Vous êtes sur la page 1sur 249

GMRIT

Academic Regulations, Curriculum and Syllabi

2016

B. Tech.
Information Technology
(4 Year Program)

Department of Information Technology


GMR Institute of Technology
Rajam, Andhra Pradesh
(An Autonomous Institute Affiliated to JNTU Kakinada, AP)
NBA Accredited and NAAC Accredited
Academic Rules and Regulations

2016

Undergraduate Programmes

GMR Institute of Technology


Rajam 532 127, Andhra Pradesh
(An Autonomous Institute, Affiliated to JNTU, Kakinada, AP)
Accredited by NAAC & NBA
GMR Institute of Technology (GMRIT) | Regulation 2016

Contents

1. Eligibility for Admission……………………………....................................................... iv


2. Duration of B. Tech. Programme……………………………………………………….. iv
3. Branches of Study…………………………………………………………………………….. iv
4. Programme Structure………………………………………………………………………. v
4.1. Credit Distribution for the Courses Offered………………………………… viii
4.2. Structure of the Curriculum……………………………………………………….. viii
4.3. Credits Break-up for Various Category of Courses………………………. x
4.4. Division of Marks for Continuous and Semester End Assessment.. xi
5. Evaluation Methodology…………………………………………………………………... xii
5.1. Continuous Assessment Pattern for all Courses…………………………... xii
6. Attendance Requirements………………………………………………………………... xvi
7. Promotion Policies…………………………………………………………………………… xvi
8. Graduation Requirements………………………………………………………………… xvii
9. Flexibility to Add or Drop Courses……………………………………………………. xix
10. Withdrawal from Examination…………………………………………………………. xix
11. Curriculum……………………………………………………………………………………… xx

ii
GMR Institute of Technology (GMRIT) | Regulation 2016

The Vision of GMRIT

 To be among the most preferred institutions for engineering and technological


education in the country
 An institution that will bring out the best from its students, faculty and staff – to learn,
to achieve, to compete and to grow – among the very best
 An institution where ethics, excellence and excitement will be the work religion, while
research, innovation and impact, the work culture

The Mission of GMRIT

 To turnout disciplined and competent engineers with sound work and life ethics
 To implement outcome based education in an IT-enabled environment
 To encourage all-round rigor and instill a spirit of enquiry and critical thinking among
students, faculty and staff
 To develop teaching, research and consulting environment in collaboration with
industry and other institutions

iii
GMR Institute of Technology (GMRIT) | Regulation 2016

Academic Regulations for B.Tech. Programme*


(For all the batches of candidates admitted in the Academic Year 2016–2017 and subsequently)

1. Eligibility for Admission


The total seats available as per the approved intake are grouped into two categories viz.
category A and Category B with a ratio of 70:30 as per the state government guidelines vide G.O
No.52
a. The admissions for category A and B seats shall be as per the guidelines of Andhra
Pradesh State Council for Higher Education (APSCHE) in consonance with
government reservation policy.
 Under Category A: 70% of the seats are filled through EAMCET counseling.
 Under Category B: 30% seats are filled based on 10+2 merits in compliance
with guidelines of APSCHE

b. Admission eligibility-Under Lateral Entry Scheme

Students with diploma qualification have an option of direct admission into 2 nd year
B. Tech. (Lateral entry scheme). Under this scheme 20% seats of sanctioned intake
will be available in each course as supernumerary seats. Admissions to this three
year B Tech later entry Programme will be through ECET. The maximum period to
complete B. Tech. under lateral entry scheme is six consecutive academic years from
the date of joining.

2. Duration of the Programme

The course duration for the award of the Degree in Bachelor of Technology will be four
academic years, with two semesters in each year. However if a student is unable to complete the
course within 4 years, he/ she can do so by giving more attempts but within 8 consecutive
academic years from the date of admission.
Academic Calendar
For all the eight semesters a common academic calendar shall be followed in each semester by
having sixteen weeks of instruction, one week for the conduct of practical exams and with three
weeks for theory examinations and evaluation. Dates for registration, sessional and end
semester examinations shall be notified in the academic calendar of every semester. The
schedule for the conduct of all the curricular and co-curricular activities shall be notified in the
planner.
3. Branches of Study
B. Tech. Programmes
I. Chemical Engineering(CH)
II. Civil Engineering (CE)

*
Approved in the Academic Council Meeting held on March 24, 2018 (Satruday)

iv
GMR Institute of Technology (GMRIT) | Regulation 2016

III. Computer Science and Engineering (CS)


IV. Electrical and Electronics Engineering (EE)
V. Electronics and Communication Engineering (EC)
VI. Information Technology (IT)
VII. Mechanical Engineering (ME)
VIII. Power Engineering (PE)

4. ProgrammeStructure

The curriculum will consist of courses of study (Theory, Practical, Contemporary Courses,
Mini Project, Term Papers, Project, Audit Courses, Self-study Courses,MOOCs, Summer
Internship and Full Semester Internship and Courses related Employability Skills) and
syllabi as prescribed by the respective Boards of Studies from time to time. The curriculum is
bifurcated into FSI and Non-FSI modes from 7th semester onwards.

Every student will be required to opt for six elective courses spanned across the semester from
4th to 8th semester from the list of electives as prescribed in the curriculum. Under Choice Based
Credit System (CBCS), the students may take one elective from the list of open electives offered
by other branches of engineering technology in consultation with their respective department.

a. Integrated Courses: Integrated courses are exclusively designed to provide a


unique learning experience to the students with the concept of layered learning
where in the students have the chances to practice while learning. These courses
designed by blending both theory and laboratory components in their core
curriculum and will be evaluated for 130 marks.
b. Contemporary Courses: These courses are designed with the help of experts from
industries and driven by experts from industries along with the internal faculty
members on the recent developments in core areas of engineering and technology.
These courses shall be registered as an elective course during their course of study
c. Mini Project: The curriculum offers Mini Projects in two different forms viz: (i) Mini
Project as a mandatory component in all lab courses (ii) 2 credit Mini Project during
5th or 6th semester. With respect to second one (ii) students will take mini project
batch wise and the batches will be divided as similar to lab courses. The report will
be evaluated by a committee as nominated by CoE constituted with internal &
external panels
d. Term Paper: The Term Paper is a self-study report and shall be carried out either
during 5th or 6th semester in choice with Mini Project. Every student will take up
this term paper individually and submit a report. The scope of the term paper could
be an exhaustive literature review choosing any engineering concept with reference
to standard research papers or an extension of the concept of earlier course work in
consultation with the term paper supervisor. The report will be evaluated by a
committee as nominated by HoD with the approval of CoE

v
GMR Institute of Technology (GMRIT) | Regulation 2016

e. Project work: The final project work shall be carried out during the 8th semester in
the non- FSI Model. Projects will be taken up batch wise. Internal evaluation will be
done by the Project Review Committee (PRC), comprising of HOD and two senior
faculty members along with the project supervisor. Semester end evaluation will be
done by Project Evaluation Committee (PEC) comprising of three members
including HOD, project guide and an external examiner nominated by the CoE
f. Audit Courses: Audit courses are among the compulsory courses and do not carry
any credits. All the students shall register for one Audit courses in the beginning of
3rdsemester. List of the courses will be notified at the beginning of the third
semester for all students and the student has to choose one audit course under self-
study mode at the beginning of third semester. All the students (regular and lateral
entry students) shall complete the audit course similar to other regular courses and
the results will be indicated with “Satisfactory” or “Not Satisfactory” performance.
g. Self-Study Courses: Self-study courses are the courses which are more similar to
theory courses where in the students learn the courses on independent mode. The
evaluation and assessment pattern for such courses shall be carried out as similar to
regular theory course. These courses shall be opted after getting proper approval
from the respective head of the department as well from the other head of the
department which is offering the course. The credits earned through these self-
study courses over and above the mandatory courses, and it will not be accounted in
CGPA calculation.
h. MOOCs: Meeting with the global requirements, to inculcate the habit of self-learning
and in compliance with UGC guidelines, MOOC (Massive Open Online Course) have
been introduced as electives
 The proposed MOOCswould be additional choices in all the elective
groups subject to the availability during the respective semesters and
respective departments will declare the list of the courses at the
beginning of the semester, which are having a minimum of 45 hours in a
given semester
 Course content for the selected MOOCs shall be drawn from respective
MOOCs links or shall be supplied by the department. Course will be
mentored by faculty members and Assessment & evaluation of the
courses shall be done by the department
 Three credits will be awarded upon successful completion of each
MOOCs
i. Summer Internship: As a part of curriculum in all branches of Engineering, it is
mandatory for all students to undergo summer internship Programme at industries
(core or allied) / R & D organization to get practical insight of their subject domain
during summer break after the 4th semester. This summer internship Programme
shall be availed to a maximum duration of 4 weeks and the assessment shall be

vi
GMR Institute of Technology (GMRIT) | Regulation 2016

carried out with both internal and external experts leading to “Satisfactory” and
“Non-Satisfactory Performance” and it will not be accounted for the calculation of
CGPA
j. Employability Skills: It is mandatory for all students to take a course on
Employability Skills from 3rd Semesterto 6th Semester. The Employability Skills are
covered under two broad streams viz. Aptitude skills and Soft Skills. The credits
earned through these courses will be indicated in the grade sheet and will not be
taken into account for CGPA calculation.
k. Industry Driven One Credit Courses (IDC): Meeting with the industry
requirements, to reduce the gap between industry and academia this one credit (15
hrs.) course has been introduced over and above regular courses from 3rd Semester
to 6th Semester for the interested students. Thecredits earned through these courses
will be indicated in the grade sheet and will not be taken into account for CGPA
calculation.
l. Full Semester Internship: Students can opt for full semester Internship
Programme at industries based on their self-interest either during 7th or 8th
semester to get practical insight relevant to their core branch of engineering or in
allied branch of study under the guidance of internal and external expert members
in the institute and at Industries respectively. All Students who wish to choose FSI
pattern shall exercise this option well before the commencement of 7th semester.
Students who wish to take FSI during 8th semester will have to take one additional
course in 7th semester when compared with Non FSI stream. In case of some
extraordinary cases, students may be permitted to choose the FSI pattern even
before the commencement of 8th semester. In all such cases student shall take one
additional course offered during 8th semester under self-study mode and acquire
the required credits.
i. Minimum CGPA cut-off up to 5th semester as prescribed by CDC
ii. Competency mapping
iii. Students who opt for FSI either in 7th or 8th will be provided with Internship
subject the availability/selection by the industries

Further the credits earned through FSI Programme will be indicated in the grade sheet
and will be accounted for the calculation of CGPA.
FSI final evaluation will be done by the FSI Review Committee (FSIRC), comprising of
HOD,one senior faculty member and External (Industry) expert nominated by HOD.

vii
GMR Institute of Technology (GMRIT) | Regulation 2016

4.1. Credit Distribution for Courses Offered

No Course Credits
1 Theory Course 3
2 Integrated Course 4
3 Laboratory/Drawing Course 2
4 MOOCs 3
5 Elective courses 3
6 Audit Course 0
7 Term Paper 2
8 Mini Project 2
9 Summer Internship 0
10 Project work 10
11 Full Semester internship 16
Co-curricular and Extra-Curricular
12 2
Activities(CCEC)
13 Employability Skills (ES) 2
14 Industry Driven One Credit Courses (IDC) 1

4.2. Structure of curriculum


Following are the TWO models of course patterns out of which any student shall choose
one model based on the notified criteria for selection.

a. Full Semester Internship (FSI) Model


b. Non Full Semester Internship Model
In the Full semester internship Model, the students selected/opted for internship will be
distributed in both the 7th and 8th semester based on the internships available. In the Non
Full Semester Internship Model, all the selected students shall carry out the Project work
as per the norms.

A. Course Pattern for Four year Regular Programme (FSI)

Total
Sem. No. of Theory Courses No. of Lab Courses
Credits
I 21
5 3
II 21
III 3 + Employability Skills+ CCEC 25
6(5 Theory + 1 Integrated) 3+ CCEC Activities+
IV 25+1 + 1
Employability Skills
Summer Internship (Audit course) 0
6 (4 Compulsory Theory + 1 1+ Term paper/Mini Project +
V 23
Integrated + 1 Elective) Employability Skills+ CCEC
6 + Audit course 1 + Term paper/Mini project +
VI (3 Compulsory Theory + 1 CCEC Activities + Employability 23+1+1
Integrated + 2 Elective) Skills
VII Full semester internship 16

viii
GMR Institute of Technology (GMRIT) | Regulation 2016

VIII 4 (2 Compulsory + 2 Elective) 2 16


16+Term paper +Mini project+
Internship +CCEC +
Total 34+4+1 Audit courses 174
EmployabilitySkills+ Audit
Course

B. Course Pattern for Four Year Regular Programme (Non-FSI)


Total
Sem. No. of Theory Courses No. of Lab Courses
Credits
I 21
5 3
II 21
III 3+ Employability Skills + CCEC 25
6 (5 Theory + 1 Integrated)
IV 3+ Employability Skills +CCEC 25 + 1+1
Summer Internship (Audit course) 0
6 (4 Compulsory Theory + 1 1+ Term paper/Mini Project +
V 23
Integrated + 1 Elective) Employability Skills+ CCEC
6+ Audit course 1 + Term paper/Mini project+
VI (3 Compulsory Theory + 1 CCEC Activities + Employability 23 + 1+1
Integrated + 2 Elective) Skills
VII 3 (1 Compulsory + 2 Elective) 2 13

VIII 3 (2 Compulsory + 1 Elective) Project work 19


16+Term paper + Mini project +
36+4+1 Audit courses Project work +CCEC + 174
Total
Employability Skills

C. Course Pattern for Three Year Lateral Entry Programme (FSI)

Total
Sem. No. of Theory Courses No. of Lab Courses
Credits
III 3 + Employability Skills+ CCEC 25
6 (5 Theory + 1 Integrated) 3+ CCEC Activities+ Employability
IV 25 + 1+1
Skills
Summer Internship (Audit course) 00
6 (4 Compulsory Theory + 1 1+ Term paper/Mini Project +
V 23
Integrated + 1 Elective) Employability Skills+ CCEC
6+ Audit course 1 + Term paper/Mini project
VI (3 Compulsory Theory + 1 CCEC Activities + Employability 23 + 1+1
Integrated + 2 Elective) Skills
VII Full semester internship 16

VIII 4 (2 Compulsory + 2 Elective) 2 16

Total 24+4+1 Audit courses 10 + Term paper +Mini project+ 132

ix
GMR Institute of Technology (GMRIT) | Regulation 2016

Internship report +CCEC +


Employability Skills

D. Course Pattern for Three year Lateral Entry Programme (Non FSI)

Total
Sem. No. of Theory Courses No. of Lab Courses
Credits
III 3 + Employability Skills+ CCEC 25
6 (5 Theory + 1 Integrated)
3+ CCEC Activities+ Employability
IV 24 + 1+1
Skills
Summer Internship (Audit course) 00
6 (4 Compulsory Theory + 1 1+ Term paper/Mini Project +
V 23
Integrated + 1 Elective) Employability Skills+ CCEC
6 + Audit course 1 + Term paper/Mini project +
VI (3 Compulsory Theory + 1 CCEC Activities + Employability 24 + 1+1
Integrated + 2 Elective) Skills
VII 3 (1 Compulsory + 2 Elective) 2 13

VIII 3 (2 Compulsory + 1 Elective) Project work 19


10 + Term paper +Mini project+
Total 26+4+1 courses Internship report +CCEC + 132
Employability Skills

4.3 Credit Break-up for Various Category of Courses


a. For Four year regular Programme (FSI)
Total Theory Courses : 34 @ 3 credits each = 102
(29 Core Courses + 5 Elective Courses)
Total Integrated Courses : 4 @ 4 credits each = 16
Total Laboratory Courses : 16 @ 2 credits each = 32
Term Paper with self-study report : 1 @ 2 credits = 2
Mini Project with self-study report : 1@ 2 credits = 2
CCEC Activities : 2 @ 1 credits = 2
Employability skills : 2@ 1 credits = 2
FSI internship : 1 @ 16 credits = 16
b. For Four year regular Programme (Non FSI)

Total Theory Courses : 36 @ 3 credits each = 108


(30 Core Courses + 6 Elective Courses)
Total Integrated Courses : 4 @ 4 credits each = 16
Total Laboratory Courses : 16 @ 2 credits each = 32
Term Paper with self-study report : 1 @ 2 credits = 2
Mini Project with self-study report : 1@ 2 credits = 2

x
GMR Institute of Technology (GMRIT) | Regulation 2016

CCEC Activities : 2 @ 1 credits = 2


Employability skills : 2@ 1 credits = 2
Project work : 1 @ 10credits = 10

c. For three year lateral entry Programme (FSI)

Total Theory Courses : 24 @ 3 credits each = 72


(19 Core Courses + 5 Elective Courses)
Total Integrated Courses : 4 @ 4 credits each = 16
Total Laboratory Courses : 10 @ 2 credits each = 20
Term Paper with self-study report : 1 @ 2 credits = 2
Mini Project with self-study report : 1@ 2 credits = 2
CCEC Activities : 2 @ 1 credits = 2
Employability skills : 2@ 1 credits = 2
Internship report : 1 @ 16 credits = 16

d. For three year lateral entry Programme (Non FSI)

Total Theory Courses : 26 @ 3 credits each = 78


(20 Core Courses + 6 Elective Courses)
Total Integrated Courses : 4 @ 4 credits each = 16
Total Laboratory Courses : 10 @ 2 credits each = 20
Term Paper with self-study report : 1 @ 2 credits = 2
Mini Project with self-study report : 1@ 2 credits = 2
CCEC Activities : 2 @ 1 credits = 2
Employability skills : 2@ 1 credits = 2
Project work : 1 @ 10credits = 10

4.4 Division of Marks for Continuous and Semester End Assessment

Marks Marks for


Course Continuous Semester end
Assessment Assessment
Theory 40 60
Integrated Course 40 (60T+30L)
Drawing courses 25 50
Laboratory 25 50
Term Paper 50 --
Audit Courses 50 --
Mini Project 25 50
Industry Driven Courses (IDC) 25 --
Full semester Internship 200 200
Project work 100 100

xi
GMR Institute of Technology (GMRIT) | Regulation 2016

5. Evaluation Methodology
a. The assessment will be based on the performance in the semester-end examinations and /
or continuous assessment, carrying marks as specified in Clause 10
b. At the end of each semester, final examinations will normally be conducted during
October/November and during April / May of each year. Supplementary examinations may
also be conducted at such times as may be decided by the Institute
c. Continuous Assessment Marks will be awarded on the basis of Continuous Evaluation made
during the semester as per the scheme given in Clause 10
d. The letter grade and the grade points are awarded based on the hybrid grading system
having earned grades and awarded grades. Grading is done based on the percentage of
marks secured by a candidate in individual course as detailed below:

Range of Percentage Letter Qualitative Grade


of Marks Grade Meaning Point
90-100 A+ Outstanding 10
Earned grade
85-89 A Excellent 9
Due to relative B+ Very Good 8
grading system the B Good 7
ranges of marks may C+ Average 6 Awarded grade
vary for each course C Satisfactory 5
based on the normal D Pass 4
distribution of marks
< 40 for theory and F Fail 0
Earned grade
< 50 for Lab

e. After completion of the Programme, the Cumulative Grade Point Average (CGPA) from the I
Semester to VIII Semester (from III to VIII semester for lateral entry) is calculated using the
formula:

Where n is the number of courses registered for, ‘ci’ is the credits allotted to the given
course and ‘gi’ is the grade point secured in the corresponding course.

5.1 Continuous Assessment Pattern for all Courses


a. Theory Course

Out of 40 marks allotted for continuous assessment 30 marks will be awarded based
on two tests(Each Test will be conducted for 40 marks and scale down to 30
marks)conducted and10 marks shall be awarded based on assignment test given
below:
Internal Test 1 & Test 2 : 30 Marks (80 % of marks secured in 1 st best internal tests
and 20% markssecured in 2nd best internal test)
The duration of each internal test will be 90 minutes addressing predominantly
on lower order thinking skills and shall cover two units of syllabus in each test
All the students will be notified with the marks secured within one week after the
completion of the sessional exams

xii
GMR Institute of Technology (GMRIT) | Regulation 2016

Students are permitted for reconciliation with in a period of two working days
after the notification of marks
The evaluation methodology of Design and Drawing Courses coming under
theory will be given in their respective course handouts which will be approved
by department HOD.

Assignment Test : 10 Marks (Test will be conducted for 30 marks and scale
scale down to 10 marks)
The duration of each test will be 120 minutes predominantly focusing on Higher
Order Thinking Skills covering all the possible range of all such HOTs. In case, if
the course has little scope of HOTs, assessment shall be carried out with LOTs

b. Integrated Course
40 marks allotted for continuous assessment as given below:
Theory Course
20 marks will be awarded based on two tests conducted similar to theory( Each Test
will be conducted for 40 marks and scale down to 20 marks) as given below:
Internal Test 1 & Test 2 : 20 Marks (80 % of marks secured in 1 st best internal tests
and 20% marks secured in 2nd best internal test)
Laboratory
20 marks are awarded for continuous assessment and following is the pattern for the
award of 20 marks
Preparation, Observation &Result :10 Marks
Record : 05 Marks
Internal Test : 05 Marks
External Exam (Lab) : 30 Marks
External Exam (Theory) : 60 Marks
c. Laboratory Course:

25 marks are awarded for continuous assessment and following is the pattern for
the award of 25 marks
Without Mini Project:
Preparation, Observation & Result : 10 Marks
Record : 05 Marks
Internal Test : 05 Marks
Viva – Voce : 05 Marks
With Mini Project (through Augmented Experiments):
Preparation, Observation & Result : 05 Marks
Record : 05 Marks
Internal Test : 05 Marks
Viva – Voce : 05 Marks
Augmented Experiment : 05 Marks

xiii
GMR Institute of Technology (GMRIT) | Regulation 2016

Engineering drawing courseisevaluated in line with lab courses and the pattern
of awarding 25 marks for continuous evaluation is as following
Day-to-day work : 15 marks
Internal test : 10 marks

There shall be two internal tests for 10 marks each during the semester and the
average shall be considered.

d. Term Paper
Continuous Assessment : 50 Marks

Distribution
Literature Survey : 10 Marks
Review 1 : 15 Marks
Review 2 : 15 Marks
Final Presentation : 10 Marks
e. Audit Courses
Online Objective Test : 50 Marks
f. Mini Project
Continuous Assessment : 25 Marks
Distribution
Review 1 : 05 Marks
Review 2 : 05 Marks
Literature Survey : 05 Marks
Final Presentation : 05 Marks

g. Project
Continuous Assessment : 100 Marks
Distribution
Innovativeness of the Project : 05 Marks
Literature Survey : 10 Marks
Experimentation / Simulation : 20 Marks
Result Analysis : 05 Marks
Review 1 : 20 Marks
Review II : 20 Marks
Final Presentation : 10 Marks
Project Report : 10 Marks

h. Full Semester Internship


Continuous Assessment : 200 Marks
Distribution
Internship Progress Report : 20 Marks

xiv
GMR Institute of Technology (GMRIT) | Regulation 2016

On Site Assessment : 30 Marks


Assessment by Industry : 100 Marks
(Intern Assessment Tool)
Final Assessement on Campus : 50 Marks
Total : 200 Marks
Distribution
Project Report : 120 Marks
Final Presentation : 80 Marks

i. Co-Curricular and Extra Curricular (CCEC) Activities

Students shall acquire 1 credit each in 2nd and 3rd years with the following
scheme:
Scheme of evaluation for the CCEC activities:
No. of slots in each Semester @ 2 slots every week : 24
No. of Stream (2-CC + 1-EC) :3
No. of slots allotted for each stream :8
Requirement for the award of 1- Credit
Students shall choose at least two streams of events in each semester
Students shall secure 75% attendance in each stream of events to obtain
a certificate
Students shall obtain 2 certificates of Participation in each semester.

The credits earned through these courses will be indicated in the grade sheet and
will not be taken into account for CGPA calculation.

j. Employability Skills (ES)

Students have to take up these courses from 3rd – 6th semesters. In both streams i.e
Aptitude Skills & Soft Skills (AS and SS) Students will be assessed in each semester.
Based on the marks secured in continuous assessment, students will be assessed for
AS. Based on the attendance for the various activities scheduled, students will be
assessed for SS. 16 periods are allotted for each stream per semester.

Assessment for Aptitude skills


Continuous assessment : 30 Marks
Comprehensive Test : 20 Marks

For continuous assessment one examination will be conducted after every 5 weeks for
a maximum of 10 marks each(3x10=30). At the end of the semester a comprehensive
test will conducted for 20 marks. The student shall secure at least 40% marks in each
semester to get qualified.

xv
GMR Institute of Technology (GMRIT) | Regulation 2016

Assessment of Soft Skills


Continuous Assessment for Soft skill is done based on the participation of the students
in the various activities schedule during each semester. In every semester 6 activities
under SS will be organized and students are expected to attend at least 4 activities to
get qualified.

Student will secure 1 credit at the end of 4th semester and at the end of 6th semester
subject to the condition that he/she secures 40% marks in AS and 75 attendance in SS
in each semester.

h. Industry Driven One Credit Courses


Online Objective Test : 25 Marks
Grading:
Marks 25 ≤ and 20 ≥ : Excellent
Marks 20 < and 15 ≥ : Very Good
Marks 15 < and 10 ≥ : Good
Marks < 10 : Satisfactory

6. Attendance Requirements

a) It is desirable for a candidate to put on 100% attendance in all the subjects.


However, a candidate shall be permitted to appear for the semester end
examination by maintaining at least 75% of attendance on an average in all the
courses in that semester put together
b) The shortage of attendance on medical grounds can be condoned to an extent of
10% provided a medical certificate is submitted to the Head of the Department
when the candidate reports back to the classes immediately after the leave.
Certificates submitted afterwards shall not be entertained. Condonation fee as fixed
by the college for those who put on attendance between ≥ 65% and <75% shall be
charged before the end examinations. Attendance may also be condoned as per the
State Government rules for those who participate in sports, co-curricular and extra-
curricular activities provided their attendance is in the minimum prescribed limits
for the purpose and recommended by the concerned authority
c) In case of the students having overall attendance less than 65% after condonation
shall be declared detained and has to repeat semester again
d) In case of the student having less than 65% of attendance in any of the course
during a particular semester, he/she is not permitted to appear for that particular
course in the semester end examinations. In such cases, the students need to
undergo extra classes during the vacation or at convenient time to earn the shortage
of attendance. After completing the attendance requirements he/she may be
permitted to appear for the examination and it will be treated as a second attempt
e) His / her academic progress and conduct have been satisfactory

7. Promotion Policies

xvi
GMR Institute of Technology (GMRIT) | Regulation 2016

 In four year B. Tech.Programme, a student shall be promoted from 2nd year to 3rd
year only if s/he fulfills the academic requirements and earning of minimum 50% of
credits up to 2nd year
 In four year B. Tech.Programme, a student shall be promoted from 3rd year to 4th
year only if s/he fulfills the academic requirements and earning of minimum 50%
credits up to 3rd year
 In three year lateral entry B. Tech.Programme, a student shall be promoted from 3rd
year to 4th year only if s/he fulfills the academic requirements and earning of
minimum 50% credits up to 3rd year

8. Graduation Requirements

a) The following academic requirements shall be met for the award of the B. Tech. Degree
 Student shall secure 174 credits for regular B. Tech.Programme and 132 credits for
the students who entered in second year through lateral entry scheme. However, the
CGPA obtained for the best 167credits(Excluding any one 3 credit course, CCEC and
ES) and 125credits(Excluding any one 3 credit course, CCEC and ES)respectively shall
be considered for the award of Grade/Class/Division
 A student of a regular Programme who fails to earn 174 credits within eight
consecutive academic years from the year of his/her admission with a minimum CGPA
of 4.0 shall forfeit his/her degree and his/her admission stands cancelled
 A student of a lateral entry Programme who fails to earn 132credits within six
consecutive academic years from the year of his/her admission with a minimum CGPA
of 4.0 shall forfeit his/her degree and his/her admission stands cancelled

b) Award of degree

Classification of degree will be as follows:

i. CGPA ≥7.5 : Degree with Distinction


ii. CGPA ≥6.5 and < 7.5 : Degree with First Class
iii. CGPA ≥5.0 and < 6.5 : Degree with Second Class
iv. CGPA ≥4.0 and < 5.0 : Degree with Pass Class

 First Class with Distinction: A candidate who qualifies for the award of the Degree
(vide clause 8 (a) having passed all the courses of study of all the eight semesters
(six semesters for lateral entry candidates) at the first opportunity, within eight
consecutive semesters (six consecutive semesters for lateral entry candidates) after
the commencement of his /her study and securing a CGPA of 7.5 and above shall be
declared to have passed in First Class with Distinction. For this purpose the
withdrawal from examination (vide clause 9) will not be construed as an
opportunity for appearance in the examination
 First Class: A candidate who qualifies for the award of the Degree (vide clause 8 (a)
having passed all the courses of study of all the eight semesters (six semesters for
lateral entry candidates) within maximum period of ten consecutive semesters

xvii
GMR Institute of Technology (GMRIT) | Regulation 2016

(eight consecutive semesters for lateral entry candidates) after the commencement
of his /her study and securing a CGPA of 6.5 and above shall be declared to have
passed in First Class
 Second Class : A candidate who qualifies for the award of the Degree (vide clause 8
(a) having passed all the courses of study of all the eight semesters (six semesters
for lateral entry candidates) within maximum period of ten consecutive semesters
(eight consecutive semesters for lateral entry candidates) after the commencement
of his /her study and securing a CGPA of 5.0 and above shall be declared to have
passed in Second Class
 Degree with Pass Mark : All other candidates who qualify for the award of the
degree shall be declared to have passed in Degree with Pass Mark
c) Grafting
In order to extend the benefit to the students with one/ two backlogs after either 6 th
semester or 8th semester, GRAFTING option is provided to the students enabling their
placements and fulfilling graduation requirements. Following are the guidelines for the
Grafting:
 Grafting will be done among the courses within the semester. Shall draw a
maximum of 7 marks from the any one of the cleared courses in the semester and
will be grafted to the failed course in the same semester.
 Students shall be given a choice of grafting only once in the 4 years Programme,
either after 6th semester (Option#1) or after 8th semester (Option#2)
 Option#1: Applicable to students who have maximum of TWO theory courses in 5 th
and/or 6th semesters
 Option#2: Applicable to students who have maximum of TWO theory courses in 7 th
and/or 8th semesters.
 Eligibility for grafting:
i. Prior to the conduct of the supplementary examination after the
declaration of the 6th or 8th semester results.
ii. She/he must appear in all regular or supplementary examinations as
per the provisions laid down in regulations for the courses s/he
appeals for grafting.
iii. The marks obtained by her/him in latest attempt shall be taken into
account for grafting of marks in the failed course(s).
d) Betterment chance
Student who clears all the subjects up to 6th semester and wish to improve their CGPA
can register and appear for one betterment chance for maximum of any five theory
courses upto 6th semester. Betterment chance can be availed along with 7th and 8th
semester examinations

e) Quick Supplementary Examination


Student who clears all the courses up to 7th semester shall have a chance to appear for
Quick Supplementary Examination to clear the failed courses of 8th semester

xviii
GMR Institute of Technology (GMRIT) | Regulation 2016

f) All the candidates who register for the semester end examination will be issued
memorandum of marks by the Institute. Apart from the semester wise marks memos,
the institute will issue the provisional certificate subject to the fulfillment of all the
academic requirements

9. Flexibility to Add or Drop Courses

a. It is mandatory that all the students need to earn the minimum number of credits (as
per clause 8) for the award of B. Tech. degree in their respective disciplines. However a
student can earn more number of credits if they wish, by registering one additional
course, from the list of courses available in the curriculum of all disciplines, over and
above to the existing courses from 4th semester to 6th semester
b. The students who are opting for full semester internship (FSI) in the 7th or 8th Semester,
they are permitted to take the courses as listed in 7th and 8th semester of the curriculum
are from the list of electives furnished in the curriculum
c. The students, who are in non FSI mode, shall register for the project work in the 8 th
semester only
d. The student shall be permitted to drop any SSC at any point of time
e. All the courses registered and cleared by a student in this mode will be mentioned in the
Cumulative Grade Memo (CGM) as additional acquired. However the CGPA is calculated
for the best 167/125 credits only (as mentioned in the clause 8)

10. Withdrawal from the Examination

a. A candidate may, for valid reasons, be granted permission by the Principal to withdraw
from appearing for the examination in any course or courses of only one semester
examination during the entire duration of the degree Programme. Also, only ONE
application for withdrawal is permitted for that semester examination in which
withdrawal is sought
b. Withdrawal application shall be valid only if the candidate is otherwise eligible to write
the examination and if it is made prior to the commencement of the examination in that
course or courses and also recommended by the Head of the Department
c. Such Withdrawal from the examination shall be treated as absent for the 1 st attemptto
the respective examination and will lose the eligibility for First Class with Distinction
d. The student shall be allowed to drop FSI course either 7th or 8th semester within 4
weeks from the commencement of the FSI Programme due any uncertainty from either
side. In such case s/he will automatically entered into Non-FSI pattern of curriculum,
and s/he needs to register for respective courses in that semester and appear for
semester end examinations. In case if s/he has earned equivalent number of credits or
near to the equivalent number of credits with respect to clause 9, s/he shall forbid the
courses either partially or fully
e. If any student withdraws from FSI course after the stipulated period mentioned in the
clause 10.d, s/he will be considered as detained from the semester. S/he needs to
register for the semester in the next academic year

xix
GMR Institute of Technology (GMRIT) | Regulation 2016

General

a. s/he represents “she” and “he” both


b. Where the words ‘he’, ‘him’, ‘his’, occur, they imply ‘she’, ‘her’, ‘hers’ also
c. The academic regulations should be read as a whole for the purpose of any interpretation
d. In the case of any doubt or ambiguity in the interpretation of the above rules, the decision of
the Chairman, Academic Council will be final

The college may change or amend the academic regulations or syllabi from time to time and the
changes or amendments made shall be applicable to all the students with effect from the dates
notified by the institute.

11.Curriculum: The curriculum of all the UG Programmes is given below

xx
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Department Vision

To be a preferred department of learning for students and teachers alike, with dual commitment
to academics and research, serving students in an atmosphere of innovation and critical thinking.

Department Mission

1. To provide adoptable education preparing the graduates for a rewarding career in


Information Technology and related industries, in tune with evolving needs of the
industry.
2. To prepare the students as thinking professionals and good citizens who will be able to
apply their knowledge critically and innovatively in solving professional and social
problems.

Program Educational Objectives


PEO 1: Be a competent software engineer/developer either as an individual or as a team
player in IT industry and allied branches providing viable solutions
PEO 2: Initiate life-long learning to acquire new technologies and adapt to the changing
needs of IT industry through self-study, graduate work, and professional
development
PEO 3: Exhibit professional excellence, ethics, soft skills, leadership qualities as a
responsible citizen with societal interest.

1
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Program Outcomes
Engineering graduate will be able to

PO 1: Apply the knowledge of mathematics, science, engineering fundamentals, and an


engineering specialization to the solution of complex engineering problems.(Engineering
knowledge)
PO 2: Identify, formulate, review research literature, and analyze complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural
sciences, and engineering sciences.(Problem analysis)
PO 3: Design solutions for complex engineering problems and design system components or
processes that meet the specified needs with appropriate consideration for the public
health and safety, and the cultural, societal, and environmental
considerations.(Design/development of solutions)
PO 4: Use research-based knowledge and research methods including design of experiments,
analysis and interpretation of data, and synthesis of the information to provide valid
conclusions.(Conduct investigations of complex problems)
PO 5: Create, select, and apply appropriate techniques, resources, and modern engineering and
IT tools including prediction and modeling to complex engineering activities with an
understanding of the limitations.(Modern tool usage)
PO 6: Apply reasoning informed by the contextual knowledge to assess societal, health, safety,
legal and cultural issues and the consequent responsibilities relevant to the professional
engineering practice.(The engineer and society)
PO 7: Understand the impact of the professional engineering solutions in societal and
environmental contexts, and demonstrate the knowledge of, and need for sustainable
development.(Environment and sustainability)
PO 8: Apply ethical principles and commit to professional ethics and responsibilities and norms
of the engineering practice.(Ethics)
PO 9: Function effectively as an individual, and as a member or leader in diverse teams, and in
multidisciplinary settings.(Individual and team work)
PO 10: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as, being able to comprehend and write
effective reports and design documentation, make effective presentations, and give and
receive clear instructions.(Communication)
PO 11: Demonstrate knowledge and understanding of the engineering and management
principles and apply these to one’s own work, as a member and leader in a team, to
manage projects and in multidisciplinary environments.(Project management and
finance)
PO 12: Recognize the need for, and have the preparation and ability to engage in independent
and life-long learning in the broadest context of technological change.(Life-long
learning)
PSO1: Analyze, design and develop efficient algorithms and software applications to deploy in
secure environment to support contemporary services (Program Specific)
PSO2: Develop software solutions using open source environment to deliver quality products for
business success (Program Specific)

2
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

CURRICULUM FEATURES
UNDER ACADEMIC REGULATION 2016
1. Choice based credit system
2. Types of learning strategies

Curriculum is designed and developed in such a way that it provides a high degree of
flexibility to promote a learner centric environment through different types of learning
strategies viz. Independent learning, collaborative learning and interactive learning.

 Independent learning
o Self study elective courses
o Self study topics in each unit in all the courses
 Collaborative Learning
o Laboratory classes
o Mini projects in all laboratory courses
o Main project to demonstrate all the possible learning outcomes
 Interactive Learning
o Tutorial classes in all the courses wherever possible

3. Industry engagement
 Industry driven 3-credit elective courses
 Industry driven 1-credit courses from 3rd semester onwards
 Summer internship (One month duration) at the end of 2nd year during the program
of study
 Full semester internship (FSI) (Six month) during fourth year during the program of
study
4. Layered learning
5. Research oriented electives in the form of term paper
6. Credited courses for employability skills, extra- and co- curricular activities
7. Assessment pattern for all courses in accordance with revised Bloom’s taxonomy
8. Distribution of courses

3
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Department of Information Technology


[Minimum Credits to be earned: 174 (for regular students)/132(for lateral entry students)]
First Semester
Course Periods
No Course POs& PSOs
Code L T P C
1 16HSX01 English Communication Skills I 10 3 1 - 3
2 16MAX01 Engineering Mathematics I 1,2 3 1 - 3
3 16PYX01 Engineering Physics 1,2 3 1 - 3
4 16MEX01 Engineering Mechanics 1,2,3 3 1 - 3
5 16CSX01 Problem Solving using C 1,2,3 3 1 - 3
6 16PYX02 Engineering Physics Lab 4 - - 3 2
7 16CSX02 Problem solving using C Lab 2,3,4 - - 3 2
8 16MEX02 Engineering Drawing 4,9,10 - - 3 2
Total 15 5 9 21
Second Semester
1 16HSX03 English Communication Skills II 10 3 1 - 3
2 16MAX02 Engineering Mathematics II 1,2 3 1 - 3
3 16CYX01 Engineering Chemistry 1,2 3 1 - 3
4 16EEX01 Basic Electrical Engineering 1,3 3 1 - 3
5 16CHX01 Environmental Studies 1,3,6,7 3 1 - 3
6 16HSX02 English Communication Skills Lab 10 - - 3 2
7 16CYX02 Engineering Chemistry Lab 4 - - 3 2
8 16MEX03 Engineering Workshop 1,2,10,12 - - 3 2
Total 15 5 9 21
Third Semester
Course Periods
No Course POs& PSOs
Code L T P C
1 16EC021 Data Communication systems 2, 3 3 1 - 3
2 16CS304 Database Management Systems 1,2, 3, PSO1 3 1 - 3
3 16CS305 Digital Logic Design 1, 2, 3,4,9 3 - 2 4
4 16CS306 Discrete Structures & Graph Theory 1, 2, 3 3 1 - 3
5 16IT305 Data Structures 1, 2, 3,PSO1 3 1 - 3
6 Object Oriented Programming through
16IT306 1,2, 3, 5, PSO2 3 1 - 3
Java
7 16CS309 Database Management Systems Lab 2,3,4,5 - - 3 2
8 16IT308 Data Structures Lab 2,3,4 - - 3 2
9 16IT309 Java Lab 2,3,4,5 - - 3 2
10 16HSX05 CC&EC Activities I - - 3 -
11 16ESX01 Employability Skills I - 2 - -
Total 18 7 14 25
Fourth Semester
1 16MA405 Probability and Statistics 1,2 3 1 - 3
2 16CS404 Software Engineering 1,2, 3, 4,5 3 - 2 4
3 16CS406 Web Technologies 1,3, 5,6,PSO2 3 1 - 3
4 16IT404 Computer Networks 1,2,PSO1 3 1 - 3
5 16IT405 Computer organization 1,2 3 1 - 3
6 16IT406 Operating Systems 1,2,3 3 1 - 3
7 16CS408 Linux Programming Lab. 1,4, PSO2 - - 3 2
8 16CS409 Web Technologies Lab 3,4,5, PSO2 - - 3 2
9 16IT409 Computer Network Lab 4, 5, PSO1 - - 3 2
10 16HSX05 CC & EC Activities I - - 3 1
11 16ESX02 Employability Skills II - 2 - 1
Total 18 7 14 27

4
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Fifth Semester
Course Periods
No Course POs& PSOs
Code L T P C
1 16CS505 Design and Analysis of Algorithms 2,3 3 1 - 3
2 16CS604 Mobile Computing 1,2,3,5 3 1 - 3
3 16IT403 Automata and Compiler Design 1,2,3 3 1 - 3
4 16IT504 Cloud Computing 2,6,7,8 3 1 - 3
5 16IT505 Object Oriented Analysis and Design 2,3, 4,5 3 - 2 4
6 Elective I/CC 3 1 - 3
7 16IT507 Cloud Computing Lab 4,5,PSO1,PSO2 - - 3 2
9 16IT508/ Term Paper/ - - 3 2
2,4,8,10,12/ 2,3,4,5,8,9,10,11
16IT509 Mini Project
10 16HSX06 CC & EC Activity II - - 3 -
11 16ESX03 Employability Skills III - 2 - -
Total 18 7 11 23
Sixth Semester
1 16HSX04 Engineering Economics & Project 3 1 - 3
11
Management
2 16CS602 Data Mining 2,3,4,5 3 - 2 4
3 16CS603 Internet of Things 1,2,3,4,5,6 3 1 - 3
4 16IT604 Artificial Intelligence 1,2,3 3 1 - 3
5 Elective II/CC 3 1 - 3
6 Elective III (Open Elective) 3 1 - 3
7 16CS607 IOT Lab 4, 9 - - 3 2
8 16IT508/ Term Paper/ - - 3 2
2,4,8,10,12/ 2,3,4,5,8,9,10,11
16IT509 Mini Project
9 Audit Course - - - -
10 16HSX06 CC & EC Activity II - - 3 1
11 16ESX04 Employability Skills IV - 2 - 1
Total 18 7 11 25
Seventh Semester
Course Periods
No Course POs& PSOs
Code L T P C
1 16IT701 Big Data Analytics 2,5,6 3 1 - 3
2 Elective IV/CC 3 1 - 3
3 Elective V/CC 3 1 - 3
4 16CS705 Mobile application Development lab 2,3, 8 - - 3 2
5 16IT705 Big Data Analytics Lab 3,4,5 - - 3 2
6 16IT706 Full Semester Internship1 1,2,5,8,9,10,11,12 - - - 16
Total 9 3 6 13/16
Eighth Semester
1 16CS802 Machine Learning 2,5 3 1 - 3
2 16IT802 Professional Ethics 6,8 3 1 - 3
3 Elective VI/CC 3 1 - 3
4 16IT804 Project 3, 4,9,10,11,12, PSO1,PSO2 - - 3 10
5 16IT706 Full Semester Internship2 1,2,5,8,9,10,11,12 - - - 16
Total 9 3 3 19/16

1
Student who opt for FSI-16IT706 during 7th semester, have to register one more additional elective and 16CS705 &
16IT705 as additional lab courses during 8th semester
2
Student the who opt for FSI-16IT706 during 8th semester, have to register an additional course in consultation with
HoD during 7th semester

5
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

List of Electives

Elective I
Course Periods
No Course POs& PSOs
Code L T P C
1 16IT001 Information System Design 3,5 3 1 - 3
2 16CS001 Computer Graphics & Multimedia 2,3,5 3 1 - 3
3 16CS004 Real Time Operating Systems 2, 3 3 1 - 3
4 MOOCs - - - 3
Elective II
1 16IT002 Distributed Systems 2,7 3 1 - 3
2 16IT003 Information Retrieval Systems 3,6,8 3 1 - 3
3 16IT004 Information Theory & Coding 1,2,3,6,8 3 1 - 3
4 MOOCs - - - 3
Elective III (Open Electives – Mathematics, Chemistry, Entrepreneurship Skills, Industrial Safety and Engineering
& Technology)
1 16CE007 Disaster Management 2 3 1 - 3
2 16EE004 Renewable Energy Sources 2,7 3 1 - 3
3 16ME007 Principles of Entrepreneurship 1,5,8,11 3 1 - 3
4 16EC004 Fundamentals of Global Positioning System 1,2,6 3 1 - 3
5 16CS006 Computational Intelligence 2,3,5 3 1 - 3
6 16CS007 IOT for Engineering Applications 1,5 3 1 - 3
7 16CH008 Industrial Safety and Hazard Management 1,2,3,6,8 3 1 - 3
8 16IT005 Fundamentals of Cloud Computing 2,6,7,8 3 1 - 3
9 16PE006 Smart Grid Technologies 3,5 3 1 - 3
10 16MA001 Computational Mathematics 1,2 3 1 - 3
11 16CY001 Nano Science & Technology 1,12 3 1 - 3
Elective IV
1 16IT006 Human Computer Interaction 5,7 3 1 - 3
2 16IT007 Middleware Technologies 5,11,PSO1,PSO2 3 1 - 3
3 16CS008 Software Project Management 3,5,6 3 1 - 3
4 16CS003 Qualitative Data Analysis 3,5 3 1 - 3
5 MOOCs - - - 3
Elective V
1 16EC602 Digital Signal Processing 1,2,3,PSO2 3 1 - 3
2 16IT008 Application security 5,6,8 3 1 - 3
3 16IT009 Cryptography and Network Security 5,6,8 3 1 - 3
4 16CS009 Social Network Analysis 2,4,5,12 3 1 - 3
5 MOOCs - - - 3
Elective VI
1 16EC005 Digital Image Processing 3,5,6 3 1 - 3
2 16IT010 Computer Forensics 5,6,7,8 3 1 - 3
3 16IT011 E-commerce 5,6,8 3 1 - 3
5 16CS010 Multimedia Database 3,5,6 3 1 - 3
6 16CS011 Wireless Ad hoc Networks 3,5,6 3 1 - 3
7 MOOCs - - - 3

6
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Contemporary Courses (CC)3


1 16IT012 Data Analytics-I 3,5,6 4 - - 3
2 16IT013 Data Analytics-II 3,5,6,7 4 - - 3
3 16IT014 Data Analytics-III 3,5,6 4 - - 3
4 16CS012 Security Analytics-I 3,5,6 4 - - 3
5 16CS013 Security Analytics-II 3,5,6 4 - - 3
6 16CS014 Security Analytics-III 3,5,6 4 - - 3
7 16IT015 Introduction to Data Analytics 3,5,6 4 - - 3
8 16IT016 Enterprise Application development Using IBM 4 - - 3
3,5,6,7
RAD &Bluemix
9 16IT017 Big Data Analytics with Hadoop Platform 3,5,6,7 4 - - 3
10 16IT018 Foundation course in Security Identity & Access 4 - - 3
3,5,6,7
Management.
11 16CSX16 Digital Marketing – ( MOOCS) 2,5,12 - - - 1
One Credit Course (s)3
1 16CSI03 Tibero®DB 1 0 0 1
2 16ITI01 Ethical Hacking & Cyber Security 1 0 0 1
3 16ITI02 Ruby on Rails 1 0 0 1
Audit Courses
1 16AT001 Contemporary India: Economy, Polity & Society
(ME)
2 16AT002 Indian Heritage and Culture (EEE)
3 16AT003 Intellectual Property Rights and Patents (ECE)
4 16AT004 Introduction to Journalism (CSE)
5 16AT005 Professional Ethics and Morals (CE) -----
6 16AT006 Science, Technology and Development (Chem)
7 16AT007 Industrial sociology (PE)
8 16AT008 Organizational Behavior (IT)
9 16AT009 Communication Etiquette in workplaces (BS& H)

3Contemporary and One Credit Courses may vary from one Academic Year to another academic year and
depends on the recent trends in the industries

7
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16HSX01 English Communication Skills I


3103
Course Outcomes
1. Infer explicit and implicit meaning of a text
2. Construct clear, grammatically correct sentences using a variety of sentence structures
3. Analyze and Produce various types & formats of emails, letters in formal & informal ways to meet
particular purposes
4. Select and apply appropriate words and phrases in different contexts
5. Formulate and present ideas effectively in spoken form
6. Discuss social issues with concern and imagine possible solutions

COs – POs Mapping

COs PO10
CO1 3
CO2 3
CO3 3
CO4 3
CO5 3
CO6 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
In London by M. K. Gandhi
Using appropriate word/phrases, synonyms and antonyms, nouns, pronouns, paragraph writing, changing
autobiography into biography
Montgomery Bus Boycott
11+4 Hours
Unit II
Pecuniary Independence by P. T. Barnum
Using appropriate word/phrases, synonyms and antonyms, Adjectives, Adverbs, Note-making, Rewriting
sentences and Short talk
TED-Sashi Tharoor
12+3 Hours
Unit III
The Drunkard by W. H. Smith
Similes, Rhythmic expressions, One-word substitution, Describing people, Synonym and Antonyms,
Tenses(past and present), Gerund and Verbal Adjective, Summarizing, essay writing, writing paragraph
Essay writing tips
11+4 Hours
Unit IV
Three Days to see by Hellen Keller
Deriving words, adjective formation, Tenses (future), prefixes, ModalAuxiliary verbs, Dialogue writing,
Expressing opinions/ideas, collecting information
Famous Indians with disability
11+4 Hours
Total:45+15 Hours
Textbook (s)
1. M. S. Rama Murty and M. Hariprasad, Prose for Communication Skills, Ravindra Publishing House,
Hyderabad, 2012

8
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Reference (s)
1. J. Seely, Oxford Guide to Effective Writing and Speaking, OUP, 2013
2. Quirk, Greenbaum, Leech and Svartvk, A Comprehensive Grammar of the English language, Pearson,
India, 2010
3. R. Murphy, English Grammar in Use, 4th Ed, CUP, Cambridge, 2012
4. https://en.wikipedia.org/wiki/Montgomery_Bus_Boycott
5. https://www.ted.com/talks/shashi_tharoor?language=en
6. http://www.internationalstudent.com/essay_writing/essay_tips
7. http://www.thebetterindia.com/16449/famous-indians-with-disability

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test 1(%)
Remember 25 25 -
Understand 25 25 -
Apply 50 50 40
Analyze - - 30
Evaluate - - -
Create - - 30
Total (%) 100 100 100

Sample question (s)


Remember
1. Find a synonym for each of the following words.
i. Emulate ii. Mend
2. Find an antonym for each of the following words
i. Intensive ii. Extravagance

Understand
1. Sketch the personality of Edward Middleton as he emerges from the conversation in the play.
2. Summarize Gandhi‘s attempts to model himself on the English gentleman and which circumstances
force him to realize that he has been pursuing a false idea?

Apply
1. Construct a dialogue between students about organizing music club activities in their college.
2. Construct a dialogue between two friends about how they plan their own careers.

Analyze and Create


1. Prepare an essay in about 300 words on ‗some concrete measures to combat pollution.
2. Create an imaginary conversation between a blind boy and his friend on their visit to a drama.

1
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

9
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16MAX01 Engineering Mathematics I


3103
Course Outcomes
1. Classify and solve analytically a wide range of first and higher order ordinary differential equations
with constant coefficients
2. Apply the knowledge of Mean value theorems, Maxima and Minima of functions of several variables
3. Analyze the characteristics and trace the curve of an equation
4. Adapt methods for measuring lengths, volumes, surface area of an object and transformation of
coordinates in practical situations
5. Utilize basic knowledge of conservative field, potential function and work donein engineering
problems
6. Identify the relationships between line, surface and volume integrals

COs – POs Mapping


COs PO1 PO2

1 3 2
2 3 2
3 3 2
4 3 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Differential Equations
Differential equations of first order and first degree–exact, linear and Bernoulli Applications to Newton‘s Law
of cooling, Law of natural growth and decay, orthogonal trajectories, Non-homogeneous linear differential
equations of second and higher order with constant coefficients with RHS term of the type e ax, Sin ax, cos ax,
polynomials in x, eaxV(x), xV(x)
Heat flow problems–Variation of parameters 11+4 Hours

Unit II
Mean Value Theroms and Functions of Several Variables
Generalized Mean Value theorem (All theorems without proof), Functions of several variables-Partial
differentiation, Functional dependence,Jacobian, Maxima and Minima of functions of two variables with
constraints and without constraints.Curve tracing-Cartesian-Polar and Parametric curves
Rolle’s, Lagrange’s and Cauchy’s mean value theorems–Generalized Mean Value theorem proofs
11+4Hours
Unit III
Applications of Integration
Applications of Integration to Lengths, Volumes and Surface areas of revolution in Cartesian and Polar
Coordinates.Multiple integrals-double and triple integrals, change of variables (Cartesian and Polar
coordinates), Change of order of Integration
Applications of Integration–Centroid–Mass 12+3 Hours

Unit IV
Vector Calculus
Vector Differentiation-Gradient, Divergence, Curl and their related properties of sums-products,
Laplacianoperator, Vector Integration - Line integral, work done, Potential function, area, surface and volume
integrals, Vector integral theorems: Greens, Stokes and Gauss Divergence Theorems (All theorems without
proof) and related problems
Vector identities–Proof of Green’s theorem 11+4 Hours
Total:45+15 Hours

10
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. B. S. Grewal, Higher Engineering Mathematics, 42nd Ed., Khanna Publishers, New Delhi, 2012
2. E. Kreyszig, Advanced Engineering Mathematics, 9th Ed., Wiley, 2012
3. R. K. Jain, S. R. K.Iyengar, Advanced Engineering Mathematics, 4 th Ed., NarosaPublishingHouse,
NewDelhi, 2014

Reference (s)
1. B. V. Ramana, Engineering Mathematics, 4th Ed., Tata McGraw Hill, New Delhi, 2009
2. D. S. Chandrashekharaiah, Engineering Mathematics, Volume 1, Prism Publishers, 2010
3. T. K. V. Iyengar, B. Krishna Ghandhi, S. Ranganathan and M.V. S.S.N. Prasad, Engineering
Mathematics, Volume-I, 12th Ed., S. Chand Publishers, 2014
4. U. M. Swamy, P. VijayaLaxmi, K. L. Sai Prasad and M. Phani Krishna Kishore, A Text Book of
Engineering Mathematics–I, Excel Books, New Delhi, 2010

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test2(%)
Remember 30 30 -
Understand 40 40 -
Apply 30 30 60
Analyze - - -
Evaluate -- - 30
Create -- - 10
Total (%) 100 100 100

Sample question (s)


Remember
1. Find the Integrating factor of x 2 y 2 xy 2 dx x3 3x 2 y dy 0

2. Define solenoidal and irrotational for a Vector point function f .


3. Find the volume of solid generated by the revolution of the cardioid r = a(1+cos ) about the initial line
=0
Understand
2
1. Solve ( D 4 D 4) y 0
2
d y dy
2. Solve 2
6 25 y e2 x Sin x
dx dx
3. Find the volume of the greatest rectangular parallelopiped that can be inscribed in the ellipsoid
x2 y2 z2
1
a2 b2 c2
Apply
1. A body originally at 80 0Ccools down to 60 oC in 20 minutes, the temperature of the air being
40oC.What will be the temperature of the body after 40 minutes from original?
2. Evaluate the integral by the change of order of integration
3. Show that the vector + is irrotational and find its Scalar
potential

Create
1. Apipe 20 cm in diameter contains steam at 200 0C. It is covered by a layer of insulation 6cm thick and
thermal conductivity 0.0003. If the temperarature of the outer surface is 30 oC. Find the heat lose per
hour from 2 meter length of the pipe

2
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

11
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16PYX01 Engineering Physics


3103
Course Outcomes
1. Illustrate the concepts of Interference, Diffraction, Polarization and their applications
2. Summarize the concepts of electric fields, magnetic fields and superconductivity and make out the
scope of applications in various engineering fields
3. Outline the quantum mechanics to infer conductivity nature of metals
4. Explain the properties and application of dielectric, magnetic and Nano-materials
5. Demonstrate the emission of laser light, optical fibers and their applications in various Engineering
fields
6. Analyze the engineering Applications based on Fundamental concepts

COs – POs Mapping

COs PO1 PO2

1 3 2
2 3 2
3 3 2
4 3 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Optics
Interference:Superposition of waves-Coherence-Young's double slit experiment-Interference in thin films by
reflection (Qualitative treatment)–Newton's rings.Diffraction: Fresnel and Fraunhoffer diffractions-Fraunhoffer
diffraction at a single slit-Diffraction grating-Grating spectrum, Polarization–Types of Polarization-Double
refraction-Nicol prism-Quarter and Half wave plate. Lasers: Characteristics of laser–Stimulated absorption–
Spontaneous emission-Stimulated emission–Population inversion–Pumping mechanism–Active medium–Laser
systems: Ruby laser-He-Ne laser–Semiconductor laser–Applications of Lasers
Wedge shaped film–Polarization–Holography
12+4 Hours
Unit II
Electrostatics and Electromagnetism
Gauss law in electricity and it‘s applications: Coulomb‘s law from Gauss law-spherically distributed charge-
Infinite line of charge-Infinite sheet of charges–Ampere's Law-Magnetic field due to current (Biot-Savart‘s
Law)-B due to a current carrying wire and a circular loop,-Faraday‘s law of induction-Lenz‘s law-Induced
fields-Maxwell‘s equations (Qualitative treatment)-Hall Effect-Electromagnetic Wave and poynting vector
(Qualitative treatment), Superconductivity–Superconductivity phenomenon-General properties-Meissner effect-
Penetration depth-Type I and type II superconductors-Flux quantization-DC and AC Josephson effect-
Applications of superconductors
Infinite line of charge–Infinite sheet of charges Quantum Interference (SQUID)
11+3 Hours
Unit III
Quantum Theory of Solids–Semiconductors–Optical Fiber
Quantum theory of solids: Dual nature of matter, properties of matter waves-Schrödinger‘s wave equation–
Physical significance of wave function–Particle in a box (one dimensional)-Free electron theory of metals,
electrical conductivity-quantum free electron theory–Fermi Dirac Distribution-Kronig-Penney model
(qualitative)-Classification of materials into conductors-semi-conductors & insulators. Semiconductors: Carrier
Concentration (Intrinsic and Extrinsic, qualitative treatment only), Carrier drift, Carrier diffusion, Optical Fiber:
–principle and propagation of light in optical fibers–Numerical aperture and acceptance angle–types of optical

12
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

fibers–single and multimode, step index and graded index fibers–applications–fiber optic communication
system
Uncertainty principle–Intrinsic and Extrinsic Semiconductor–Fiberoptic sensors
12+4 Hours
Unit IV
Magnetic, Dielectric &Nanomaterials
Magnetic Materials: Origin of magnetic moment (Bohr Magneton)-Classification of Magnetic materials-Dia,
para, ferro, Anti-ferro and Ferri magnetism-Domain and Weiss field theory (qualitative treatment only)-
Hysteresis Curve-Soft and Hard magnetic materials-Applications of magnetic materials
Dielectric Materials: Dielectric Polarization-Electronic, ionic and orientation polarizations (Qualitative treatment)
-Dielectrics in alternating fields-frequency dependence of the Polarizability ((Qualitative treatment), Important
dielectric materials
Nanomaterials: Introduction to nano materials-Physical, mechanical-electrical and optical properties of nano
materials-Preparation techniques of nano materials (Sol-Gel, CVD, Ball Milling)-Nano tubes-Different methods
of preparation carbon nano tubes (CNT‘s) (CVD)-Applications of Nanomaterials
Permeability–Magnetization–Dielectric constant–Ferro and Piezo electric effect and materials
10+4 Hours
Total:45+15 Hours
Textbook (s)
1. Halliday, Resnick and Krane, Physics Part-II, Wiley India Pvt. Ltd, 2012
2. S. O. Pillai, Solid State Physics, 6th Ed., Newage International Publishers, 2015
3. M. R. Srinivasan, Engineering Physics, 2nd Ed., Newage International Publishers, 2014
4. A. S. Vasudeva, Modern Engineering Physics, S. Chand and Company, New Delhi, 2006
5. C. M. Srivastava and C.Srinivasan, Science of Engineering Materials, Wiley Eastern Pvt. Ltd, 1997
6. C. P. Poole and F. J. Owens, Introduction to Nanotechnology, Wiley, New Delhi, 2007
Reference (s)
1. R. K. Gour and S. L. Gupta, Engineering Physics, Dhanpathrai Publications, New Delhi, 2002
2. V. Rajendran, Engineering Physics, McGraw Hill Education (India) Private LTD, 2010
3. M. Armugam, Engineering Physics, Anuradha Agencies, 2007

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test3(%)
Remember 40 40 -
Understand 40 40 -
Apply 20 20 80
Analyze - - 20
Evaluate - - -
Create - - -
Total (%) 100 100 100

Sample question (s)


Remember
1. Define Principle of Superposition?
2. State Faraday‘s law of electromagnetic induction and Lenz‘s law.
3. Summarize Meissenr‘s effect of super conductors.

Understand
1. Explain the construction and working principle of Nicole‘s prism.
2. Construct Ruby laser and explain its working principle with energy level diagram.
3. Conclude the inferences from the M-H characteristics of Type-1 and Type-2 super conductors.

3
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

13
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Apply
1. List any four applications of lasers with reference to their characteristics.
2. Apply Biot-Savart‘s law, and calculate the Magnetic field induction along the infinite length of a straight
conductor at points close to the conductor.
3. Calculate electric field intensity due to infinite line of charge by applying Gauss law.

Analyze
1. Compare Fraunhoffer‘s diffraction and Fresnel‘s diffractions.
2. Discuss the role of Meta stable states in lasing action.
3. Discuss the BCS theory of Superconductors.

14
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16MEX01 Engineering Mechanics


3103
Course Outcomes
1. Draw the free body diagram of a given physical system and compute the resultant of a given coplanar
system of forces
2. Estimate the centroid of composite figures and bodies
3. Estimate area moment of inertia and mass moment of inertia of composite figures and bodies
4. Explain concepts of friction and principle of virtual work
5. Summarize power transmission through belts
6. Analyze plane truss (frame) by method of joints and method of sections
COs – POs Mapping

COs PO1 PO2 PO3

1 3 2 2
2 3 2 2
3 3 2 2
4 3 2 2
5 3 2 2
6 2 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
System of forces-Equilibrium of system of forces
Types of Force systems-Coplanar Concurrent Forces–Resultant–Moment of a Force and its application–
Couples and Resultant of a Force System, Free body diagrams, equations of equilibrium of coplanar concurrent
and non-concurrent force systems, Lami‘s theorem, resolution of a force into a force and a couple
Polygon law of forces for resultant
11+4 Hours
Unit II
Centroid-Centre of Gravity-Area Moments of Inertia-Mass Moment of Inertia
Centroids of simple figures (from basic principles)-Centroids of Composite Figures, Centre of gravity of simple
body (from basic principles), center of gravity of composite bodies, Definition–Moments of Inertia of simple
Figures, Polar Moment of Inertia, Transfer Theorem, Moments of Inertia of Composite Figures.Definition,
Moment of Inertia of simple bodies, Transfer Formula for Mass Moments of Inertia
Mass moment of inertia of composite bodies
12+4 Hours
Unit III
Friction-Power transmission through belts
Theory of friction–Angle of friction–Laws of friction-static friction–Kinetic friction, friction in bodies moving
up or down on an inclined plane-Introduction to belt and rope drives, types of belt drives, velocity ratio of belt
drives, slip of belt drives, tensions for flat belt drive, angle of contact, centrifugal tension, maximum tension of
belt
Condition for transmission of maximum power
11+4Hours
Unit IV
Analysis of perfect frames (Analytical Method)-Virtual Work
Types of Frames-Assumptions for forces in members of a perfect frame, Method of joints, Method of sections,
Force table, Cantilever Trusses, Structures with one end hinged and the other freely supported on rollers
carrying horizontal or inclined loads, Principle of Virtual Work-Application of the Principle of Virtual Work-
potential Energy and Equilibrium
Stable and Unstable Equilibrium 11+3 Hours
Total: 45+15 Hours

15
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. J. Suresh Kumar, Singer's Engineering Mechanics Statics and Dynamics, BS
Publications, 3rd Edition, 2011
2. A. K. Tayal, Engineering Mechanics Statics and Dynamics, Umesh Publications, 14th Edition, 2011
3. S. S. Bhavikatti, Engineering Mechanics, New Age International, 2008
4. S. Timoshenko & D. H. Young, and JV Rao, Engineering Mechanics, 4th Ed., TMH Education, 2006
Reference (s)
1. Irving H. Shames and G. Krishna MohanaRao, Engineering Mechanics, 4 th Ed., Pearson, 2006
2. R. K. Bansal, Engineering Mechanics, Laxmi Publications, 3rd Edition, 2004
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test4(%)
Remember 20 20 -
Understand 30 30 -
Apply 50 50 60
Analyze -- - 40
Evaluate -- - -
Create -- - -
Total (%) 100 100 100
Sample question (s)
Remember
1. Define centroid
2. List the different types of belt drives
3. Define angle of repose

Understand
1. Explain Lami‘s theorem
2. Compare mass moment of inertia and area moment of inertia
3. Explain the difference between frame and truss

Apply
1. Solve the resultant of three forces acting on a hook as shown in below figure

2. Identify the centroid of T-section shown in below figure

3. Solve to find the power transmitted by a belt running over a pulley of 600 mm diameter at 200 r.p.m.
The coefficient of friction between the belt and the pulley is 0.25, angle of lap 160° and maximum
tension in the belt is 2500 N

4
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

16
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CSX01 Problem Solving using C


3103
Course Outcomes
1. Develop the flow charts and algorithms, and then implement, compile and debug programs in C
language for solving a problem
2. Design programs involving decision structures, loops for problem solving
3. Design programs to develop applications using array data structure
4. Solve scientific problems using functions
5. Make use of pointers to design applications for efficient and dynamic memory allocation
6. Design programs to create/update basic data files

COs – POs Mapping


COs PO1 PO2 PO3
1 3 3 3
2 3 3 2
3 3 3 2
4 3 3 3
5 2 2 3
6 2 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Programming Basics
Introduction, Algorithm / pseudo code, flowchart, program development steps, structure of a C program,Types,
Operators, and Expressions: C-tokens, Variable Names, Data Types and Sizes, Constants, Declarations, C-
operators, Type Conversions, Precedence and Order of Evaluation
Control Flow: Statements and Blocks, If-Else, Else-If, Switch, Loops-While and For, Loops- Do-while, Break
and Continue
Comma and sizeof operators–Conditional Expressions–goto and Labels
12+3 Hours
Unit II
Arrays and Functions
Array concept, definition, declaration, accessing elements, storing elements, strings and string manipulations, 2-
D arrays, Multidimensional arrays, Array Applications
Basicsof Functions, Functions Returning Non-integers, External Variables, Scope Rules, Static Variables,
BlockStructure, Storage Classes, user defined functions, standard library functions, recursive functions, passing
Arrays to functions, Functions Applications
Arithmetic operations on string–nesting of functions–preprocessor commands
11+4 Hours
Unit III
Pointers and Structures
Pointer concepts, initialization of pointer variables, pointers and function arguments, passing by address,
dangling memory, address arithmetic, Character pointers and functions, pointers to pointers, dynamic memory
management functions
Basics of Structures, Structures and Functions, Arrays of Structures, Pointers to Structures, Self-referential
Structures, typedef, Unions
Programs on Dynamic memory management using functions–Table Lookup
11+4 Hours
Unit IV
File Structures
Standard Input and Output, Formatted Output-printf, Variable-length Argument Lists, Formatted Input-scanf,
File Access
Data Structures: Introduction to linear and non-linear data Structures, definition: stack, queue

17
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Error Handling-stderr and exit–Introduction to Single Linked Lists


11+4 Hours
Total: 45+15 Hours
Textbook (s)
1. B. W. Kernighan, Dennis M. Ritchie, The C–Programming Language-, 2nd Ed., PHI, 1990
2. H. Sahni and A. Freed, Fundamentals of Data Structures in C, 2 nd Ed., Universities Press, 2008

Reference (s)
1. Y. Kanetkar, Let us C, 8th Ed., BPB Publication, 2004
2. F. E. V. Prasad, C Programming: A Problem-Solving Approach, Giliberg, Cengage, 2010
3. A. S. Tenenbaum, Y. Langsam and M. J. Augenstein,Data Structures using C, Pearson Education, 2009

Internal Assessment Pattern

Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test5(%)
Remember 25 20 -
Understand 35 40 30
Apply 40 40 40
Analyze - - 30
Evaluate - - -
Create - - -
Total (%) 100 100 100

Sample question (s)


Remember
1. Define computer
2. List out operators
3. What is dangling pointer

Understand
1. Explain structure of a c program
2. Describe linear and nonlinear data structures
3. Explain multidimensional arrays

Apply
1. Implement matrix multiplication using arrays
2. Draw flow chart of program development steps
3. Demonstrate pointe to pointer concept.

Analyze
1. Compare structure and union
2. Differentiate logical and relational operators
3. Classify linear and nonlinear data structures

5
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

18
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16PYX02 Engineering Physics Lab


0032
Course Outcomes
1. Build the knowledge in the scientific methods and learn the process of measuring different physical
parameters
2. Develop the laboratory skills in handling of electrical and Optical instruments
3. Demonstrate the interference and diffraction phenomena of light
4. Inspect and experience physical principles of Magnetic fields and optical fiber communications
5. Apply the principles of physics and measure the solid state properties of materials
6. Design and analyze experiment based on physics concepts
COs – POs Mapping
COs PO4

1 3
2 3
3 3
4 3
5 3
6 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

List of Experiments
1. Variation of magnetic field along the axis of current-carrying circular coil-Stewart and Gee‘s Method
2. Determination of wavelengths of spectral line of mercury spectrum using diffraction grating
3. Determination of radius of curvature of convex lens by forming Newton‘s rings
4. LCR circuit- Study of parallel and series Resonance
5. Measurement of thickness of a thin paper using wedge method
6. Fiber optics-Numerical aperture of a given fiber and study of bendig losses
7. Meldie‘s Experiment–Transverse and longitudinal modes
8. Determination of wave length of Laser by diffraction grating
9. Determination of Hall Coefficient and charge carrier density of semi-conductor
10. Determination of Band gap of a semiconductor

List of Augmented Experiments 6


1. To study the magnetization (M) of a ferromagnetic material in the presence of a magnetic field B and to
plot the hysteresis curve (M vs. B)
2. Study theThermoemf of the thermo couple
3. LCR Series and Parallel–Design of circuit for various resonance frequencies
4. Determination of characteristics of Laser beam
5. Determination of Horizontal component of earth‘s magnetic field
6. Study of double refraction in calcite crystals
7. Dispersive power of various liquids using spectrometer
8. Photo cell–Characteristics and determination of Planks constant

Reading Material (s)


1. Physics Lab manual–Department of Physics, BS & H, GMRIT, Rajam, 2015
2. Y. Aparna and K. Venkateswararao, Engineering Physics–I and II, VGS Techno series, 2010
3. S. Panigrahi and B. Mallick, Engineering Practical Physics, Cengage leaning, Delhi, 2015

6
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

19
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CSX02 Problem Solving using C Lab


0032
Course Outcomes
1. Implement, compile and debug programs in C language for solving a problem
2. Design programs involving decision structures, loops for problem solving
3. Design programs to develop applications using array data structure
4. Apply functions to solve real world problems
5. Make use of pointers to design applications with efficientuse of memory
6. Design programs to create/update basic data files

COs – POs Mapping


COs PO2 PO3 PO4
1 1 2 3
2 2 3 1
3 3 1 2
4 1 2 3
5 3 1 1
6 2 1 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

List of Experiments
1. Algorithms and Flow charts design and evaluation (Minimum 2)
2. Write C Programs to demonstrate C-tokens and operators
3. Write C Programs to demonstrate Decision Making And Branching (Selection)
4. Write a C program to demonstrate different loops
5. Write a C program to demonstrate arrays
6. Write a C program to demonstrate functions
7. Write a C program to implement the following
A. To manipulate strings using string handling functions.
B. To manipulate strings without using string handling functions
8. Write a C program to demonstrate different library functions
9. Write a C program to implement the following
A. To exchange two values using call by value and reference
B. To multiply two matrices using pointers
10. Write a C program to demonstrate functions using pointers
11. Write a C program to implement the following operations using structure and functions:
i) Reading a complex number ii) Writing a complex number
12. Write a C program
A. To copy data from one file to another
B. To reverse the first n characters in a given file (Note: The file name and n are specified on the
command line)
List of Augmented Experiments 7
1. Merging of two arrays
2. Arithmetic operations on two complex numbers
3. Employee's Management System
4. Library management
5. Department store system
6. Personal Dairy Management System
7. Telecom Billing Management System
8. Bank Management System
9. Contacts Management
10. Medical Store Management System

Reading Material (s)


1. C Programming Lab manual–Department of CSE-GMRIT Rajam
7
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

20
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16MEX02 Engineering Drawing


0032
Course Outcomes
1. Understand Principles of engineering drawing
2. Construct Conic sections using general methods and other methods
3. Construct Orthographic projections of Points, Lines and Planes
4. Construct Orthographic projections of Solids using basic drafting software
5. Construct Isometric projections using basic drafting software
6. Construct Orthographic projections from given isometric projections of an object and vice versa

COs – POs Mapping


COs PO4 PO9 PO10
1 3 3 3
2 3 3 3
3 3 3 3
4 3 3 3
5 3 3 3
6 3 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

List of Experiments
Unit I
Conic Sections-Introduction to Orthographic Projections
Construction of conics using general method and other special methods
Orthographic Projections of Points, Straight Lines parallel to both planes, parallel to one plane and inclined to
other plane
9 Hours
Unit II
Orthographic Projections of Straight Lines and Planes
Projections of Straight Lines inclined to both planes; Projections of Planes; Regular Planes Perpendicular
Parallel to one Reference Plane and inclined to other Reference Plane; inclined to both the Reference Planes
Practice the following topics by using any one 2D drafting software
9 Hours
Unit III
Projections of Solids&Isometric Projections
Projections of Prisms, Cylinders, Pyramids and Cones with the axis inclined to one Principal Plane and Parallel
to the other, Projections of Prisms, Cylinders, Pyramids and Cones inclined to both the Principal Planes
Introduction to Isometric Projections, Isometric axes, angles, Isometric views, Construction of Isometric views
of Simple planes and Solids in various positions
15 Hours
Unit IV
Conversion of Engineering Views
Conversion of Orthographic Views of Simple Solid objects into Isometric View, Conversion of Isometric View
of Simple Solid objects into Orthographic Views
9Hours
Total: 42 Hours
List of Drawing Sheets
1. Conics by General Method
2. Conics by using Special Methods
3. Projections of Points and Straight lines in Simple Positions
4. Projections of Lines inclined to both planes
5. Projections of Planes in Simple positions

21
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

6. Projections of Planes inclined to both planes


7. Projections of Solids
8. Projections of Solids inclined to both planes
9. Isometric Projections
10. Conversion of Orthographic views into Isometric views
11. Conversion of Isometric views into Orthographic views

List of Augmented Experiments 8


1. Draw the Knuckle Pin and fork end of the knuckle joint
2. Draw the Socket and spigot cotter joint
3. Draw the Tommy bar and body of the Screw jack
4. Draw the Cup and Big and Small screws of screw jack
5. Draw the Connecting rod of IC Engine using AutoCAD
6. Draw the Pipe spool with flanges and a valve
7. Draw a sample pipe line construction design in oil and gas industries using AutoCAD
8. Draw the Pipe truss design using AutoCAD
9. Draw a 3-D bolt and nut with Threads using AutoCAD
10. Draw a 3-D Cross head pattern using AutoCAD
11. Draw the sample Bridge using AutoCAD
12. Draw the pipe vice using AutoCAD
13. Draw the Ni-Cd Battery zapper circuit diagram using AutoCAD
14. Draw the circuit diagram of battery charger with automatic cutoff using AutoCAD
15. Draw the satellite dish and Antenna using AutoCAD

Reading Material (s)


Textbook (s)
1. N.D.Bhatt,V.M. Panchal, Pramod R. Ingle, Engineering drawing, Charotar Publications, 54th Edition,
2014
2. D. M. Kulkarni, A.P. Rastogi, Ashoke K. Sarkar, Engineering Graphics with Auto CAD, Prentice Hall
of India, 2nd Edition, 2010

Reference (s)
1. K. C. John, Engineering Graphics for Degree, PHI Publications, 2nd Edition, 2009
2. M. B. Shah and B. C. Rana, Engineering Drawing, Pearson Publishers, 2nd Edition, 2009
3. D. A. Jolhe, Engineering Drawing, Tata McGraw-Hill Education, 1st Edition, 2008

8
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

22
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16HSX03 English Communication Skills II


3103
Course Outcomes
1. Build new academic vocabulary & phrases and make use of them in different contexts
2. Construct clear, grammatically correct sentences using a variety of sentence structures
3. Analyze and Produce various types & formats of emails, letters in formal & informal ways to meet
particular purposes
4. Compose and present ideas logically in written form
5. Organize ideas effectively in spoken form
6. Discuss social issues with concern and imagine possible solutions

COs – POs Mapping

COs PO10

1 3
2 3
3 3
4 3
5 3
6 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
The Knowledge Society by A.P.J. Abdul Kalam
Forming Negative words, Quantifiers, LetterWriting, Interviews, Scientific Terminology
Famous Indian Scientist Inventions
11+4 Hours
Unit II
Principles of Good Writing by L.A.Hill
Word definitions, Articles, e-mail writing, Debates, Noticing changes in English, Origin and meaning of
borrowed words
Effective writing tips
11+4 Hours
Unit III
Man’s Peril by Bertrand Russell
Deriving nouns, Prepositions, Phrasal verbs, Speeches, Report Writing, Problem solving
Bertrand Russell and Einstein Manifesto
12+3 Hours
Unit IV
Shooting an Elephant by George Orwell
Using an appropriate word, conjunctions, voices, Cover letters, Resume, Dialogue writing, Group Discussion
Abridged version of Animal Farm
11+4 Hours
Total :45+15Hours
Textbook (s)
1. M. S. Rama Murty and M. Hariprasad, Prose for Communication Skills, Ravindra Publishing House,
Hyderabad, 2012

23
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Reference (s)
1. J. Seely, Oxford Guide to Effective Writing and Speaking, OUP, 2013
2. Quirk, Greenbaum, Leech and Svartvik, A Comprehensive Grammar of the English language, Pearson,
India, 2010
3. Raymond Murphy, English Grammar in Use, 4th Ed, CUP, Cambridge, 2012
4. http://www.famousscientists.org/15-famous-indian-scientists-inventions/
5. http://www.grammarbook.com/grammar/effWrite.asp
6. https://en.wikipedia.org/wiki/Russell%E2%80%93Einstein_Manifesto)
7. http://cbhs.portlandschools.org/UserFiles/Servers/Server_1098483/File/Migration/Animal-Farm-
Abridged.pdf

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test9(%)
Remember 25 25 -
Understand 25 25 -
Apply 50 50 40
Analyze 30
Evaluate -- - -
Create -- - 30
Total (%) 100 100 100

Sample question (s)


Remember
1.
Write one synonym for each of the following words.
a) Generate (b) Vivid
2. Write an antonym for each of the following words.
a) Unique (b) Interesting
3. Fill in the blanks with some or any in the following sentences.
a) There isn‘t ______ milk here.
b) She has _____ books and pens.

Understanding
1. Read the following passage
There is no dearth of fake patriotism in the world to disguise one‘s weakness of failure in
administration and planning. It rather becomes an instrument in the hands of dictators and selfish rulers to keep
their position safe. One can hear the slogans of patriotism on both the sides of the line of demarcation in the
Indian sub-continent. When there is dissatisfaction among the masses these slogans would be raised—‗danger is
lurking on the borders‘, ‗the enemy is making preparation to attack our country‘. This is not patriotism but
perverse thinking for selfish motives. Patriotism does not require a whip to rouse the sentiments of the people—
if it is true patriotism. The unity achieved during war may be a result of apprehension of slavery, not necessarily
true emotion generated by patriotism. It is in the blood of the people to mould their life according to the needs of
the motherland. It is not in the expediency to create circumstances befitting one‘s own interests. It is rather
regrettable that patriotism is the greatest casualty in almost all the fields in our country. Political expediency and
self-motives have become supreme, to the extent that even to talk of patriotism is labeled as puerile of
reactionary. Let us take inspiration from the young girl who wept and cried bitterly for she could not offer
flowers on the war memorial in London, for none of her forefathers had laid his life for the cause of the nation.
Let us inculcate this noble spirit among people if we have to bring back the glory that was India.
Answer the following question.
a) Show the effect of fake patriotism?
b) When are the slogans of patriotism raised?
c) Is this type of patriotism real patriotism? Whom does it benefit?
d) Is the unity during war real patriotism? Does true patriotism require any instigation?
e) What does the author regret?
f) Explain the result of political expediency and selfish motives?

9
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

24
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

g) Why did the little girl cry bitterly? Do we learn anything from her?
h) Locate the synonym of the word ‗conceal’ from the passage.
i) Find the antonym of the word ‗cheerful‘ from the passage.
j) Suggest a suitable title to the passage.
2. Read the following passage and answer the questions on it:
Many matters, however, are less easily brought to the test of experience. If, like most of mankind, you have
passionate convictions on many such matters, there are ways in which you can make yourself aware of your own
bias. If an opinion contrary to your own makes you angry, that is a sign that you are subconsciously aware of
having no good reason for thinking as you do. If someone maintains that two and two are five, you feel pity
rather than anger, unless you know so little of arithmetic that his opinion shakes your own conviction. The most
savage controversies are those about matters as to which there is no good evidence either way. Persecution is
used in theology, not in arithmetic because in arithmetic there is knowledge, but in theology there is only
opinion. So, whenever you find yourself getting angry about your difference of opinion, be on your guard; you
will probably find, on examination, that your belief is going beyond what the evidence warrants.

Answer the following questions


a) Do you consider the content of the passage, legal or logical? Ans: logical
b) Is the author of the passage finally telling you about changing your opinion? Ans: No giving info.
c) According to the passage when do we feel pity? Ans: When someone knowledge so poorer then
minimum standards.
d) What is the meaning of the word ‗savage‘ as used in the passage? Ans: uncivilized / unfair
e) What is the general reaction to an opinion contrary to your own? Ans: we get angry at first.
f) ‗In arithmetic there is no scope for opinion’-explain.

Apply
1. Develop an essay on the theme of ―Digital India and its consequences‖ in about 200 words.
2. Write a letter to your friend who is exclusively occupied with his studies. Advise him to take part in
games

Analyze
1. Discuss the chief components of knowledge society with reference to India according to
Dr.A.P.J.Abdul Kalam.
2. Analyze L.A.Hill‘s principles of good writing in achieving ‗vivid expression, simple and
conversational tone‘ to make the writing interesting to the readers.
3. Explain how L.A. Hill‘s principles of good writing are helpful to become a successful writer. (in about
250 words)

Create

1. Imagine yourself to be the instructor of a course in which 75 students have registered. Draft an email to
all your students asking them to prepare a presentation on the topic of their choice.
2. Build a model essay on impact of social media on youth.

25
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16MAX02 Engineering Mathematics II


3103
Course Outcomes
1. Apply matrix knowledge to Engineering problems
2. Solve problems related to engineering applicationsusing integral transform techniques
3. Make use of Laplace transforms in solving the differential equations with the initial
andboundaryconditions
4. Apply the concept of Fourier series of periodicfunctionsand expand a function in sine and cosine series
5. Solve problems related to basic linear and non-linearpartial differential equations
6. Formulate and solve some of the physical problems of engineering using partial differential equations

COs – POs Mapping

COs PO1 PO2

1 3 3
2 3 2
3 3 2
4 3 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Matices
Linear systems of equations: Rank-Echelon form, Normal form–Solution of Linear Systems–Rank Method and
Gauss Seidal Method
Eigen values–Eigen vectors–Properties–Cayley-Hamilton Theorem(without proof)–Inverse and powers of a
matrix by using Cayley-Hamilton theorem, Quadratic forms-Reduction of quadratic form to canonical form–
Rank–Positive, negative, semi definite–index–signature
LU Decomposition Method
11+4 Hours
Unit II
Laplace Transforms
Laplace transforms of standard functions–Shifting Theorems, Transforms of derivatives and integrals–Unit step
function–Dirac delta function
Inverse Laplace transforms by Partial fractions–Convolution theorem (without proof)-Application of Laplace
transforms to ordinary differential equations with constant coefficients
Laplace Transform of Periodic Functions 11

11+4 Hours
Unit III
Fourier Series and Transformations
Fourier series–even and odd functions–Half-range sine and cosine series, Fourier integral theorem (without
proof)–Fourier transforms–sine and cosine transforms–properties–inverse transforms–Finite Fourier transforms
Fourier Transform of Convolution Products
12+3 Hours
Unit IV
Partial Differential Equations and Applications
Formation of partial differential equations-by elimination of arbitrary constants and arbitrary functions–
solutions of first order linear (Lagrange) equations and nonlinear equations (standard types)–Method of
Separation of Variables-Applications to wave equation, heat conduction equation in one dimension and
homogeneous Laplace equation in Cartesian coordinates in two dimensions

26
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Charpits Method
11+4 Hours
Total:45+15 Hours
Textbook (s)
1. B. S. Grewal, Higher Engineering Mathematics, 42nd Ed., Khanna Publishers, New Delhi, 2012
2. S. R. K. Iyengar, R. K. Jain, Advanced Engineering Mathematics, 4th Ed., Narosa Publishing House,
New Delhi, 2014
3. B. V. Ramana, Engineering Mathematics, 4th Ed., Tata McGraw Hill, New Delhi, 2009

Reference (s)
1. T. K. V. Iyengar, B. Krishna Ghandhi, S. Ranganathan and M. V. S. S. N. Prasad, Engineering
Mathematics, 12th Ed.,Volume–I, S. Chand Publishers, 2014
2. U. M. Swamy, P. Vijaya Laxmi, K. L. Sai Prasad and M. Phani Krishna Kishore, A Text Book of
Engineering Mathematics–II, Excel Books, New Delhi, 2010
3. D. S. Chandrashekharaiah, Engineering Mathematics, Vol–1, Prism Publishers, 2010
4. Erwin Kreyszig, Advanced Engineering Mathematics, 9th Ed., Wiley, 2012

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test10(%)
Remember 30 30 -
Understand 40 40 -
Apply 30 30 60
Analyze - - -
Evaluate -- -- 30
Create -- -- 10
Total (%) 100 100 100

Sample question (s)


Remember
1. Define rank of the matrix
2. Define unit step function
3. Write the Fourier sine transform of ( )

Understand
1. If in the interval , then for what values of the Fourier series of
contains only sine terms
2. Form the partial differential equation by eliminating arbitrary constants from
2 2
z (x a )( y b)
3. Evaluate L 2 t

Apply

1. Use Laplace transform technique to solve the differential equation


y '' 2 y' 3 y sin t if
y(0) 0, y '(0) 0.
2. Using Convolution theorem, find
3. A tightly stretched string with fixed end points x 0 and x l is initially in a position given by
x
y y0 Sin3 . If it is released from rest from this position, find the displacement y( x, t )
l

Create

10
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

27
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

1. Compare the direct and iterative methods in solving system of equations.


2. Identifying the method to solve sparse systems.
3. What is the advantage of Fourier series over the Taylor‘s series in some real time problems?

28
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CYX01 Engineering Chemistry


3103
Course Outcomes
1. Outline the fundamental chemistry with an applied perspective as future engineers with a focus on
engineering and industry
2. Analyze the quality of water and its treatment methods for domestic and industrial applications
3. Utilize the polymers, plastics, elastomers and advanced materials (Nano materials) as engineering
materials and apply them in domestic and industrial life
4. Infer the concepts of renewable & non-renewable energy sources, quality of fuels and apply a suitable
fuel as an energy source
5. Outline the corrosion factors and implement the prevention measures
6. Interpret the Nernst equation for electrode potentials and construction and working of various types of
energy storage devices

COs – POs Mapping

COs PO1 PO2

1 3 2
2 3 2
3 3
4 3 2
5 3
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Water Technology & Advanced Materials
Water technology: sources of water–hardness of water–disadvantages of hard water–boiler troubles–internal
treatment methods, softening methods–lime soda, zeolite, ion exchange and reverse osmosis -specifications for
drinking water–BIS & WHO standards–municipal water treatment–analysis of water for hardness, chloride &
fluoride, numerical problems
Advanced materials–Nanomaterials–Introduction–Preparation by chemical methods–Characterization–SEM–
Applications in industry–solar, water purification and battery technology
Preparation of some important membranes for reverse osmosis process
12+3 Hours
Unit II
Polymers & Composites
Polymers: Introduction–Advantages of polymers over Metals and Alloys; Types of polymers–Types of
polymerization–Physical properties: viscosity, polydispersity, molecular weight distribution etc., and
mechanical properties–Plastics: Thermosetting & thermoplastics–Compounding of plastics–Moulding methods
(Compression, Injection, Transfer, Extrusion)–Preparation, Properties and Engineering applications of important
industrial polymers–Poly Ethylene, Poly Styrene, PVC, PTFE, Bakelite–Molecular Imprinting Polymers (MIP)
–Conducting Polymers–Biodegradable polymers-Fiber reinforced plastics-Glass fiber reinforced plastic–Bullet
Proof Plastics–Rubbers: processing of natural rubber–Vulcanization and compounding of rubber–Engineering
applications of rubber
Inorganic rubbers-silicone rubbers
11+4 Hours
Unit III
Fuels & Energy Resources
Fuels–Introduction-Calorific value–determination of calorific value–Bomb calorimeter and Junker‘s
calorimeters-Classification of fuels–characteristics of a good fuel–classification and analysis of coal-Extraction
of Crude Oils–refining of crude oil–Cracking-Thermal and Catalytic cracking–Synthetic petrol–Polymerization,
Fischer Tropsch and Bergius processes–Knocking–Anti Knocking–Octane &Cetanenumber–ASTM standards of

29
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

fuels–Energy Resources: Energy scenario in India–working of thermal power plants–advantages and


disadvantages–non Renewable energy–solar energy–harnessing of solar energy–solar heaters–photo voltaic
cells–bio energy–biodiesel
Rocket fuels
11+4 Hours
Unit IV
Corrosion &Energy Systems
Introduction–process of corrosion–Dry corrosion–Wet corrosion–galvanic corrosion–concentration cell
corrosion–water line corrosion–pitting corrosion–stress corrosion–Factors influencing corrosion–Control of
corrosion–Proper designing–passivity–using alloys–modifying the environment–using corrosion inhibitors:
Inorganic and Organic inhibitors-Cathodic protection–Metallic coatings–galvanization and tinning-Industrial
examples of high corrosion
Electrochemical energy systems:Introduction–Electrode potential–Nernst equation–EMF of cell–Storage
devices–Batteries: primary cell–dry cell; secondary cells–Lead acid battery, Lithium ion battery, flow batteries–
H2–O2 fuel cell and Photo galvanic cell
Organic coatings
11+4 Hours
Total:45+15 Hours
Textbook (s)
1. P. C. Jain and Monica Jain, Engineering Chemistry, 16th Ed., Dhanpat Rai Publishing Company, New
Delhi, 2015
2. S. S. Dara, A Textbook of Engineering Chemistry, S. Chand and Company Limited, New Delhi, 1994
3. C. N. R. Rao, A. Muller and A. K. Cheetham, Nanomaterials Chemistry: Recent Developments and
New Directions, 2010

Reference (s)
1. S. Chawla, A Textbook of Engineering Chemistry, 3rd Ed., Dhanpat Rai& Co (Pvt) Ltd, New Delhi,
2012
2. P. Murthy, C. V. Agarwal, A. Naidu, Textbook of Engineering Chemistry, B. S. Publications,
Hyderabad, 2006
3. T. Pradeep, Textbook of Nanoscience and Nanotechnology, McGraw Hill Education,India,
Pvt.Limited, 2013

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test11(%)
Remember 30 30 -
Understand 40 40 -
Apply 30 30 80
Analyze - - 20
Evaluate -- - -
Create -- - -
Total (%) 100 100 100

Sample question (s)


Remember
1. Define hardness. Which salts are responsible for different types of hard nesses?
2. Differentiate between polymer and plastic? List out the differences between thermoplastics and
thermosetting plastics?
3. Define calorific value, HCV and LCV

11
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

30
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Understand
1. What is meant by desalination? Explain the procedure for softening of water by Reverse osmosis
process?
2. What is compounding of plastics? Explain the role of Fillers and Stabilizers with examples
in compounding of plastics?
3. How a photo-voltaic cell constructed and what is is the working mechanism of it?

Apply
1. Water contains the constituents like CO2 , HCO3- , Mg(HCO3)2 , H+, CaSO4 , NaCl and Na2SO4 and
this water is subjected to Lime and Soda softening, which type of chemical reactions are involved
between these constituents with Lime and Soda?
2. Which moulding technique is involved in making a plastic ball in toys industry? Explain the process in
detail with neat sketch?
3. By which methods, the underground pipelines are protected from corrosion? Explain the involved
mechanisms?

Analyze
1. The Boiler fed water contains the following compositions: CaSO4, CaCl2, MgCl2, SiO2&
Na2CO3.Suggest the suitable methods and involved principle to prevent the formation of scale and
sludge by these constituents?
2. When a metal X (of reduction potential = 0.337V at 250C) is connected to another
metal Y (of reduction potential = -0.140V at 250C) and this structure is exposed
continuously to sea water, which type of corrosion would take place? Explain with
suitable mechanism.
3. Which type of corrosion is involved in the following jointed pipeline and why? Explain the involved
mechanism in detail
Iron pipe Copper pipe
Sea water inlet Sea water outlet

31
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16EEX01 Basic Electrical Engineering


3103
Course Outcomes
1. Demonstrate the basic principles of electrical components
2. Outline electric circuits using network laws and reduction techniques
3. Illustrate the behavior of basic circuit elements for an AC excitation
4. Relate the laws of electro-magnetism and select a machine for practical applications
5. Outline the working principle and construction of the measuring instruments
6. Choose appropriate safety measures and wiring schemes

COs – POs Mapping

COs PO1 PO3

1 3 1
2 3 1
3 2 1
4 3 1
5 3 1
6 2 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Basic Electrical Components
Definition of charge, electric potential, electric field, voltage, current, power and energy, Ohm‘s law, Faraday‘s
Law of Electromagnetic Induction, Classification of network elements, Basic circuit elements–R, L and C,
Types of energy sources-Dependent and independent sources, Kirchhoff‘s laws, Resistive, inductive and
capacitive networks–series, parallel circuits, Self Inductance, mutual inductance, Types of induced emfs, Dot
Convention, Coefficient of coupling
Types of resistors–inductors and capacitors
11+4 Hours
Unit II
Fundamentals of Electrical Circuits
DC Circuits:Voltage and current division rule, Source transformation, mesh and nodal analysis, Star-delta
transformation. AC Circuits:Generation of alternating current, periodic waveforms and basic definitions, RMS
and average values of periodic and non-periodic waveforms, form factor and peak factor, AC through pure R
and L, Phasor representation, J-operator, Power in ac circuits
AC through pure capacitor
12+4 Hours
Unit III
Electrical Machines & Measuring Instruments
Electrical Machines:Principle of operation, Construction and Applications-DC Machines, 1-phase Transformers,
1-Phase Induction Motors, Stepper motors. Measuring Instruments: Classification of Measuring Instruments,
Construction and basic working principle of Voltmeter, Ammeter, Wattmeter
Working principle of Energy meter
12+4 Hours
Unit IV
Electrical Safety, Wiring and Introduction to Power System
Indian electricity safety rules, Electric shock- effects, protective measures and first aid, Earthling-Basic
principles and types.Electrical wiring-wiring accessories, staircase, tube light.Single line diagram of power
system
Design of corridor wiring 10+3Hours
Total:45+15 Hours

32
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. D. P. Kothari and I. J. Nagrath, Theory and Problems of Basic Electrical Engineering, 4th Ed., PHI
Learning Private limited, 2013
2. S. Ghosh, Fundamentals of Electrical & Electronics Engineering, 2nd Ed., PHI, 2010
3. V. K. Mehta and Rohit Mehta, Basic Electrical Engineering, S Chand and company Ltd, New Delhi,
India, Revised Edition, 2012
Reference (s)
1. J. B. Gupta, Basic Electrical and Electronics Engineering, 3rd Ed., S. K. Kataria & Sons, 2009
2. B. L. Theraja, Fundamentals of Electrical Engineering and Electronics, 5 th Ed., S. Chand & Company
Ltd, 2013
3. K. Alice Mary and P.Ramana, Basic Electrical Engineering, 1st Ed., Winger Publications, 2013
4. Basic Electrical Engineering by K.Alice Mary and P.Ramana, Winger Publications, 1stEdition, 2013

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test12(%)
Remember 40 40 -
Understand 60 60 20
Apply - - 40
Analyze - - 40
Evaluate - - -
Create - - -
Total (%) 100 100 100

Sample question (s)


Remember
1. State Faradays laws of Electro-magnetic Induction.
2. Define
i. Charge ii. Power
iii. Energy iv. Potential
3. State any five Indian electricity safety rules
4. Define coefficient of coupling

Understand
1. Explain the principle of operation of transformer.
2. Describe the working of DC generator.
3. Explain the construction and working of Wattmeter.
4. Illustrate the emf equation of a transformer

12
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

33
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CHX01 Environmental Studies


3103
Course Outcomes
1. Translate the learner‘s attitude to think globally and act locally
2. Motivate environmental organizaions to create a concern about our present state of Environment.
3. Find solutions for conservation of natural resources
4. Identify the benefits of ecosystem conservation, biodiversity protection, implement pollution
prevention and control measures
5. Illustrate social issues of environmental protection and adopt sustainable developmental practices
6. Perceives the basic structure of environmental policy and law pertaining to specific environmental
issues (water quality, air quality, biodiversity protection, Forest, etc.)

COs – POs Mapping

COs PO1 PO3 PO6 PO7

1 - - 3 3
2 - - - 3
3 3 3 - 3
4 - - 3 3
5 - - 3 3
6 - - - 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Multidisciplinary Nature of Environmental Studies &Natural Resources
Definition, Scope and Importance, Multidisciplinary nature of Environmental Studies, Value of Nature-
Productive, Aesthetic/Recreation, Option, Need for Public Awareness, Institutions (BNHS, BVIEER, ZSI, BSI)
and People in Environment (MedhaPatkar, SundarlalBahuguna, Indira Gandhi, Rachael Carson)
Natural Resources: Renewable and Non–renewable resources–Importance, uses, overexploitation/threats, and
conservation of (i) forest (ii) water (iii) mineral (iv)food and (v) energy resources, role of an individual in
conservation of natural resources
Biotic and abiotic components–Case studies of forest-water-mineral-food-energy resources
12+4 Hours
Unit II
Ecosystem & Biodiversity
Ecosystems: Concept of an ecosystem, Structure and function of an ecosystem, Biogeological cycles (Energy
flow, Carbon and Nitrogen Cycles), Ecological succession, Food chains, food webs and ecological pyramids,
Introduction, types, characteristic features, structures and functions of the following ecosystems:a. Forest
Ecosystem b. Aquatic EcosystemBiodiversity and its Conservation: Definition and levels of biodiversity, Bio–
geographical classification of India, hot spots of biodiversity–India as a mega diversity nation, Threats to
biodiversity, Endangered and endemic species of India, Conservation of biodiversity: In–situ and Ex–situ
conservation
Phosphorus cycle–Desert ecosystems–Grassland ecosystem–Case studies on conservation of biodiversity
12+4 Hours
Unit III
Environmental Pollution &Social Issues
Environmental Pollution: Definition, Cause, effects, control measures and case studies of: Air pollution b. Water
pollution c. Soil pollution Solid waste Management: Causes, effects and control measures of urban and
industrial wastes. Disaster management (floods and cyclones) Social Issues and the Environment: Sustainability,
Urban problems related to energy, Water conservation and watershed management, Resettlement and
rehabilitation of people; Environmental ethics: Issues and possible solutions, global warming, ozone layer
depletion, Consumerism and waste products
Noise pollution–Case studies on pollution–Wasteland reclamation 11+4 Hours

34
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Unit IV
Human Population and the Environmental Acts
Human Population and the Environment: Population growth, Affluence, Technology and Environmental Impact
(Master Equation), Population explosion and Family Welfare Programme, Value Education, HIV/AIDS,
Women and Child Welfare, Role of information Technology in Environment and human health, Environment
Protection Acts: Air (Prevention and Control of Pollution) Act, Water (Prevention and control of Pollution) Act,
Wildlife Protection Act and Forest Conservation Act. Issues involved in enforcement of environmental
legislation
Human Rights–The environment (Protection) Act, 1986
10+3 Hours
Total:45+15 Hours
Textbook (s)
1. E. Bharucha, Textbook of Environmental Studies, 1st Ed., University Press (India) Pvt. Ltd., 2005

Reference (s)
1. W. P. Cunningham, M. A. Cunningham, Principles of Environmental Science, 6 th Ed., Tata McGraw
Hill, 2008
2. A. Kaushik, C. P. Kaushik, Perspectives in Environmental Studies, 4 th Ed., New Age International
Publishers, 2008
3. H. S. Peavy, D. R. Rowe, G. Tchobanoglous, Environmental Engineering, 1 st Ed., McGraw Hill, 1984
4. T. E. Graedel, B. R. Allenby, Industrial Ecology and Sustainable Engineering, 1 st Ed., Pearson
Publications, 2009

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test13(%)
Remember 40 35 15
Understand 45 50 50
Apply 15 15 35
Analyze -- -- --
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Sample question (s)


Remember
1. List important natural resources & important institutions related to the environment.
2. Recall a simple food chain.
3. List important acts in environment.
Understand
1. Money deposited in a bank- identify under which environment value.
2. Summarize the methods for creating public awareness regarding environment.
3. Explain the consequences of over utilization of water resources.
Apply
1. Select the economic method of conservation of biodiversity and describe it.
2. Predict the effects and control methods of water pollution.
3. Find the urban problems related to energy and suggest suitable alternatives.
4. Assess why women and children need special care and what are all the supports that our Government is
extending to them?

13
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

35
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16HSX02 English Communication Skills Lab


0032
Course Outcomes
1. Develop the pronunciation ability by using their gained knowledge of the English sound system
2. Improve the articulation of sounds and pronunciation of words for intelligible English
3. Recognize the use of language in conversational style with focus on communication in English
4. Organize ideas effectively in spoken form
5. Discuss social issues with concern and imagine possible solutions
6. Develop the pronunciation abilityby using their gained knowledge of the English sound system

COs – POs Mapping

COs P010
1 3
2 3
3 3
4 3
5 3
6 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

List of Experiments

Module 1–Sounds of English-Consonants


Module 2–Interaction-1: Greeting and taking leave, introducing oneself to others.
Module 3–Sounds of English-Vowels
Module 4–Interaction-2: Making request and response to them ask for and give/refuse permission, Ask for and
give directions, thank and respond
Module 5–Some rules of Pronunciation
Module 6–Interaction-3: Invite, accept, and declining invitations, Make complaints and respond to them,
Express sympathy
Module 7–Word Stress and Sentence stress
Module 8–Interaction-4: Apologize and respond, advise and suggest, Telephone Skills
Module 9–Presentation Skills: Oral and PPT Presentations
Module 10 Group Discussion
Extra Module
Module 11–Debate

List of Augmented Experiments 14


1. Common Errors in English
2. Listening Skills
3. Speaking Skills
4. Writing Skills
5. Presentation Skills–observations
6. Reading Skills
7. Public Speaking
8. Interview Skills
9. Office Communication
10. Telephone Skills
11. Report Writing
12. Vocabulary
13. Body Language
14. Resume Writing
15. Functional English

14
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

36
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Reading Material (s)


1. K. Nirupa Rani, Jayashree Mohanraj and B. Indira, Strengthen Your Steps-Maruthi publications, 2012
2. K. Nirupa Rani, Jayashree Mohan Raj, B. Indira, (Ed) Speak Well (C.D) Orient Black Swan Pvt Ltd,
Hyderabad, 2012
3. D. Jones, English Pronouncing Dictionary (Software)CUP, Ver.1.0, 2003
4. J. Sethi, S. Kamlesh, D. V. Jindal. A Practical Course in English Pronunciation, Prentice-hall of India,
New Delhi, 2007
5. T. Balasubramanian, A Textbook of English Phonetics for Indian students, McMillan, 1981
6. K. Mohan and M. Raman, Effective English Communication, 1st Ed., Tata McGraHills, 2000
7. R. K. Bansal and J. B. Harrison, Spoken English, 3rd Ed., Orient Black Swan, Hyderabad, 1983

37
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CYX02 Engineering Chemistry Lab


0032
Course Outcomes
1. Utilize different Analytical tools and develop the necessary skills in executing experiments involving
estimation of metals in alloys, raw materials, finished products and environmental samples etc.
2. Utilize modern instruments like flame photometer, ion analyzer, UV Vis spectrophotometer, Atomic
Absorption Spectrophotometer for characterization of materials used in industry & environmental
monitoring
3. Determine the amount of hardness, chloride, fluoride, nitrite, DO of water for its quality and know its
utility in domestic and industry
4. Summarize the characteristics of lubricants and able to choose/modify lubricants according to purpose
5. Compose some cross-linked polymers like Bakelite, Nylon etc.
6. Identify the adulteration of food items such as milk, honey, tea, coffee & fertility of soil to increase
crop production

COs – POs Mapping

COs PO4
CO1 3
CO2 3
CO3 3
CO4 3
CO5 3
CO6 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

List of Experiments
Introduction to Quantitative Analysis
1. Assessment of Quality of water
i) Hardness ii) Chloride iii) Fluoride iv) Dissolved Oxygen v) Nitrite
2. Testing quality of lubricants
i) Viscosity Index ii) Flash & Fire point iii) Acid Number
3. Quality Analysis of engineering materials
i) Cement ii) Al/Cu wire iii) Steel
4. Preparation of Engineering and Nano materials
i) Bakelite ii) Nylon iii) Silver nano particles
5. Estimation of Purity of Iron in Ingot
6. Analysis of fertility of soil
i) Sodium & Potassium ii) Micro Nutrients
7. Determination of acid strength (for a citrus fruit) by Conductometr
8. Detection of adulteration of Food in Honey/ Milk/ Tea
9. Estimation of heavy metals in fast food items by AAS.
10. Testing of corrosion of metal
Note: Student should perform minimum of 12 experiments at least one form each head.

List of Augmented Experiments 15


1. Assessment of ground water quality of your village/Mandal
2. Preparation of desired Viscosity Index lubricating oil
3. Studies on the effect of various factors on corrosion

15
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

38
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Reading Material (s)


1. K. Gouru Naidu, Engineering Chemistry Lab Manual, 1 st Ed., 2014
2. G. Svehla, Vogel‘s Qualitative Inorganic Analysis, 7th Ed., Pearson Education, New Delhi, 2003
3. Standard methods for the examination of water and waste waters, American Public Health Association,
21st Ed., EPA, Washington, 2005
4. Metcalf and Eddy, Waste Water Engineering Treatment and Reuse, 4th Ed., Tata McGraw Hill, New
Delhi, 2003
5. D. Srinivasulu, Engineering Chemistry laboratory manual & Record, Parshva publications, 2010

39
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16MEX03 Engineering Workshop


0032
Course Outcomes
1. Utilize basic carpentry tools for the preparation of wooden joints
2. Make use of basic hand tools for the preparation of mild steel joints
3. Build simple house hold items with GI sheet using tin smithy tools
4. Make use of house wiring accessories to build simple electrical circuits
5. Build simple components with hand tools for making experimental setups
6. Build simple components with hand tools as per the drawing specifications

COs - POs Mapping


COs PO1 PO2 PO10 PO12
1 3 2 2 2
2 3 2 1 2
3 3 2 2 1
4 3 2 3 2
5 3 3 1 3
6 3 2 1 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

List of experiments

Trades
Carpentry : 1. Cross Lap joint
2. T-Lap joint
3. Dovetail Joint
4. Mortise and Tennon Joint
Fitting : 1. Square Fit
2. V- Fit
3. Half Round Fit
4. Dovetail Fit
Tin Smithy : 1. Square Box without lid
2. Taper Tray
3. Open Scoop
4. Funnel
House Wiring : 1. Parallel/Series Connection of three bulbs
2. Florescent Lamp Wiring
3. Stair Case Wiring
4. Godown Wiring
Total: 45 Hours
16
List of Augmented Experiments
1. Prepare Tee–bridle joint
2. Prepare Corner dovetail joint
3. Make Corner bridge joint
4. Make Dovetail lap joint
5. Prepare 900round elbow pipe
6. Prepare Ellipse using GI sheet
7. Make cylindrical pipe
8. Make Round T-pipe
9. Prepare hexagonal fitting
10. Prepare diagonal dovetail fitting
11. Prepare universal fitting

16
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

40
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

12. Make square fitting


13. Set the general house wring
14. Set the dim & bright lighting
15. Set the test lamping

Reading Material (s)


1. Engineering workshop Lab manual, Department of Mechanical Engineering, GMRIT Rajam

41
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16EC021 DATA COMMUNICATION SYSTEMS


3103
Course Outcomes
1. Illustrate fundamental concepts of data transmission and to understand the various modulation and
demodulation techniques .
2. Outline the design, operation and capabilities of different transmission lines.
3. Interpret the technical specifications of electronic communication design.
4. Identify various Telephone instruments and their signaling systems.
5. Distinguish between various error detection and correction techniques.
6. Explain different synchronous and Asynchronous Data link protocols.
COs–POs Mapping
COs PO2 PO3
1 2 1
2 2 1
3 2 1
4 2 1
5 2 1
6 2 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction to Data Communications and Networking
Standards Organizations for Data Communications, Layered Network Architecture, Open Systems Interconnection,
Serial and parallel Data Transmission.
Signals, Noise, Modulation and De-Modulation:-Signal Analysis, Electrical Noise, M-ary Encoding, Analog and
Digital Modulation systems.
Metallic Cable Transmission Media: Metallic Transmission Lines, Metallic Transmission Line Types, Metallic
Transmission Line Equivalent Circuit, Wave Propagation on Metallic Transmission Lines, Optical
FiberTransmission Media: Optical Fiber Communications System Block Diagram, Optical Fiber Modes Optical
Fiber construction, Propagation of Light Through an Optical fiber Cable.
Demodulation of analog and digital systems,application of modulation (analog and digital), Evolution of optical
communication
(12+4) Hours
Unit II
Digital Transmission
Pulse Modulation, Pulse code Modulation, Linear Versus Nonlinear PCM Codes, Delta Modulation, PCM and
Differential PCM.
Multiplexing and T carriers:Time-Division Multiplexing, T1 Digital Carrier System, North American Digital
Multiplexing Hierarchy, T Carrier systems, Frequency-Division Multiplexing.
Wireless Communications Systems: Electromagnetic Polarization, Rays and Wave fronts, Electromagnetic
Radiation, the Inverse Square Law, Terrestrial Propagation of Electromagnetic Waves, Microwave Communications
Systems, Satellite Communications Systems.
Different types of PCM systems, WDM, frequency spectrum, application of electro magnetism
(11+4) Hours
Unit III
Telephone Instruments and Signals
The Subscriber Loop, Standard Telephone Set, Basic Telephone Call Procedures, Cordless Telephones, Paging
systems.
The Telephone Circuit:Telephone Message-Channel Noise and Noise Weighting, Transmission Parameters and
Private-Line Circuits, Voice-Frequency Circuit Arrangements.

42
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Cellular Telephone Systems:First-Generation Analog Cellular Telephone, Second-Generation Cellular Telephone


Systems, N-AMPS, Digital Cellular Telephone, Global system for Mobile Communications, Personal
Communications Satellite System.
Public Switching telephone networks, types of hand sets,cellular mobile communications
(12+3) Hours
Unit IV
Data Communications Codes, Error Control, and Data Formats
DataCommunications, Character Codes, Error Control, Error Detection and Correction.
Data Communications Equipment:Digital Service Unit and Channel Service Unit, Voice-Band Modern Block
Diagram, Voice-Band Data Communication Modem.
Data –Link Protocols:Data –Link Protocol Functions, Character –and Bit-Oriented Protocols, Asynchronous Data–
Link Protocols, Synchronous Data–Link Protocols, High–Level Data–Link Control
Cyclic redundancy check method, hamming code, Different types of modems
(10+4) Hours
Total:45+15 Hours
Textbook (s)
1. Wayne Tomasi, Introduction to Data Communications and Networking, 1st Edition, Pearson
Education,2005
2. Behrouz A Forouzan, Data Communications and Networking, 4th Edition, TMH, 2007
Reference(s)
Gallow,Computer Communications and Networking Technologies,2ndEdition Thomson Brookes cole,2005
1.
Fred Halsall, Lingana Gouda Kulkarni, Computer Networking and Internet, 5 thEdition,
2.
PearsonEducation,2005
SAMPLE QUESTIONS

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Comprehensive Test1 (%)
Remember 25 10 --
Understand 50 35 --
Apply -- 20 50
Analyze 25 35 50
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

REMEMBER
1. List 2 different kinds of transmission lines
2. Define modulation
3. List 7 layers in OSI reference model
4. State Inverse square law
5. List 5 types of cellular telephone
UNDERSTAND
1. Identify the functions of layers in OSI reference model
2. Explain the principles involved in the transmission of data through optical fiber
3. Explain the basic telephone call procedure
4. Explain hand off process in cellular networks
5. Explain HDLC protocol

1
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills

43
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

APPLY
1. If the frame is 1101011011 and generator is 10011,what would be the transmitted frame
2. What is the remainder obtained by dividing x7+x5+1by the generator polynomial x3+1
3. Consider a 32 bit block of data 11100111 1101110100111001 10101001 that has to be transmitted IF
Longitudinal Redundancy Check is used what is the transmitted bit stream
4. What is the data transfer rate in bps of a signal that is encoded using phase modulation with eight different
phase angles and a baud rate of 3000?
ANALYZE
1. A block of 32 bits has to be transmitted. Discusshow the thirty two bit block is transmitted to thereceiver
using Longitudinal Redundancy Check
2. In the Hamming code for a data unit of m bits how do you computes the number of redundant bitsneeded.
3. Compare Analog cellular telephone with digital cellular telephone
4. A bit string 0111101111101111110, needs to betransmitted at the data link layer. What is the stringactually
transmitted after bit stuffing

5. A bit stream 10011101 is transmitted using the standard CRC method. The generator polynomial isx3+1
show the actual bit string transmitted. Suppose the third bit from left is inverted during transmission show
that this error is detected at receivers end

44
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS304 Database Management Systems


3103
Course Outcomes
1. Identify and define the data models needed to design a database
2. Create conceptual and logical database design for Large enterprises
3. Demonstrate the relational data model
4. Apply Integrity constrains over the relations
5. Apply normalization process on existing database for eliminating redundancy
6. Apply the recovery techniques for managing the database effectively to avoid the data lose

COs–POs Mapping
COs PO1 PO2 PO3 PO 13 PO 14
1 1 3 2 1 1
2 3 3 2 1 2
3 2 2 3 1 1
4 3 3 2 1 2
5 2 2 3 2 1
6 1 2 3 1 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Introduction to Database Systems
File System Vs DBMS, Advantages of DBMS, Structure of DBMS, Levels of Data Abstraction (Data
Independence), Database Users and Administrators, Different Data Models. E-R Model: Overview of Database
Design, Entities, Attributes, and Entity Sets, Relationships and Relationship Sets Additional Features of the ER
Model
Codd’s rules - Introduction to Distributed Databases - Data Ware Housing and Data Mining
(11+3) Hours
Unit II
Introduction to the Relational Model
Integrity Constraints Over Relations-Introduction to Views-Relational Algebra - Selection And Projection - Set
Operations-Renaming-Joins-Division-Examples of Relational Algebra Queries-Relational Calculus: Tuple
Relational Calculus.
SQL Queries: Form Of Basic SQL Query-Union-Intersect-And Except-Nested Queries-Aggregative Operators-
Group By And Having Clauses-Null Values-Outer Joins.
Query Optimization: Query Processing and Optimization-Heuristics and Cost Estimation in Query Optimization

(11+5) Hours
Unit III
Schema Refinement and Normal Forms
Introduction To Schema Refinement - Problems Caused By Redundancy - Decomposition - Problems Related To
Decomposition - Functional Dependency - Closure of a Set of Fds - Attribute Closure - First - Second - Third
Normal Forms – BCNF - Multi Valued Dependencies – Fourth Normal Form.
Transactions: Acid Properties of Transaction - Transaction States - Schedule: Serial Schedule - Concurrent
Schedules - Anomalies Associated With Concurrent Schedules (RW - WR - and WW Conflicts) -Serializability -
Conflict Serializability - and View Serializability.
Join Dependency - Fifth Normal Form - Domain Key Normal Form
(12+4) Hours

45
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
OODBMS, Concurrency Control, Crash recovery
Introduction to Lock Management-Lock Based Concurrency Control: 2pl-Strict 2pl-Concurrency without Locking-
Timestamp–Based Concurrency Control - Optimistic Concurrency Control. Introduction to Aries - the Log - the
Write-Ahead Log Protocol-Check Pointing
Object-Oriented DBMSs-Concepts and Design: Introduction to Object-Oriented Data Models and DBMSs-
OODBMS perspectives-Persistence-Issues in OODBMSs-The object Oriented Database System Manifesto-
Advantages and Disadvantages of OODBMSs-Object oriented Database Design.
Database Security: Data Classification-Threats and Risks-Database access control-Types of Privileges.
File Organization-Comparison of File Organizations (Heap File - Sorted File Hash File)
(11+3) Hours
Total: 45+15 Hours
Textbook (s)
1. Elmasri & Navatha, Fundamentals of Database Systems, Pearson Education, 2006
2. Silberschatz Korth, Database System Concepts, McGraw hill, 5th Edition, 2010

Reference (s)
1. Peter Rob & Carlos Coronel, Database Systems design, Implementation and Management, 7 th Edition,
2004.
2. Raghurama Krishnan & Johannes Gehrke, Database Management Systems, TATA McGraw-Hill, 3rd
Edition, 2006
3. C.J.Date, Introduction to Database Systems, Pearson Education, 1999.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test2 (%)
Remember 30 30 --
Understand 35 30 --
Apply 35 40 50
Analyze -- -- 40
Evaluate -- -- 10
Create -- -- --
Total (%) 100 100 100

Remember
1. List any four application of DBMS
2. Define data model
3. List any four applications for triggers
4. Define functional dependency
5. List the 4 properties of Transaction
Understand
1. Explain E-R Model with suitable example
2. Explain the role of integrity constraints in database design
3. Illustrate the working principle of „write a head log‟ protocol
4. Differentiate 3NF and 4NF
5. Explain Two Phase Locking Protocol

2
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

46
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Apply
1. When multiple transactions are being executed by the operating system in a multiprogramming
environment, there are possibilities that instructions of one transaction are interleaved with some other
transaction. Apply the suitable concept to overcome the problem
2. Classify various normal forms according to their applicability
3. Give some real world applications of Normalization
4. Illustrate the Commit and Rollback operations of Transaction Control
5. Give some real world applications for Database indexing techniques

Analyze
1. Compare File processing system with DBMS
2. Analyze different locking protocol for concurrency control and serializability
3. Normalization will increase the complexity of the database design. Justify
4. Compare DDL and DML of SQL
5. Compare and Contrast Serializability and Recoverability

Evaluate
1. Is database redesign is necessary? explain
2. How can you evaluate the performance of two data models?
3. Evaluate the performance of query processor and list the corresponding metrics
4. How can you assess the throughput and delay for any DBMS?
5. How can you evaluate the impact of data models on the query processing?

47
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS305 Digital Logic Design


3024
Course Outcomes
1. Apply the Principles of Boolean Algebra to manipulate and minimize Logic Expressions
2. Apply K-maps to Minimize and optimize two-level Logic Functions to several variables
3. Analyze and Experiment with the different operations on Latches - Flip-Flops and Counters
4. Explain the Properties of Registers and Counters in different devices
5. Analyze and Experiment the operation of Sequential Circuits built with various Flip-Flops
6. Illustrate the State Machine diagrams to Design Finite State Machines using various types of Flip-Flops and
Combinational Circuits with Prescribed Functionality

COs–POs Mapping
COs PO1 PO 2 PO4 PO9
1 3 2 1 1
2 3 2 2 1
3 2 2 2 3
4 2 2 3 1
5 3 2 2 3
6 3 3 1 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit I
Number Systems and Boolean Algebra
Review of Number Systems-Conversion of Numbers from One Radix to Another Radix-Complement
Representation of Negative Numbers-Binary Arithmetic-4-bit codes: BCD-Excess-3-Basic Logic Operations-Basic
Theorems and Properties of Boolean Algebra-Switching Functions-Canonical and Standard Forms-Algebraic
Simplification-Digital Logic Gates-Universal Gates. Gray code
ASCII - EBCDIC Codes
Practical Components
1. Realization of Logic gates and verification of Truth tables
2. Realization of basic gates using Universal gates
(10+6) Hours
Unit II
Boolean Function Minimization and Combinational Arithmetic Logic Circuits
Minimization of Switching Functions using K-Map up to 5-variables & 6-variables-Tabular Minimization- Minimal
SOP and POS Realization-Problem Solving using K-map such as Code Converters Binary Multiplier, Half Adder-
Full Adder- Full Subtractor-Ripple carry Adder-Carry Look Ahead Adder-Multiplexer-Demultiplexer-Encoder-
Priority Encoder-Decoder-MUX Realization of Switching Functions-Parity Bit Generator-Error Detection and Error
Correction Codes-parity Checking Even Parity - Odd parity-Hamming Code.
Binary Multiplier- Problem solving using K-map such as Code Converters

Practical Components
1. Construction of half-adder, half-subtractor, full-adder, full-subtractor and verification of their truth tables
2. 4-bit word Parity generator and checker
(11+9) Hours
Unit III
Combinational Logic Circuits and Programmable Logic Devices (PLDs)
Multiplexers-Demultiplexers-Realization of Boolean Functions Using Decoders and Multiplexers, Code Converters
- Magnitude Comparator

48
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Basic PLD‟s-ROM-PROM-PLA-PAL - Realization of Switching functions using PLD‟s-, Classification of


Sequential Circuits (Synchronous and Asynchronous): Basic Flip-Flops-Truth Tables and Excitation Tables (NAND
RS Latch-NOR RS Latch-RS Flip-Flop, JK Flip-Flop-T Flip-Flop-D Flip-Flop with Reset and Clear terminals)-
Conversion of flip-flops
7-Segment Display Decoder - Digital ICs- Digital Logic Families- Characteristics- Introduction to RTL - TTL - ECL
- MOS and CMOS Logics

Practical Components
1. Verification of the properties of decoders and encoders
2. Verification of the functioning of Multiplexer and De-multiplexers
(12+6) Hours
Unit IV
Introduction to Sequential Logic Circuits & Registers and Counters
Design of Registers - Buffer Register - Control Buffer Registers - Bidirectional Shift Registers - Universal Shift
Register - Design of Ripple Counters - Synchronous Counters and Variable Modulus Counters (Mod-2,4,6,10 & 16)
- Ring Counter - Johnson Counter. Finite State Machine-capabilities and limitations -Mealy and Moore State
Machines -Mealy to Moore conversion and vice-versa - Reduction of State Tables and State Assignment
Construction of Finite Automata -Mealy - Moore Machines
Practical Components
1. Realization of Flip-Flops using IC‟s.
2. Verification of functioning of Basic Shift Register (SR), SI/SO SR, SI/PO SR, PI/SO SR, PI/PO SR
(12+9) Hours
Total: 75 Hours
Textbook (s)
1. Morris Mano, Digital Design, 3rd Edition, PHI, 2006
2. A. Anand Kumar, Switching Theory and Logic Design, 3rd Edition, PHI, 2016
Reference (s)
1. Charles H. Roth - Fundamentals of Logic Design, 3rd Edition, Thomson Publications, 1998
2. Zvi Kohavi, Switching & Finite Automata Theory, 2nd Edition, Tata McGraw Hill, 2008
3. R. P. Jain, Modern Digital Electronics, 4th Edition, Tata McGraw Hill, 2010
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Augmented Test3 (%)
Remember 25 20 --
Understand 40 40 30
Apply 35 40 30
Analyze 10
Evaluate -- 10
Create -- -- 20
Total (%) 100 100 100

Remember
1. List the first 16 numbers in base12
2. State Basic Theorems and Properties of Boolean Algebra
3. Reproduce RS-Latch with NOR gates
4. State Demorgan‟s theorem
5. Define Priority Encoder
6. List basic types of programmable logic devices

3
Augmented test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

49
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Understand
1. Explain the functioning of Carry-Lookahead-Adder
2. Describe working Johnson Counter and Ring Counter
3. Draw 5 variable K-map structure
4. Convert decimal number 22.64 to Hexadecimal number
5. Explain how Edge triggered flip flop eliminates Race Around Condition
Apply
1. Show that a full adder can be constructed with two half adders and one OR gate
2. Show dual of X-OR is its complement
3. Demonstrate full adder with MUX
4. Show that NAND connections are not Associative
5. Show that a half adder can be constructed with two half adders and one OR gate
Analyze
1. Compare and Contrast Combinational Circuits and Sequential Circuits
2. Compare PROM and PLA
3. Analyze the following circuit and prove that it is equivalent to T-flipflop

4. Differentiate Synchronous and Asynchronous counters


5. Differentiate flip flop and latch
Evaluate
1. Assess the performance carry-look-ahead adder with ripple carry adder
2. Master-Slave flip flop eliminates race around condition. Defend
3. Hamming Code can correct single bit errors. Defend
4. Implement 2 input AND gate using 2X1 MUX

50
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS306 Discrete Structures & Graph Theory


3103
Course Outcomes
1. Construct simple Mathematical proofs and possess the ability to verify them and comprehend Formal
Logical Arguments via Propositional Logic and Predicate Logic
2. Identify the basic Mathematical objects such as sets-functions-and relations and also verify simple
mathematical properties that these objects possess
3. Demonstrate the ability to describe computer programs in a Formal Mathematical manner using Recursive
Functions
4. Apply basic Counting techniques to solve Combinatorial Problems
5. Apply various techniques of Mathematical Induction (weak - strong and structural induction) to prove
simple Mathematical properties of a variety of Discrete Structures
6. Demonstrate the Graphs and Trees as tools to visualize and simplify situations
COs–POs Mapping
COs PO1 PO2 PO3
1 3 2 1
2 2 3 2
3 1 3 1
4 3 1 2
5 2 3 1
6 3 3 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Mathematical Logic and Predicates
Statements and Notations - Connectives - Well-formed Formulas - Truth Tables - Tautology - Equivalence
Implication - Normal Forms - Rules of Inference for Statement Logic - Proof Techniques (Equivalence - Converse -
Inverse - Contra-positive - and Contradiction - Direct Proofs - Disproving by Counter Example - Proof by
Contradiction - Method of Induction) - Consistency
Predicative Logic - Quantifiers - Universal Quantifiers - Free & Bound Variables - Rules of Inference for Predicate
Logic
Program Correctness - Concepts on PROLOG Language and Simple Programs - Design of Logic Circuits
(10+3) Hours
Unit II
Binary Relations and Algebraic Structures
Binary Relations-Properties & Operations-Relational Matrix and Relational Graph-Equivalence Relations-
Compatibility Relations-Partial Ordering Relations-Hasse Diagram
Lattices-Definition-Types and Properties with examples
Functions-Definition -Types-Inverse Function - Composition of Functions-Recursive Functions
Algebraic Structures-Algebraic Systems-Properties with Examples-Semi Groups-Monoids-Groups and Sub Group
with Examples (Basic Concepts)
Group Codes in Cryptography - Relations in Databases
(12+4) Hours
Unit III
Elementary Combinatorics and Recurrence Relation
Basis of Counting-Cardinality-Sum and Product Rules-Permutations & Combinations with Repetitions (Simple
Problems only)-Constrained Repetitions (Simple Problems only)-Binomial Coefficients-Binomial and Multinomial
Theorems (Basic Concepts only)-The Principle of Inclusion–Exclusion-Pigeon-hole Principle and its Application

51
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Generating Functions-Function of Sequences-Calculating Coefficient of Generating Function-Recurrence Relations-


Solving Recurrence Relation by Substitution and Generating Functions (Simple Problems only)
Algorithm Analysis - Combinatorics for Bioinformatics-Data Science (Time series and signal processing)
(13+5) Hours
Unit IV
Graph Theory
Definition-Representation of Graph-Matrix Representation(Incident and Adjacent Matrices) -Sub-graphs-Graph
Traversal Strategies (DFS & BFS) - Planar Graphs - Isomorphism - Multi-graphs - Cut Sets (Vertices & Edges) -
Euler Circuit and Hamiltonian Cycle - Chromatic Number.
Definition of Tree - Terminologies - Spanning Trees - Minimal Spanning Tree - Prim‟s and Kruskal‟s Algorithm
Four-Color Problem - Tournaments -Social Network Analysis - Network Analysis - Decision Tree Generation for
Data Analysis
(10+3) Hours
Total: 45+15 Hours
Textbook (s)
1. Tremblay J.P. and P. Manohar, Discrete Mathematical Structures with Applications to Computer Science,
Tata McGrawHill, 1997.
2. J. L. Mott, A. Kandel & T. P. Baker, Discrete Mathematics for Computer Scientists & Mathematicians,
Prentice Hall India, 2nd Edition, 2009.
Reference (s)
1. Kenneth H. Rosen, Discrete Mathematics and Applications, 7th Edition, Tata McGraw Hill, 2011.
2. C. L. Liu and D. P. Mohapatra, Elements of Discrete Mathematics, A Computer Oriented Approach, 3rd
Edition, Tata McGrawHill, 2008.
3. D. S. Chandrasekharaiah, Mathematical Foundation to Computer Science, Prism Books Pvt. Ltd,
Hyderabad, 4th Edition, 2012.
4. Seymour Lipschutz and Marc Lipson, Discrete Mathematics, Revised 3rd Edition, Schaum‟s Outline Series,
Tata McGrawHill, New Delhi, 2009.
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test4 (%)
Remember 45 40 10
Understand 35 40 10
Apply 20 20 10
Analyze -- -- 30
Evaluate -- -- 20
Create -- - 20
Total (%) 100 100 100

Remember
1. Define converse, contra positive and inverse of an implication
2. List out the different Principal normal forms with example
3. State the property of first theory of digraph theory by taking a suitable example
4. Define monoid and abelian group with a suitable example
5. Define Pigeonhole Principle and the generalization of the Pigeonhole Principle

4
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.

52
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Understand
1. Explain the Planarity of the Kuratowski‟s two planar graphs
2. Explain the General Principle of Inclusion-Exclusion for n-sets
3. Draw the Hasse diagram of the following relation
R is a relation defined as the divisors of 60 and denoted by D60.
4. Compare between Eulerian graph and Hamiltonian graph
Apply
1. Show that the identity. C(n, r -1) + C(n, r) = C(n +1, r)
2. Show that the complete graphs K2, K3, K4 are planar
3. Let G be the set of all non-zero real numbers with a binary operation *, defined as a*b = a2b2. Show that
<G,*> is an abelian group.
4. Find the coefficient of x9y3 in the expansion of (2x-3y)12.
Analyze
1. Differentiate between Permutation and Combination and find the relation between them.
2. Compare the Equivalence Relation, Compatible relation and Partial Order Relation.
3. Justify, whether the following argument is valid or not.
p q
r s
p r
----------
qvs
4. Identify the combinations in set of electives of 7 subjects that has no repetitions for a group of 10 members
having 5 students in each group.
Evaluate
1. In a sample of 100 logic chips, 23 have a defect type D1, 26 have a defect type D2, 30 have a defect type D3,
7 have defects types D1 and D2, 8 have defects types D1 and D3, 10 have defects types D2 and D3 and 3 have
all three types defects.
Determine the number of chips having (i) At least one defect & (ii) no defect.
2. Find the MST using Kruskals‟s algorithms with explanation.

3. A woman has 11 close relatives and she wishes to invite 5 of them to dinner. Determine the number of
ways can she invite them in the following situations.
a. There is no restriction on the choice.
b. Two particular persons will not attend separately.
c. Two particular persons will not attend together.
4. Determine the number of vertices and number of edges of the complete bipartite graphs K 4,7 and K 7,11.

53
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT305 Data Structures


3103
Course Outcomes
1. Apply the data structure array for various list processing operations such as searching and sorting
2. Apply the data structures like arrays, linked structures, stacks, and queues to solve real world problems.
3. Explain the linked implementation, and its uses both in linear and non-linear data structure.
4. Design and implement an appropriate hashing function for an application.
5. Demonstrate and apply binary tree and height balanced binary trees to solve real world problems.
6. Demonstrate and apply different methods for traversing the graphs

COs–POs Mapping
COs PO1 PO2 PSO1
1 3 1 1
2 3 3 1
3 2 3 2
4 2 3 3
5 3 1 3
6 2 3 1

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit I
Linear Data Structures
Basic concepts: Data abstraction, Algorithm specification, performance analysis
Stack: Introduction to stack, basic operations and implementation of stack using arrays
Queue: Introduction to linear queue, basic operations and implementation of linear queue using arrays, circular
queue, basic circular queue operations
Applications on stack – Recursion, infix to postfix conversion
Linked Lists: Basic operations of singly, doubly and circular linked lists, implementation of stack and queue using
singly linked list
Evaluation of postfix expression - Double Ended Queue - Header linked lists
(12+4) Hours
Unit II
Searching and Sorting
Searching: Linear search and Binary search
Sorting: Bubble sort, Insertion sort and Selection sort
Hashing: Hashing Functions, Open hashing (chaining), closed hashing (open addressing – linear probing, quadratic
probing, double hashing), rehashing
Bucket sort -hash table representations for a keyword set used in programming languages.
(10+3) Hours
Unit III
Non-Linear Data Structures
Trees: Introduction, Terminology, Binary Trees, Representation of Binary Trees using arrays and linked lists, Binary
tree traversals
Heaps: Introduction to binary heaps, definition of a Max-heap, Min-heap, creating Max-Heap, Applications: Heap
sort, Priority queue operations insertions and extract-max.
Binary Search Trees: definition, basic operations of BST (Searching, Insertion and deletion)

54
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Creation of binary tree from in-order & pre-order sequences - Creation of binary tree from in-order & post-order
sequences Priority queue - Representation of symbol tables in compiler design
(12+4) Hours
Unit IV
Efficient Binary Search Trees
Introduction to AVL trees, Height of an AVL Tree, Balancing AVL tree by rotations after insertions and deletions of
a data node
Multi-way search trees: introduction to m-way search trees, B-trees, B+ Trees
Graphs: Definitions, Graph representation - Adjacency matrix, adjacency lists, Graph Traversals (BFS & DFS)
Application of graphs for Determination of single source shortest path - extraction of minimum cost spanning trees
(11+4) Hours
Total: 45+15 Hours
Textbook (s)
1. Horowitz, Sahni and Anderson-Freed, Fundamentals of Data Structures in C, 2nd Edition, Universities
Press, 2008
2. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, Pearson Education, 2002
Reference (s)
1. R. F. Gilberg, B. A. Forouzan, Data Structures A Pseudocode Approach with C, 2nd Edition, CENGAGE
Learning, 2005
2. S. Tanenbaum, Y. Langsam and M.J. Augenstein,Data Structures using C, Pearson Education, 1990
3. Seymour Lipschutz, Data Structures with C, Schaum Series, McGraw Hill Education, 2010

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test5 (%)
Remember 25 20 --
Understand 35 30 --
Apply 20 30 70
Analyze 20 20 10
Evaluate -- -- 10
Create -- -- 10
Total (%) 100 100 100
Remember
1. List out linear data structures
2. Name the basic operations of stack data structure
3. Define balance factor of AVL tree
4. Define complete binary tree
5. What is self-referential structure?
6. Name two basic operations on stack data structure supports
7. Define a double linked list structure
8. What are advantages and disadvantages of circular linked list?
Understand
1. Explain Bubble Sort Process with an example
2. Demonstrate with neat diagram and algorithm to insert a node before the given key
3. Explain Deletion process using an example binary search tree
4. Explain why the selection sort is more efficient than the bubble sort

5
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.

55
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

5. Explain with suitable example of LL rotation after inserting a new node into an AVL tree
6. Demonstrate the application of singly linked lists for the addition of the polynomials P1 and P2
Apply
1. Construct a symbol parse tree for the key words of following program
void main() {
long int n,num,d;
char prime;
clrscr();
printf("Enter the range for prime no");
scanf("%ld",&n);
for(num=2;num<=n;num++) {
prime='t';
for(d=2;d<=sqrt(num);d++)
if (num%d==0) {
prime='f';
break;
} if(prime==t)
printf("%10ld",num);
} getch();
}
2. Develop an algorithm to concatenate two single linked lists
3. Construct a priority queue and implement all basic operations to demonstrate priority queue
4. Build a recursive procedure to count the number of nodes in a binary tree
5. Develop a queue using single linked list data structure
Analyze
1. Analyze the efficiency of insertion sort for the following inputs to sort
A={12, 23, 3, 11, 56, 6, 78, 7} B={12, 14, 23, 45, 56, 67, 78, 81}
2. Analyze the efficiency of BST deletion to delete a node with two children
3. Compare BST deletion and AVL deletion methods according to time efficiency.
4. Choose a suitable data structure to implement a linked stack
5. Analyze the efficiency of BFS graph traversal method
Evaluate
1. Justify that the height of the AVL tree is O (log n) where n is the no of nodes in the tree
2. Prove that the height of a complete, balanced binary tree of „n‟ nodes is “log (n+1)”
3. The worst time complexity of binary search is O(log n), Justify
4. Choose a suitable data structure to implement double ended queue
5. Compare the height by successive insertion of following numbers if inserted into a BST and AVL tree
{12, 14, 23, 45, 56, 67, 78, 81}

Create
1. Construct the binary tree for the given in-order and pre-order traversal of a tree
In-order sequence: D B E A F C , Pre-order sequence: A B D E C F
2. Modify the routine BST-branch so that the nodes of the tree are freed after they are no longer required.
3. Modify the bubble sort algorithm so that a record is kept of the actual number of comparisons and
interchanges made
4. Construct the binary tree for the given in-order and post-order traversal of a tree
In-order: 4 2 5 1 6 7 3 8 , Post-order: 4 5 2 6 7 8 3 1

56
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT306 Object Oriented Programming through Java


3103
Course Outcomes
1. Apply object oriented concepts to real world problems
2. Develop applications using different types of inheritances
3. Create and use user defined packages
4. Analyze and recover runtime exceptions arise in the applications
5. Apply parallel processing applications using threads
6. Develop internet based interactive applications using peripheral functions
COs–POs Mapping
COs PO2 PO3 PO5 PSO2
1 3 2 3 2
2 3 1 3 2
3 2 3 3 2
4 2 3 1 3
5 3 2 3 2
6 3 3 3 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit I
Introduction to Java
Overview of Object Oriented Programming principles, Importance of Java to the Internet, Byte code, Methods,
classes and instances, Data types, arrays, control statements, simple java program, Classes and Objects–
constructors, methods, access control, this keyword, overloading methods and constructors, garbage collection
Features of object oriented programming–Java History–Computer Programming Hierarchy–Role of Java
Programmer in Industry
(11+3) Hours
Unit II
Inheritance, Packages & Interface
Inheritance: Hierarchical abstractions, Base class and subclass, subtype, substitutability, forms of inheritance-
specialization, specification, construction, extension, limitation, combination, Benefits of inheritance, super
keyword, final keyword with inheritance, polymorphism, abstract classes
Packages: Defining, Creating and Accessing a Package, Understanding CLASSPATH, importing packages, Member
access rules,Interface: Defining an interface, differences between classes and interfaces, implementing interface,
variables in interface and extending interfaces
Nested–Inner Class & Anonymous Classes–Generic Class Types
(11+4) Hours
Unit III
Exception Handling & Multithreading
Exception handling: Concepts and benefits of exception handling, exception hierarchy, usage of try, catch, throw,
throws and finally, built-in and User Defined Exceptions
Multithreading: Definition thread, thread life cycle, creating threads, synchronizing threads, daemon threads
Control Flow In Exceptions– JVM reaction to Exceptions– Inter Communication of Threads– Critical Factor in
Thread–Deadlock (11+4) Hours

57
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
Applets & Event Handling
Applets: Concepts of Applets, differences between applets and applications, life cycle of an applet, types of applets,
creating applets, passing parameters to applets, The AWT class hierarchy, user interface components labels, button,
Text components

Event Handling: Events, Delegation event model, handling mouse and keyboard events, Adapter classes, inner
classes, Compare basic AWT components with swing components, More user interface components-canvas,
scrollbars, check box, choices, lists panels–scroll pane, dialogs, menu bar, layout managers.
Applet Security Policies–Anonymous Inner classes a Short–cut to Event Handling–Java Utilities (java.util Package)

(12+4) Hours
Total: 45+15 Hours
Textbook (s)
1. H. Schildt, Java: The complete reference, 7th Edition, TMH, 2006
2. T. A. Budd, An Introduction to Object–Oriented Programming, 3rd Edition, Addison Wesley Longman, 2002
Reference (s)
1. Dietal & Dietal, Java: How to Program, 8th Edition, PHI, 2010
2. C. S. Horstmann and G. Cornell, Core Java, Vol 1. Fundamentals, 7 th Edition, Pearson Education, 2004
3. C. Horstmann, BIG JAVA Compatible with Java 5 & 6, 3rd Edition, Wiley Publishers, 2008

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test6 (%)
Remember 30 15 --
Understand 40 25 --
Apply 20 40 70
Analyze 10 20 20
Evaluate -- -- 10
Create -- -- --
Total (%) 100 100 100

Remember
1. List all OOPs principles
2. Define class and object
3. Illustrate various data types supported by JAVA
4. State various access controls available in JAVA
5. Define inheritance
6. Define thread
Understand
1. Explain byte code
2. Explain the use of super, static and final keywords
3. Illustrate the use of try, catch, throw and throws
4. Java is purely object oriented programming language. Explain
5. Explain types of polymorphism with Example

6
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

58
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Apply
1. Write statements that perform the following one-dimensional-array operations:
a) Set the 10 elements of integer array counts to zero
b) Add one to each of the 15 elements of integer array bonus
c) Display the five values of integer array best Scores in column format
2. Create two arrays that store all even no‟s in one array and all odd no‟s in another array for a given set
of elements
3. Write a java program to implements final variable, Method and classes
4. Explain the reason for the following code giving compiling errors.
abstract class AbstractClass
{
abstract void abstractMethod()
{
System.out.println("First Method");
}
}
5. Write a java program to implement the following techniques
a) Method Overloading
b) Method Overriding
6. Write a Java program to implement Virtual function technique

Analyze
1. Compare and Contrast an abstract class and an interface
2. Differentiate method overloading and overriding
3. Differentiate abstraction and encapsulation
4. Identify the uses of calling a synchronize method inside a synchronize method
5. Identify memory leak problems in Java objects

59
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS309 Database Management Systems Lab


0032
Course Outcomes
1. Define the structure of SQL query
2. Experiment with different Data Base languages
3. Choose Database packages(Oracle/ MySql/ DB2/ etc)
4. Demonstrate the JDBC and ODBC Connections
5. Interpret Embedded and Nested Queries
6. Design and development of projects in DBMS
List of Experiments
1. Design ER Model for a given application & Convert ER model to Relational Model
2. Creating users - roles and Granting privileges.
3. Creating and altering tables for various relations in SQL
4. Implement Integrity Constraints. (Key constraints - Domain constraints)
5. Implementing queries in SQL using
5.1 Insertion
5.2 Retrieval (operations like union - intersect - minus - in - exists - group by and having etc.)
5.3 Updation
5.4 Deletion
6. Implementing joins - sub queries - nested and co related nested queries
7. Built in functions in oracle (String - Date - Aggregate functions etc.)
8. Working with views
9. Creating triggers and exception handling
10. Implementing cursors
11. Implementing operations on relations using PL/SQL
12. Implementing functions and stored procedures
13. Implementing the concepts of Rollback - commit and checkpoints
List of Augmented Experiments9
1. Inventory control management System
2. College Management System
3. Hospital management System
4. Library management System
5. Payroll management System
6. Health care organization Management System
7. Restaurant Management System
8. Blood Donation Management System
9. Art Gallery Management System
10. Hotel Management System
11. School Management System
12. Salary Management System
13. Wholesale Management System
14. Time Table Management System
15. Website Management
Reading Material (s)
1. Database Management Systems Lab Manual, Department of CSE, GMRIT, Rajam

9
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

60
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT308 Data Structures Lab


0032
Course Outcomes
1. Apply the data structure array for various list processing operations such as searching and sorting
2. Implement array - stack - and queue data structures to solve various computing applications
3. Implement linked list data structure to solve various computing problems
4. Design and develop applications using appropriate hashing method
5. Demonstrate and apply binary tree and its applications
6. Demonstrate and apply different methods for traversing graphs
List of Experiments
1. Implement Stack and queue operations using array
2. Implement Singly Linked Lists
3. Implement Stacks and queues using linked lists
4. Implement Doubly Linked Lists
5. Implement to search an element using iterative linear and binary search
6. Implement Bubble sort, Insertion sort & Selection sort techniques
7. Implement Open Hashing and closed hashing (any one ) using appropriate data structures
8. Write a program to demonstrate Max-Heap operations and application Heapsort
9. Write a program to demonstrate Max-Heap operations and application priority queue with operations insert
and extract-max
10. Write a program to demonstrate different Binary search Tree Traversals
11. Write a program to demonstrate BST searching and deletion operations
12. Write a program to demonstrate different Graph Traversals
List of Augmented Experiments8
1. Develop an application that would allow you to insert and delete elements into/from the array at any
arbitrary location.
2. Develop an application to add and subtract following polynomials 5x2 – 3xy+y - 2x2 – y2+5xy – x+y using
array.
3. Develop an application to create one dimensional - two dimensional and three dimensional arrays in memory
and then verify the various address calculation formulae for any arbitrary element of these arrays.
4. Develop an application to implement a sparse matrix for the given matrix A.
5. Develop an application to implement a queue using stack operations.
6. Develop an application to convert the following expression to its postfix equivalent using stack
I. ((A+B )* D) ^ (E – F)
II. A+(B * C – (D / E ^ F) * G) * H Where ^: raise to the power
7. Develop an application to evaluate any given postfix expression. Test your program for the evaluation of the
equivalent postfix form of the expression (- (A*B)/D) ↑ C+E – F * H * I
for A = 1 - B = 2 - D = 3 - C = 14 - E = 110 - F = 220 - H = 16.78 - I = 364.621.
8. Develop an application to declare a priority queue using two-dimensional array - store elements and priority.
Display the elements according to priority from higher to lower.
9. Develop an application dequeue using a one dimensional array of size N.
10. Let X = (x1 - x2 - … xn) Y = (y1 - y2 - …yn) be two lists with a sorted sequence of elements. Write an
application to merge the two lists together as a single list Z with m+n elements. Implement the lists using
array and singly linked list.
11. Write a menu driven application which will maintain a list of car models - their price - name of the
manufacturer - engine capacity etc. - as a doubly linked list. The menu should make provisions for inserting
information pertaining to new car models - delete obsolete models - and update data such as price besides
answering queries such as listing all car models within a price range specified by the user and listing all
details given a car model.

8
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

61
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

12. Develop an application to perform the inorder, preorder and postorder traversals of a binary tree using non-
recursive methods.
13. Develop an application to perform inserting and deleting a node in a graph
14. Develop an application to simulate a calculator which performs the addition, subtraction, multiplication and
division of polynomials using linked list.
15. Develop an application to perform construction of an AVL search tree using insertion and deletion
operations.

Reading Material (s)


1. Data Structures Lab manual, Department of CSE, GMRIT, Rajam

62
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT309 Java Lab


0032
Course Outcomes
1. Make use of JAVA SDK environment to create - debug and run java programs
2. Create applications based on code reusability
3. Develop programs using threads
4. Develop and debug real time problems using exception handling
5. Create interactive applications using event handling mechanisms
6. Design Graphical User Interface using AWT components
List of Experiments
1. Write a Java program to demonstrate String handling methods.
2. Write a Java program for sorting a given list using inheritance concept.
3. Write a Java program for creating one base class for student personal details and inherit those details
into the sub class of student Educational details to display complete student information.
4. Write a Java program to implement matrix operations using multidimensional arrays.
5. Write a Java program that illustrates runtime polymorphism.
6. Write a Java program - to demonstrate tokenizing given string/text using String Tokenizer class
7. Write a Java program to create a package which has classes and methods to read Student Admission
details.
8. Write a Java program to define and handle Exceptions in the implementation of Program3. (Also make
use of throw - throws).
9. Java program that simulates a traffic light.
10. Write a Java program for handling mouse events.
11. Write a Java Program to design a Job Application/ Student Admission Form and store the values in a
file.
12. Write a java program for a simple event handler to display cut/copy/paste events using swings.
13. Write a Java program that works as a simple Calculator.
List of Augmented Experiments7
1. New Patient Registry Management System
2. Restaurant Billing Management System
3. Library Management System
4. ATM Management System
5. Bus Ticket Booking Management System
6. Movie Ticket Booking Management System
7. Queuing Management System
8. Attendance Management System
9. Medical Store Billing Management System
10. Text Editor Projects in Java
11. Google Search Engine Filter
12. Electronic voting System
13. Day Planner
14. Library management System
15. Personal Finance Management System

Reading Material (s)

1. JAVA Lab manual, Department of CSE and IT, GMRIT, Rajam

7
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

63
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16ESX01 / 16ESX02 Employability Skills I & II


0201
16ESX01 Employability Skills I

Soft Skills: Communication Skills & Confidence: How Communication Skills affect Confidence? How to
communicate effectively.(with Examples) - Attitude & Confidence: Attitude Vs Skills vs Knowledge, Attitude Vs
Behavior, How to develop Positive Attitude? Confidence? Fear? Steps to Overcoming the Fear of Public Speaking?
- Goal Setting: Vision Vs Mission Vs Goals, Why Goal Setting? SMART Technique to Goal Setting, Putting First
things First and Time Management - JAM & J2M Sessions: Practice & Evaluation - Public Speaking: Presentations
by Students on General Topics.

Quantitative Aptitude: Problems on numbers - H.C.F and L.C.M - Problems on ages – Averages - Time and Work
- Time & Distance – Percentages - Profit & loss - Ratio & Proportions – Partnership - Simple interest & Compound
interest – Clocks – Calendars - Pipes and Cisterns - Mensuration

Verbal reasoning: Number series - Direction test - Blood relations – Syllogisms - Seating arrangement -
Permutations, combinations and Probability – Dice - Cube and Cuboid - Data sufficiency - Logical deductions –
Analogies - Course of action - Cause and effect - Data interpretation.

64
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CSI03 Tibero ® DB (One Credit Course)


(Course designed and will be delivered by TMaxSoft, Bangalore)
1001

Course Outcomes
1. Demonstrate and understanding of the relational data model
2. Performance analysis between Tibero® DB and Oracle DBMS

Tibero ®DB: Fundamentals of Data Base Management Systems, Fundamentals of Tibero®DB. Different data
models for Data Base management systems, Database Languages: DDL, DML, DCL, types of SQL queries and
different operators, Tibero / SQL Queries: Form of Basic SQL Query, Introduction to Nested Queries, Correlated
Nested Queries, Set Comparison Operators, Aggregative Operators-NULL values.
(15 Hours)

Reading Material (s)


1. https://technet.tmaxsoft.com/upload/download/online/tibero/pver-20150504-000002/index.html

65
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16MA405 Probability and Statistics


3103
Course Outcomes
1. Understand basic probability axioms and apply Baye‟s theorem related to engineering problems.
2. Identify the suitable distribution among Binomial, Poisson, exponential, normal in engineering
applications.
3. Make use of the sampling distribution of the sample mean in general situations, using the Central
Limit Theorem.
4. Decide the null or alternative hypotheses using the suitable test statistic.
5. Apply the regression analysis to fit the curves.
6. Understand the methods and applications of Control charts like X-bar, p and R-charts.
COs–POs Mapping

COs PO1 PO 2
1 3 3
2 3 3
3 2 3
4 2 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Probability: Sample space and events – Probability – The axioms of probability – Some Elementary theorems -
Conditional probability – Baye‟s theorem, Random variables – Discrete and continuous Distributions and
properties-Expectations - MGFs.
Real time problems of Baye’s theorem, Construction of discrete probability distributions
(11 +4) Hours
Unit II
Binomial, Poisson, Exponential, Normal distributions and their MGFs – related properties
Limiting cases from Binomial distribution to Poisson and Normal distribution
(11 + 4) Hours
Unit III
Sampling distribution: Populations and samples - Sampling distributions of mean (known and unknown)-Central
limit theorem. Test of Hypothesis– Type I and Type II errors. One tail and two-tail tests –tests of Hypothesis
concerning one and two means & Proportions-Z test, Maximum error and interval estimation of means and
proportions. Tests of significance – Student‟s t-test, F-test, Chi-square test for independence of attributes
Real time problems in construction of confidence intervals and Testing of Hypothesis
(11 + 4) Hours
Unit IV
Statistical Quality Control methods-Methods of preparing Control charts-X-bar, p and R-charts-curve fitting by the
method of least squares- linear, polynomial and exponential curves-Correlation-Pearson‟s correlation coefficient
and Spearman‟s Rank correlation and linear Regression.
Construction of NP-chart
(12 + 3) Hours
Total: 45+15 Hours

66
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Textbook(s):
1. B.V.Ramana, Engineering Mathematics, TMH-publications, 4th Edition, 2009.
2. Miller and J. E. Freund, Probability & Statistics for Engineers, Prentice Hall of India, 8 th Edition, 2011.
3. T. K. V. Iyengar, B. Krishna Gandhi et. al, Probability & Statistics, S. Chand & Company, 2012.
Reference book(s):
1. Arnold O. Allen, Probability & Statistics, Academic Press, 2nd Edition, 2005.
2. Shahnaz Bathul, A text book of Probability & Statistics, V. G. S. Book Links, 2 nd Edition, 2007.
3. Murugesan and Gurusamy, A text book of Probability & Statistics, Anuradha Publications, 2011.

SAMPLE QUESTION (S)


Internal Assessment Pattern

Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test7 (%)
Remember 25 20 --
Understand 35 35 --
Apply 30 25 70
Analyze 10 20 20
Evaluate -- 10
Create -- --
Total (%) 100 100 100

Remember
1. List out the formulas related to permutation and combination
2. List out all types of events in probability
3. Define axioms of probability
4. Define conditional probability

Understand
1. Explain probability, condition probability definitions and Bayes theorem
2. Discuss Moment generating functions of discrete and continuous distributions
3. Compare Binomial, Poisson, Normal distributions
4. Illustrate the procedure involved in sampling distributions

Apply
1. The mean voltage of a battery is 15 and SD is 0.2. Compute the probability that four such batteries
connected in series will have a combined voltage of 60.8 0r more volts.
2. A company claims that the mean life time of tube lights is 500 hours. Is the claim of the company tenable if
a random sample of 25 tube lights produced by the company has mean 518 hours and SD 40 hours.
Company is satisfied if t falls between -t0.01 and t0.01.
3. It is observed that 174 out of a random sample of 200 truck drivers on highway during night are drunk. Is it
valid to state that at least 90% of the truck drivers are drunk. Use 0.05 LOS

7
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

67
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS404 Software Engineering


3024
Course Outcomes
1. Illustrate the need of Software Life Cycle Models
2. Demonstrate the Requirements of the Software Systems process
3. Summarize the system models of software engineering
4. Choose appropriate software architecture style for real-time software projects
5. Analyze Risk management and Software quality of the software products
6. Identify the Illustrate Find quality assurance techniques.
COs–POs Mapping
COs PO1 PO2 PO3
1 1 3 2
2 1 3 2
3 1 2 3
4 1 2 3
5 2 1 3
6 3 1 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit I
Introduction to Software Engineering and Life Cycle Models
Software engineering definitions software development projects, the evolving role of software, Changing Nature of
Software, Software myths.
Perspective, evolutionary, specialized (agile), Unified software process model
Business Process Engineering Overview - Product Engineering Overview
Practical Components
1. Suggest the suitable life cycle model for credit card validation system
2. Perform Agile Testing
(12+6) Hours
Unit II
Software Requirements Engineering Process and S ystem Models
Requirement classification, Feasibility studies, elicitation and analysis, validation and change management.
Context Models, Behavioral model1, Data models, Object models
Software Prototyping – Prototyping in the Software Process
Practical Components
1. Prepare the requirement analysis and SRS document
2. Estimate the effort using COCOMO Model
3. Develop DFD and Context model for given problem
(11+12) Hours
Unit III
Design Engineering
Design concepts, the design model.
Creating an architectural design - Software architecture, Architectural styles and patterns,
Performing User interface design - Golden rules, User interface analysis and design and steps
Data Acquisition System - Monitoring and Control System

68
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Practical Components
1. Suggest architecture style for internet banking system
(11+3) Hours
Unit IV
Testing and Risk Management
Unit testing, integration testing, system testing, object oriented programs testing, black box and white box testing,
debugging,
Risk management - Risk types, strategies, estimation and Planning.
Software Quality - Quality assurance and its techniques
Software Implementation Techniques - Testing as an Engineering Activity

Practical Components
1. Prepare Test suite
2. Perform code generation using automated tools
(11+9) Hours
Total: 75 Hours
Textbook (s)
1. Rajib Mal, Fundamentals of software Engineering, 3rdEdition, Eastern Economy Edition, 2009
2. Roger S. Pressman, Software Engineering, A practitioner‟s Approach, 6 thEdition, McGraw-Hill
International Edition, 2005
Reference(s)
1. I. Sommerville, Software Engineering, 7thEdition, Pearson education, 2004
2. K K Aggarwal and Yogesh singh, Software engineering,3 rd Edition, New age international
publication,2008
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Augmented Test8 (%)
Remember 25 15 --
Understand 35 15 20
Apply 20 25 30
Analyze 20 25 30
Evaluate -- 10 20
Create -- 10 --
Total (%) 100 100 100

Remember
1. Define software engineering
2. List 3 software myths
3. Define Feasibility study
4. What is meant by debugging?
5. Define Risk
Understand
1. Explain various quality assurance techniques
2. Describe software architecture styles and patterns
3. Illustrate golden rules for user interface design
4. Explain various techniques for requirements elicitation and analysis
5. Describe the differences between white box testing and black box testing

8
Augmented test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

69
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Apply
1. Classify the techniques of requirement analysis

Analyze
1. Compare and Contrast software life cycle models
2. Analyze risk types in the risk management
Evaluate
1. How do you assess the quality of the software product?
2. How do you assess the performance of software models?

70
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS406 Web Technologies


3103
Course Outcomes
1. Write a valid HTML document involving a variety of element types - including hyperlinks - images - lists -
tables - and forms
2. Implement server-Side Programming for creating information sharing and functionality using PHP
3. Apply JDBC and AJAX technologies in real time applications
4. Make use of servlets-and JSP Technologies in real time applications
5. Develop Server-Side Programming for creating information sharing and functionality using JSP
6. Create web applications by using data base and sever side scripting languages

COs–POs Mapping
COs PO3 PO5 PO6 PO13
1 3 1 2 1
2 3 3 2 2
3 2 3 2 2
4 2 3 2 2
5 3 3 3 2
6 2 3 2 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
HTML Common tags- List, Tables, images, forms, Frames, Links and Navigation, CSS: Introduction, CSS
Properties, Controlling Fonts, Text Formatting, Pseudo classes, Selectors,.
Java Script: Learning Java script: Variables, operators, Functions, Control structures, Events, Validations,plugins.
Introduction to HTML5, introduction to CSS3 13+4 Hours

Unit II
PHP Programming: Introducing PHP: Creating PHP script, Running PHP script. Working with Variables and
constants: Using variables, Using constants, Data types, Operators.
Controlling program flow: Conditional statements, Control statements, Arrays, functions. Working Withforms.
PHP 5 Global Variables – Superglobals - PHP 5 Cookies - PHP 5 Session 10+3 Hours
Unit III
PHP Programming
Introducing PHP: Creating PHP script - Running PHP scriptworking with Variables and constants: Using variables -
Using constants-Data types - Operators. Controlling program flow: Conditional statements - Control statements -
Arrays - functions
PHP 5 Global Variables – Superglobals - PHP 5 Cookies - PHP 5 Session 11+4 Hours
Unit IV
JDBC and AJAX
JDBC architecture - JDBC drivers - working with PHP forms and Database using MYSQL - Developing JDBC
applications Introduction - AJAX with XML and PHP - Common Gateway Interface and Perl programming -
Developing AJAX applications
PHP 5 File Handling - PHP XML DOM Parser - and AJAX Database
11+4 Hours
Total: 45+15 Hours

71
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Textbook (s)
1. Jon Duckett, Web programming with HTML, XHTML and CSS, 2nd Edition, Wiley India, 2010
2. Uttam Roy, Web Technologies, OXFORD University press,2010
Reference (s)
1. Bai, Michael Ekedahl, Web programming, CENAGE Learning, India Edition, 2015
2. Paul S.Wang, An Introduction to Web DesignProgramming, India Edition, 2004
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test9 (%)
Remember 25 25 --
Understand 35 35 30
Apply 40 40 20
Analyze 15
Evaluate -- -- 10
Create -- 25
Total (%) 100 100 100
Remember
1. List out different form elements in HTML
2. Define GET() and POST() method
3. List out different types of JDBC drivers
4. List any three XML parsers
5. Write about XML DTD
Understand
1. Explain fundamental HTML elements
2. Explain internet concepts
3. Illustrate how work java script events
4. Describe procedure for how to connect PHP to MYSQL
5. Explain AJAX technologies
Apply
1. Implement tables in HTML
2. Demonstrate and implement how to connect PHP to MYSQL, student Placement details.
3. Demonstrate and implement Java script validations using regular expressions
4. Implement AJAX technology with any application
5. Implement PHP to MYSQL, insert the student academic information
Analyze
1. Compare and contrast CSS4 and CSS5
2. Compare XML DTD and XML Schema
3. Compare SGML-based versus XML-based HTML
Evaluate
1. How the Sessions can be maintained in Session tracking?
2. Compare Servlet with CGI
3. How to add Nodes in DOM Tree?
4. How the template based Transformation achieved with the help of XSLT?

9
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

72
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT404 Computer Networks

3103
Course Outcomes
1. Propose appropriate network model for data communication
2. Analyze various protocols in data link layer.
3. Analyze IEEE 802 series protocols.
4. Develop web applications for sending E-mail.
5. Propose and implement appropriate routing algorithm for data routing.
6. Extend the Internet connection to a given system and trouble shoots the same.

COs–POs Mapping

COs PO1 PO2 PSO1


1 3 2 1
2 3 3 1
3 2 3 2
4 2 3 2
5 1 3 3
6 1 3 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Network Hardware-Network Software-and Transmission Media
OSI-TCP/IP-the ARPANET-Network Topologies-Physical Layer:
Transmission media: Magnetic Media-Twisted pair-Base band Coaxial Cable-Fiber optics-Wireless Transmission:
Electromagnetic Spectrum-Radio Transmission-and Microwave Transmission.Switching Techniques: Circuit
Switching-Packet Switching-Message Switching.

Taxonomy of networking devices.


11+4 Hours
Unit II
Data link layer
Design Issues: Framing-error detection and correction-CRC-Elementary Data link Protocols: Stop and wait-Sliding
Window protocols: Go-back-n-Selective Repeat-Medium Access sub layer: Channel allocation methods-Multiple
Access protocols: ALOHA-CSMA-IEEE Standard 802.3 and Ethernet-IEEE Standard 802.4: Token bus.
Data Link Control Protocols: HDLC-SLIP-PPP
12+4 Hours
Unit III
Network Layer
Network Layer design issues-Virtual circuit and Datagram subnets-Routing algorithms: Shortest path routing-
Flooding-Hierarchical routing-Distance vector routing-Broad cast and Multi cast routing,Congestion Control:
Congestion prevention policies.
Internet control protocols
10+3 Hours

73
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
Transport Layer
Transport Services-Connection management-Elements of Transport Protocols-Internet Transport Protocols: UDP
and TCP. IPv4 & IPv6, Application Layer-Domain name system-Electronic Mail-WWW,
ATM Transport protocol-Proxy Servers-Multimedia: Data compression-digital representation of analog signals-
Real time transport protocol-session control protocols
12+4 Hours
Total: 45+15 Hours
Textbook (s)
1. Andrew S Tanenbaum, Computer Networks, 4th Edition, Pearson Education /PHI, 2002
2. Behrouz A. Forouzan, Data Communications and Networking, 3rdEdition, Tata McGraw Hill Higher
Education, 2003
Reference (s)
1. Willam Stallings, Data and Computer Communications,8thEdition, Pearson Prentice Hall, 2007
2. W.A. Shay, Thomson, Understanding communications and Networks, 3rd Edition, Cengage Learning, 2005

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test10 (%)
Remember 25 30 --
Understand 35 40 --
Apply 20 20 70
Analyze 20 10 20
Evaluate -- -- 10
Create -- -- --
Total (%) 100 100 100

Remember
1. List the applications of Computer Networks
2. Write two differences between OSI and TCP/IP models.
3. State 5 key assumptions in Dynamic channel allocation?
4. State the purpose of DNS.
5. Define congestion.
6. State the 2-army problem.

Understand
1. Illustrate OSI Reference model.
2. Explain various design issues of data link layer.
3. What are the responsibilities of Data Link layer and explain Pure Aloha and Slotted Aloha protocols.
4. Describe Distance Vector routing algorithm with example and explain count to infinity problem
5. Represent the Manchester encoding for the bit stream: 0001110101.
Apply
1. What is the check summed frame transmitted if the message is 1101011011 and the generator polynomial is
x 4 + x + 1 using CRC
2. Can you think of any circumstances under which an open-loop protocol, (e.g., a Hamming code) might be
preferable to the feedback-type protocols.

10
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

74
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

3. Assuming that all routers and hosts are working properly and that all software in both is free of all errors, is
there any chance, however small, that a packet will be delivered to the wrong destination?

Analyze
1. The following data fragment occurs in the middle of a data stream for which the byte-stuffing algorithm
described in the text is used: A B ESC C ESC FLAG FLAG D. What is the output after stuffing?
2. The following character encoding is used in a data link protocol: A: 01000111; B: 11100011; FLAG:
01111110; ESC: 11100000 Show the bit sequence transmitted (in binary) for the four-character frame: A B
ESC FLAG when each of the following framing methods are used:
(a) Character count.
(b) Flag bytes with byte stuffing.
(c) Starting and ending flag bytes, with bit stuffing.
3. Analyze Data link protocols almost always put the CRC in a trailer rather than in a header.

Evaluate
1. Consider the user of differentiated services with expedited forwarding. Is there a guarantee that expedited
packets experience a shorter delay than regular packets? Justify.
2. Compute a multicast spanning tree for router C in the following subnet for a group with members at routers
A, B, C, D, E, F, I, and K.

75
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT405 Computer Organization


3103
Course Outcomes

1. Identify the different components of the computer system, their functions and their interconnections.
2. Demonstrate the various instruction formats that the processor follows.
3. How the control unit generates control signals to execute a particular instruction
4. How the memory system can be suitably designed to improve the performance of the computer.
5. Analyze how high speed computers can be designed by using the pipelining and multiprocessor
6. Illustrate data transfer between central computer and I/O devices may be handles in a variety of modes
COs – POs Mapping
COs PO1 PO 2
1 3 3
2 3 2
3 3 3
4 2 3
5 2 3
6 2 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Fundamentals of Computers and Basic Computer Organization and Design
Introduction to Digital Computers. Functional units, Register transfer language: Register transfer, Bus and memory
transfers; Micro-Operations: Arithmetic micro-operations, Logic micro-operations, Shift micro-operations,
Arithmetic logic shift unit: Instruction codes, Computer registers, Computer instructions, Timing and Control,
Instruction cycle, Memory-Reference instructions, Register-Reference instruction, Input-Output instruction,
Interrupts,
Hardware and Software-Computer types (12+4) Hours

Unit II
Computer Arithmetic and the Memory System
Fixed point representation, Floating point representation, Addition and subtraction, Multiplication algorithms,
Division algorithms, Memory hierarchy, Semiconductor RAM memories, Read-only memories, Cache memories,
Performance considerations, Secondary storage,
Floating point arithmetic operations-Virtual memories (12+4) Hours

Unit III
Central Processing Unit and Control Unit Design
Stack organization, Instruction formats, Addressing modes, Data Transfer and manipulation, Program control,
reduced instruction set computer, Complex instruction set computer Hardwired control unit design, Micro-
programmed Control unit design, Control memory, Address sequencing,
Micro-program example (11+3) Hours

Unit IV
Input-Output Organization and Pipeline Processing
Peripheral devices, Input-Output interface, Asynchronous data transfer, Modes of transfer, Priority interrupt, Direct
memory access, Parallel processing, Pipelining, Arithmetic pipeline, Instruction pipeline
Input-Output processor (IOP) (10+4) Hours
Total : 45+15 hours

Textbook (s)

76
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

1. Carl Hamacher, ZvonksVranesic and SafeaZaky, Computer Organization, 5 thEdition, McGraw Hill, 2002
2. M.Moris Mano, Computer Systems Architecture 3rd Edition, Pearson/PHI, 1992
Reference (s)
1. William Stallings, Computer Organization and Architecture, 6th Edition, Pearson/PHI,2007
2. Andrew S. Tanenbaum ,Structured Computer Organization, 6thEdition PHI/Pearson,2012

SAMPLE QUESTION (S)


Internal Assessment Pattern

Int. Test 2
Cognitive Level Int. Test 1 (%)
(%)
Assignment Test11 (%)
Remember 30 20 --
Understand 30 20 --
Apply 20 30 70
Analyze 20 30 30
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. List functional parts of computer
2. Define an interrupt
3. List any four applications of stacks
4. Define address sequencing
5. Write the representation of floating point number in computer memory.

Understand
1. Explain logic and shift micro operations with example
2. Represent the format of an instruction. How do you differentiate Memory reference, Register reference and
IO reference instructions? Write at least two instructions in each category.
3. Explain the phases of instruction cycle with flowchart.
4. Illustrate the concept of virtual memory with an example.
5. Compare isolated IO and memory mapped IO
Apply
1. Construct 4 bit common bus using multiplexers
2. Assess the configuration of pipeline to perform the operation (Ai+Bi)(Ci+Di) where i is from 1 to 6.
3. Design 5 bit arithmetic circuit to perform the following two operations.
4. D=A+B+1 and D=A+B‟+1
5. Use booth‟s Algorithm to multiply (-9) X (-13)
6. Construct an algorithm for evaluating square root of binary fixed point number.

Analyze
1. Differentiate between CISC and RISC characteristics
2. Does DMA have priority over CPU when both request memory transfer? Justify
3. Attribute the hardware procedure for detecting an overflow by comparing signs of augend and addend. The
numbers are in signed-2‟s complement representation.
4. Is it necessary the read and write control lines in a DMA controller bi directional? Justify.
5. Why should be the sign of the remainder after the division be the same as the sign of dividend? Justify.

11
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

77
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT406 Operating Systems


3003
Course Outcomes
1. Explain the concepts of process and implement CPU scheduling algorithms
2. Implement concurrency mechanisms
3. Implement various Algorithms to handle deadlocks
4. Design and analyze mechanisms used in memory management
5. Analyze and implement mechanisms used in virtual memory management
6. Analyze and implement various file system and disk storage mechanisms
COs – POs Mapping

COs PO1 PO2


1 2 1
2 3 2
3 3 2
4 3 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Operating Systems Overview and Process Management
Operating Systems Overview: Introduction to Operating Systems - Operating System Structure - Operating System
Operations - Operating System Services - System calls - Types of System Calls.
Process Management: Introduction to Process - Process Scheduling - Operations on Processes - Inter Process
Communication - Process Scheduling Criteria - and Scheduling Algorithms and its Evaluation. Multi-Threading
Models
Multilevel Scheduling (12+4) Hours

Unit II
Process Synchronization and Deadlocks
Process Synchronization: Introduction to Process synchronization - The Critical-Section Problem - Peterson‟s
Solution - Synchronization Hardware - Semaphores and Classical Problems of Synchronization using Semaphores
Deadlocks: System Model - Deadlock Characterization - Methods for Handling Deadlocks - Deadlock Prevention -
Deadlock Avoidance - Deadlock Detection - and Recovery from Deadlock.

Classical Problems of Synchronization using Monitors (11+4) Hours

Unit III
Memory Management
Memory Management: Introduction to Memory Management - Swapping - Contiguous Memory Allocation - Paging
- Segmentation.
Virtual Memory Management: Introduction to Virtual Memory Concept - Demand Paging - Copy on Write - Page
Replacement Algorithms - Allocation of Frames - Thrashing.
Memory Management by Intel (11+4) Hours

78
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
File System and Secondary Storage Structure
File Concept - Access Methods - Directory Structure - File System Structure - Allocation Methods - Free-Space
Management.
Overview of Mass Storage Structure - Disk Structure - Disk Scheduling - RAID structures
UNIX File System
(11+3) Hours
Total: 45+15 Hours
Textbook (s)
1. Abraham Silberchatz, Peter B. Galvin and Greg Gagne, Operating System Concepts, 7th Edition, John
Wiley, 2005.
2. William Stallings, Operating Systems Internal Design Principles, 6th Edition, Pearson Education, 2005
Reference (s)
1. D.M.Dhamdhere, Operating systems, A Concept based Approach, 2nd Edition, TMH, 2006.
2. Crowley, Operating System A Design Approach, 1st Edition, TMH, 2001
3. Modern Operating Systems, Andrew S Tanenbaum, 3rd edition, PHI, 2009

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test 12(%)
Remember 40 30 --
Understand 30 40 --
Apply 20 20 70
Analyze 10 10 20
Evaluate -- - 10
Create -- - --
Total (%) 100 100 100

Remember
1. List any four operating systems
2. Define operating system
3. List any four operating system services

Understand
1. Explain System calls
2. Explain the role memory management in operating system
3. Illustrate the working principle critical section problem

Apply
1. When multiple transactions are being executed by the operating system in a multiprogramming
environment, there are possibilities that instructions of one transaction are interleaved with some other
transaction. Apply the suitable concept to overcome the problem
2. Give an example of a scenario that might benefit from a file system supporting an append-only access
write.

12
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

79
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Analyze
1. Context switching between two threads of execution within the operating system is usually performed by a
small assembly language function. In general terms, what does this small function do internally?
2. Compare CPU scheduling algorithms
3. Analyze the general strategy behind deadlock prevention, and give an example of a practical deadlock
prevention method.
Evaluate
1. Assuming the operating system detects the system is deadlocked, what can the operating system do to
recover from deadlock?
2. Describe how to implement a lock using semaphores

80
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS408 Linux Programming Lab


0032
Course Outcomes
1. Illustrate the knowledge of the basic principles of UNIX system calls
2. Illustrate the basic principles of UNIX IO system
3. Explain the concepts and principles and develop system-level software (e.g. - compiler - and networking
software)
4. Apply the Inter Process Communication in UNIX Environment
5. Develop solutions to real-world problems
6. Develop a simple communication application to communicate with various systems in a LAN

List of Experiments
1. Execute the following UNIX commands: cal - date - echo -bc -passwd - PATH - who -uname -pwd - cd -
mkdir -rmdir - cat -cp -rm - mv - more - ls -wc.
2. Execute the following UNIX commands: cmp -comm - diff - tar -df - du - mount -umount -chmod and vi
editor commands.
3. a) Write a shell script to accept three numbers and display the largest.
b) Write a shell script which will accept different numbers and find their sum.
c) Write a shell script to find the number of files in a directory.
4. a) Write a shell script to display first ten positive numbers using until loop.
b) Write a shell script to print the first 10 odd numbers using the while loop.
5. a) Write a sed command that deletes the first character in each line in a file.
b) Write a sed command that deletes the character before the last character in each line in a file.
c) Write a sed command that swaps the first and second words in each line in a file.
6. Implement the following forms of IPC. a) Pipes b) FIFO
7. Implement file transfer using Message Queue form of IPC.
8. Implementation of semaphore: Write a program that demonstrates how two processes can share a variable
using semaphore
9. To implement C Program to Catch Signals SIGINT - SIGKILL - SIGSTOP.
10. Write a c program to implement Two threads displaying two strings “Hello” and “How are you?”
independent of each other.
11. Design TCP iterative Client and Server application to reverse the given input sentence.
12. Design UDP Client Server to transfer a file.
List of Augmented Experiments12
1. Simulate the UNIX help main menu
2. Simulate the File Management Commands Sub-menu
3. Simulate the Text Processing Commands Sub-menu
4. Simulate the System Status Commands Sub-menu
5. Code for Shell Script to make a menu driven calculator using case in Unix / Linux / Ubuntu
6. Code for Shell Script to create a Menu Driven program : Hard Link - Soft Link - Counting each of the links
for a specific link and Display the soft-links in Unix / Linux / Ubuntu
7. Using the file input - do the following using sed - displaying the result on the screen
8. Create a chat server using Message Queue
9. Simulate alarm using Unix / Linux / Ubuntu alarm system call
10. Implement a game to create 1 master process and 10 racing processes where the master process is feeding a
pipe with "Win" - and then broadcast the signal SIGUSR1 to its group of process. When a racing process

12
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

81
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

gets the signal SIGUSR1 - it tries to read the pipe - the one getting the "Win" message is out for the rest of
the game. At the end of the game - each process has a number which is the round number in which it caught
the message "Win".
11. Simulate dice rolling.
12. Simulate Text editor in UNIX / Linux / Ubuntu

Reading Material (s)


1. Linux Programming Lab manual, Department of CSE, GMRIT, Rajam

82
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS409 Web Technologies Lab


0032
Course Outcomes
1. Create a simple web page using html along with the usage of style sheets - lists - creation or tables with
borders - padding and color
2. Demonstrate acquainted with JavaScript and how to embed JavaScript in HTML code
3. Develop web applications using PHP
4. Design Web application development using Servlets and JSP features
5. Design and development applications using JSP and JDBC
6. Show how to work on web applications at server side and client side

List of Experiments
1. Design the following static web pages required for a Training and placement cell web site. 1) Home Page
2) Login Page 3) Registration page

2. 4) Company Details Page 5) Alumni Details Page 6) Placement Staff Details Page

3. 7) Student personal Info Page 8) Student Academic Info page 9) Semester Wise Percentage & their
Aggregate page

4. Validate login page and registration page using regular expressions.

5. Apply different font styles, font families, font colors and other formatting styles to the above static web
pages.

6. Install wamp server and tomcat server, access above developed static web pages using these servers.

7. Write a servlet/PHP to connect to the database, Insert the details of the users who register with the web site,
whenever a new user clicks the submit button in the registration.
8. Write a JSP/PHP to connect to the database, Insert the details of the student academic information with
student academic info page.

9. User Authentication:
Assume four users user1user2, user3 and user4 having the passwords pwd1, pwd2, pwd3 and pwd4
respectively. Write a servlet for doing the following.
1. Create a Cookie and add these four user id‟s and passwords to this Cookie.
2. Read the user id and passwords entered in the Login form (week1) and authenticate with the values (user
id and passwords) available in the cookies.
If he is a valid user (i.e., user-name and password match) you should welcome him by name (user-name)
else you should display “You are not an authenticated user “.
Use init-parameters to do this. Store the user-names and passwords in the webinf.xml and access them in the
servlet by using the getInitParameters() method.

10. Write a JSP which does the following job:


Authenticate the user when he submits the login form using the user name and password from the
database.

11. Write a JSP to insert the student‟s semester wise percentages and calculate aggregate and insert into
database.

12. Write a JSP to search the students according to their aggregate and produce sorted list or according to their
Enroll number.

83
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

List of Augmented Projects10

1. Student Information system


2. Online Hospital Management
3. Online Shopping Project
4. Web based Appointment Systems
5. Scrapbook
6. Online Job Recruitment System
7. Web Crawlers
8. Attendance management system
9. Online Banking system
10. Online Exam
11. Railway Reservation system
12. Leave Application Management System
13. Address Book
14. Movie Rental Systems
15. Online Auction System

Reading Material (s)

Web Technologies Lab manual–Department of CSE & IT-GMRIT Rajam


10
Students shall opt any one of the Augmented experiment in addition to the regular experiments

84
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT409 Computer Networks Lab


0032
Course Outcomes
1. Propose appropriate network model for data communication
2. Analyze how reliable data communication is achieved through data link layer.
3. Propose appropriate routing algorithm for the network
4. Elaborate the internet connection to the system and do the network installation
5. Choose the internal modem and connecting it to Internet
6. Analyze media and Tools includes Co-axial cable - UTP Cable and Crimping Tool

List of Experiments
1. A. Familiarization with Networking Components and devices: LAN Adapters - Hubs -Switches - Routers
etc. B. Familiarization with Transmission media and Tools: Co-axial cable - UTP Cable - Crimping Tool -
Connectors etc.
2. Preparing the UTP cable for cross and direct connections using crimping tool.
3. Implement the data link layer framing methods: a. Character stuffing method b. Bit Stuffing method
4. Implement on a data set of characters the two CRC polynomials: CRC 12 - CRC 16
5. Implement on a data set of characters the CRC polynomials: CRC CCIP.
6. Implementation of sliding window protocol: go back n sliding window protocol
7. Implement Dijkstra„s algorithm to compute the Shortest path thru a graph.
8. Take an example subnet graph with weights indicating delay between nodes. Now Obtain Routing table art
each node using distance vector routing algorithm.
9. Take an example subnet of hosts. Obtain broadcast tree for it
10. To configure the IP address for a computer connected to LAN and to configure network parameters of a
web browser for the same computer.
11. Configuration of TCP/IP Protocols in Windows
12. A. Installing of internal modem and connecting to Internet. B. To configure WiFi for your PC.
13. Installation of NS2/NS3 tools and Overview

List of Augmented Projects10


1. Peer to Peer File Sharing Technology over LANs
2. Internet Protocol Testing.
3. Packet Loss Testing Tool.
4. Network Design Proposal for An Institution.
5. Implementation Of Client Server Protocol
6. Implantation of Chart Server Project In Java
7. Congestion Control Using Network Based Protocol
8. Networking Project On Prevention Of Congestion Collapse.
9. Network Administrator Tool Project
10. Domain Name Service With Secured Manner Project.
11. File Transfer Protocol Project.
12. Client-Server Based Instant Messenger.
13. Remote System Access by Using Virtual Network Computing Project.
14. Multi File Upload In Java
15. Active Source Routing Protocol For Mobile Networks.

10
Students shall opt any one of the Augmented Experiment in addition to the regular experiments

85
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16ESX01 / 16ESX02 Employability Skills I& II


0201
16ESX02 Employability Skills II

Soft Skills: Self Esteem: Definition? Types of Self Esteem, Causes of Low Self Esteem, Merits of Positive Self
Esteem and Steps to build a positive Self Esteem - JAM & J2M Sessions: Practice; Group Discussions (Practice):
GD? GD Vs Debate, Overview of a GD , Skills assessed in a GD, Dos & Don‟ts,& Conducting practice sessions &
Evaluation (Simple Topics) - Motivational Talk on Team Work: Team Vs Group? Stages in Team Building,
Mistakes to avoid and Lessons to Learn (Through Stories) - Self Introspection: Analyzing oneself to identify the
drawbacks, taking steps to overcome them in stages, Fortifying the Strengths further (through SWOT Analysis).

Quantitative Aptitude: Problems on numbers - H.C.F and L.C.M - Problems on ages – Averages - Time and Work
- Time & Distance – Percentages - Profit & loss - Ratio & Proportions – Partnership - Simple interest & Compound
interest – Clocks – Calendars - Pipes and Cisterns - Mensuration

Verbal reasoning: Number series - Direction test - Blood relations – Syllogisms - Seating arrangement -
Permutations, combinations and Probability – Dice - Cube and Cuboid - Data sufficiency - Logical deductions –
Analogies - Course of action - Cause and effect - Data interpretation

86
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16ITI01 Ethical Hacking & Cyber Security (One Credit Course)


(Course designed and will be delivered by WebTek Labs, NewDelhi)

1001
Course Outcomes
1. Illustrate the ongoing developments in Computer and Ethical Hacking Basics related to information
technologies
2. Explain cyber security and IT laws with related legislation relate to one another

Ethical Hacking & Security: Cyber Ethics-Hacking Introduction, Information Gathering, Scanning, Google
Hacking Database, Virus, Worms Virus Analysis, Trojans & Backdoors, Sniffers & key loggers, Proxy Servers &
VPNs, Social Engineering, Email, DNS, IP spoofing, Honey Pots, System Hacking & Security, Bots, Botnets &
DOS. Vulnerability Research, SQL Injection 1, SQL Injection 2, XSS Attacks & Countermeasures, LFI/ RFI
Attacks & Countermeasures , Information Disclosure Vulnerabilities, Buffer Overflow Attacks, Session Hijacking
Attacks, Hacking Web Servers, Vulnerability Assessment & Penetration Testing, Exploit Writing , Secure Coding
Practices, Wireless Hacking & Security, SMS Forging & Countermeasures, VoIP Hacking & Countermeasures

15 Hours

Reading Material (s)

1. Justice Yatindra Singh, Cyber Laws, Universal Law Publishing Co, New Delhi, (2012)
2. Vasu Deva, Cyber Crimes and Law Enforcement, Commonwealth Publishers, New Delhi, (2003)

87
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS504 Design and Analysis of algorithms


3103
Course Outcomes
1. Explain asymptotic notations and efficiency classes to express time complexity of algorithms
2. Describe various algorithm design techniques
3. Design algorithms based on general algorithm design techniques
4. Analyze the performance of algorithms designed for a specific problem
5. Solve engineering and real world problems using appropriate algorithm design technique
6. Identify the complexity classes P, NP, NP-complete and NP-hard

COs–POs) Mapping
COs PO2 PO3
1 3 1
2 1 3
3 3 3
4 3 3
5 3 3
6 3 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit I
Introduction to Algorithm as Technology
Performance Analysis: - Space complexity, Time complexity Growth of Functions: Asymptotic Notation- Big oh notation,
Omega notation, Theta notation, little oh, little omega. Recurrences: The Master Method.
Divide and conquer: General method, applications:-Fibonacci Search, Quick sort, Disjoint Sets: Disjoint operations,
UNION-FIND Algorithms
Time complexities of basic operations on arrays, stacks, heaps, graphs
12+5 hours
Unit II
Algorithm Design Techniques
Greedy method: General method, applications:-Job sequencing with deadlines, Minimum cost spanningtrees (Kruskal‟s
Algorithms), Single source shortest path problem (Dijkstra‟s Algorithms), Optimal MergePatterns (two way merge
pattern).Dynamic Programming: General method, applications:-Matrix chain multiplication, 0/1 knapsackproblem, all pairs
shortest path problem.
Graph representation, graph applications. Longest common sub sequence problem
13+3 hours
Unit III
Search space and optimization problem techniques
Backtracking: General method, applications:-n-queen problem, sum of subsets problemBranch and Bound: General method,
LC Branch and Bound solution & FIFO Branch and Boundsolution.Applications: - Traveling sales person problem
0/1 knapsack problem, graph coloring problem
11+3 hours
Unit IV
Introduction to NP Problems and computing algorithms
NP-Hard and NP-Complete problems: Basic concepts, NP - Hard and NP Complete classes, Cook‟stheorem. Directed
Hamiltonian Cycle – Flow shop scheduling - Number-Theoretic Algorithms: the Chinese remainder theorem

88
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Proof of 3-SAT problem


11+3 hours
Total: 45+15 Hours
Textbook (s)
1. Fundamentals of Computer Algorithms, Ellis Horowitz, Satraj Sahni and Rajasekaran, University press.
2. Introduction to Algorithms, second edition, T.H.Cormen, C.E.Leiserson, R.L. Rivest, and C.Stein, PHI Pvt. Ltd./
Pearson Education

Reference (s)
1. Introduction to Design and Analysis of Algorithms A strategic approach, R.C.T.Lee, S.S.Tseng, R.C.Chang and
T.Tsai, McGraw Hill.
2. Design and Analysis of algorithms, Aho, Ullman and Hopcroft,Pearson education.
3. Algorithms – Richard Johnson baugh and Marcus Schaefer, Pearson Education.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test1 (%)
Remember 25 10 20
Understand 35 20 20
Apply 20 40 40
Analyze 20 30 20
Evaluate -- - -
Create -- - -
Total (%) 100 100 100

Remember
1. Define performance analysis of an algorithm.
2. Define recurrence relation
3. Define disjoint sets.
4. Define optimality principle

Understand
1. Explain back tracking algorithm
2. Explain Asymptotic notations
3. Explain the LC search algorithm
4. Explain the divide and conquer strategy. Write the applications of divide and conquer strategy and write the
control abstraction for divide and conquer strategy
5. Explain the 4 cases of master theorem
6.What are implicit and explicit constraints in back tracking ?

Apply
1. Solve the fractional knapsack problem with capacity m=20,W=(18,15,10),P=(25,24,15) for the optimum solution.
2. Create two arrays that store all even no‟s in one array and all odd no‟s in another array for a given set of elements
3. Find the space and time complexity of an algorithm to find the maximum element from an array.

1
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
89
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

4. Solve the recurrence relation T(n)=2T(n/2)+nlogn) using master theorem .


5. Demonstrate the process of Fibonacci search with an example

6. Find the shortest tour for the TSP for the given graph using FIFOBB.
Analyze
1. Analyze the time complexity of quicksort .
2. Differentiate greedy method with dynamic approach
3. Discuss the worst case time complexity of travelling sales person problem
4. How polynomial multiplication is best with FFT
5. Compute the time complexity of fun()?
int fun(int n)
{ int count = 0;
for (inti = n; i> 0; i /= 2)
for (int j = 0; j <i; j++)
count += 1;
return count;
}

90
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS604 Mobile Computing


3103

Course Outcomes
1. Compare and identify the GSM - GPRS and Bluetooth software model for mobile computing.
2. Develop advanced data communicating methods and networking protocols for wireless and mobile
environments
3. Justify and employ application frameworks for developing mobile applications including under
disconnected and weakly connected environment
4. Categorize Critically and Security issues of mobile and wireless computing systems
5. Discover and implement simple mobile games
6. Develop applications that rely on wireless data communications including applications for the mobile
phone.
COs–POs Mapping
COS PO1 PO2 PO3 PO5
1 2 2 1 1
2 3 2 1 1
3 2 3 2 2
4 2 3 2 2
5 2 3 3 3
6 1 3 3 3
3-Strongly linked , 2-Moderately linked ,1-weakly linked

Unit I
Mobile Communications
Overview: Wireless transmission - voice and data communication standards-1G/2G/3G/4G - WPAN - WLAN -
applications-limitations-mobile computing architecture-overview on mobile devices and systems. Wireless Medium Access
Control: Motivation for a specialized MAC (Hidden and exposed terminals - Near and far terminals - MACA) - modulation
- Spread spectrum - SDMA - FDMA - TDMA – CDMA GSM: services - system architecture - radio interface - localization
- call handling - handover - security - GPRS -EDGE
Networking: communication modes - basic network designs - cellular infrastructure 11+4 Hours

Unit II
Mobile Network and Transport Layer
Mobile Network Layer: Mobile IP - IP packet delivery - agent advertisement and discovery - registration -
tunneling and encapsulation - optimizations - Dynamic Host Configuration Protocol Mobile Transport Layer: Traditional
TCP - Indirect TCP - Snooping TCP - Mobile TCP . 12+4 Hours
Multi Task gadget: wide area mobile data - air link standards for data - wireless application environment

Unit III
Mobile Ad hoc Network (MANET)
Introduction - Properties - applications - limitations - routing issues - routing algorithms-proactive (DSDV & OLSR) and
reactive (DSR & AODV).
Wireless Sensor Network (WSN): Introduction - architecture - applications - security in ad hoc networks
Wireless LAN: IEEE 802.11 - System architecture - Protocol layers.
Satellite systems: history - applications - basics - broad cast systems 10+3 Hours
Unit IV
Network Simulator:
Overview on different network simulators (NS2 - NS3 -Qualnet -Omnet++ -Netsim etc.) - configuration of MANET and
WSN on NS2/NS3.
Mobile OS: Overview on different mobile Oss (Android OS - Android OS architecture , IOS -architecture , black berry ) ,
App development examples ,Wireless Application Protocol (WAP): Introduction – architecture,
Application layer protocols - SMTP , FTP , DHCP, World Wide Web, Windows 10. 12+4 Hours
Total: 45+15 Hours

91
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. Raj Kamal, Mobile Computing, Oxford press, 2nd Edition, 2012
2. Jochen Schiller, Mobile Communications, Pearson Education, 2ndEdition, 2003

Reference (s)
1. Asoke K Talukder, Hasan Ahmed and RoopaYavagal Mobile Computing, McGraw Hill, 2010
2. Prasant Kumar Pattnaik and Rajib Mall, Fundamentals of Mobile Computing, PHI Learning, 2012
3. http://www.isi.edu/nsnam/ns/doc/ns_doc.pdf (NS2 manual)

SAMPLE QUESTION(S)
Internal Assessment Pattern
Cognitive Level Int.Test 1(%) Int.Test 2(%) Assignment Test2 (%)
Remember 30 25 10
Understand 25 15 20
Apply 25 20 30
Analyze 20 20 30
Evaluate -- 10 10
Create -- 10 --
Total 100 100 100
Remember

1. List the applications of mobile computing.


2. List the limitations of mobile computing.
3. Define mobile computing.
4. Define Mobile Ad hoc Network
5. List the MANET routing issues

Understand

1.Explain mobile computing with architecture


2.Explain FDMA and TDMA with neat diagrams
3.Illustrate the different services provided by the GSM, Explain with system architecture
4.Explain IP Packet Delivery with diagram
5.Describe DSSM (DIRECT SEQUENCE SPREAD SPECTRUM)

Apply

1.Illutrate Registration Process achieved in mobile network layer


2.Discuss the feature of tunneling and encapsulation
3.Illustrate the function of Dynamic Host Configuration Protocol
4.Discuss about security in Ad-hoc network
5. Illustrate the properties of MANETS

Analyze

1.Compare snooping TCP and indirect TCP


2.Analyze the Performance of Dynamic source Routing Protocol
3.Compare about IOS, Windows 8 and Blackberry operating systems
4.Compare NS2 and NS3 simulators
5.Explain about Android Operating system with architecture

2
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
92
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Evaluate

1. Evaluate the performance of Wireless Datagram protocol


2. Evaluate the performance of DSDV
3. Evaluate the performance of DSR
4. How Traditional TCP is different from Indirect TCP
5. How localization and call handling is performed

Create

1. Develop an app for given operating system.


2. Design an app for given Application
3. Implement simple mobile games.

93
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT503 Automata and Compiler Design


3103
Course Outcomes
1. Analyses and design finite automata, pushdown automata for the formal languages and grammars.
2. Apply working skills in theory and application of finite state machines in compiler design .
3. Demonstrate a compiler that includes all the phases of Compiler Design.
4. Show recursive descent-production rules-parsing-and language semantics in high level compilers.
5. Demonstrate the machine dependent and independent codes.
6. Judge the ideas-the techniques-and the knowledge acquired for the purpose of other software design.

COs–POs Mapping
COs PO1 PO2 PO3
1 1 3 2
2 2 3 3
3 3 2 2
4 2 1 3
5 2 1 3
6 2 1 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit I
Finite Automata & Lexical Analysis:
DFA - NFA - Recognition of a language by an Automaton - Equivalence of DFA and NFA - Finite Automata with Null-
Closure - Minimization of FA - Equivalence of FAs, Regular Sets and Languages - Equivalence of FA & regular
expression
Overview of Language Processing-Compiler-Assembler-Interpreters-Linkers & Loaders-Structure of Compiler-Phases of a
Compiler-Lexical Analysis-Role of Lexical Analysis-Token-Patterns and Lexemes-Lexical Errors-
Finite Automata with output: Mealy and Moore Machines;
13+5 Hours
Unit II
Push-Down Automata & Syntax Analysis - Non-regular Languages - CFLs - Closure Properties of CFLs - CFGs -
derivation trees - Simplification - Ambiguity Push-Down Automata - Normal Forms - Chomsky Hierarchy ,
Top-down Parsing-First and Follow-LL(1) Grammar-Non-Recursive Predictive Parsing
Handling Ambiguous grammars-Error recovery in LR parsing 12+4 Hours
Unit III
Bottom-up parsing-Shift Reduce Parsing-Model of an LR Parsers-Construction of SLR Tables-Construction of CLR (1)-
LALR Parsing tables-Dangling ELSE ambiguity.
Semantic Analysis-SDT-Intermediate Code -Three Address Code-Quadruples-Triples-Indirect Triples-Abstract Syntax
Trees-DAG for Expressions
Data structures used in symbol table 10+3 Hours
Unit IV
Optimization
Machine Independent Code Optimization-Common Sub-expression Elimination-Constant Folding-Copy Propagation-Dead
Code Elimination-Strength Reduction-Loop Optimization-Basic Blocks-Flow Graph-DAG for basic Blocks-Machine
Dependent Code Optimization: Peephole Optimization-Register Allocation-Instruction Scheduling
Code generation algorithm-optimization among basic blocks
10+3 Hours
Total: 45+15 Hours

94
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. J. E. Hopcroft and J. D. Ullman, Introduction to Automata Theory, Languages and Computation, 3 rd Edition,
Pearson/Addison Wesley, 2007
2. Mishra & Chandra Sekharan, Theory of Computer Science& Automata Language and Computation, 3 rd Edition,
Prentice Hall of India, 2007.
3. Alfred V Aho, Monical S Lam, Ravi Sethi, Jeffrey D. Ullman, Compilers, Principles Techniques and Tools, 2nd
Edition, Pearson, 2007.
4. V. Raghavan, Principles of Compiler Design, 2nd Edition, TMH, 2011.

Reference (s)
1. 1 P. Linz, Introduction to Formal Language and Computation, 2nd Edition, Narosa, 2006.
2. H. R. Lewis & C. H. Papadimitriou, Elements of the Theory of Computation, Prentice Hall of India, 2nd Edition -
2006.
3. Nandini Prasad, Principles of Compiler Design, 2nd Edition, Elsevier, 2012
4. Kenneth C Louden, Compiler Construction, Principles and Practice, 1st Edition, Cengage, 1997.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test3 (%)
Remember 20 20 --
Understand 50 40 30
Apply 30 40 20
Analyze -- -- 10
Evaluate -- -- 10
Create -- -- 30
Total (%) 100 100 100

Remember
1. List out the different tuples of Deterministic Finite Automata
2. List out the closure properties of regular sets
3. State some software tools that manipulate source program.
4. List out the cousins of compiler.
Understand
1. Explain the procedure of simplification of CFG
2. Describe the types of Turing machines
3. Illustrate the pumping lemma with an example
4. Represent the Error-recovery actions in a lexical analyzer.
5. Formulate the roles and tasks of a lexical analyzer.
6. Illustrate Why lexical and syntax analyzers are separated out.
7. Identify the problems with top down parsing
Apply
1. Apply the Arden‟s theorem to convert the following Finite automata to Regular expression

3
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
95
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

2. Apply Pumping lemma to prove the language L={ a p / p is a prime number} is not regular
3. Eliminate UNIT productions from the CFG:
SA
AB
Ba/b/c

4. Demonstrate top down parsing and bottom up parsing methods.


5. Show the contents of activation record.
6. Choose the properties of optimizing compiler.

Analyze

1. Compare and Contrast Mealy machine and Moore machine


2. Analyze the solution to the PCP with the two lists M=(abb ,aa, aaa) and N=(bba, aaa, aa)
3. Analyze whether the language L ={anbncn/n>=1} is Context free language or not
4. Identify the difficulties with top down parsing.
5. Breakdown the grammar for flow-of-control statements.
6. Differentiate declarations are done in a procedure using syntax directed translations

Evaluate

1. Assess the performance of Pushdown automata over Finite automata


2. “Regular sets are closed under union” is true or false? Justify your answer
3. “We can design PDA for L ={anbncn/n>=1}” is true or false? Justify your answer
4. Determine the addressing mode and associated costs in the target machine.
5. Defend the step to partition a sequence of 3 address statements into basic blocks.
6. Choose the important classes of local transformations on basic blocks.
7. Criticize code optimization and optimizing compiler.

96
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT504 Cloud Computing


3103
Course Outcomes
1. Interpret the architecture and infrastructure models of cloud computing, strengths, and limitations of cloud
computing.
2. Understand the virtualization concepts of machines and data centers.
3. Infer the design concepts of cloud ready applications
4. Compare different cloud centre‟s implementation
5. 5.Understand the concepts of cloud scaling and disaster recovery
6. 6.Interpret the security and risk issues in cloud computing
COs–POs Mapping
COs PO2 PO6 PO7 PO8
1 3 2 3 1
2 3 1 2 3
3 2 3 1 2
4 2 3 3 1
5 2 3 1 2
6 2 3 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Cloud Computing
Cloud computing: Introduction, SOA,Cloud computing architectures, Value of cloud computing, Cloud Infrastructure
models including SaaS, PaaS, IaaS, Storage-as-a-Service, Database-as-a-Service, Information-as-a-Service, Process-as-a-
Service, Application-as-a-Service, Integration-as-a-Service, and Securityas-Service.
Public cloud, private cloud and hybrid cloud, Cloud Services.
Before the move into the cloud: Know Your Software Licenses, The Shift to a Cloud Cost Model.History of Cloud
Computing, Advantages of Cloud Computing, and Disadvantages of Cloud Computing.
Beyond the Syllabus: Companies in the Cloud Today, Amazon Web Services, Google services, IBM Cloud, Windows Azure
,Tata Cloud, Salesforce.com
( 12 +4 )Hours
Unit II
Virtualization & Design
Virtualization, Virtual machine,Implementation Levels of Virtualization, Virtualization Structures/Tools and Mechanisms,
Virtualization of CPU, Memory, and I/O Devices, Virtual Clusters and Resource Management, Data centre, Virtualization
for Data-Centre Automation.Service Levels for Cloud Applications Ready for the cloud: Web Application Design, Machine
Image Design, Privacy Design, Database Management.
Beyond the Syllabus: various hypervisors like VMware, KVM, oracle VM,
(13+4) Hours
Unit III

Cloud centres, Scaling a Cloud Infrastructure and Disaster Recovery:


Cloud centres in detail: Comparing approaches, Xen, Eucalyptus, Cloud Stack, and Open Stack.
Cloud Scaling: Capacity Planning, Cloud Scale,Types of cloud scaling.
Disaster Recovery: Disasters in cloud, Disaster Recovery Planning, Cloud Disaster Management.

Requirements for modern data centres-high availability and Service Orientated-Infrastructures (SOI). Modern data centre
use case studies.
(10 +4) Hours
Unit IV
Cloud Computing Software Security Fundamentals
Data Security, Network Security, Host Security, Compromise Response.
97
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Cloud information Security Objectives, Cloud Security Services, Relevant Cloud Security Design Principles, Secure Cloud
Software Requirements, Approaches to Cloud Software Requirements Engineering, Cloud Security Policy Implementation.
Cloud Computing Risk Issues: The CIA Triad, Privacy and Compliance Risks, Threats to Infrastructure Data and Access
Control, Cloud Access Control Issues, Cloud Service Provider Risks.
Microsoft Azure , IBM Bluemix (10 +3) Hours
Total: (45+15) Hours
Textbook (s)
1. George Reese, Cloud Application Architectures, 1st Edition O‟Reilly Media, 2009
2. Ronald L.Krutz and Russell Dean Vines, Cloud Security, 1st Edition, Wiley Publishing, 2010

Reference (s)
1. Michael Miller, Cloud Computing-Web Based Applications that change the way you work and collaborate online,
1st Edition, Pearson Education, Publishing, 2011
2. Kai Hwang, Geoffrey C Fox and .Jack J.Dongarra, Distributed & Cloud Computing from Parallel Processing to the
Internet of Things , 1st Edition, MK Publishing, 2010
3. David S Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide, 1st
Edition, Addison-Wesley, 2009
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test4 (%)
Remember 40 45 20
Understand 40 45 60
Apply 20 10
Analyze -- -- 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100
Remember
1. Define Cloud Computing.
2. List types of virtualization.
3. Define proactive scaling.
4. What is CIA Triad?
Understand
1. Explain different cloud Infrastructure models.
2. Explain different levels of virtualization.
3. Explain about cloud Network security in detail.
4. Explain about Recovery Point Objective.
5. With neat diagram explain the functioning of Xen Architecture.
6. List and explain various cloud service providers risks.

Analyze
1. Compare cloud center and service infrastructure.
2. Analyze different cloud services provided by Amazon

4
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
98
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT505 Object Oriented Analysis and Design


3024
Course Outcomes
1. Formulate the use of unified modeling language for object oriented analysis and design
2. State the syntax of different UML diagrams
3. Identify different models for a software system
4. Use object oriented analysis and design to build a software system
5. Relate forward and reverse engineering for a software system
6. Illustrate architectural modeling-which will know components-deployment diagrams
COs–POs Mapping
COs PO2 PO3 PO4 PO5
1 2 2 3 1
2 1 3 2 2
3 3 2 1 3
4 3 2 1 2
5 2 3 2 1
6 2 1 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction to OOAD & UML
Object Oriented Analysis vs. Object Oriented Design-Importance of modeling-and principles of modeling-object oriented
modeling-Conceptual model of the UML-Architecture-and Software Development Life Cycle. Modeling concepts:
overview of Structural-Behavioral and Architectural Modeling
Object Modeling Technique (OMT)-Object basics-Object state and behavior
Practical Components
1. Suggest to explain overview of UML.
2. Suggest to explainrational rose software.
(12+6 )Hours
Unit II
Behavioral Modeling
Introduction to Use case diagrams-Include-extend and generalization relationship in use cases. Introduction to Activity
Diagrams-uses of Activity diagrams-fork and join in activity-Swimlanes in Activity diagrams. Overview of interaction
diagrams-sequence vs. collaboration diagrams-Relationship between sequence diagrams and use cases System.
Types and Roles- Process and threads and their notations in UML
Practical Components
1. Explain UML Diagrams at Glance
2. Draw the Use case,Sequence and Activity Diagram for Point of sale

(11+12) Hours
Unit III
Class & Object Diagrams and Advanced Structural Modeling
Classes-Relationships-and common Mechanisms. Class and object diagrams-Advanced classes-advanced relationships-
Interfaces-Packages. Forward and Reverse Engineering concepts,Events and signals-concepts of state machines and state
chart diagrams
Association classes-Abstract class
Practical Components
1. Suggest case study of Library management systems
2. Draw The Use case and Activity and State Chart Diagrams for Point of sale
(11+3)Hours

99
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Unit IV
Architectural Modeling
Introduction to Components-Component diagrams-Component vs. classes. Introduction to Deployment and deployment
diagrams. Deployment vs.component. Case Study: Online banking System.
Patterns and frameworks-Systems and models
Practical Components
1. Perform case study online banking system
2. Draw the Use Case, Activity, State Chart for Point of sale

(11+9)Hours
Total: 75 Hours
Textbook(s)
1. Grady Booch , James Rumbaugh and IvarJacobson, The Unified Modeling Language User Guide, 1st Edition
,Addison Wesley October 20, 1998
2. Ali Bahrami, Object Oriented Systems Development using the unified modeling language, 1 stEdition, TMH, 2008

Reference (s)
1. Meilir Page, Jones, Fundamentals of Object Oriented Design in UML, Pearson Education, 1999.
2. AtulKahate, Object Oriented Analysis & Design, The McGraw-Hill Companies, 2004.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test5 (%)
Remember 30 20 --
Understand 20 20 --
Apply 20 20 30
Analyze 10 15 20
Evaluate 10 10 20
Create 10 15 30
Total (%) 100 100 100
Remember
1. List out applications of UML
2. State SDLC?
3. Define Process and Phases
4. Define swimlanes in Activity diagram

Understand
1. Illustrate Conceptual model of UML
2. Illustrate object oriented modeling
3. Formulate Overview of interaction diagrams

Apply
1. Choose Case Study for Online banking System
2. Demonstrate a class diagram for University data base
3. Construct a use case diagram for Railway reservation system

Analyze

5
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
100
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

1. Compare Object Oriented Analysis vs. Object Oriented Design


2. Differentiateconcepts of state machines and state chart diagrams

Evaluate
1. Judge Deployment vs. component Diagram
2.
4.
Choose a suitable diagram when it is a design phase

101
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT507 Cloud Computing Lab


0032
Course Outcomes
1. Demonstrate the types of cloud computing architecture
2. Create and Run virtual machines on open source OS
3. Implement Infrastructure as service using openStack
4. Implement storage as service using ownCloud
5. Apply security features in cloud using ownCloud
6. Evaluate user management in cloud using owncloud
List of Experiments
1. Study of Cloud Computing & Architecture.
Scope: Cloud Computing & Architecture Types of Cloud Computing.
2. Creating and running virtual machines on open source OS.
Concept: Virtualization
Objective: In this module students will learn, Virtualization Basics, Objectives of Virtualization, and Benefits of
Virtualization in cloud.
Scope: Technology: KVM, VMware.
3. Study and implementation of Infrastructure as a Service .
Concept: Infrastructure as a Service.
Objective: In this module student will learn Infrastructure as a Service and implement it by using Open Stack.
Scope: Installing Open Stack and use it as Infrastructure as a Service .
Technology: Quanta Plus /Aptana /Kompozer
4. Write a program to parse the log files using Map/Reduce or Thread Programming Model
5. Study and installation of Storage as Service.
Concept: Storage as Service (SaaS)
Objective: is that, students must be able to understand the concept of SaaS , and how it is implemented using own
Cloud which gives universal access to files through a web interface.
Scope: is to installation and understanding features of own Cloud as SaaS.
Technology: own Cloud
6. Implementation of identity management.
Concept: Identity Management in cloud
Objective: this lab gives an introduction about identity management in cloud and simulates it by using Open Stack
Scope: installing and using identity management feature of Open Stack
Technology: Open Stack
7. Write a program for web feed.
Concept: Web feed and RSS
Objective: this lab is to understand the concept of form and control validation
Scope: Write a program for web feed
Technology: PHP, HTML
8. Study and implementation of Single-Sign-On.
Concept: Single Sign On (SSO),open ID
Objective: is to understand the concept of access control in cloud and single sing on (SSO), Use SSO and
advantages of it, and also students should able to implementation of it.
Scope: installing and using JOSSO
Technology: JOSSO
9. Securing Servers in Cloud.
Concept: Cloud Security
Objective: is to understand how to secure web server, how to secure data directory and introduction to encryption
for own cloud.
Scope: Installing and using security feature of own Cloud
Technology: own Cloud

10. User Management in Cloud.


Concept: Administrative features of Cloud Management, User Management
Objective: is to understand how to create, manage user and group of users accounts.
Scope: Installing and using Administrative features of own Cloud
102
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Technology: own Cloud


11. Case study on Amazon EC2.
Concept: Amazon EC2
Objective: in this module students will learn about Amazon EC2. Amazon Elastic Compute Cloud is a central part
of Amazon com's cloud computing platform, Amazon Web Services. EC2 allows users to rent virtual computers on
which to run their own computer applications
12. Case study on Microsoft azure
Concept: Microsoft Azure
Objective: students will learn about Microsoft Azure is a cloud computing platform and infrastructure, created by
Microsoft, for building, deploying and managing applications and services through a global network of Microsoft-
managed datacenters. How it work, different services provided by it.
Technology: Microsoft azure

List of Augmented Projects10


1. Concept: using different features of cloud computing creating own cloud for institute, organization etc.
Objective: is student must be able to create own cloud using different features which are learned in
previous practices.
Scope: creating a cloud like social site for institute. Technology: any open system used for cloud

Reading Material (s)


1. Advanced Java Lab manual–Department of CSE & IT-GMRIT Rajam
10
Students shall opt any one of the Augmented Experiments in addition to the regular experiments

103
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16ESX03 / 16ESX04 Employability Skills III & IV


0201
16ESX03 Employability Skills III

Soft Skills: Introduction to Campus Placements: Stages of Campus Placement, Skills assessed in Campus Placements &
How to get ready? - A Motivational Talk on Positive Thinking: Beliefs, Thoughts, Actions, Habits & Results (Success);
Resume Preparation: Resume? Templates? Mistakes to be avoided in a Resume, Steps to be followed in preparing it(with
examples) - Group Discussions: GD? Stages of a GD, Skills assessed in a GD, Blunders to be avoided, How to excel in a
GD? - GD-Practice: Practice sessions for the Students on different Topics including the contemporary issues with brief
inputs on each topic & feedback on their performance & Evaluation

Quantitative Aptitude: Problems on numbers - H.C.F and L.C.M - Problems on ages – Averages - Time and Work - Time
& Distance – Percentages - Profit & loss - Ratio & Proportions – Partnership - Simple interest & Compound interest –
Clocks – Calendars - Pipes and Cisterns - Mensuration

Verbal reasoning: Number series - Direction test - Blood relations – Syllogisms - Seating arrangement - Permutations,
combinations and Probability – Dice - Cube and Cuboid - Data sufficiency - Logical deductions – Analogies - Course of
action - Cause and effect - Data interpretation

104
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16ITI02 Ruby on Rails


(Course designed and will be delivered by Amzur technologies, Visakhapatnam)

1001
Intended Learning Outcomes
1. Illustrate different data types, packages and calling functions in Ruby on Rails
2. Analyze MVC framework and apply development best practices learning methods

Ruby & Rails: Introduction to Ruby programming language. Ruby web programming & popularity, extension of the Ruby
programming language, Introduction to Rails, Rails framework for building websites, Rails supporting Principles: MVC
Design Pattern, COC - Convention over Configuration, Dry - Don’t Repeat Yourself. Ruby on Rails & full-stack: Ruby
on Rails over the front-end and the back-end. Web application, without the Back-end or front-end representation. Side-
effect of Ruby on Rails, HTML/CSS, JavaScript, and Ruby

15 Hours
Reading Material (s)

1. Ruby on Rails , Learn web development with rails by Michael Hartl, Tutorial, Commonwealth Publishers, New
Delhi, (2014)

105
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT001 Information System Design (Elective I)


3103
Course Outcomes
1. Define the concepts and definition of the information systems
2. Differentiate between several types of information system
3. Identify the threats to information security
4. Show how to protect information recourses
5. Differentiate between transaction processing system and functional area information system
6. Show how to maintaining and protecting information system
COs–POs Mapping
COs PO3 PO5
1 2 1
2 1 1
3 1 1
4 1 2
5 2 1
6 2 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction to Information systems Development
Overview of system analysis and Design Categories of Information systems-Systems Development strategies-
Implementation and Evaluation-Tools for systems development-Information systems Planning Methodologies-Managing
project Review and selection-Preliminary Investigation-Project Feasibility-selecting the project-development strategy.
Requirement Analysis and Determinations: Activities in Requirements determination-Fact finding Techniques: Interview-
Questionnaire-Record Review-observation
People and Procedures-Expert Systems (artificial intelligence)
(10+5) Hours
Unit II
Prototype Development Strategy
Tools for Documenting Procedures and Decisions: Decision Trees-Decision Tables-Structured Analysis-Dataflow Analysis-
Tools for dataflow strategy-Developing data flow diagrams-Leveling-Data dictionary. purpose of prototyping-steps in
prototype Method-use of prototypes-tools for prototyping-Prototyping Strategies. Computer Aided System Tools: Benefits
of computer Assisted Tools-Categories of computer assisted system Engineering (CASE) Tools.
Time Box Approach-IT Organization vs. End-User Development
(10+3) Hours

Unit III
System Design
Objectives-Features to be designed-Managing the design process-Managing EndUser development system Design of
output-Design of Input and control-Design of online dialogue-Design of Files and Databases.
Approaches to Development-Systems Development Life Cycle
(12+4) Hours
Unit IV
System Engineering and Quality Assurance
Designing reliable and maintainable system-Program Structure charts-Software Modules-Coupling-Cohesion. Software
Design and documentation Tools: Structured flowchart-HIPO-Wamier/Orr diagrams. Managingquality Assurance-
Assessing system Reliability-Testing Strategies-Documentation. Managing System Implementation: Training Conversion
Methods-Data and File Preparation-post implementation review. Managing Information system Development: Estimation
and management of development Time-Personnel and Development Management-structured walkthroughs. Selection of

106
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Hardware and Software: Hardware Selection-Determining size and capacity requirements. Computer Evaluation-
plugcompatible equipment-financial Factors-Maintenance and Support-Software Selection.
Modular Programming and the Top-Down Approach-Auditing
(13+3) Hours
Total: (45+15) Hours
Textbook(s)
1. A. James &Senn, Analysis and Design of Information Systems, 2nd Edition MCGRAW-HillEdu, 2008
2. Arthur M. Langer ,Analysis and Design of Information Systems 3rd Edition , SpringerSpringer Science &
Business Media, 2007
Reference(s)
1. Preeti Gupta, System Analysis and Design 2nd Edition, Firewall Media, 2008
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test6 (%)
Remember 35 20 --
Understand 30 30 --
Apply 25 30 80
Analyze 10 20 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. What are the components of Information systems?
2. List out various layers that consists information system architecture.
3. What is top-down programming structure?
4. Define software metrics.
Understand
1. Represent the block diagram of system development life cycle.
2. Draw the salient features of accounting information system.
3. Indicate how to apply competitive strategy concepts to the strategic role of information systems.
4. Contrast Physical system design activity in detail
Apply
1. Write statements that perform the following one-dimensional-array operations
2. Find traditional system life cycle approach for building information systems.
3. Show how IT enables systems are useful for solving real world business problems
4. Demonstrate the Physical components required fororganizational information system

Analyze
1. Justify how to apply competitive strategy concepts to the strategic role of information systems.
2. Identify 4 fact finding techniques, giving one different advantage and one different disadvantage of each.
3. Compare the concept of Data Flow Diagram (DFD) from that of Decision Table.
4. Differentiate the terms Physical Model and Logical Model as used in System design process

6
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
107
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS001 Computer Graphics & Multimedia (Elective I)


3103
Course Outcomes
1. Demonstrate the contemporary graphics hardware-the actual methodology and techniques to draw computer
graphics-animations etc. for the real world presentation and how it is implemented in Computer graphics software
and various applications of computer graphics.
2. Apply algorithms for rasterization and clipping of 2D graphic primitives and filling of closed regions and
understand the basic 2D and 3D Transformations such as translation-rotation and scaling.
3. Identify the usage of various clipping algorithms
4. Analyze algorithms for visible surface detection and various projection types.
5. Demonstrate the ability to develop an animation movie.
6. Summarize the introductory concepts in multimedia processing.

COs–POs Mapping
COs PO2 PO3 PO5
1 3 2 1
2 2 3 1
3 3 2 2
4 3 2 1
5 2 3 2
6 2 2 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction & Output primitives
Application of Computer Graphics- overview of graphics systems-raster scan systems-random scan systems-raster scan
display processors
Output primitives :Points and lines-line drawing algorithms(Bresenham‟s and DDA Line derivations and algorithms)-mid-
point circle and ellipse algorithms. Filled area primitives: Inside and outside tests-Scan line polygon fill algorithm-
boundary-fill and flood-fill algorithms.
Graphics monitors-work stations and input devices
(11+4) Hours
Unit II
2-D Geometrical transforms & 2D-Viewing
Translation-scaling-rotation-reflection and shear transformations-matrix representations and homogeneous coordinates-
composite transforms-transformations between coordinate systems.
2-D viewing:The viewing pipeline-viewing coordinate reference frame-window to view-port coordinate transformation-
viewing functions-Cohen-Sutherland and Cyrus beck line clipping algorithms-Sutherland –Hodgeman polygon clipping
algorithm.
Transformation Functions and raster methods for transformations (11+4) Hours
Unit III
3-D object representation-Transformations & Visible Surface Detection Methods
Polygon surfaces-quadric surfaces- spline representation -Hermite curve-Bezier curve and B-Spline curves-Bezier and B-
Spline surfaces.3-D Geometric transformations:Translation-rotation-scaling-reflection and shear transformations-composite
transformations. 3D Viewing pipeline-clipping-projections ( Parallel and Perspective).
Visible surface detection methods:Classification-back-face detection-depth-buffer-scan-line-depth sorting -BSPtree
methods-area sub-division and octree methods.
Basic illumination models-polygon rendering methods
(11+4) Hours

Unit IV
108
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Computer Animation & Fundamentals of Multimedia


Design of animation sequence-general computer animation functions-raster animation-computer animation languages-key
frame systems-motion specifications.
Fundamental concepts in Text and Image:Multimedia and hypermedia-world wide web-overview of multimedia software
tools. Graphics and image data representation graphics/image data types-file formats.
Multimedia data compression:Lossless compression algorithm: Run-Length Coding-Variable Length Coding-Dictionary
Based Coding-Arithmetic Coding-Lossless Image Compression -Lossy compression algorithm.
Digital voice and video-Image video and animation
(12+3) Hours
Total: (45+15) Hours
Textbook (s)
1. D. Hearn & M.P. Baker, Computer Graphics, 2/e, Pearson Education, New Delhi, 2005
2. Ze-Nian Li and Mark S. Drew, Fundamentals of Multimedia, PHI/PearsonEducation, 2004.

Reference (s)
1. Newman W.M. and Sproull R.F., Principles of Interactive Computer Graphics, 2ndEdition, Tata McGraw Hill
Publishing Company Limited, New Delhi, 1997.
2. S. Harrington, Computer Graphics, A Programming Approach, MGH Publication, New Delhi, 1994.
3. J.D. Foley et. Al, A Fundamental of Computer Graphics, Addition Wesley, London, 1993.
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test7 (%)
Remember 20 35 --
Understand 35 35 --
Apply 35 20 40
Analyze 10 10 40
Evaluate -- -- 20
Create -- -- --
Total (%) 100 100 100

Remember
1. List the applications of computer graphics
2. Write 2D transformation matrix for translation, rotation and scaling
3. Define parallel projection
4. List the steps to design computer animation

Understand
1. Explain Bresenham‟s Line drawing algorithm
2. Explain Sutherland-Hodgeman polygon clipping algorithm
3. Write about Depth sorting visible surface detection method
4. Explain about Lossless Image Compression.

Apply

7
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
109
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

1. Draw a circle with center (5,8) and radius 7 units using Midpoint circle generation algorithm
2. Obtain the reflection of a point A(10, 10) with respect to the line y=x+2
3. Use Cohen Sutherland clipping algorithm to clip two lines p1p2 and p3p4 with p1(40,15) p2(75,45) p3(70,20)
p4(100,10) against window a(50,10) b(80,10) c(80,40) d(50,40)
4. Clip the polygon v1-v6 against the window ABCD. Assume any convenient numerical values for the vertices
preserving the information containing the figure. Employ Sutherland-Hodgeman algorithm

Analyze
1. Compare raster scan and random scan systems
2. Write the functionalities of B-spline curves
3. Test the Bresenham‟s line drawing algorithm to draw a line between the points (20,10) and (30,18)
4. Compare and contrast parallel and perspective projections

110
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS004 Real Time Operating Systems (Elective I)


3103
Course Outcomes
1. Develop the mathematical model of the system and implement real time algorithm for task scheduling.
2. Explain capabilities Handling Resource Sharing and dependencies among Real-time Tasks
3. Explain and use of different protocols
4. Analyze Real-time tasks Scheduling in multiprocessor and distributed systems
5. Explain the working of real time operating systems and real time database.
6. Explain the working of real time operating systems and real time communication

COs–POs Mapping
COs PO 2 PO 3
1 3 3
2 3 2
3 3 2
4 3 3
5 2 2
6 2 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Real-Time Systems
Introduction: Real time definition - Applications of Real-Time systems - A basic model of Real-time system -
Characteristics of Real-time system - Safety and Reliability - Types of Real-time tasks - timing constraints - Modeling
timing constraints Some important concepts - Types of Real-time tasks and their characteristics - Task scheduling - Clock-
Driven scheduling - Hybrid schedulers - Event-Driven scheduling - Earliest Deadline First (EDF) scheduling.
Identify some RTOS for review - Embedded Programming in C
11 + 4 Hours
Unit II
Scheduling Periodic Tasks
Rate monotonic algorithm (RMA). Some issues associated with RMA. Issues in using RMA practical situations.Handling
Resource Sharing and dependencies among Real-time Tasks: Resource sharing among real-time tasks.Priority inversion.
Priority Inheritance Protocol (PIP) - Highest Locker Protocol (HLP) - Priority Ceiling Protocol (PCP).Different types of
priority inversions under PCP. Important features of PCP - Some issues in using a resource sharing protocol. Handling task
dependencies
Memory Management - and PortingμCos
11 + 4 Hours

Unit III
Scheduling Real-Time Tasks in Multiprocessor and Distributed Systems

Multiprocessor task allocation - Dynamic allocation of tasks - Fault tolerant scheduling of tasks - Clock in distributed Real-
time systems - Centralized clock synchronization Commercial Real-time operating systems: Time services - Features of a
Real-time operating system - Unix as a Real-time operating system - Unix-based Real-time operating systems - Windows as
a Real-time operating system - POSIX-RT - A survey of contemporary Real-time operating systems. Benchmarking real-
time systems
RTOS for fault Tolerant Applications
11 + 4 Hours
Unit IV

111
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Real Time Databases and Communication


Real-time Databases: Example applications of Real-time databases. Review of basic database concepts - Real-time
databases - Characteristics of temporal data.
Concurrency control in real-time databases - Commercial real-time databases - Real-time Communication: Basic concepts -
Examples of applications - Real-time communication in a LAN and Real-time communication over packet switched
networks.
Comparison and study of various RTOS like QNX - VX Works
12 + 3 Hours
Total: 45+15 Hours
Textbook (s)
1. Rajib Mall, Real-time Systems Theory and Practice, 1st edition, Pearson Publication, 2008.
Reference (s)
1. Jane W. S. Liu, Real-Time Systems, Pearson Education, 2000.
2. C.M. Krishna and K.G. Shin, Real-Time Systems, TMH, 2009

SAMPLE QUESTION (S)

Internal Assessment Pattern

Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test8 (%)
Remember 25 15 10
Understand 35 25 20
Apply 20 35 30
Analyze 20 25 20
Evaluate -- -- 10
Create -- -- 10
Total (%) 100 100 100

Remember

1. Define real-time system.


2. List few applications of real-time systems.
3. What is meant by fail safe state?
4. Name any two important sensor devices and two actuators used in real time systems.

Understand

1. Explain the basic model of real-time system.


2. Explain characteristics of real-time systems.
3. Explain the key differences between the characteristics of a soft-real time task such as web browsing and a non-
real time task such as e-mail delivery.

Apply
1. In a real time system what is the difference between a performance constraint and a behavioral constraint? Give
practical examples of each type of constraint.
2. Draw a schematic model showing the important components of a typical hard real system. Explain the working of
output interface using a suitable schematic diagram. Explain using a suitable circuit diagram how analog to digital
conversion is achieved in an output interface.

8
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
112
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

3. Draw a schematic model showing the important components of a typical hard real system. Explain the working of
input interface using a suitable schematic diagram. Explain using a suitable circuit diagram how digital to analog
conversion is achieved in an input interface.
Analyze
1. Is it possible to have an extremely safe but unreliable system? If your answer is affirmative, then give example of
such a system. If your answer is no, then explain why such a system is not possible to exist.
2. Identify the constraints that a set of periodic real-time tasks need to satisfy for RMA to be optimal scheduler for
the set of tasks?
3. Compare the performance of IEEE 802.4 protocol with IEEE 802.5 protocol for real-time applications at high,
medium and low bandwidths.

113
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16HSX04 Engineering Economics and Project Management

3103
Course Outcomes
1. Explain basic principles of engineering economics
2. Apply cost-volume-profit (CVP) analysis in their business decision making
3. Evaluate investment proposals through various capital budgeting methods
4. Apply the knowledge to prepare the simple financial statements for measuring performance of business firm
5. Analyze key issues of organization, management and administration
6. Evaluate project for accurate cost estimates and plan future activities
COs – POs Mapping
COs PO11
1 2
2 1
3 2
4 3
5 1
6 3
Unit I
Introduction to Engineering Economics - Demand Forecasting & Cost Analysis
Concept of Engineering Economics – Types of efficiency – Managerial Economics Nature and Scope – Law of Demand –
Types of Elasticity of demand.Demand Forecasting & Cost Analysis:Demand Forecasting: Meaning, Factors Governing
Demand Forecasting, Methods of Demand Forecasting (Survey and Statistical Methods) – Cost Analysis: Basic Cost
Concepts, Break Even Analysis.
Factors affecting the elasticity of demand – Supply and law of Supply.
(10 + 3)Hours
Unit II
Investment Decisions & Market Structures - Financial Statements & Ratio Analysis
Time Value of Money – Capital Budgeting: Meaning, Need and Techniques of Capital Budgeting –Types of Markets
Structures – Features – Price Out-put determination under Perfect Competition and Monopoly.Financial Statements & Ratio
Analysis:Introduction to Financial Accounting – Double entry system – Journal – Ledger – Trail Balance – Final Accounts
(with simple adjustments) – Financial Analysis through Ratios: Interpretation of Liquidity Ratios (Current Ratio and quick
ratio), Activity Ratios (Inventory turnover ratio and Debtor Turnover ratio, Creditors Turnover Ratio, Capital Turnover Ratio),
Solvency Ratios (Debt- Equity ratio, Interest Coverage ratio), and Profitability ratios (Gross Profit Ratio, Net Profit ratio,
Operating Ratio, P/E Ratio and EPS).
Price output determination under Monopolistic markets, Accounting concepts and conventions
(11 + 6)Hours
Unit III
Introduction to Management - Strategic Management
Introduction to Management: Nature – Importance – Classical Theories of Management: F.W.Taylor‟s and Henri Fayol‟s
Theory – Functions and Levels of Management – Decision Making Process.
Methods of Production (Job, Batch and Mass Production) - Inventory Control, Objectives, Functions – Analysis of
Inventory – EOQ.
Maslow & Douglas Mc.Gregor theories of Management, ABC Analysis
(12 + 2)Hours
Unit IV
Project Management
Introduction – Project Life Cycle and its Phases – Project Selection Methods and Criteria – Technical Feasibility – Project
Control and Scheduling through Networks – Probabilistic Models of Networks – Time-Cost Relationship (Crashing) –
Human Aspects in Project Management: Form of Project Organization – Role & Traits of Project Manager.

114
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Sources of Long-term and Short-term Project Finance


(12 + 4)Hours
Total :( 45+15) Hours
Textbook (s)
1. Pravin Kumar, Fundamentals of Engineering Economics, Wiley India Pvt. Ltd. New Delhi, 2012
2. Rajeev M Gupta, Project Management, 2nd Ed., PHI Learning Pvt. Ltd. New Delhi, 2014
Reference (s)
1. PanneerSelvam. R, Engineering economics, 2nd Ed.,, Prentice Hall of India, New Delhi, 2013
2. R.B.Khanna, Project Management, PHI Learning Pvt. Ltd. New Delhi, 2011
3. R. PanneerSelvam&P.Senthil Kumar, Project Management, PHI Learning Pvt. Ltd. New Delhi, 2010
4. A. Aryasri, Management Science, 4th Ed., Tata McGraw Hill, 2014
5. A. Aryasri, Managerial Economics and Financial Analysis, 4th Ed., Tata McGraw Hill, 2014
6. Koontz &Weihrich, Essentials of Management, 6th Ed., TMH, 2010
7. Chuck Williams and Mukherjee, Principle of Management 7th Ed., Cengage Learning, 2013

SAMPLE QUESTION (S)


Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test9 (%)
Remember 25 20 --
Understand 25 15 --
Apply 20 20 30
Analyze 10 15 30
Evaluate 20 20 20
Create -- 10 20
Total (%) 100 100 100

Remembering
1. Define Managerial Economics. Explain its nature and scope
2. Explain the concept of efficiency? What are the serveral methods to enhacing the economic efficiency?
3. Define Production Function? What are the various types of production functions
4. What is meaning of productivity? Explain how productivity can be enhanced in the Indian industries
5. How are projects “unique” and „temporary as defined by PMBOK?

Understanding
1. What do you understand by engineering economics? Discuss
2. What is law of demand? Explain its exceptions
3. Explain different elements of costs used in cost analysis
4. Illustrate the effect of price on demand and supply with the help of a diagram
5. Compare and contrast long-run equilibrium under monopolistic competition with that under perfect competition.
Application
1. Determine price elasticity of demand given that the quantity demand of a product is 1000 units when the price is
Rs.100 and when the price declines to Rs.70, demand increases to 1100 units.
2. Consider the following data of company for the year 2015
Sales = Rs.2,40.000/-
Fixed cost = Rs.50,000/-
Variable caost = Rs.75,000/-
Find our the followings
a) Contribution
b) Profit
c) BEP

9
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
115
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

d) Margin of safety
3. “Every debit must have a corresponding credit” Explain.
4. Identigy the factors that are to be diagnosed both in the external and the internal environment to make enough
ground for strategy formulation. Illustrate appropriately
5. “Poor technology selection can lead to total failure for a manufacturing firm”, Do you agree? Give reasons in
support of your answer with suitable examples
Analysis

1. “Management is regarded as an art by some, science by othes”. In the light of this statement, explain the exact
nature of management.
2. Make a comparative analysis of the features of different methods of production.
3. Analyse the Discounted Cash Flow (DCF) technique for appraising large investment decisions.
4. Is there any lind between mission, goal, objective, strategy and programmes in an industrial environment?
5. Compare and contrast the project evaluation and review technique (PERT) with the critical path method (CPM)
Evaluate

1. Evaluate survey based demand forecasting methods with appropriate examples


2. The logical sequence of management functions cannot be subordinated even by one fuction. Do you agree?
Support your answer
3. Can there be a strategy without a mission? Give a mission statement for following organization:
A) An internet servce provider
B) A large private hospital
C) State electricity board

4. From the following information calculate ARR of the project, with initial cost of Rs.2,00,000/- and scrap value is
Rs.10,000/.

Year Project
1 20000
2 50000
3 70000
4 60000
5 40000

5. Following data relates to a certain project.

Activity to tm tp
1-2 2 5 14
1-3 3 12 21
2-4 5 14 17
3-4 2 5 8
4-5 1 4 7
3-5 6 15 30
a) Construct the network
b) Find the project duration
c) Identify the critical path
Create

1. Discuss the flow of goods, services, resources and money payments in a simple economy with the help of a
suitable diagram.
2. Sketch and explain the demand relationship in each of the following statements.
a. I would never buy a Britney Spears CD! You couldn‟t even give me one for nothing.

116
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

b. I generally buy a bit more coffee as the price falls. But once the price falls to Rs.2/-, I‟ll buy out the entire
stock of the supermarket.
c. I spend more on orange juice even as the price rises. (Does this mean that I must be violating the law of
demand?)
3. “Managerial Economics is the discipline which deals with application of economic theory to business
management”, Discuss.
4. How information technology has enabled the development of project management in recent times?
5. „GE Matrix is an extension of BCG Matrix‟, Discuss.

117
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS604 Data Mining

3 024

Course Outcomes
1. Process raw data by applying relevant preprocessing techniques to make it suitable for various data mining
algorithms.
2. Discover and measure interesting patterns from different kinds of databases.
3. Apply the techniques of clustering, classification, association finding, feature selection and visualization to real
world data.
4. Become aware of ethical issues that are present in data mining applications.
5. Evaluate models/algorithms of data mining techniques with respect to their accuracy
6. Demonstrate capacity to perform a self-directed piece of practical work that requires the application of data mining
techniques

COs–POs Mapping
COs PO2 PO3 PO5 PO6
1 3 1 1 1
2 3 1 2 2
3 3 3 2 2
4 1 3 1 1
5 2 1 3 2
6 3 2 2 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction to Data Mining and Warehousing
Overview of Data warehouse-Data Warehouse Architecture-Introduction to Data Mining-Basic Data Mining Tasks-Data
Mining Issues-Data Mining Metrics-Different sources of Data Mining-Data Mining and KDD-Types of Data-Data
Preprocessing-Statistical Perspective on Data Mining-Similarity Measures-Examples of Proximity Measures-Issues in
Proximity Calculations-Selection of the Right Proximity Measure
Data Mining Primitives-Concept Description: Characterization and Comparison
Practical Components
1. Introduction to Graphical User Interface (GUI) of WEKA
2. Introduction to IBM SPSS Modeler and Nodes Palette
3. Perform Data Pre-processing on sample data set
11+9 Hours
Unit II
Mining Association Rules in Large Databases
Association Rule Mining-Mining Single-Dimensional Boolean Association Rules from Transactional
Databases-Mining Multilevel Association Rules from Transaction Databases-Mining Multidimensional
Association Rules from Data sources-From Association Mining to Correlation Analysis-Constraint-Based
Association Mining
Evaluation of Association Patterns-Effect of Skewed support distribution
Practical Components
1. Perform Association Analysis to derive the association rules using Aprioriand FP-Growth Algorithm.
2. Preparing the data for analysis using data audit node.
12+6 Hours
Unit III
Classification of Data
Preliminaries-General Approach to Solving Classification Problem-Decision Tree Induction-Rule-based Classifier-Nearest-
Neighbor Classifiers-Bayesian Classifiers-Artificial Neural Network

118
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Classification by Backpropagation-Genetic Algorithms


Practical Components
1. Implement the Classification using Decision Tree Induction.
2. Implement theClassification using Regression.
3. Implement the Classification using Bayesian Classification.
10+9 Hours
Unit IV
Mining Complex Types of Data
Overview-K-means-Agglomerative Hierarchical Clustering–DBSCAN-Prototype-based Clustering-Cluster Evaluation-
Multidimensional Analysis and Descriptive Mining of ComplexData Objects-Mining Spatial
Databases-Mining Multimedia Databases-Mining Text Databases-Mining the World Wide Web
Grid-Base Clustering Methods-Model Based Clustering Methods
Practical Components
1. Implement the K-means Clusteringand Hierarchical clustering.
2. Predicting Loan Defaulters using Bayesian Networks Algorithm.
12+6 Hours
Total: 75 Hours
Textbook (s)
1. Pang, Ning Tan, Michael Steinbach,Vipin Kumar Introduction to Data Mining, 1st Edition, Pearson Addison
Wesley, 2005
2. Jiawei Han &MichelineKamber, Data Mining Concepts and Techniques, 2nd Edition, Morgan Kaufmann, 2006

Reference (s)
1. Margaret H Dunham, Data Mining Introductory and advanced topics, 2nd Edition, Pearson Education, 2004
2. Arun K Pujari, Data Mining Techniques, 2nd Edition, University Press, 1999.
3. Ian H. Witten, Eibe Frank, Mark A. Hall, Data Mining:Practical Machine Learning Tools and Techniques, 3rd
Edition, Morgan Kaufmann Publishers, 2011

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test10 (%)
Remember 35 15 20
Understand 30 25 30
Apply 20 30 20
Analyze 15 20 20
Evaluate -- 10 10
Create -- -- --
Total (%) 100 100 100

Remember
1. What are the steps in the data mining process?
2. What is Descriptive and predictive data mining?
3. What is Data Generalization?
4. What is clustering?
5. Define Spatial Databases.

Understand
1. What are the requirements of clustering?

10
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course
119
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

2. How is association rules mined from large databases?


3. What is the classification of association rules based on various criteria?
4. Explain the various OLAP operations.
5. Explain data reduction
6. Explain Data mining Primitives
7. Explain the data mining functionalities
Apply
1. Find some of the data mining applications
2. Show the various social impacts of data mining?
3. Demonstrate the different types of data repositories on which mining can be performed
4. Choose some specific application oriented databases.

Analyze
1. Identify the different types of data repositories on which mining can be performed
2. Compare the parametric methods and non-parametric methods of reduction
3. Differentiate the types of data in cluster analysis.
4. Justify Additional themes in data mining
5. Criticize over the data quality is so important in a data warehouse environment

Evaluate
1. Judge the attributes requirement for high performance data mining
2. Determine the data visualization help in decision-making
3. Select the factors to be considered while selecting the sample in statistics

120
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS603 Internet of Things


3003
Course Outcomes

1. Demonstrate knowledge and understanding of the security and ethical issues of the Internet of Things
2. Conceptually identify vulnerabilities, including recent attacks, involving the Internet of Things
3. Conceptually describe countermeasures for Internet of Things devices
4. Analyze the societal impact of IoT security events
5. Develop critical thinking skills
6. Compare and contrast the threat environment based on industry and/or device type

COs–POs Mapping

COs PO1 PO2 PO3 PO4 PO5 PO6


1 3 2 3 2 2 2
2 3 3 2 2 2 2
3 2 3 3 3 2 1
4 2 3 2 3 2 1
5 1 3 2 1 3 2
6 1 3 1 1 1 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
IoT Concepts and Architectures
Introduction - Internet of Things Definition Evolution - IoT Architectures - Resource Management - IoT Data
Management and Analytics - Communication Protocols - Internet of Things Applications – Security - Identity
Management and Authentication – Privacy - Standardization and Regulatory Limitations
Open Source Semantic Web Infrastructure for Managing IoT Resources in the Cloud
11+3 Hours
Unit II
Device/Cloud Collaboration Framework & Fog Computing
Device/Cloud Collaboration Framework: Powerful Smart Mobile Devices - Runtime Adaptation Engine - Privacy-
Protection Solution. Applications of Device/Cloud Collaboration: Context-Aware Proactive Suggestion - Semantic
QA Cache - Image and Speech Recognition.
Fog Computing: Definitions and Characteristics - Reference Architecture – Applications - Research Directions and
Enablers - Commercial Products - Case Study on SMART City
IoT Enablers and Solutions
11+4 Hours
Unit III
Virtualization on Embedded Boards as Enabling Technology for the Cloud of Things
Cloud and Fog Computing - Three Delivery Models of Fog and Cloud-of-Things Computing - Machine Reference
Model With its Three Interface Levels - Virtualization Technique Taxonomy - Hardware-Level and Process-Level
Virtualization Taxonomy - ARM Virtualization Extensions - XEN ARM Virtualization - KVM ARM Virtualization
- Virtualization and Real-Time
Micro Virtual Machines (MICROVMS) For Cloud assisted Cyber-Physical Systems (CPS): Virtual Machines and
Micro Virtual Machines - Architecture for Deploying Cps in the Cloud and the Expansion of the IoT - Extending the
Possibilities of the IoT by Cloud Computing - Micro Virtual Machines with the Sensor Observation Service and
Path Between Smart Objects and CPS
IoT Architecture for Selected Use Cases: eHealth, Precision Agriculture and Domotic 12+4 Hours
121
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Unit IV
Stream Processing In IoT: Foundations, State-Of-The-Art and Future Directions
Stream Processing in the System Architecture of IoT - Comparison of the Stream Model and the Batch Model -
Differences Between Two Use-Cases of Stream Processing: DSMS and CEP - The Characteristics of Stream Data in
IoT - General Architecture of a Stream Processing System in IoT - Continuous Logic Processing System -
Challenges and Future Directions
Framework for Distributed Data Analysis for IoT: Anomaly Detection - Problem Statement and Definitions -
Distributed Anomaly Detection - Efficient Incremental Local Modeling
Home Temperature Monitoring System, Raspberry Pi Platform, Introduction to Object Orientation Programming
(OOP) with Java, Webcam and Raspberry Pi Camera Projects

Text Book (s)

1. Rajkumar Buyya, Amir Vahid Dastjerdi, “Internet of Things: Principles and Paradigms,” Elsevier 2016

Reference (s)

1. Dieter Uckelmann, Mark Harrison, Florian Michahelles, Architecting the Internet of Things, Springer,
2011
2. Luigi Atzor, The Internet of Things: A survey, Journal on Networks, Elsevier Publications, 2010
3. http://postscapes.com/
4. http://www.theinterntofthings.eu/what-is-the-internet-of-things
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Int. Test 1 Int. Test 2
Assignment Test8 (%)
Level (%) (%)
Remember 20 25 --
Understand 30 25 30
Apply 25 10 30
Analyze 25 20 20
Evaluate -- 20 20
Create -- -- --
Total (%) 100 100 100
Remember

1. Write the major significance of Internet of Things.


2. State the crucial requirement f IoT in terms of application and its supporting natures.
3. List the dominant technologies behind IoT development.
4. Identify two major differences between Internet of Everything and Industrial IoT.
5. Write about the data-center based cloud tools that use to run the machine learning algorithm internally.
6. Recognizes an alternative approach that results in better adaptivity in case of network fluctuations and
increased latency.
7. Identify the on-demand processing and storage capabilities that is used to analyze the data generated by IoT
objects in batch or stream format.

Assignment Test should contain only questions related to Higher Order Thinking (HOT) Skills

122
Department of Computer Science and Engineering, GMR Institute of Technology (GMRIT) | Regulation 2016
Understand
1. Identify the evolutionary terms of Internet of Things (IoT) that use to interact and live with the physical objects.
2. Illustrate the reference architecture of IoT that unifies the smart objects and human beings to provide the
ubiquitous communication
3. Illustrate the service-oriented architecture of IoT that ensures the interoperability among the heterogeneous
devices
4. Illustrate the API-Oriented Architecture of IoT that use SOAP and Remote Method Invocation (RMI) as a
means for describing, discovering, and calling services
5. Discuss the resource capacity, selecting and provisioning the resources that greatly impact Quality of Service
(QoS) of the IoT applications
6. Classify the taxonomy of resource management activities of IoT.
7. Report the standard requirement of real time analytics to fulfill the demand of real-time stream processing
engine.
Apply

1. Interpret a study analysis on open-source prototyping platform for the industrial IoT.
2. Implement a suitable OPENIoT Architecture for IoT/Cloud Convergence that provides an abstract presentation
of the functional elements of architecture.
3. Sketch W3C SSN-XG ontology and how to semantically enable real time sensor feeds
4. Execute the two-tier data dissemination model for large-scale wireless sensor network
5. Demonstrate SPARQL query caching in order to improve the performance of semantic web applications
6. Illustrations a technique to cluster semantically similar QA pairs for retrieving an answer for a newly given
query without asking the QA engine on the cloud side
Analyze
1. Comparative analysis on real-time analytics in Cloud-IoT and fog computing.
2. Compare the communication efficiencies for the following protocols such as AMPQ, CoAP, DDS, MQTT,
UPnP and XMPP in terms of Transport Layer Protocols.
3. Differentiate the major significances of nesC, keil C and Dynamic C.
4. Relate a set of minimal features to be fulfilled by the programming frameworks for IoT.
5. Comparative analysis on IoT programming approaches
Evaluate
1. Select an example that utilizes the device-collaboration framework for the proactive suggestion application
2. Appraise a semantic QA cache that implement the device/cloud collaboration framework to compute the
probability of the on-device semantic QA cache to answer a given query correctly.
3. Select a suitable example that use automatically tagging recognized images to display the additional information
such as social sentiment in order to achieve similar performance improvement for speech-recognition
application with DL through device/cloud collaboration framework
4. Critique on fog-computing assisted distributed analytics system that uses a set of fall-detection algorithms,
including algorithms based on acceleration measurements and time-series analysis methods, as well as filtering
techniques to facilitate the fall-detection process.

123
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT604 Artificial Intelligence (Elective V)


3103
Course outcomes
1. Interprets different types of AI agents
2. Identify various AI search algorithms (Un-informed, Informed, Heuristic, Constraint Satisfaction, Genetic
Algorithms)
3. Compare fundamentals of knowledge representation (Logic-based, Frame-based, Semantic Nets), Inference
and Theorem proving
4. Demonstrate working knowledge of reasoning in the presence of incomplete and/or uncertain information
5. Apply knowledge representation, reasoning and machine learning techniques to real-world problems
6. Understand independent (or in a small group) research and communicate it effectively in a seminar setting
COs–POs Mapping
COs PO1 PO2 PO3
1 1 3 2
2 1 1 3
3 1 3 1
4 1 3 2
5 1 1 2
6 1 3 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit I
Introduction & Heuristic Search Techniques
AI problems, AI techniques, Defining problem as a state space search, Production systems, Problem characteristics,
Production system characteristics. Generate-and-test, hill climbing, best-first-search, problem reduction, constraint
satisfaction
Means-ends-analysis and data abstraction-mapping
12+4 Hours
Unit II
Knowledge representation
Issues, predicate logic, resolution, representing knowledge using rules, forward versus backward reasoning,
matching, control knowledge, weak slot and filler structure-semantic nets, frames, strong slot
Filler structures-conceptual dependency-scripts
11+ 3 Hours
Unit III
Game Playing
Mini-max search, alpha-beta cutoffs, planning system, goal stack planning, hierarchical planning, understanding as
constraint satisfaction, waltz algorithm, natural language processing, syntactic processing.
Semantic analysis-case grammars
11+ 4 Hours
Unit IV
Learning
Rote learning, learning by taking advice, learning in problem solving, learning from examples, winston‟s learning
program, decision trees, perception, vision, speech recognition, navigation, manipulation, robot architecture
Expert systems, shell-explanation-knowledge acquisition
11+ 4 Hours
Total: 45+15 Hours

88
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Textbooks (s)
1. E.Rich K.Knight, and B. Nair, Artificial Intelligence, 3rdEdition, TMH, 1 July 2017
2. Russel Norvig, Artificial Intelligence A modern Approach, 3rd Edition, Pearson Education,2010

Reference (s)
1. Patrick henry Winston,Artificial Intelligence, third edition,Pearson Education Asia, 2005
2. Dan W. Patterson, Introduction to Artificial intelligence and Expert Systems, 2 nd Edition, PHI,2009

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test11 (%)
Remember 40 30 --
Understand 35 30 --
Apply 25 40 70
Analyze -- -- 20
Evaluate -- -- 10
Create -- -- --
Total (%) 100 100 100

Remember
1. State the tasks which are associated with A.I.
2. Give an example of cript-arithmetic problem.
3. Define Script
4. Recall Intelligence
Understand
1. Explain Turing Test.
2. Explain the characteristics of production system.
3. Write A* algorithm in detail and explain its functionality to solve 8-puzzle problem.
4. Explain the semantic analysis phase done through case grammars in Natural Language understanding

Apply

1. Distinguish between weak and strong slot filler structures


2. Discuss the tic-tac-toe problem in detail and explain how it can be solved using AI technique
3. Construct semantic net representation for the following:
(i) Pompeian (Marcus), Blacksmith (Marcus)
(ii) Mary gave the green flowered vase to her favorite cousin.
Analyze
1. Show that the tower of Hanoi problem can be classified under the area of AI. Give a state space
representation of the problem.
2. Give an example of a problem for which breadth-first search would work better than depth-first search.
Justify your answer.
3. Consider the following sentences:
John likes all kinds of food.
Apples are food.
Chicken is food

11
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

89
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Anything anyone eats and isn‟t killed by food.


Bill eats peanuts and is still alive.
Sue eats everything Bill eats.
(a) Translate these sentences into formula in predicate logic.
(b) Convert the formulas of part a into clause form.
Prove that John likes peanuts using resolution.
Evaluate
1. Convert the following statements to conceptual dependencies.
(i) I gave a pen to my friend
(ii) Rama ate ice cream
(iii) I borrowed a book form your friend
(iv) While going home, I saw frog
2. Assume the following facts:
Steve only likes easy courses.
Science courses are hard.
All the courses in the basket wearing department are easy.
BK 301 is a basket wearing course.
Use resolution to answer the question.
“What course would Steve like?”
3. Trace the constraint satisfaction procedure solving the cryptarithmetic problem.
SEND
+ MORE

MONEY

Create
1. The function h‟ is an estimator of h of best-first search algorithm. Explain what is done in the algorithm if
h‟ underestimates h and h‟ overestimate h.
2. Write A* algorithm in detail and explain its functionality to solve 8-puzzle problem.
3. Consider the problem of finding cloths to wear in the morning. To solve this problem, it‟s necessary to use
knowledge such as:
Wear jeans unless either they are dirty or you have a job interview today.
Were a sweater if it‟s cold.
It‟s usually cold in the winter.
Wear sandals if it‟s warm
It‟s usually warm in the summer.
Build a JTMS-style database of the necessary facts to solve this problem.

90
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS607 IoT Lab


0032
Course Outcomes
1. Analyze any real world problem
2. Identify the requirements of the system
3. Design the system and its functional requirements
4. Identify and select appropriate components for system implementation
5. Design interface for the system
6. Design and implement a model for a real world problem

The Internet of Things (IoT) is a system of interrelated computing devices, mechanical and digital machines,
objects, animals or people that are provided with unique identifiers and the ability to transfer data over a
network without requiring human-to-human or human-to-computer interaction.

List of Experiments
1. Accident Detection System.
2. Health Monitoring System.
3. Traffic congestion detection System.
4. Surveillance Systems.
5. Home Security Systems/ Automation System.
6. “Next generation” IoT applications must be able to capture, collect, interpret, and act on vast
amounts of information – detecting connectivity gaps, handling interruptions, and meeting
specific business and industry requirements.

91
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16ESX03 / 16ESX04 Employability Skills III & IV


0201
16ESX04 Employability Skills IV

Soft Skills: Overview of Employability Skills: Skills required for excelling in both the GDs and Interviews -
Interview Skills: Interview? Types of Interview, Dos & Don‟ts, Skills assessed in an Interview, Mistakes to be
avoided, How to equip oneself to excel? How to handle the Typical Interview Questions? (With Examples) - Mock
Interviews (HR Round): Practice sessions with Feedback & Evaluation - Email Writing: Practice - Motivational
Talk: (Case specific) such as “Building Confidence” or “Emotional Intelligence”

Quantitative Aptitude: Problems on numbers - H.C.F and L.C.M - Problems on ages – Averages - Time and Work
- Time & Distance – Percentages - Profit & loss - Ratio & Proportions – Partnership - Simple interest & Compound
interest – Clocks – Calendars - Pipes and Cisterns - Mensuration

Verbal reasoning: Number series - Direction test - Blood relations – Syllogisms - Seating arrangement -
Permutations, combinations and Probability – Dice - Cube and Cuboid - Data sufficiency - Logical deductions –
Analogies - Course of action - Cause and effect - Data interpretation

92
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT002 Distributed System (Elective II)


3103
Course Outcomes
1. Learn the core concepts underlying distributed systems designs.
2. Identify entities and resources in distributed systems
3. Examine the naming conventions in distributed systems
4. Apply and compare the various communication mechanisms in distributed systems.
5. Identify issues on how to coordinate multiple tasks in a distributed system.
6. Identify issues on how to synchronize multiple tasks in a distributed system

COs-POs Mapping
COs PO2 PO7
1 3 1
2 3 2
3 2 3
4 3 1
5 2 3
6 2 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction to Distributed systems
Definition of Distributed systems-goals of distributed systems-types of distributed systems-Distributed system
architecture-architectural styles-system architectures-Communication Fundamentals-Remote Procedure Call-
Message-Oriented Communication-Stream-Oriented Communication-Multicast Communication.
The node addition algorithm-Application level multicasting
(10+5 )Hours
Unit II
Naming, Synchronization, Consistency and Replication
Names-Identifiers-and Addresses-Flat Naming-Structured Naming-Attribute-Based ,Clock Synchronization-Stream
Synchronization-Synchronization Mechanisms-Logical Clocks-Physical clocksIntroduction-Data-Centric
Consistency Models-Client-Centric Consistency Models-Consistency Protocols.
Framework for Consistency-Multiprocess Systems-SessionGuarantees
(10+3) Hours
Unit III
Fault Tolerance&Distributed File Systems
Introduction to Fault Tolerance-Process Resilience-Reliable Client-Server Communication-Reliable Group
Communication-peer to peer communications-Distributed Commit-Recovery.Introduction to distributed file
systems-Architecture-Process-communications-consistency and replication-Sun network file system
Server Message Block-Andrew File System
(12+4 )Hours
Unit IV
Distributed Transactions&Coordination and Agreement:
Introduction-Flat and nested distributed transitions-Atomic commit protocol-concurrency control in distributed
transactions-distributed dead locks-Transaction and recovery.Introduction-Distributed Mutual exclusion-Elections-
multi cast communication-consensus and related problems.Case study: CORBA RMI-CORBA Services.
A ring based election algorithm-Maekawa’s algorithm
13+3 Hours
Total: 45+15 Hours

93
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Textbook(s)
1. Andrew S.Tanenbaum and Maarten Van Steen,Distributes Systems Principles and paradigms,-Second
Edition, Prentice Hall, 2002
2. George Coulouris , Jean Dollimore& Tim Kindberg , Distributed Systems: Concepts and Design , 4 th
Edition, Addison-Wesley, 2005

Reference(s)
1. Andrew S.Tanenbaum, Distributed Operating Systems, Pearson Education, 1995
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test12 (%)
Remember 25 20 --
Understand 35 35 --
Apply 30 35 70
Analyze 10 10 30
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100
Remember:
1. List three properties of distributed systems.
2. List some disadvantages or problems of distributed systems that local only systems do not show (or at least
not so strong)
3. Define distributed Systems.
4. What are the services and examples of Middleware?
5. List five reasons why to build distributed System.
6. What do you mean by transparency?
7. What are the request reply protocols?
8. List the types of Communication paradigms.
9. Define distributed mutual exclusion.

Understand:

1. Estimate how distributed system benefits resource sharing.


2. Describe the main idea of Distributed Systems.
3. Summarize about resource sharing.
4. Discuss the design issues in Intranet
5. Discuss the design issues of RMI.
6. Differentiate marshalling and unmarshalling.
7. Describe Remote procedure call.
8. Differentiate physical clock and Logical clock.
9. Discuss what are the advantages and drawbacks of multi version timestamp ordering in comparison with
ordinary timestamp ordering
10. Summarize the internal and external synchronization of Physical clocks.
11. Express in diagram the file attributes record structure.
12. (i)Describe With a neat sketch explain remote procedure call.
(ii) Describe explain about group communication.

12
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

94
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Apply:

1. Show how distributed System helps cloud computing.


2. Illustrate the concept of concurrency.
3. Utilize the World Wide Web as an example to illustrate the concept of resource sharing, client and server.
4. (i) Examine about the use of request reply protocol. (ii) Show how message queues are useful? Explain in
brief.
5. Illustrate the architecture and server operation of NFS.
6. Show the use nested transaction.
7. Show how will you make use of nested transaction, What are its rules
Analyze:

1. Classify the file accessing models.


2. Summarize in detail about naming in file systems.
3. Pointout the reason why computer clock synchronization is necessary.
4. (i)Explain distributed mutual exclusion with suitable algorithm. (ii) Analyze on any three election
algorithms. Use appropriate
Create:

1. Develop the scenario how might the clocks in two computers that are linked by a local network be
synchronized without reference to an external time source
2. Design in detail any two application domain where distributed system is applied.
3. Formulate why there is no explicit data typing in CORBA
4. Formulate the design and implementation of name services and Domain Name services.
Evaluate:

1. Rank the advantages and disadvantages of HTML, URLs and HTTP as core technologies for information
browsing?
2. Conclude on shared memory Approach
3. Explain on LDAP.
4. How will you assess a consensus problem?
5. (i)Explain detail about two phase commit protocol. (ii) Examine on atomic commit protocol.

95
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT003 Information Retrieval Systems (Elective II)

3103
Course Outcomes
1. Learn Classical and advanced techniques employed by Web Search engines
2. Know different ways of representation and retrieval of documents.
3. Apply techniques of preprocessing needed for IRS
4. Apply the techniques of clustering on unstructured data
5. Apply indexing methods for fast retrieval from Document data.
6. Develop an IRS by using different user search techniques and text search algorithms

COs–POs) Mapping
COs PO3 PO6 PO8
1 3 2 2
2 3 2 2
3 2 3 1
4 2 3 1
5 2 3 1
6 3 3 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit I
Introduction & Measures
Definition, Objectives, Precision,Recall,Comparison to DBMS, Digital libraries and Data Warehouses, Functional
Overview, Search, Browse Capabilities.
Beyond the syllabus: Miscellaneous capabilities. (11+3) Hours
Unit II
Cataloging and Indexing & Data Structures
Objectives, Indexing Process, Automatic Indexing, Information Extraction, Classes of automatic indexing,
Stemming Algorithms, Inverted file structures, N-gram data structure, PAT datastructure.
Beyond the syllabus: Signature file structure, Hypertext data structure. (12+4) Hours
Unit III
Document and Term Clustering & Text Search Algorithms
Introduction, Thesaurus generation, Item clustering, Hierarchy of clusters. Software text search algorithms-Brute
force, Knuth Pratt Morris, Boyer Moore.
Beyond the syllabus: Hardware text search systems (11+4) Hours

Unit IV
Information Retrieval System Evaluation
Introduction, Measures used in System Evaluation,Standard test collections, Evaluation of unranked retrieval sets,
Evaluation of ranked retrieval results.
Beyond the syllabus: Measurement Example-TREC Results. (11+4) Hours
Total: (45+15) Hours
Textbook (s)
1. Kowalski, Gerald, Mark T Maybury: Information Retrieval Systems: Theory and Implementation, Kluwer
Academic Press, 1997.
2. http://nlp.stanford.edu/IR-book/html/htmledition/evaluation-in-information-retrieval-1.html

96
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Reference (s)
1. Frakes, W.B.andRicardoBaeza Yates, Information Retrieval Data Structures and Algorithms, 1st Edition
Prentice Hall, 1992.
2. Robert Korfhage, Information Storage & Retrieval, 1st Edition, John Wiley & Sons, 2005

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test13 (%)
Remember 30 30 --
Understand 40 40 --
Apply 10 20 80
Analyze 20 10 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. Define measures for IRS
2. Define PAT
3. State Browse capabilities
4. List automatic indexing
5. Recall term clustering algorithms

Understand
1. Explain Functional Overview
2. Explain Stemming algorithms
3. Summarize Brute force algorithms
4. Illustrate S/w text search Algorithms
5. Interpret standard test collection
6. Classify S/w & H/w text search systems
Apply
1. Demonstrate Precision
2. Design a hybrid Indexing Data Structure
3. Use stemming Algorithms for IRS

Analyze
1. Analyze s/w and h/w indexing methods
2. Analyze search and Browse capabilities
3. Compare Pat and Stemming algorithms
4. Analyze Term clustering Algorithms

Evaluate
1. Determine Which of the indexing algorithm is efficient
2. Check all automatic indexing methods for its efficiency
3. Compare S/w text search and H/w text search algorithms

13
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

97
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT004 Information Theory & Coding (Elective II)


3103
Course Outcomes
1. Demonstrate the basic concepts of information theory-source coding-channel and channel capacity-channel
coding and relation among them.
2. Interpret the real life applications based on the fundamental theory.
3. Determine the entropy-channel capacity-bit error rate-code rate-steady-state probability and so on.
4. Compute the encoder and decoder of one block code or convolution code using any program language.
5. Conclude the information content of a random variable from its probability distribution.
6. Predict the efficient code for data on imperfect communication channels.

COs–POs Mapping
COs PO1 PO2 PO3 PO6 PO8
1 1 2 1 2 1
2 2 3 2 1 2
3 2 1 3 2 2
4 3 3 3 1 2
5 1 1 1 2 1
6 1 1 1 1 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Information Theory
Information–Entropy-Information rate-classification of codes-Kraft McMillan inequality-Source coding theorem-
Shannon-Fano coding-Huffman coding-Extended Huffman coding-Joint and conditional entropies-Mutual
information-Discrete memoryless channels–BSC.
BEC Channel capacity-Shannon limit (12+4) Hours
Unit II
Source Coding: Text-Audio and Speech
Text: Adaptive Huffman Coding-Arithmetic Coding-LZW algorithm–Audio: Perceptual coding-Masking
techniques-Psychoacoustic model-MEG Audio layers I-II-III-Dolby AC3-Speech: Channel Vocoder.
Linear Predictive Coding (11+3) Hours
Unit III
Source Coding: Image and Video
Image and Video Formats–GIF-TIFF-SIF-CIF-QCIF–Image compression: READ-JPEG–Video Compression:
Principles-I-B-P frames-Motion estimation-Motion compensation.
H.261-MPEG standard (11+3) Hours
Unit IV
Error Control Coding Block & Convolutional Codes
Definitions and Principles: Hamming weight-Hamming distance-Minimum distance decoding-Single parity codes-
Hamming codes-Repetition codes-Linear block codes-Cyclic codes-Syndrome calculation-Encoder and decoder
CRC Convolution codes–code tree-trellis state diagram-Encoding .
Decoding: Sequential search and Viterbi algorithm–Principle of Turbo coding (11+5) Hours
Total: (45+15) Hours
Textbook (s)
1. R Bose, Information Theory-Coding and Crptography,2nd Edition TMH,2007
2. Fred Halsall, Multidedia Communications: Applications-Networks-Protocols and Standards,1st Edition
Perason Education Asia, 2000

98
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Reference(s)
1. K Sayood, Introduction to Data Compression, 3rd Ed., Elsevier, 2006
2. S Gravano, Introduction to Error Control Codes, 2nd Edition Oxford University Press, 2007
3. Amitabha Bhattacharya, Digital Communication, 2nd Edition ,TMH, 2006

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test14 (%)
Remember 30 20 --
Understand 40 30 --
Apply 20 30 70
Analyze 10 20 30
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. Write the conditional entropy H(Y |X) in bits
2. State the entropy of the source, H(X)
3. List the advantage and disadvantage of cyclic code
4. Define rate of information.
Understand
1. Draw the mutual information I(X; Y)?
2. Represent binary cyclic code?
3. Indicate the different methods for controlling the errors?
4. Contrast fixed length codes inefficient for alphabets whose letters are not equiprobable? Discuss this in
relation to Morse code.
Apply
1. Find the alternative expression for H(Y ) − H(Y |X) in terms of the joint entropy & both marginal entropies
2. Demonstrate a plot of the function you would need to use in order to recover completely the continuous
signal transmitted, using just such a finite list of discrete periodic samples of it
3. Select the important properties of codes while encoding a source?
4. Compute the coding rate R of your code? How do you know whether it is optimally efficient?
Analyze
1. Justify In terms of the probability distributions, what are the conditional entropies H(X|Y ) and H(Y |X)?
2. Compare is there any limit to the capacity of such a channel if you can increase its bandwidth W in Hertz
without limit, but while not changing N0 or P? If so, what is that limit?
3. Conclude that mutual information is non negative.
4. Identify code word corresponding to the information sequence 10011 using time domain and transform
domain

14
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

99
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT005 Fundamentals of Cloud Computing (Open Elective)


3103
Course Outcomes
1. Interpret the main concepts, key technologies, strengths, and limitations of cloud computing and the
possible applications for state-of-the-art cloud computing
2. Illustrate various problems and evaluate related cloud computing solutions.
3. Apply the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS, public cloud,
private cloud and hybrid cloud to different problems.
4. Analyze cloud provider for a defined environment and to a specific platform in a cost effective way.
5. Analyze case studies to derive the best practice model to apply when developing and deploying cloud based
applications
6. Build a virtual machine with a machine image

COs–POs Mapping
COs PO2 PO6 PO7 PO8
1 3 2 1 2
2 3 2 1 3
3 3 2 1 1
4 2 2 2 2
5 3 2 1 3
6 2 2 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Understanding Cloud Computing
Cloud computing: Introduction, Cloud application architectures, Value of cloud computing, Cloud Infrastructure
models, Cloud Services, History of Cloud Computing, Advantages of Cloud Computing, Disadvantages of Cloud
Computing, Companies in the Cloud Today, Amazon Web Services, Windows Azure, Google services, IBM Cloud
Before the move into the cloud- Know Your Software Licenses, The Shift to a Cloud Cost Model, Service Levels for
Cloud Applications Ready for the cloud: Web Application Design, Machine Image Design, Privacy Design, Design,
Database Management.
Tata Cloud- Salesforce.com

(13+3) Hours
Unit II
Virtual Machines and Virtualization of Clusters and Data Centers
Implementation Levels of Virtualization, Virtualization Structures/Tools and Mechanisms, Virtualization of CPU,
Memory, and I/O Devices, Virtual Clusters and Resource Management, Virtualization for Data-Center Automation
Case Studies: Cloud centers in detail, Comparing approaches, Xen, Eucalyptus, Cloud Stack, and Open Stack
VMware- KVM.
(10+5) Hours
Unit III
Scaling of Cloud Infrastructure & Security
Capacity, Planning, Cloud Scale.Cloud Security-Data Security, Network Security, Host Security, Compromise
Response
Disaster Recovery-Disaster Recovery Planning, Disasters in cloud, Cloud Disaster Management.
Requirements for modern data centers- high availability and Service Orientated Infrastructures (SOI)- Modern data
centre use case studies.
(10+3) Hours

100
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
Cloud Computing Software Security Fundamentals
Cloud information Security Objectives, Cloud Security Services, Relevant Cloud Security Design Principles, Secure
Cloud Software Requirements, Approaches to Cloud Software Requirements Engineering, Cloud Security Policy
Implementation. Cloud Computing Risk Issues: The CIA Triad, Privacy and Compliance Risks, Threats to
Infrastructure Data and Access Control, Cloud Access Control Issues, Cloud Service Provider Risks.
Security concepts-Confidentiality-privacy-integrity-authentication-non-repudiation-availabilit- access control-
defence in depth- least privilege
(12+4) Hours
Total:(45+15) Hours
Textbook (s)
1. George Reese, Cloud Application Architectures, 1st Edition O‟Reilly Media, 2009
2. Ronald L.Krutz and Russell Dean Vines, Cloud Security, 1st Edition, Wiley Publishing, 2010

Reference (s)
1. Michael Miller, Cloud Computing-Web Based Applications that change the way you work and collaborate
online, 1st Edition, Pearson Education, Publishing, 2011
2. Kai Hwang, Geoffrey C Fox and .Jack J.Dongarra, Distributed & Cloud Computing from Parallel Processing
to the Internet of Things , 1st Edition, MK Publishing, 2010
3. David S Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide,
1st Edition, Addison-Wesley, 2009

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test15 (%)
Remember 40 45 --
Understand 40 45 --
Apply 20 10 80
Analyze -- -- 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. Define Cloud Computing
2. List types of virtualization
3. Define proactive scaling
4. What is CIA Triad?

Understand
1. Explain different cloud Infrastructure models
2. Explain different levels of virtualization
3. Explain about cloud Network security in detail?
4. Explain about Recovery Point Objective.

15
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

101
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Apply
1. Explain any IaaS service provided by Amazon
2. What is cloud Stack?
3. How disaster recovery planning can be done
4. How Web Application Design is used in designing cloud applications

Analyze
1. Compare cloud center and service infrastructure.
2. Analyze different cloud services provided by Amazon
3. With neat diagram explain the functioning of Xen Architecture.
4. List and explain various cloud service providers risks.

102
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CE007 Disaster Management (Open Elective)


4003
Course Outcomes
1. Demonstrate the interdisciplinary nature of disaster management
2. Apply the knowledge to formulate different risk management frameworks and pre-preparedness tools for
natural and manmade disasters
3. Summarize the risk and vulnerability associated with disasters
4. Apply different technologies in the management of disasters
5. Outline the importance of education and preparedness in the management of disasters
6. Infer the role of different organizations in disaster management
COs–POs Mapping
COs PO2
1 2
2 3
3 3
4 3
5 1
6 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Introduction to Disaster Management and Management of Natural Disasters
Introduction: Interdisciplinary nature of the subject, Disaster Risk Reduction–Global Policies and Practices, Basic
Strategies and Practices of Disaster Reduction, Linking Disaster Risk Reduction with Global Framework, Integrated
Disaster Risk Management and Post-Disaster Response-Management of Natural Disasters: Floods, Droughts,
Earthquakes, Global Warming, Cyclones, Landslides, Tsunamis and Post Tsunami hazards along the Indian Coast
Significant Aspects of Disasters-Global Earthquake Safety Initiative-Prediction of Tsunamis-Typology of flood
risks-Framework for Preparedness and Mitigation
12+3 Hours
Unit II
Management of Manmade Disasters and Risk & Vulnerability
Management of Manmade Disasters:Temporal Transport Hazard Dynamics, Solid Waste Management: Post–
disaster, A Threat of Bio-terrorism in Mega Cities, Rail and Air craft‟s accidents, emerges infectious diseases, AIDS
and Climate Change Risk Reduction-Risk & Vulnerability: Building Codes and Land Use Planning, Social
Vulnerability, Environmental Vulnerability and Disaster Risk Reduction, Macroeconomic Management and
Sustainable Development, Financial Management of Disaster related Economic Losses
Temporal Analysis of Transport-Capacity Building and Institutional Strengthening-Climate Risk Management -
Decision Framework
11+4 Hours
Unit III
Role of Technology in Disaster Management
Role of Technology in Disaster Management:Implementation Technology for Disaster Reduction, Disaster
Management for Infrastructure, Geospatial Information in agriculture Drought Assessment and Monitoring,
Multimedia Technology in Disaster Risk Management Training-Education and Community: Education in Disaster
Risk Reduction , Essentials of School Disaster Education, Community Capacity and Disaster Resilience,
Community-based Disaster Recovery, Community-based Disaster Management and Social Capital, Designing
Resilience
Disaster Management Program-Building Community Capacity-Remote Sensing and GIS 11+4 Hours

103
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
Multi Sectional and Crosscutting Issues
Multi Sectional Issues:Impact of Disasters on Poverty and Deprivation, Climate Change Adaptation and Human
Health, Health Hazards and Environmental Risk-Crosscutting Issues: Forest Management and Disaster Risk
Reduction, Institutional Capacity in Disaster Management, Corporate Sector and Disaster Risk Reduction, Essentials
of Pre-disaster Recovery Planning
Poverty Vulnerability Indices-Protective Functions of Forest Resources-Corporate Organizations and Disaster
Potential-Community Focused Approach
11+4 Hours
Total: 45+15 Hours
Textbook (s)
1. R. Shaw and R. R. Krishna Murthy, Disaster Management: Global Challenges and Local Solutions, 1 st Ed.,
Universities Press (India) Private Limited, Hyderabad, 2009
2. J. Singh, Disaster Management: Future Challenges and Opportunities,2nd Ed., I.K.International Publishing
House Private Limited, New Delhi, 2007

Reference (s)
1. D. P. Coppola, Introduction to International Disaster Management, 3rd Ed., Elsevier Publications, 2011
2. U. Ranke, Natural Disaster Risk Management, Springer International Publishing, 2016

Sample Question (s)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test 16(%)
Remember 20 10 --
Understand 30 40 --
Apply 50 50 100
Analyze -- -- --
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. Define Hazard.
2. Define Disaster.
3. What are the different phases of disaster management cycle?
4. Define Tsunami.
5. Define landslide.
Understand
1. Explain when hazard become disaster
2. “Prevention is better than cure is opted proverb in the context of disaster management” Explain.
3. Explain the causes of global warming.
4. Explain the difference between environmental and social vulnerabilities.
5. “All the developmental projects will lead to disaster risk”, Justify.
Apply
1. Role of Geospatial technology in disaster management
2. Role of multimedia technology in disaster management

16
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

104
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16EE004 Renewable Energy Sources (Open Elective)


30 0 3
Course Outcomes
1. Summarize the principles of solar energy systems
2. Demonstrate the applications of solar energy system
3. Illustrate the working principles of wind and biomass energy systems
4. Interpret working principles of geothermal energy system
5. Summarize operation and classification of ocean , tidal, fuel cells, small hydro and magneto hydro energy
system
6. Extend renewable energy sources to distributed generation & micro grids

COs – POs Mapping

COs PO2 PO7


1 3 2
2 2 3
3 2 3
4 2 3
5 2 3
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Introduction &Solar Energy
Introduction to renewable energy, advantages of generating power through renewable energy sources – technical &
economical, Solar Energy:Physics of sun, the solar constant, extra-terrestrial and terrestrial solar radiation,
instruments for measuring solar radiation and sun shine. Flat Plate and Concentrating Collectors, classification of
concentrating collectors, thermal analysis of flat plate collectors, Photo voltaic energy conversion,PV cell model and
characteristics, Maximum power point tracking for photovoltaic power systems. Types of Maximum power point
tracking methods (Perturb and Observe (hill climbing), Incremental Conductance, Fractional short circuit current,
Fractional open circuit voltage)
Solar applications-solar heating /cooling technique
12+4 Hours
Unit II
Wind & Bio-Mass Energy
Sources and potentials, horizontal and vertical axis windmills, performance characteristics, Betz criteria, maximum
power point tracking for wind, types of Maximum power point tracking methods
Principles of Bio-Conversion, Anaerobic/aerobic digestion,Types of Bio-Gas Digesters,gas yield, Combustion
characteristics of bio-gas,
Utilization for cooking, IC.Engine operation
12+4 Hours
Unit III
Energy Conversion systems
Geothermal &OceanEnergy: Types of Resources (hydrothermal, geo-pressured, hot dry rock), types of wells, and
methods of harnessing the energy (vapour dominated, liquid dominated).Ocean thermal energy conversion,
principles, Open loop&closed loop OTEC Cycles.Tidal energy- potential, conversion techniques-single basin, two
basin system. Wave energy: conversion techniques.
Fuel cells-Principle of working of various types of fuel cells and their working, Magneto-hydrodynamics (MHD)-
Principle of working of MHD Power plant, Hydrogen generation, battery energy storage system.

105
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Wave, tidal power conversion systems&Small hydro power generation


11+3Hours
Unit IV
Distributed generation &Microgrid
Define grid, distributed generation(DG)&microgrid, importance of DG &microgrid, typical structure and
configuration of a microgrid, AC and DC microgrids, modes of operation and control of microgrid: grid connected
and islanded mode, anti-islanding schemes: passive, active and communication based techniques.
HVDC microgrid system 10+4 Hours
Total: 45+15=60 Hours
Textbook (s)
1. G.D. Rai,Non-Conventional Energy Sources,Khanna Publishers,1stEdition, 2000.
2. B H Khan, Non-conventional energy resources, Tata McGraw Hill EducationPrivate Limited, 2ndEdition,
2001.
3. Alexis Kwasinski , Wayne Weaver, Robert S. Balog, Micro grids and other local area power and
energy systems,Cambridge University Press,1stEdition, 2016

Reference (s)
1. Tiwari and Ghosal, Renewable energy resources, Narosa Publishing house, 2ndEdition, 2001
2. RanjanRakesh, Kothari D. P.& Singal K. C., Renewable Energy Sources And Emerging Technologies,
PHI, 2ndEdition, 2013.
3. Nikos Hatziargyriou,Micro grids: Architectures and Control,wiley,1stEdition.
4. Electricity Act 2003, Renewable Energy Act 2015.
5. Indian Constitution-Articles 51A, 47, 48A.

Sample Question (s)


Internal Assessment Pattern

Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Comprehensive Test17 (%)
Remember 40 40 ---
Understand 60 60 80
Apply 20
Analyze --- --- ---
Evaluate --- --- ---
Create --- --- ---
Total (%) 100 100 100

Remember
1. Define renewable energy
2. List out the advantages HAWT
3. List out the disadvantages non concentration collector
4. Define solar radiation
5. Define solar constant
6. Define micro-grid

Understand
1. Explain need of micro-grid
2. Interpret faraday‟s laws
3. Explainclosed loop OTEC Cycles system

17
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills

106
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

4. Explain Principle of working of MHD Power plant


5. Compare HAWT and VAWT
6. Classify concentrating collectors

Apply
1. Compute the power coefficient of wind turbine
2. Demonstrate storage of energy from battery
3. Assess magnetic flux density due to circular ring
4. Compute solar cell working
5. Assess the nature of microgrid

107
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16ME009 Principles of Entrepreneurship (Open Elective)


3103
Course Outcomes

1. Explain the role of entrepreneur in economic development


2. Demonstrate methods of generating ideas
3. Develop the business plan to start their own enterprise
4. Manage various production aspects such as manufacturing costs control, marketing management and
waste reduction
5. Make financial plan for enterprise
6. Find the institutional support entrepreneurship
COs – POs Mapping
COs PO1 PO5 PO8 PO11
1 3 - 3 2
2 3 - 1 -
3 3 - 1 3
4 3 3 2 2
5 3 3 3 3
6 3 - 1 3
3 – Strongly linked | 2 – Moderately linked | 1 – Weakly linked

Unit I
Introduction to Entrepreneurship
Definition of Entrepreneur, Entrepreneurial Traits, Entrepreneur Vs. Manager, Entrepreneur Vs Entrepreneur. The
Entrepreneurial decision process- Role of Entrepreneurship in Economic Developments, Ethics and Social
responsibility of entrepreneurs, Woman as entrepreneur.
Opportunities for entrepreneurs in India and abroad.
10+3 Hours
Unit II
Creating and starting the venture
Sources of new Ideas, Methods of generating ideas, creating problems solving- Product planning and development
process
The business plan
Writing Business plan, Evaluating Business plans, Using and implementing business plans, marketing plan,
financial plan and the organizational plan launching formalities
Nature and scope of business plan.
15+5 Hours
Unit III
Financing and managing the new venture
Source of Capital, record keeping, recruitment, motivating and leading teams, financial controls, Marketing and
sales controls. E- Commerce and Entrepreneurship
New venture expansion strategies and issues
Features evaluation of joint ventures, acquisitions, merges, franchising, Public issues, rights issues, bonus issues
Internet advertising
9+3 Hours

108
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
Institutional support Entrepreneurship
Role of Dire crate of Industries, District Industries, Centers (DICS), Industrial development Corporation (IDC),
state Financial corporation (SFCs), Small Scale Industries Development Corporations (SSIDCs), Khadi and village
Industries Commission (KVIC), Technical Consultancy Organization (TCO), small Industries Service Institute
(SISI), National Small Industries Corporation (NSIC), Small Industries Development Bank of India (SIDBI),
salient provision under Indian Factories Act, Employees State Insurance Act, Workmen‟s Compensation Act and
payment of Bonus Act.
Labour legislation
11+4 Hours
Total: 45+15Hours
Textbook (s)
1. Robert Hisrich& Michael Peters, Entrepreneurship, TMH, 5th Edition, 2009.
2. Dollinger, Entrepreneurship, Pearson Education, 4th Edition, 2004.
Reference (s)
1. VasantDesal, The Dynamics of Entrepreneurial Development and Management Himalaya publishing House,
5th Edition, 2017.
2. William A. Sahlman, James Stancill, Arthur Rock, Harvard Business Review on Entrepreneurship, Harvard
Business School Press, 10th Edition 1999.
3. Robert J. Calvin, Entrepreneurial Management, Tata McGraw-Hill Education 2004.
4. GurmeetNaroola, The Entrepreneurial Connection: East Meets West in the Silicon Valley, Special edition,
TiE, 2001.
5. Bill Bolton & John Thompson, Entrepreneurs Talent, Temperament, Technique, Routledge, 2 nd Edition,
2004.
6. Agrawal, A.N. &Agarwal, M.K., Indian Economy: Problems of Development and Planning, New Age
International, 42nd Edition, 2017.
7. GauravDatt&AshwaniMahajan, Dutt&Sundaram‟s Indian Economy, S. Chand, 72nd Edition, 2016.
8. Srivastava, Industrial Relations Labour Laws, Vikas Publishing House, 6 th Edition, 2005.
9. ArunaKaulgud, Entrepreneurship Management by Vikas publishing house, 2003.
10. Thomas W. Zimmerer& Norman M. Scalbrorough, Essential of Entrepreneurship and small business
management, PHI, 4th Edition, 2005.
11. Mary Coulter, Entrepreneurship in Action, PHI 2nd Edition, 2005.
12. Kaplan, Patterns of Entrepreneurship, Willey, 4th Edition, 2005.
13. ND Kapoor, Industrial Law, Sultan Chand & Sons, 14th Revised Edition, 2013.
Sample Question (s)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test18(%)
Remember 30 40 -
Understand 70 60 -
Apply - - 35
Analyze - - 45
Evaluate - - 20
Create - - -
Total (%) 100 100 100

18Assignment Test should contain only questions related to Higher Order Thinking (HOT) Skills

109
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Remember
1. List the different methods of generating ideas and explain any four methods.
2. List the difference between entrepreneur vs manager.
3. What are the objectives of market research?
4. What are the market research activities? List them.
5. List the important functions of IDBI.
Understand
1. Illustrate the difference between entrepreneur vs manager.
2. Illustrate the characteristics or traits of an entrepreneur.
3. Illustrate the sources of new ideas for entrepreneur.
4. Explain the various steps involved in writing a business plan.
5. What are the various sources of capital required for business venture?
6. Describe the role of E-commerce in entrepreneurship with its applications.
7. Write about marketing plan and financial plans required for an entrepreneur.
8. Illustrate the factories act 1948.
9. Illustrate the reasons for the need of labor legislation becomes important
.

110
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16EC004 Fundamentals of Global Positioning System (Open Elective)


3103
Course Outcomes
1. Summarize the history of GPS, NAVSTAR GPS
2. State the working principle of GPS, GNSSs
3. Outline GALILEO, GLONASS signal constellation details
4. Conclude about GPS segments, signal components, IRNSS specifications
5. Demonstrate GPS coordinate systems
6. Classify various datums and map projections
COs–POs Mapping

COs PO1 PO2 PO6


1 1 2 2
2 1 2 2
3 2 3 3
4 2 3 3
5 3 2 2
6 2 2 2
3–Strongly linked | 2–Moderately linked| 1–Weakly linked

Unit I
Introduction to Global Navigation Satellite Systems
The History of GPS, The Evolution of GPS, Development of NAVSTAR GPS, Block I, Block II, Block IIA, Block
IIR, Block IIR-M, Block IIF and Block III satellites, GPS working principle, Trilateration, Determination of satellite
position, Determining the receiver position: 2D or X-Y Plane, 3D or X-Y-Z Plane, Ionospheric effects of GPS
signals
GIS Integration
12+4 Hours
Unit II
Types of Global Navigation Satellite Systems
GALILEO: Advantages of GALILEO, signal components, PRN codes, Modulation schemes of Galileo signals:
BOC, Alt-BOC, Galileo and GPS Signal interoperability, Improved performance from the combination of
GALILEO and GNSSs, GLONASS: GLONASS constellation details, signal structure: PRN code,P-code,C/A
code,navigationdata,signal modulation
GAGAN Navigation system
12+3 Hours
Unit III
GPS Satellite constellation and Signals
GPS system segments: Space segment, Control segment, User segment, GPS Signals: Pseudorandom noise (PRN)
code, C/A code, P code, Navigation data, GPS signal generation: generation of codes, Comparison of GNSSs in
terms of constellation and services, IRNSS: Segments, 1A to 1G specifications, applications
Simulation of GPS signals
10+4 Hours

111
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
Coordinate Systems
Geoid, Ellipsoid, Coordinate Systems: Geodetic and Geo centric, CTRS, CIRS, ECEF, Datums: world geodetic
1984, Indian geodetic datum, Conversion between Cartesian and geodetic coordinate frame, Map projections:
Advantages, metric properties, construction, types of map projections
Extract GPS Coordinates for a Google Maps Location 11+4 Hours
Total: 45+15 Hours
Textbook (s)
1. G.S. Rao, Global Navigation Satellite Systems, McGraw-Hill Publications, New Delhi, 2010
2. Ahmed El-Rabbany, Introduction to GPS: the Global Positioning System,Artech House,2002
Reference (s)
1. Scott Gleason and DemozGebre- Egziabher, GNSS Applications and Methods, Artech House, 685
Canton Street, Norwood, MA 02062, 2009
2. James Ba-Yen Tsui, Fundamentals of GPS receivers-A software approach, John Wiley &Sons, 2001

Sample Question (s)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test 19(%)
Remember 20 -- --
Understand 45 35 --
Apply -- 35 45
Analyze 35 30 55
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember

1. Define trilateration.
2. List two applications of GPS.
3. List two important specifications of GLONASS
4. Retrive the need of PRS.
5. Define ranging codes and data.

Understand

1. Illustrate the working principle of GPS.


2. Identify the GPS and GLONASS interoperability issues.
3. Formulate the signal structure of GPS.
4. Abstract geodetic and geocentric coordinate systems.
5. Illustrate the modulation techniques of GALILEO system.

Apply

1. Compute the receiver position using 3D plane.


2. Find the pseudo range on satellite with travelling time of 70ms?
3. Find the free space loss factor on a GPS satellite L1 C/A code signal at a distance of 2x10 7.

19
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

112
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

1 X
4. Show that the longitude of a point in ECEF is tan .
Y
x(t ) A, t /2
5. Compute the Fourier transform of a pulse signal defined as
0, t /2
Analyse

1. Compare the features of C/A code and P-code.


2. Outline the unknowns to be solved in acquisition of GPS signal.
3. Contrast BOC and AltBOC modulation techniques.
4. Compare GPS and IRNSS features
5. Contrast ephemeris and almanac codes

113
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CS006 Computational Intelligence (Open Elective)


3103
Course Outcomes
1. Identify and describe Soft Computing Techniques and their roles in building Intelligent Machines
2. Apply Supervised Learning Networks in Machine Learning Problems
3. Illustrate the working of Associative memory networks
4. Apply Unsupervised Learning Networks in Machine Learning Problems
5. Apply Fuzzy Logic and Reasoning to handle Uncertainty and Solve Engineering Problem
6. Apply Genetic Algorithms to solve Optimized Problems

COs – POs Mapping

COs PO 2 PO3 PO5


1 3 2 1
2 3 2 1
3 2 3 1
4 3 2 1
5 3 2 2
6 2 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Basic Elements of Soft Computing
Basic elements of Soft Computing: Difference between Hard Computing & Soft Computing- Introduction to
Neural Networks - Fuzzy Logic - Genetic Algorithms - Hybrid Systems.Artificial Neural Networks:
Introduction to Artificial Neural Networks - Evolution of Neural Networks - Basic Models of Neural Networks
- McCulloch-Pitts Neuron - Hebb Network.
Basics of Artificial Intelligence and Computational Intelligence.
11+4 Hours
Unit II
Supervised Learning Network
Supervised Learning Network: Artificial Neural Networks: Introduction - Perceptron Networks - Back
Propagation Network. Radial Basis Function Network.
Associative Memory Networks: Auto-associative Memory Network - Hetero auto-associative Memory
Network - Bidirectional Associative Memory (BAM) - Hopfield Networks.
Functional Link Neural Network.
11+4 Hours
Unit III
Unsupervised Learning Network
Introduction - Fixed Weight Competitive Nets -Kohonen Self-Organizing Feature Maps - Learning Vector
Quantization - Counter Propagation Networks - Adaptive Resonance Theory Networks (ART-1 & ART-2).
Support Vector Machines and their applications for Classification.

11+4 Hours
Unit IV
Fuzzy logic and Genetic Algorithm
Introduction to Fuzzy Sets: Difference between Classical Sets & Fuzzy Sets – Properties.
Classical Relations and Fuzzy Relations: Cartesian product of Relations - Classical Relations - Fuzzy Relations
Membership Functions: Features of Membership Functions -Fuzzification - and Defuzzification
Genetic Algorithm: Basic Concepts – Operators.

114
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Concepts on Fuzzy Controller and its applications -a Simple Application of Genetic Algorithm for function
Optimization.
11+4 Hours
Total: 44+16 Hours
Textbook (s)
1. S. N. Sivanandam, S N Deepa, Principles of Soft Computing, 2ndEditionWiley India, 2007
2. V. Kecman, Learning and soft computing, Pearson Education, India, 2006
3. Russell Eberhart and Yuhui Shi - Computational Intelligence: Concepts to Implementations (2007)

Reference(s)
1. G. J. Klir and Bo Yuan, Fuzzy sets and Fuzzy Logic, Prentice Hall, USA, 1995
2. N. J. Nelsson, Artificial Intelligence, A New Synthesis, Harcourt Asia Ltd., 1998
3. D. E. Goldberg, Genetic Algorithms: Search, Optimization and Machine Learning, Addison Wesley, N.Y –
1989
4. S. Haykins, Neural networks: a comprehensive foundation Pearson Education, India, 2002
5. A. P. Engelbrecht, Computational Intelligence: An Introduction, John Wiley & Sons, 2007.
6. X. Yu and M. Gen, Introduction to Evolutionary Algorithms, Springer Verlag, 2010.
7. FakhreddineKarray and Clarence de Silva - Soft Computing and Intelligent Systems Design, 2004.
8. AndriesEngelbrecht - Computational Intelligence: an Introduction, 2007.
9. AmitKonar - Computational Intelligence: Principles, Techniques, and Applications, 2005.
10. Vojislav Kecman - Learning and Soft Computing: Support Vector Machines, Neural Networks, and Fuzzy
Logic Models, 2001.

SAMPLE QUESTION (S)


Internal Assessment Pattern

Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test20 (%)
Remember 25 15 --
Understand 35 15 --
Apply 20 20 40
Analyze 20 30 40
Evaluate -- 20 20
Create -- -- --
Total (%) 100 100 100

Remember
1. Define Chromosome
2. List two methods in which the information flows in a nervous system
3. List five unsupervised learning algorithms
4. List the difference between classical logic and fuzzy logic
5. List the computational units of ART

Understand
1. Explain the components of Soft Computing
2. Explain the role of activation function in exhibiting the output from a neuron
3. Construct the 5 node pattern {0,1,1,0,1} by Hopfield network and explain the procedure for recalling
andstoring
4. Explain Adaptive Resonance Theory and its type
5. Explain CPN and illustrate the steps involved in training algorithm of full CPN
Apply

20
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

115
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

1. Construct a ANN circuit which makes the flow of data using multilayered and multilevel networks
2. Apply clusters of various datasets maintained by learning approach considering live example
3. Draw the neat architecture of hamming network and trace the inhibitatory and excitatory neurons by
considering an inconsistent vector
4. Find the Max-min and Max Product composition of the fuzzy relation matrices R={0.6,0.3,0.2,0.9}(2x2)
S={1,0.5,0.3,0.8,0.4,0.7}(2x3)
5. Find the cardinality for the matrices R={1,4,6,7}(2x2) S={5,2,3,7}(2x2)

Analyze
1. Differentiate between learning and training algorithms considering multilayer perceptron network and trace
the different types of networks obtained.
2. Differentiate between Counter Propagation Network and Adaptive Resonance Theory

Evaluate
1. Evaluate using Back Propagation algorithm for the below map considering weights , inputs and outputs

2. Evaluate the instance, that the 2 dimensional input vector X is presented to the three-neuron
ohonennetwork, x=[ 0.52 0.12]. The initial weight vectors, Wj are given by
W1=[0.27 , 0.81]
W2=[0.42 , 0.70]
W3=[0.43 , 0.21]
in a form of 2 X 1 matrix. Find the winning neuron using the Euclidean distance and apply kernel self-
organization map.State the differences between register machines and stack machine?

116
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CH007 Industrial Safety and Hazard Management (Open Elective)


3103
Course Outcomes
1. Demonstrate the safety and ethical issues that may arise from industrial processes
2. Explain industrial hygiene practices and its procedures
3. Illustrate the toxic pathways and elimination of toxicity on bio organisms
4. Understand hazards arising from runaway reactions, explosions and fires, and how to deal with them.
5. Choose a suitable method for prevention of fires and explosions
6. Evaluate the process and able to do HazardsIdentification and risks Risk Assessment

COs – POs Mapping

COs PO1 PO2 PO3 PO6 PO8


1 2 2 1 3 3
2 1 2 1 3 3
3 3 2 3 1 1
4 3 1
5 3 3 3 2
6 3 3 3 3 2
7.

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Introduction to Safety &Industrial Hygiene
Safety programs, Engineering ethics, Accident and Loss Statistics, Acceptable Risk, Public Perceptions, The nature
of the Accident Process, Inherent Safety, Government of India and OSHA regulations, Industrial Hygiene,
Identification, Evaluation & Control
Lethal dosage–Material Safety Data Sheets
12+4 Hours
Unit II
Toxicology, Fires and Explosions
how toxicants enter biological organisms, how toxicants are eliminated from biological organisms, effects of
toxicants on biological organisms The fire triangle, Distinction between fire and explosions, Definitions,
Flammability characteristics of liquids and vapors, MOC and inerting, ignition energy, Auto ignition, Auto
oxidation, Adiabatic compression, Explosions
Firefighting equipment–Personal protecting equipment–Building fire safety codes
11+3 Hours
Unit III
Designs to Prevent Fires and Explosions
Inerting, static electricity, controlling static electricity, explosion proof equipment and instruments, ventilation,
sprinkler systems, miscellaneous designs for preventing fires and explosions
Work permit–Earthling–Color codes for identification of process
10+4 Hours
Unit IV
Hazards Identification and Risk Assessment
Process hazards checklists, hazards surveys, hazards and operability studies, safety reviews, other methods. Review
of probability theory, event trees, fault trees, QRA and LOPA
Health and safety foundation–5S Practice–Emergency procedures
12+4 Hours
Total: 45+15 Hours

117
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Text book (s)


1. D. A. Crowl, J. F. Louvar, Chemical Process Safety: Fundamentals with Applications, 3 rd Ed., Prentice
Hall, 2011
2. Reese, Charles D. Industrial Safety and Health for People-oriented Services. CRC Press, 2008

Reference (s)
1. H.H.Fawcett and W.S.Wood, Safety and Accident Prevention in Chemical Operations, John Wiley and
sons, 2nd Ed., New York, 1982
2. Hammer, Willie, and Dennis Price. Occupational safety management and engineering. Pearson College
Division, 2001

Sample Question (s)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test21(%)
Remember 20 20 --
Understand 30 20 --
Apply 30 20 35
Analyze 20 30 35
Evaluate -- 20 30
Create -- -- --
Total (%) 100 100 100

Remember
1. Define terms hazard and accidents
2. List three-step of accidents process?
3. Define terms LD and ED
4. List any four reversible effects that caused by toxic exposure
5. Define terms risk, loss prevention

Understand
1. Identify the initiation, propagation, and termination steps for motor accident
2. Explain about how toxicants enter biological organisms
3. Explain the key responsibilities‟ of professional engineers
4. Explain the inherent safety techniques that are used in the chemical industry
5. Explain how toxicants are eliminated from biological organisms
6. List the ingredients of safety program for outstanding safety program

Apply
1. An employee works in a plant with a FAR of 4. If this employee works a 4-hr shift, 200 days per year, what
are the expected deaths per person per year?
2. Air contains 5 ppm of diethylamide (TLV-TWA of 5 ppm), 20 ppm of cyclohexanol (TLV-TWA of 50
ppm), and 10 ppm of propylene oxide (TLV-TWA of 2 ppm). What is the mixture TLV-TWA and has this
level been exceeded?
3. The following accident report has been filed. Failure of a threaded 1½″ drain connection on a rich oil line at
the base of an absorber tower in a large (1.35 MCF/D) gas producing plant allowed the release of rich oil
and gas at 850 psi and –40°F. The resulting vapor cloud probably ignited from the ignition system of
engine driven re compressors. The 75′ high × 10′ diameter absorber tower eventually collapsed across the
pipe rack and on two exchanger trains. Breaking pipelines added more fuel to the fire. Severe flame
impingement on an 11,000-horsepower gas turbine–driven compressor, waste heat recovery, and super-

21
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

118
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

heater train resulted in its near total destruction. Identify the initiation, propagation, and termination steps
for this accident
4. A process has a reported FAR of 2. If an employee works a standard 8-hr shift 300 days per year, compute
the deaths per person per year
Analyze
1. Can gate valves be placed between a vessel relief and its vessel
2. Liquid levels in storage tanks are frequently determined by measuring the pressure at the bottom of the
tank. In one such tank the material stored in the tank was changed and an overflow resulted. Why?

Evaluate
1. How to convert your kitchen in to XP area
2. Does LOPA really replace 90% of the QRA?

119
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16PE007 Smart Grid Technology (Open Elective)


3103
Course Outcomes
1. Compare the basic difference between existing grid and smart grid
2. Explain perfect power system network (Including distributed and fully integrated systems)
3. Explain the importance of renewable energy systems and distributed energy resources in smart grids
4. Summarize the wide area monitoring system and advanced measuring technologies
5. Recall the technologies like Zigbee, HAN and NAN in smart grids
6. Explain SCADA technology in modern power systems and to analyze the micro grid systems

COs – POs Mapping

COs PO3 PO5


1 2 2
2 3 3
3 3 3
4 3 2
5 3 2
6 3 3
3–Strongly linked | 2–Moderately linked| 1–Weakly linked

UNIT I
Introduction to the Smart Grids
Introduction to smart grid- Electricity network-Local energy networks- General considerations for a smart grid,
characteristics of smart grids, elements in smart grids.
Electric transportation- Low carbon central generation-Attributes of the smart grid- Alternate views of a smart grid.
Smart grid to evolve a perfect power system: Introduction- Overview of the perfect power system configurations-
Device level power system- Building integrated power systems- Distributed power systems- Fully integrated power
system-Nodes of innovation.
Present status of smart grids in India
14+4 Hours
UNIT II
Smart Electric Grid & Measurement Technologies
Smart electric grid: generation- Distributed energy resources: Renewable energy, energy storage, solar energy,
wind energy, biomass, hydro power, geothermal and fuel cell, effect of electric vehicles(EV‟s) , transmission,
distribution, and end-user; Basic concepts of power, load models, load flow analysis
Measurement Technologies: Widearea monitoring system (WAMS), advanced metering infrastructure (AMI),
phasor measurement units.
Functioning of PMU
12+3 Hours
UNIT III
Communication & Networking Technology
Architectures, standards and adaptation of power line communication (PLC), zigbee, GSM, GPS, GIS, machine to-
machine communication models for the smart grid; Home area networks (HAN) and neighborhood area networks
(NAN)
Machine to human communication system
11+3 Hours
UNIT IV
Energy Management in Smart grids
Aspects of energy management in the smart grid; SCADA; micro grids; demonstration projects; case studies.Policy
and economic drives of the smart grid; environmental implications; sustainability issues of smart grid systems.
Environmental issues related to smart grid systems 10+3 Hours

120
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Total: 45+15 Hours


Text Book(s)

1. Clark W Gellings, “The Smart Grid, Enabling Energy Efficiency and Demand Side Response”- CRC Press,
2012
2. JanakaEkanayake, KithsiriLiyanage,Jianzhong.Wu, Akihiko Yokoyama, Nick Jenkins, “Smart Grid:
Technology and Applications”- Wiley, 2012

Reference(s)
1. A. Keyhani, Smart Power Grid Renewable Energy Systems, Wiley 2011
2. James Momoh, Smart Grid :Fundamentals of Design and Analysis, Wiley, IEEE Press, 2012

Sample Question (s)


Internal Assessment Pattern

Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test22(%)
Remember 10 10 ---
Understand 50 50 --
Apply 40 40 55
Analyze -- -- 45
Evaluate --- --- ---
Create --- --- ---
Total (%) 100 100 100

Remember
1. Define smart grid system
2. Write about self healing capability
3. List out four basic characteristics of smart grid system
4. Write about resiliency to disturbances
5. Write down the basic elements of smart grid system
6. Write about smart meters
7. Write down the generation options which are possible in smart grid system
8. Write about the functions of smart grids
9. Write down the attributes of smart grid system
10. Write about smart home energy management system
Understand
1. Illustrate the advanced power system network
2. Draw the block diagram of smart grid system
3. Explain the self healing property of smart grid system
4. Explain about self healing capability technology in smart grid systems
5. Explain the self healing property of smart grid system
6. Explain about the smart homes
7. Explain the energy storage system in smart grids
8. Explain about outage management system

Apply

22
Assignment Test should contain only questions related to Higher Order Thinking (HOT) Skills

121
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

1. Construction of modern power system network with the help of basic characteristics
2. Choose the best renewable energy source based on the environmental conditions
3. Execute the smart home with the smart grid elements
4. Develop a smart hybrid electric vehicle with efficient battery system
5. Compute micro grid system with dc loads
6. Find the net power injected in the bus i for a two bus system
Analyze

1. Differentiate between traditional and modern grid


2. Identify the reasons for failure of existing grid
3. Justify the need of AMI in smart grids
4. Compare the operation of micro grid and smart grid systems
5. Identify WAMS in smart grids

122
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16MA001Computational Mathematics (Open Elective)


3103
Course Outcomes
1. Apply the knowledge of finding roots of nonlinear equations and different errors in series approximations
2. Understand the consistency and inconsistency of linear system of equations
3. Evaluate the solution of Initial and Boundary value problems
4. Perform numerical differentiation and integration
5. Analyze the solution of PDEs under given conditions
6. Apply Knowledge of numerical techniques to Engineering problems
COs–POsMapping

COs PO1 PO2


1 3 2
2 3 2
3 2 3
4 2 2
5 3 3
6 3 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Errors in numerical calculations and Solutions of algebraic and transcendental equations
Absolute, relative and percentage errors, a general error formula, errors in a series approximation
Locating Roots of Equations with one variable : Secant method, Muller‟s method
Solution of nonlinear equations - Introduction, Iteration method, Newton-Raphson method
Develop MATLAB codefor Bisection method, Newton-Raphson method and for the above methods
12 + 3 Hours
Unit II
Solution of Linear Systems and Interpolation
Direct methods -LU Decomposition, Iterative methods –Jacobi method, Gauss-Seidel method
Interpolating polynomials using finite differences- Bessel interpolation, Piecewise and spline interpolation -
Piecewise Linear interpolation, Quadratic spline interpolation
Develop MATLAB code for the above methods
11 + 4 Hours
Unit III
Numerical Integration and BVP(ODE)
Newton-Cotes methods (Weddle‟s rule)
Solution of BVP - Finite difference method, shooting method, the cubic spline method
Develop MATLAB code for Trapezoidal, Simpson’s 1/3 & 3/8 rules and for the above methods
11+4 Hours

123
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
Numerical solutions of PDEs
Introduction, Finite difference approximations to derivatives, Solutions of Laplace & Poisson equations
usingJacobi‟s, Gauss-Seidel & SOR methods.Solution of parabolic equation using -Bender-Schmidt & Crank-
Nicolson methods. Solution of hyperbolic equation
Develop MATLAB code for the above methods
11 + 4 Hours

Textbook(s)
1. M. K. Jain, S.R.K. Iyengar, R.K. Jain, Numerical methods for Scientific and Engineering Computation, 4th
edition, New Age International publishers, New Delhi(
2. S.S.Sastry, Introductory methods of numerical analysis, 4th Edition, PHI
3. B. S. Grewal, Higher Engineering Mathematics, 42nd edition, Khanna publishers, New Delhi

Reference(s)
1. S. C. Chapra& R. P. Canale, Numerical Methods for Engineers, 6th Edition, McGraw Hill(2012)
2. Cleve Moler, Numerical Computing with MATLAB, SIAM.

Sample Question (s)


Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test23 (%)
Remember 30 30 -
Understand 45 40 -
Apply 20 25 40
Analyze 5 5 30
Evaluate - - -
Create - - 30
Total (%) 100 100 100

Remember

6. List out different Errors in Numerical calculations


7. List the three numerical methods to solve Algebraic and Transcendental equations
8. Define initial and boundary value problem for Ordinary differential equations
9. List the numerical methods in solving Laplace‟s, partial differential equations i.e. Parabolic and hyperbolic

Understand

5. Summarize the Absolute, relative and percentage Errors


6. Illustrate the procedure for Newton-Raphson method for finding root of an algebraic equation
7. Explain the mechanism involved in LU decomposition method in solving linear systems
8. Explain spline interpolation formula

Apply

1. Given , construct the Taylor series approximations of orders 0 to 7 at and state their
absolute errors.
2. Apply Newton-Raphson method to find a root of the equation .
3. Given the set of data points (1,-8), (2,-1) and (3, 18) satisfying the function , find the linear splines
satisfying the given data. Determine the approximate values of y(2.5) and

23
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills

124
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

4. Apply Gauss-Seidel‟s method to solve Laplace equation for the region given in the figure

Analyze
6. Compare the roots obtained from Secant method, Muller‟s methods and explain which method is preferable
7. Analyze the physical significance of spline‟s interpolation formula
8. Differentiate shooting and cubic splines methods for numerical integration.
9. Analyzethe platform for the application of Laplace Equation

125
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16CY001 Nano Science and Technology(Open Elective)


3103
Course Outcomes
1. Apply various chemical and physical methods for the synthesis of nanomaterials
2. Understand the properties of nano-materials and their applications in relation to bulk materials
3. Describe the nano size effect on optical, electrical, magnetic and thermal properties
4. Characterize nano materials by powder XRD and microscopy techniques.
5. Understand structure, properties and applications of Fullerenes and Carbon nanotubes.
6. Review the applications of nanomaterials, specially semiconducting metal oxides for sensing and catalysis

COs – POs Mapping

COs PO1 PO12

1 3 2
2 3 2
3 3 2
4 3 2
5 3 2
6 3 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Introduction to Nanomaterials
Introduction to nanomaterials and nanotechnology, Nano-sizes and their unique properties: comparison with the
bulk materials, Different shapessizes and morphology of nanomaterials; Defects in nanocrystalline materials, Effect
of grain size on physical properties – magnetic, electrical, optical and thermal properties.
11 + 3 Hours
Unit II
Fabrication of Nanomaterials
Top Down Approaches: Grinding, Planetory milling and comparison of particles; Bottom Up Approach: Wet
Chemical Synthesis - Microemulsion Approach, Colloidal Nanoparticles Production, Sol Gel Methods,
Sonochemical Approach, Microwave and Atomization; Gas phase Production Methods - Chemical Vapour
Depositions; Carbon Nano structures: carbon molecules, carbon clusters, carbon nano tubes- synthesis, formation.
12+4 Hours
Unit III
Characterization of Nanomaterials
Fractionation principles of particle size measurements, Particle size and its distribution, powder X-ray Diffraction,
Zeta potential, Electronic band structure Electron statistics Application: Optical transitions in solids, photonic
crystals, Microscopies: Scanning Electron Microscopy, Transmission Electron Microscopy, Atomic Forced
Microscopy, Scanning and Tunneling Microscopy.
11 + 4 Hours

126
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Unit IV
Applications of Nanomaterials
Self-assembly and molecular manufacturing, Surfactant based system Colloidal system applications, Functional
materials Applications: Single walled and multi walled CNTs, quantum dots, GaN wires, TiO 2 and ZnOnano
crystalline materials, Nanosensors based on optical properties.
11 + 4 Hours
Total:45+15 Hours
Textbook(s)
1. B. S. Murthy, P. Shankar, Baldev Raj, B.B. Rath, Ames Murday,Text book ofNanoscience and
Nanotechnology, published by Springer & Universities Press (India) Pvt. Ltd.
2. Sulabha K. Kulkarni,Nanotechnology: Principles & Practices, Springer
3. Nils O. Petersen, Foundations for Nanoscience and Nanotechnology, CRC Press, 2017.

Reference(s)
1. Stuart M. Lindsay, Introduction to Nanoscience, Oxford University Press, 2009.
2. Robert Kelsall, Ian Hamley, Mark Geoghegan, Nanoscale Science and Technology, John Wiley & Sons,
2005.
3. Gabor L. Hornyak , H.F. Tibbals , JoydeepDutta , John J. Moore Introduction to Nanoscience and
Nanotechnology CRC Press
4. Davies, J.H. „The Physics of Low Dimensional Semiconductors: An Introduction‟, Cambridge University
Press, 1998

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test24(%)
Remember 30 30 -
Understand 40 40 -
Apply 30 30 80
Analyze - - 20
Evaluate -- - -
Create -- - -
Total (%) 100 100 100

Sample Question (s)


Remember
1. Define a nanomaterial. List any four naturally occurring/synthetically prepared nanomaterils used in daily
life.
2. Differentiate between nano materials & bulk materials in terms of physical properties.
3. List two methods of preparing nanomaterials in bottom up approach & top down approach.

Understand
1. Explain the sol-gel method of preparing nano materials. What kind of materials can be prepared by this
method in nanoform.
2. How will the electrical, magnetic & optical properties vary for nanoamterials compared to bulk. Explain
with an example for each.
3. What are the various carbon nano materials available? Describe one methos of producing Carbon nano
tubes.

Apply
24
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

127
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

1. How is SEM used for characterization of nano materials? Describe the principle and working of instrument.
2. Based on the optical properties of Nano TiO2 and ZnO, describe the design & construction of nano sensors.
3. Describe the functions and applications of Carbon nano tubes and gaNnano wires.

Analyze

1. How is the size of nanomaterials characterized? Assess the advantage of using SEM & TEM instead of
powder XRD for size of particle, grain size characterization.
2. For a semiconductor, as the materials is sized down to nano, the electronic band structure is found to vary
from bulk material. Explain the changes in electronic band structure for a direct band gap material.
3. Calculate the changes in surface to volume ratio (S/V ratio) for a particle of 1 micrometer cube divided into
10 nanometer cubes by top down approaches. Comment on its impact in catalysis

128
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT013 Data Analytics I (Contemporary Course)


3103
Course Outcomes
1. Identify R
2. Make use of function R
3. Summarize Data
4. Work on Probability.
5. Interpret NOSQL
6. Solve Engineering Issues and Create Business Models
(COs–POs) Mapping
COs PO3 PO5 PO6
1 2 2 2
2 3 3 3
3 2 3 3
4 2 2 2
5 2 3 2
6 1 2 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Introduction to Analytics and R Programming
Introduction to Big data and Data Analytics, Knowing language R, Using R as calculator, understanding
components of R, Reading database using R, Importing & Exporting CSV, Working on Variables, Outliers and
Missing Data treatment, Combining Data sets in R, Discuss Functions and Loops.
Scripts-Documenting, commenting & sharing code
(12+3) Hours
Unit II
Summarizing Data & Revisiting Probability
Summary Statistics-Summarizing data with R, Probability, Expected Value, Random & Bivariate Random
Variables, Probability Distribution, Normal Distribution, Central Limit Theorem, Random Walk.
Visualizing-3D plotting,
(10+4) Hours
Unit III
SQL using R, Correlation and Regression Analysis
NO SQL, The Benefits of NOSQL, NOSQL Vs SQL Summary, Excel and R integration with R Connector Read
Excel Spreadsheet I R.
Basic Regression Analysis,Regression residuals, Correlation, Heteroscedasticity, Autocorrelation
&Multicollinearity, Introduction to Multiple Regression, Dummy Variables
Time-series Analysis
(13+4) Hours
Unit IV
Understanding Verticals and Requirements Gathering
Understanding the business problem related to engineering, identify the critical issues. Set business objectives,
Requirement gathering: Gather All the Data related to Business Objective.
Understand systems viz engineering design, manufacturing, automotive industries, tech system
(10+4) Hours
Total: (45+15) Hours

129
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Textbook (s)
1. Steven Murray, Learn R, Kindle 1st Edition, 2013.
2. Norman Matloff, The Art of R Programming: A Tour of Statistical Software Design, 1st edition, Kindle
Edition, 2014
3. Mark Gardener, Beginning R-The Statistical Programming Language, 2nd Edition, John Wiley & Sons, Inc.,
2012.
4. NASSCOM Material
Reference (s)
1. Mark Gardener ,Beginning R: The Statistical Programming Language ,1st Edition, John Wily & sons,
2012
2. Emmanuel Paradis , R for Beginners, 1st Edition, kindle 2012
3. https://bigdatauniversity.com/courses/introduction-to-data-analysis-using-r/
4. http://www.r-tutor.com/elementary-statistics

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test25 (%)
Remember 30 20 --
Understand 40 40 --
Apply 30 30 60
Analyze - 10 20
Evaluate - - 10
Create - - 10
Total (%) 100 100 100

Remember
1. What is Ordinary least squares(OLS)?
2. What is Dummy Variables?
3. What are 2 ways of looping in R? Give an Example?
4. How to find summary statistics in R?

Understand
1. Explain about Big data and Data Analytics?
2. Explain Components of R with Example?
3. Explain about NoSQL? What are the types of NoSQL tools based on Data models
4. Which of the following is not a functionality of R- Linear modeling and nonlinear modeling

Apply
1. How do you read excel dataset in R
2. Explain the process of how to connect data with R?
3. Relate between the Rbind and Cbind

25
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

130
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Analyze
1. How to interpret data to make it useful for business?
2. What are various steps involved organizational decision making?
3. How to find summary statistics in R
Evaluate
1. Define Knowing the language R? Justify using R as Calculator with example?
2. Explain about Regression Residuals with example?
4. Define Probability Distribution? Explain various Probability Distribution curves?
Create
1. Design the different Visualization models for Twitter data?
2. Create the various components of descriptive statistics? Explain with suitable example

131
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

16IT016 Enterprise Application Development Using IBM RAD & Bluemix

3103
Course Outcomes
7. Master the fundamentals of website development, such as HTML5, Servlet,JSP with MVC Architecture
8. Use fundamental skills to maintain web server required to host a website
9. Build dynamic, database-driven web applications, such as use of a IBM RAD, to develop robust online
programs
10. Implement core concepts of database connectivity
11. Design websites using appropriate security principles, focusing specifically on the vulnerabilities inherent
in the common web implementation
12. Design, code, publish, deployment of web applications on IBM Bluemix

COs–POs Mapping
COs PO3 PO5 PO6 PO7
1 2 3 1 3
2 2 3 2 1
3 3 2 2 2
4 2 3 1 3
5 2 3 2 2
6 3 3 3 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

UNIT I: Introduction to JAVA EE Web component


Dynamic web project creation, Web component-Introduction to servlet, container- servlet API‟s, Practical on servlet
life cycle, counter program-Service method practical, Servlet Context versus Config- Introduction of JSP,
Tags/implicit Object- Directives and Action Tag, Page Designing with RAD- Development Descriptor, Expression
Language- session Management: Cookie/HttpSession/URL Rewriting

Practicals on JSP tags ,Practicals on implicit objets 13+4 hours

UNIT II: JavaBeans and the Model-View-Controller Pattern


Model-View Controller- Java Server pages with java Beans-JDBC with database, Developing Dynamic Web
Application with logic & signup module with session- JSTL, servlet filter- Servlet Listener, Best Practices on server
side application- JDBC with database, Packing of web application.

Develop web applications with session, changing database configuration


10+3 hours
UNIT III: Introduction to Bluemix& Cloud computing overview
Consumption view- IaaS (Soft layer), PaaS(IBM Bluemix)- Buemix architecture, Overview and DashBoard-
Building an Application from Boilerplate in Bluemix UI- Deploying a Java Web app that uses the PostGreSQL
service with IBM Bluemix Eclipse tools- create a Dynamic web project exporting the war file and deploy from
Cloud Foundry

132
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Development of Apps using Bluemix services- Registering Services in BluemixTM- Deploying a Nod.js
app that uses CloudantNoSQL DB- Demo Binding and Insertion of records- Build a Twitter influencer application
in Bluemix
Setup and installing- Eclipse and CD plugins, Jazz editor to deploy application toBluemix 12+4 hours

UNIT IV: Development of Apps using Blue Mix


Development of Apps using Dev Ops Services on Blue Mix- Overview of Blue Mix DevOps Services- Importing
and deploying the application from DevOps- updating the application- Look for example (DAR)- Demonstrate
Weather Insights for a given location using deployed app on BlueMix
Demonstrate a Watson IOT climate control sample application deployment on Bluemix- Demonstrate
Watson Conversation API Service Integration with NodeJS UI- Deploy the app and showcase user Interaction with
Watson

Bluemix Services in Mobility & Big Data10+4 hours


Total: 45+15 Hours
Textbook (s)
1. IBM Career Education Course Material
Reference (s)
1. www.redbooks.ibm.com/redpapers/pdfs/redp5184.pdf
2. www.redbooks.ibm.com/redpapers/pdfs/redp5242.pdf

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test26 (%)
Remember 30 30 20
Understand 20 20 20
Apply 20 20 35
Analyze 10 30 25
Evaluate - - -
Create - - -
Total (%) 100 100 100
Remember
1. Define Cloud Computing.
2. List Java web development Evolution
3. List JSP scripting elements
4. What is cloud foundry?
Understand
1. Differentiate between servlet context and Servlet config
2. Explain the components present in the URL
3. Explain all session management techniques
4. Explain different cloud service models

26
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

133
Department of Information Technology, GMRIT| Curriculum | Regulation 2016

Apply
1. Demonstrate the process for war file deployment in the cloud.
2. How does bluemixstackupagaist AWS and Azure?

Analyze
1. Justify your answer .Which technique is used for Session management .
2. Deploy a Nod.js app that uses CloudantNoSQL DB

134
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT701 Big Data Analytics


3103
Course Outcomes:
1. Understand the limitations in SQL
2. Identify the concepts and advantages of DDBMS
3. Identify challenges of Big data and its existing technologies
4. Use UNIX and HDFS commands
5. Analyze data using Map-Reduce framework
6. Exemplify concepts of R Programming

COs–POs Mapping
COs PO2 PO5 PO6
1 3 3 1
2 3 3 2
3 3 3 3
4 1 1 1
5 3 2 2
6 3 2 1

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Concepts of DDBMS 13+4 Hours
Data Fragmentation; Replication; and allocation techniques for DDBMS; Methods for designing and implementing
DDBMS, designing a distributed relational database; Architectures for DDBMS: cluster federated, parallel databases
and client server architecture.
Introduction to Big Data
Introduction - Challenges of Conventional Systems, What is Business Analytics, Business Analytics lifecycle, Why
Big Data Analytics, Defining Big data, Characteristics of Big Data(V‟s), Business Analytics phases: Data
Acquisition- Data Cleaning - Data Manipulation - Data Analysis (Statistical and Analytical methods) to make sense
of data - Data Visualization

Query processing problem; Objectives of Query Processing

Unit II
Introduction to NoSQL 12+4 Hours
Overview, and History of NoSQL Databases Definition of the Four Types of NoSQL Database, The Value of
Relational Databases, Getting at Persistent Data, Concurrency, Integration, Impedance Mismatch, Application and
Integration Databases, Attack of the Clusters, The Emergence of NoSQL, Key Points,Comparison of relational
databases to new NoSQL stores, MongoDB, Cassandra, HBASE, Neo4j use and deployment, Challenges NoSQL
approach, Key-Value and Document Data Models, Column-Family Stores, Aggregate-Oriented Databases

Replication and sharding, MapReduce on databases

135
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Unit III
Introduction to HADOOP 10+4 Hours
Introduction to HADOOP - Hadoop ecosystem components and uses, Hadoop Storage: HDFS, Concept of Hadoop
Distributed file system, Design of HDFS, Configuration of HDFS.
HADOOP MapReduce
Hadoop Data Types, Functional-Concept of Mappers, Functional-Concept of Reducers, MapReduce Execution
Framework, Partitioners and Combiners, Hadoop Clusters component : NameNode, Secondary NameNode, and
DataNode, Data flow (Anatomy of File Write and Read);

Challenges for processing big data, RDBMS vs HADOOP,Accessing HDFS - CLI (Command Line Interface)

Unit IV
Statistics with R Programming 10+3 Hours
Introduction, How to run R, R Sessions and Functions, Basic Math, Variables, Data Types, Vectors, Conclusion,
Advanced Data Structures, Data Frames, Lists, Matrices, Arrays, Classes.R Programming Structures, Control
Statements, Loops, - Looping Over Nonvector Sets,- If-Else, Arithmetic and Boolean Operators and values, Default
Values for Argument, Return Values, Deciding Whether to explicitly call return- Returning Complex Objects,
Functions are Objective, No Pointers in R, Recursion, A Quicksort Implementation-Extended Extended Example: A
Binary Search Tree.

Math sums, cumulative sums and products

Total: 45+15 Hours


Textbook (s)

1. Distributed Databases:Principles and Systems Paperback – 1 Jul 2017 by Stefano Ceri Giuseppe
Pelagatti , McGraw Hill Education, ISBN-10: 0070265119, ISBN-13: 978-0070265110, 2017.
2. Tom White “ Hadoop: The Definitive Guide” FourthEdition, O‟ reilly Media, 2015
3. Prajapati, V. Big data analytics with R and Hadoop. Packt Publishing Ltd, 2013

Reference (s)
1. M. Tamer Ozsu and Patrick Valduriez, “Principles of Distributed Database Systems”, Springer Science +
Business Media , 3rd Edition, 2011.
2. Zikopoulos, P., Parasuraman, K., Deutsch, T., Giles, J., & Corrigan, D.v Harness the Powerof Big Data The
IBM Big Data Platform. McGraw Hill Professional, 2012
3. The Art of R Programming, Norman Matloff, Cengage Learning, 1st Edition, 2011

136
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test1 (%)
Remember 60 10 --
Understand 40 50 --
Apply -- 40 70
Analyze -- -- 30
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. List out data sources
2. Name the basic advantages of data analysis
3. Define Big data
4. Define Big Data Analytics
5. What is parallel processing?
6. Name two basic operations of parallel processing

Understand
1. Explain the role of map-reduce in BDA
2. Demonstrate with neat diagram BDA
3. Explain architecture of HADOOP
4. What is the role of OOZIE.
5. Explain the advantages of NoSQL
6. How to provide security to Big data
Apply
1. Explain the steps to store the data in HDFS
2. Build the schema in Hive.
3. Write the steps to analyze the log files in Big data

Analyze
1. List out any 3 differences between structured and un-structured data
2. Analyze the difference between data analysis and reporting
Evaluate
1. Evaluate the performance of HDFS and HADOOP in a simple cluster

Create
1. Construct the unstructured table using Big data analytic tools
2. Modify the table in NoSQL Database

1
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to the course.

137
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS705 Mobile Application Development Lab


0032

Course Outcomes
1. Apply mobile application models/architectures and patterns to the development of a mobile
software application.
2. Demonstrate the components and structure of a mobile development framework (Google‟s
Android Studio).
3. Apply essential Android Programming concepts.
4. Develop various Android applications related to layouts & rich uses interactive interfaces
5. Develop Android applications related to mobile related server-less database like SQLITE
6. Apply a mobile development framework to the development of a mobile application.

COs–POs Mapping
COs PO2 PO4 PO5 PO9
1 2 3 3 2
2 3 2 2 3
3 3 3 3 2
4 2 3 3 1
5 3 1 2 3
6 2 2 1 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Pre requisite Topics


Install VS2013 and Windows Mobile SDK,SDK Resources & R.java Assets, J2ME.
Using Emulator-Android Virtual Device Launching emulator Editing emulator settings
Develop an app for communication between Intents ,Form widgets Text Fields Layouts.
Using Menu OptionContext menu Sub menu menu from xml menu via code Examples, SQLite
Programming SQLiteDatabse

List of Experiments

1. Develop an application that uses GUI components, Font and Colors forWindows Mobile devices.
2. Write an android program to print the set of alphabets/strings in a linear layout and in table
layout.
3. Write an android program to demonstrate DatePickerDialog, TimePickerDialog with current date
and current running time and perform the tasks to demonstrate a Menu with name File with New
and Open as menu items.
4. Write an android program to switch from one activity to another using Intent. When the activity is
changed disable the use of back button to avoid going to previous activity Views
5. Write an android program to demonstrate scroll view and list view. (List view should array
adapter. The adapter should use array list of companies.Each item in the list view should have
company name, company address and its annual revenue.)
6. Write an android program to implement the following operations using SQLite Database.
Create the SQLite Database Object.
Execute the CRUD Operations required for the application
Close the database.

138
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

7. Write a sample program to show how to make a SOCKET Connection from j2me phone.
This J2ME sample program shows how to how to make a SOCKETConnection from a J2ME
Phone.
8. Develop Win Application on Number of Super specialty hospitals in a city. SQLite Database
9. Implement Window applicationDivide students into batches and suggest them to develop
any interested project such as.
a. Student Mark Entry System
b. Attendance System
10. Creating an application that correctly deals with display orientation modeslike Docking and
anchoring controls for Windows Mobile devices.(Use Visual Basic .NET or Visual C# /
Visual Studio 2013)
11. Implement an Window application that creates an alert upon receiving a message.
12. Develop a native Winapplication that uses GPS location information.

Reading Material(s)
1. Mobile Application Development Lab manual–Department of CSE-GMRIT, Rajam

139
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT705 Big Data Analytics Lab


0032
Course Outcomes
1. Demonstrate the HDFS commands
2. Implement HADOOP with Map-Reduce
3. Use Apache Pig for analytics framework
4. Demonstrate HIVE QL
5. Compute the Page-Rank using Pig
6. Implement Map-Reduce programs for data analysis
COs–POs Mapping
COs PO4 PO5 PO9
1 3 3 2
2 3 3 2
3 1 2 2
4 3 3 2
5 2 3 2
6 2 3 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

List of Experiments
1. Set up a pseudo-distributed, single-node Hadoop cluster backed by the Hadoop DistributedFile System,
running on Ubuntu Linux. After successful installation on one node,configuration of a multi-node Hadoop
cluster(one master and multiple slaves).Hadoop file management: Adding files and directories ,Retrieving
files , Deleting files
2. Move files between your regular Linux file-system and HDFS you can use the put and get commands.
3. Run the word-count job with the command below, where “/user/biadmin/input/” is where the input files are,
and “output” is the directory where the output of the job will be stored.
4. Write a script to implement the following:
o Exploring Data with Apache Pig
o Splitting a Dataset
o Joining Datasets with Apache Pig
5. Write a script to implement the following on the given dataset:
o Sorting
o Grouping the Data with Apache Pig
6. Write a script to Demonstration: Computing Page Rank using Pig
7. Database manipulation using Hive: To create, alter, drop databases and views
8. Define an external Hive table and review the results, Implement Partition and Skew in Hive
9. Functions and indexes in Hive, Use Hive to Drop Functions and indexes
10. Produce the histogram by summing the word counts grouped by word length.

Reading Material(s)
1. Data Science and Big Data Analytics, EMC2 Education Dept. of CSE VR14 VRSEC 162 Services
2. Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques, 2 ed, Elseiver publishers
3. VigneshPrajapati, Big Data Analytics with R and Hadoop, packt publishing, 2013
4. Bill Franks, Taming The Big Data Tidal Wave, 1st Edition, Wiley, 2012. [3] Frank J. Ohlhorst, Big Data
Analytics,1st Edition, Wiley, 2012.

140
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT006 Human Computer Interaction (Elective IV)


3103
Course Outcomes
1. Demonstrate the capabilities of both humans and computers from the viewpoint of human information
processing.
2. Interpret typical human–computer interaction (HCI) models, styles, and various historic HCI paradigms.
3. Apply an interactive design process and universal design principles to designing HCI systems
4. Make use of HCI design principles, standards and guidelines.
5. Analyze and identify user models, user support, socio-organizational issues, and stakeholder requirements
of HCI systems
6. Analyze and discuss HCI issues in groupware, ubiquitous computing, virtual reality, multimedia, and Word
Wide Web-related environments.
COs–POs Mapping
COs PO5 PO7
1 1 3
2 1 3
3 3 1
4 1 2
5 2 3
6 1 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Introduction
Importance of user Interface-definition, importance of good design, Benefits of good design, A brief history of
Screen design, The graphical user interface-popularity of graphics, the concept of direct manipulation, graphical
system, Characteristics, Web user-Interface popularity, characteristics-Principles of user interface.
Design methodologies-participatory design-Usability and tests-Acceptability tests.
10+5 Hours
Unit II
Design process
Human interaction with computers, importance of human characteristics human consideration, Human interaction
speeds, understanding business junctions, Screen Designing:-Design goals-Screen planning and purpose, organizing
screen elements, ordering of screen data and content-screen navigation and flow-Visually pleasing composition-
amount of information-focus and emphasis-presentation information simply and meaningfully-information retrieval
on web-statistical graphics-Technological consideration in interface design.
Design Visual thinking-virtual-environments-item presentation sequence-layout-form fill-in dialog boxes
10+3 Hours
Unit III
Windows
New and Navigation schemes selection of window, selection of devices based and screen based controls,
Components-text and messages, Icons and increases-Multimedia, uses problems, choosing colors.
Goals of Co-operation-asynchronous interactions-synchronous distributed-application to education-social uses
12+4 Hours
Unit IV
Software tools &Interaction Devices
Specification methods, interface-Building Tools, Keyboard and function keys, pointing devices-speech recognition
digitization and generation-image and video displays-drivers.
Database query and phase search in documents, multimedia document searches, information visualization
13+3 Hours

141
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Total:45+15 Hours
Textbook (s)
1. Wilbert O Galitz, Wiley Dream Tech, The essential guide to user interface design,2ndEdition,Wiley
Computer Publishing, 2002
2. Ben Shneidermann, Designing the user interface, 3rd Edition, Pearson Education Asia, 2008

Reference (s)
1. Alan Dix, Janet Fincay, GreGoryd, Abowd, Russell Bealg, Human Computer Interaction.,3rd Edition,
Pearson Education, 2004

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test2 (%)
Remember 40 30 --
Understand 40 40 --
Apply 20 30 80
Analyze -- -- 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. Define Human Computer Interaction.
2. What is the basic goal of Human Computer Interaction?
3. State the long term goal of HCI
4. List the factors HCI designers must consider for User Interface Design
Understand
1. Demonstrate the HCI importance.
2. Extend the Trouble faced by human with Computers.
3. Illustrate Psychological Responses to Poor Design
4. InterpretHuman-factor variables used in Comparison of pointing devices.
Apply

1. Identify the amount of Information need to Present in a page.


2. Organize the different Software tool specification methods.
3. Model out the six types interaction tasks properties of Pointing devices
Analyze
1. Distinguish the Focus and Emphasis of visual elements in web page design.
2. Categorize the Formatting of Menus.
3. Analyze organizational structure of Keyboard layouts

2
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.

142
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT007 Middleware Technologies


3103
Course Outcomes
At the end of the course students are able to:
1. Choose appropriate client server computing model for given problem.
2. Interpret dynamic remote application with RMI and JDBC Connectivity.
3. Understand client server applications using C#.net
4. Select appropriate language for homogeneous and heterogeneous objects.
5. Apply the concept of CORBA and database interfacing in real time projects.
6. Analyze appropriate middleware technology to develop real time applications

COs–POs) Mapping
COs PO5 PO11 PSO1 PSO2
1 3 1 2 2
2 2 3 3 1
3 3 2 2 3
4 2 3 2 1
5 3 1 1 3
6 2 3 2 1

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

UNIT – I
Introduction
General Middleware, Service Specific Middleware, Client/Server Building blocks – RPC - Messaging – Peer – to –
Peer, Java RMI - Computing standards – OMG - Overview of CORBA - Overview of COM/DCOM - Overview of
EJB - Middleware types - Middleware in distributed Applications

Benefits & pitfalls of client server computing.


11+4 hours
UNIT – II
EJB and CORBA
EJB architecture - Overview of EJB software architecture, EJB Conversation, Building and Deploying EJBs, Roles,
applications - EJB Session Beans, EJB entity beans – Lifecycle of Beans - EJB clients - developing an application -
Deployment. CORBA – components - architectural features - method invocations - static and dynamic: IDL -
CORBA‟s self-describing data - interface repository - Building an application using CORBA - Overview of
CORBA Services - Object location Services, Messaging Services - CORBA Component Model.
Dynamic CORBA- Multi count 12+3 hours

UNIT-III
COM and .NET
Evolution of DCOM - Introduction to COM - COM clients and servers - COM IDL - COM Interfaces COM
Threading Models – Marshalling - Custom and standard marshalling - Comparison COM and CORBA -
Introduction to .NET - Overview of .NET architecture

DOT NET Remoting layer 11+4 hours

143
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

UNIT-IV

SOA and Web Services


Defining SOA - Business value of SOA - SOA characteristics - Concept of a service, Basic SOA - Enterprise
Service Bus (ESB) - SOA enterprise Software Models -Services and SOA – WSDL - SOAP, UDDI, WS Standards -
Web Services and Service Oriented Enterprise (SOE) - Coordination and Transaction.

Business Process Execution Language for Web Services. 11+4 hours


Total: 45+15 hours

Text Book (s):


1. G. Sudha Sadasivam and Radha Shankarmani, Middleware and Enterprise Integration Technologies,1st
edition, Wiley, 2009.
2. Gustavo Alonso, Fabio Casati, Harumi Kuno, Vijay Machiraju, Web Services: Concepts, Architectures and
Applications, Springer, 2010.
3. Ian Gorton, Essential Software Architecture, 2nd Edition Springer, 2011.
Reference Book (s):
1. The Complete Book of Middleware,1st Edition, Judith M. Myerson, Auerbach Publications,
2007.
2. Mobile Middleware: Supporting Applications and Services” 1st Edition, Sasu Tarkoma, Wiley
2009.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test3 (%)
Remember 40 30 --
Understand 40 40 --
Apply 20 30 80
Analyze -- -- 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
5. Represent the Characteristics of Client/Server Architecture
6. State 3 methods of Dynamic CORBA
7. List four uses of Middleware
8. Write the role of RMI
Understand
5. Demonstrate the pitfalls for Client/Server Computing
6. Illustrate Late Binding with system.reflection and Activator class
7. Justify the reasons for employing distributed computing in business

3
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.

144
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Apply

4. Show the portable count and dynamic count of Dynamic CORBA


5. Formulate the Object –Oriented Programming with C#.
6. Draw OMG reference model architecture of CORBA
Analyze
4. Indicate the different services provided by CORBA.
5. Categorize the COM and CORBA software development study
6. Analyze the steps involved in a EJB conversations

145
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS008 Software Project Management (Elective IV)


3103
Course Outcomes:

1. Understand the concepts and issues of Software Project Management.


2. Explain various Software Architectures.
3. Analyze Software Risks and Risk Management Strategies.
4. Design effective software development model to meet organizational needs.
5. Apply appropriate methodologies to develop a project schedule.
6. Apply appropriate techniques to assess ongoing project performance.

COs–POs Mapping
COs PO3 PO5 PO6
1 1 3 1
2 1 3 1
3 3 2 2
4 1 2 3
5 2 3 1
6 1 2 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

UNIT I
The principles of conventional software Engineering, Principles of Modern software management, transitioning to
an iterative process.Conventional Software Management: The Waterfall Model, Conventional Software
Management Performance, Software Economics, Software Cost Estimation.Improving Software Economics:
Reducing Software Product Size, Improving Software Processes, Improving Team Effectiveness, Improving
Automation, Achieving Required Quality, Peer Inspections.
Software Development Phases, Procedural vs Object Oriented Paradigm.
12+4 Hours
UNIT II
Life Cycle Phases: Engineering and Production Stages, Inception, Elaboration, Construction, Transition Phases.
Artifacts of Software Process: The Artifact Sets, Types of Artifacts.;Software Architectures: A Management
Perspective and Technical Perspective, Software Process Workflows, Iteration Workflows.
Off-the-Shelf Components, Requirement Specification Document, Methods of Specification.
10+3 Hours
UNITIII
Checkpoints of the Process: Major Milestones, Minor Milestones, Periodic Status Assessments. Iterative Process
Planning: Work breakdown Structures, Planning Guidelines, Cost Estimation and Scheduling Iteration Planning
Process, Pragmatic Planning.; Project Organizations and Responsibilities: Line-of-Business Organizations,
Project Organizations, Evolution of Organizations.; Process Automation: Automation Building Blocks, The Project
Environment.
CASE Tools for Requirements Specification, Planning and Estimation.
10+3 Hours
UNIT IV
The Seven Core Metrics, Management Indicators, Quality Indicators, Life Cycle Expectations, Pragmatic Software
Metrics, Metrics Automation, Tailoring the Process- Process Discriminant.; Future Software Project
Management: Modern Project Profiles, Next Generation Software Economics, Modern Process Transitions.
Types of Software Testing, Software Testing Methodologies.
10+3 Hours
Total: 45+15 Hours

146
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. Walker Royce, Software Project Management, Pearson Education, 2005.
Reference (s)
1. Bob Hughes, Mike Cotterell and Rajib Mal, Software Project Management, Tata McGraw- Hill Edition.
2. Joel Henry, Software Project Management, Pearson Education.
3. Pankaj Jalote, Software Project Management in practice, PearsonEducation.2005.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test4 (%)
Remember 40 30 --
Understand 40 40 --
Apply 20 30 80
Analyze -- -- 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. Define Software Process
2. List the phases of Software Development.
3. What is an Artifact?
4. What is Process Automation?
Understand
1. Explain various formal methods of specification.
2. Explain COCOMO II Model.
3. Explain Critical Path Methods to schedule a software project.

Apply

1. Identify the amount of Information need to present in a page.


2. Organize the different Software tool specification methods.
3. Assume that the size of an organic type software product has been estimated to be 32,000 lines of source
code. Assume that the average salary of software engineers be Rest. 15,000/- per month. Determine the
effort required to develop the software product and the nominal development time.
Analyze
1. Distinguish between Classical and Object Oriented Software methodologies
2. Compare among various CMMI levels with real time examples.
3. Analyze PERT with suitable example
4. Outline the merits and demerits for scrum and XP.

4
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

147
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS003 Qualitative Data Analysis (Elective IV)

3103
Course Outcomes
1.Describe various styles of interpretation of qualitative data
2. Explain the relative appropriateness of different analysis approaches for a particular qualitative study
3. Apply one or more analytic approaches to data they have collected and write an analysis paper
4. Describe special issues in ethics for qualitative research
5. Develop qualitative data files effectively to ensure ease of use and participant confidentiality
6. Illustrate the basic and intermediate functions of software program for coding of textual data

COs–POs Mapping
COs PO3 PO5
1 3 2
2 2 3
3 1 3
4 3 2
5 2 1
6 1 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Concepts-Contexts-Basics
Qualitative Data Analysis - Ethnographic Fieldwork - Sampling Strategies - Transcription of Data Analysis -
Collaborative Analysis of Qualitative Data - Qualitative Comparative Practices: Dimensions - Cases and Strategies.
Sampling-types of sampling for data (using simple tools)
11+3 Hours
Unit II
Reflexivity and the Practice of Qualitative Research & Analytic Strategies
Induction - Deduction & Abduction - Interpretation and Analysis - Grounded Theory and Theoretical Coding -
Qualitative Content Analysis - Phenomenology - Narrative Analysis - Documentary Method - Hermeneutics and
Objective Hermeneutics - Cultural Studies - Net no graphic Analysis - Using Software in Qualitative Analysis.
Study of different Software Tools for Qualitative Analysis
11+3 Hours
Unit III
Types of Data and their Analysis
Analyzing -Interviews - Focus Groups - Observations - Documents - News Media - Films - Images - Sounds -
Virtual Data - Video Analysis and Videography - Conversations and Conversation Analysis - Discourses and
Discourse Analysis
Data Management Techniques
12+4 Hours
Unit IV
Using and Assessing Qualitative Data Analysis
Re-analysis of Qualitative Data - Qualitative Meta-analysis - Quality of Data Analysis - Ethical Use of Qualitative
Data and Findings - Generalization in and from Qualitative Analysis - Theorization from Data - Writing and/as
Analysis - Implementation.
Report writing for a sample data from the field work
12+5 Hours
Total: 45+15

148
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. Editor: Uwe Flick, The SAGE Handbook of Qualitative Data Analysis, 3rd Edition, SAGE Publications India
Pvt. Ltd., New Delhi, 2013.
2. Robert K. Yin, Qualitative Research from Start to Finish, 2nd Edition, The Guilford Press, London, 2010.

Reference (s)
1. Louise B. Silverstein, Carl F. Auerbach, Qualitative Data: An Introduction to Coding and Analysis, New
York University Press, New York, 2003.
2. Bernard, H.R.& Ryan, G. W. Thousand Oaks, CA: Analyzing Qualitative Data: Systematic Approaches, 2nd
Edition, SAGE Publications, 2017.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Comprehensive Test5 (%)
Remember 35 15 --
Understand 30 25 --
Apply 20 30 60
Analyze 15 20 30
Evaluate -- 10 10
Create -- -- --
Total (%) 100 100 100
Remember
1. Define Qualitative data
2. Define Collaborative Analysis
3. List any four types of data for analysis
4. Define virtual data
Understand
1. Explain the various Sampling Techniques
2. Explain the Cases and Strategies for Qualitative Data Dimensions
3. Interpret Qualitative Content Analysis
Apply
1. Plan an interview process to collect data
2. Identify the Ethical use of Qualitative Data
3. Select the proper Observation method of Qualitative research
Analyze
1. Differentiate Deduction & Abduction
2. Differentiate Interpretation and Analysis
3. Criticize over the data quality is so important in software development environment
4. Comment on the Ethical Use of Qualitative Data
Evaluate
1. Judge the need of Cultural Studies in Qualitative data analysis
2. Select the factors to be considered for Re-analysis of Qualitative Data
3. Evaluate a suitable technique of grounded theory

5
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.

149
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16EC005 DIGITAL IMAGE PROCESSING (Elective V)

3103
Course Outcomes

1. Interpret fundamental concepts of digital image processing


2. Infer image transforms
3. Exemplify image enhancement and color image processing
4. Assess image restoration techniques
5. Summarize line, point, threshold and region based segmentation for digital images
6. Attribute various compression models and compression techniques for digital images
COs – POs Mapping
COs PO1 PO2 PO3

1 2 1

2 2 1

3 2 1

4 3 2 1

5 2 1 1

6 3 2 1

3–Strongly linked | 2–Moderately linked| 1–Weakly linked

Unit I
Digital Image Fundamentals
Fundamental steps in Digital image processing,Components of an Image processing system, Elements of visual
perception, Image sampling and quantization, basic relationships between pixels, An introduction to mathematical
tools in digital image processing.
Image transforms: 2D DFT and its properties, Discrete cosine transform, Discrete Wavelet Transform.
Walsh Transform, Hadamard Transform
13+4 Hours

Unit II
Image Enhancement and Color Image Processing
Enhancement in spatial domain: Intensity transformations, Histogram Processing, smoothing and sharpening, Image
Enhancement in Frequency Domain: Smoothing and Sharpening Filters
Color fundamentals, Color models, Pseudo color Image Processing, Full Color Image Processing, color
transformations.
Color Image Enhancement in spatial and frequency domain
13+4 Hours

Unit III
Image Restoration
Image Degradation/Restoration model, Noise models, Restoration using spatial filtering, Periodic noise reduction by
frequency domain filtering, Linear Position-Invariant Degradations, Inverse filtering, Minimum Mean Square Error
Filtering, Constrained Least squares filtering.

150
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Estimating the degradation function, Geometric Mean filter


9+3 Hours

Unit IV
Image Segmentation and Compression
Image segmentation: Fundamentals, point, Line and Edge detection, Thresholding, Region based Segmentation,
Image Compression: Fundamentals, Image Compression Models, Lossless Compression, Lossy Compression,
Transform coding and JPEG compression standard.
Watershed algorithm 10+4 Hours
Total: 45+15 Hours

Textbook (s)

1. Rafel C.Gonzalez and Richard E.Woods, Digital Image Processing, Pearson Education,3rdEdition 2011
2. S.Sridhar, Digital Image Processing, Oxford publishers, 2nd Edition, 2016

Reference (s)

1. Anil K. Jain, Fundamentals of Digital Image Processing, Pearson Education, 1 st Edition, 2015
2. S.Jayaraman, S.Esakirajan, T.Veerakaumar, Digital Image Processing, McGraw Hill publishers, 2011
3. M.Sonka,V. Hlavac, R. Boyle, Image Processing, Analysis and Machine Vision, Vikas Publishing House,
2001

SAMPLE QUESTION (S)

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test6 (%)
Remember 25 20 --
Understand 30 25 --
Apply 25 30 40
Analysis 20 25 60
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

REMEMBER

1. List the 6 components of digital image processing system


2. Define image enhancement
3. Define image segmentation
4. State the lossy compression
5. List out the 3 color models

6
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

151
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

UNDERSTAND

1. Interpret the process of image sampling and quantization


2. Summarize the fundamental steps in digital image processing
3. Represent RGB color model
4. Explain the properties of 2D Discrete Fourier Transform
5. Illustrate contrast stretching transformation function to increase the dynamic range of the gray levels in the
image

APPLY

1. Consider the image segment shown below. Compute N4, N8 distances

3 1 2 1 (q)

2 2 0 2

1 2 1 1

(p) 1 0 1 2

2. Compute histogram equalization for a given 8x8 image

3. Compute the efficiency of Huffman Coding for the given symbols


Symbol a1 a2 a3 a4 a5 a6

Probability 0.1 0.4 0.06 0.1 0.04 0.3

4. Implement segmentation on given image using bimodal thresholding

5. Show that a linear, spatially –invariant degradation system with additive noise can be modeled in the spatial
domain as the convolution of the degradation function with an image followed by addition of noise

ANALYSE

1. Differentiate between image enhancement and restoration in terms of processing and applications
2. Compare lossy and lossless compression methods in terms of entropy, applications and transforms used
3. Is image enhancement a subjective approach? Justify your answer
4. Is lossless compression preferred to lossy compression? Justify your answer
5. Differentiate region based segmentation and thresholding based segmentation in terms of approach and
applications

152
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT008 Application Security (Elective V)


3103
Course Outcomes
1. Demonstrate external and internal threats to an organization
2. Make use of information security awareness and a clear understanding of its importance
3. Infer fundamentals of secret and public cryptography
4. Develop the network security designs using available secure solutions (such as PGP, SSL, IPSec, etc)
5. Experiment with advanced security issues and technologies (such as DDoS attack detection and
containment, and anonymous communications,)
6. Perceive importance of integrating people, processes and technology.
COs–POs) Mapping
COs PO5 PO6 PO8
1 3 1 2
2 2 3 1
3 3 2 3
4 2 3 1
5 3 1 3
6 2 3 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit-I
Computer Security Concepts
Introduction to Information Security, Introduction to Data and Network Security, Integrity, and Availability, NIST
FIPS 199 Standard, Assets and Threat Models,Examples, Control Hijacking– Attacks and defenses, Buffer overflow
and control hijacking attacks,Exploitation techniques and fuzzing-Finding vulnerabilities and exploits
Dealing with Legacy code-Dealing with bad (legacy) application code: Sandboxing and Isolation.
11+4 Hours
Unit II
Web Application Security
Least privilege, access control, operating system security-The principle of least privilege, Access control concepts,
Operating system mechanisms, Unix, Windows, Qmail, Chromium, and Android examples. Basic web security
model-Browser content, Document object model (DOM), Same-origin policy. SQL injection, Cross-site request
forgery, Cross-site scripting, Attacks and Defenses, Generating and storing session tokens, Authenticating users
The SSL protocol-The lock icon-User interface attacks-Pretty Good Privacy.
11+4 Hours
Unit III
Network Defenses
Network defense tools, Secure protocols, Firewalls, VPNs, Tor, I2P, Intrusion Detection and filters, Host-Based IDS
vs Network-Based IDS, Dealing with unwanted traffic: Denial of service attacks.Malicious Software and Software
Security-Malicious Web, Internet Security Issues, Types of Internet Security Issues, Computer viruses, Spyware,
Key-Loggers, Secure Coding, Electronic and Information Warfare.
11+4 Hours
Unit IV
Mobile Platform Security Models
Android, iOSMobile platform security models, Detecting Android malware in Android markets.Security Risk
Management-How Much Security Do You Really Need, Risk Management, Information Security Risk Assessment:

153
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Introduction, Information Security Risk Assessment: Case Studies, Risk Assessment in Practice.The Trusted
Computing Architecture-Introduction to Trusted Computing,
TPM Provisioning, Exact Mechanics of TPM. 11+4 Hours
Total: 45+15 Hours

Textbook (s)
1. William Stallings, Network Security Essentials: Applications and Standards, 4th edition, Prentice Hall,
2010.
2. Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security, Addison Wesley, 2011.

Reference (s)
1. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Handbook of Applied Cryptography, CRC
Press, 2001.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test7 (%)
Remember 30 30 --
Understand 20 20 --
Apply 20 20 75
Analyze 10 30 25
Evaluate - - -
Create - - -
Total (%) 100 100 100

Remember
1.
Distinguish between message integrity and message authentication.
2.
Write the authentication dialogue exchanged between a user and authentication
server in Kerberos V4?
Understand
1. Determine the security services required to counter various types of Active and
Passive attacks. What are the common C functions that give raise to buffer overflow?
2. Describe the round function of CAST block Cipher. Explain the encryption algorithm of CAST.

Apply
1. What are the requirements of hash functions?
2. What is the need for security services at transport layer of Internet Protocol?
3. Explain the four protocols defined by Secure Socket Layer.

Analyze
1. What are the main features of Kerberos Version 5?
2. Write briefly about the signature based Intrusion Detection Systems.

7
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

154
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT802 Cryptography and Network Security (Elective (Elective V)


3103
Course Outcomes
1. Understand theory of fundamental cryptography, encryption and decryption algorithms
2. Understand the symmetric and public key cryptographic algorithms
3. Explain the various authentication applications
4. Comprehend different mechanisms related to network security
5. Interpret the functionalities of IP Security
6. Describe the functionalities of firewalls

COs–POs) Mapping
COs PO5 PO6 PO8
1 2 2 3
2 2 2 3
3 2 1 3
4 2 1 2
5 2 2 3
6 2 2 2
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

UNIT I
Introduction: Security Attacks, Security Goals, Computer criminals, Methods of Defence, Security Services,
Security Mechanisms. Basics of Cryptography:Symmetric Cipher Model, Substitution Techniques,
Transportation, Techniques, Other Cipher Properties- Confusion, Diffusion, Block and Stream Ciphers. Block
Cipher Design Principles and Modes of Operations, Symmetric Key Cryptosystems: Principles of Private Key
System, Data Encryption Standard (DES), Strength of DES, Triple DES, International Data Encryption algorithm,
Advanced Encryption Standard (AES),
Blowfish, CAST-128. 11 + 4 Hours

UNIT II

Public Key Ciphers: Principles of Public Key Cryptosystems, RSA Algorithm, Diffie-Hellman Key Exchange.
Cryptographic Hash Functions: Principles of Cryptographic Hash functions, Applications of Cryptographic Hash
Functions, Secure Hash Algorithm (SHA), Message Authentication Codes – Message Authentication Requirements
and Functions, HMAC, Digital Signatures, Digital Signature Schemes, Authentication Protocols,

Digital Signature Standards. 11 + 4 Hours

UNIT III

Authentication Applications: Kerberos, Key Management and Distribution, X.509 Directory Authentication service,
Public Key Infrastructure, Electronic Mail Security: Pretty Good Privacy, S/MIME. IP Security: Overview,
Architecture, Authentication Header, Encapsulating Security Payload, Combining security Associations, Internet
Key Exchange, Web Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security,
Electronic Payment. 11 + 4 Hours

155
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

UNIT IV

IDS and Firewalls: Intruders, Intrusion Detection, Password Management, Firewalls-Characteristics, Types of
Firewalls, Placement of Firewalls, Firewall Configuration, Trusted Systems. Non-cryptographic protocol
Vulnerabilities: DoS, DDoS, Session Hijacking and Spoofing, Software Vulnerabilities- Phishing, Buffer
Overflow,
Format String Attacks, SQL Injection. 11 + 4 Hours
Text Books:
1. William Stallings, “Cryptography And Network Security – Principles and Practices”,
Prentice Hall of India, Third Edition, 2003.
2. AtulKahate, "Cryptography and Network Security", Tata McGraw-Hill, 2003.

3. M. Y. Rhee, Cryptography and Secure communication, McGraw-Hill


Reference (s) :

1. William Stallings, “Cryptography and Network Security: Principles and Practices”, Third
Edition, Pearson Education, 2006.
2. Matt Bishop ,“Computer Security art and science ”, Second Edition, Pearson Education,
2002
3. Wade Trappe and Lawrence C. Washington, “Introduction to Cryptography with Coding
Theory” Second Edition, Pearson Education, 2007
4. Jonathan Katz, and Yehuda Lindell, Introduction to Modern Cryptography, CRC Press,
2007
5. Douglas R. Stinson, “Cryptography Theory and Practice”, Third Edition, Chapman &
Hall/CRC, 2006
6. Wenbo Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, First
Edition, 2006.
7. Network Security and Cryptography, Menezes Bernard, Cengage Learning, New Delhi,
2011

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test8 (%)
Remember 30 30 --
Understand 20 20 --
Apply 20 20 75
Analyze 10 30 25
Evaluate - - -
Create - - -
Total (%) 100 100 100

8
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

156
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Remember
1. Use Caesar cipher with key =15 to encrypt the message “Hello”.
2. What is differential cryptanalysis?
3. Solve the congruence x 2 7 mod 13.
4. Distinguish between message integrity and message authentication.
5. Write the authentication dialogue exchanged between a user and authentication
server in Kerberos V4?
Understand
1. What are the tools available for session hijacking? Explain briefly how they work.
2. Determine the security services required to counter various types of Active and
Passive attacks. What are the common C functions that give raise to buffer overflow?
3. Describe the round function of CAST block Cipher. Explain the encryption algorithm of CAST.
4. Explain the Key Scheduling of CAST. How many S-boxes are used by CAST

Apply
1. Explain the compression of Secure Hash Algorithm.
2. What are the requirements of hash functions?
3. What is the need for security services at transport layer of Internet Protocol?
4. Explain the four protocols defined by Secure Socket Layer.

Analyze
1. What are the main features of Kerberos Version 5?
2. Write briefly about the signature based Intrusion Detection Systems.
3. What is Transport mode and Tunnel mode? Explain about the scope of AH and ESP in these modes .

157
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS009 Social Network Analysis (Elective V)


3103
Course Outcomes
1. Acquire Knowledge to analyze Social Networks
2. Model, Aggregate and Represent Knowledge for Semantic Web
3. Use Extraction and Mining tools for Social Networks
4. Apply Reality Mining to Predict Human Behaviour for Social Communities
5. Apply various Algorithms for Evolution and Opinion Mining in Social Networks
6. Write algorithms and systems for expert location in social networks

COs–POs) Mapping
COs PO2 PO4 PO5 PO12
1 2 2 3 2
2 2 2 3 2
3 2 1 3 3
4 2 1 2 2
5 2 2 3 2
6 2 2 2 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Introduction

Introduction to Web, Limitations of current Web, Development of Semantic Web, Emergence of the Social Web,
Statistical Properties of Social Networks, Network analysis, Development of Social Network Analysis-Key concepts
and measures in network analysis, Discussion networks-Blogs and online communities-Web-based networks

Case Studies of Social Network sites like Facebook-Twitter-Linkedin etc.


9+3 Hours

Unit II
Evolution
Evolution in Social Networks– Framework, Tracing Smoothly Evolving Communities, Models
and Algorithms for Social Influence Analysis, Influence Related Statistics, Social Similarity
and Influence, Influence Maximization in Viral Marketing, Link Prediction in Social Networks, Feature based
Link Prediction

Neurons &Social Actor-Advanced techniques in Link Prediction


12+4 Hours

Unit III
Mining Communities and Opinion Mining
Applications of Community Mining Algorithms, Node Classification in Social Networks
Opinion Extraction–Sentiment Classification and Clustering, Temporal Sentiment Analysis-Irony Detection in
Opinion Mining-Wish Analysis–Product Review Mining–Review Classification

Tracking Sentiments towards Topics over Time


12+4 Hours

158
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Unit IV
Modelling and Visualization

Visualizing Online Social Networks, A Taxonomy of Visualizations, Graph Representation-Centrality-Clustering-


Node-Edge Diagrams-Visualizing Social Networks with Matrix-Based Representations-Node-Link Diagrams,
Hybrid Representations, Modelling and Aggregating Social Network Data, Random Walks and their Applications,
Ontological representation of Social Individuals and Relationships.

Use of Hadoop and MapReduce-Gephi

12+4 Hours
Total: 45+15 Hours
Textbook (s)
1. Charu C. Aggarwal, Social Network Data Analytics, Springer, 2011
2. Peter Mika, Social Networks and the Semantic Web, Springer, 1st Edition, 2007.

Reference (s)
1. BorkoFurht, Handbook of Social Network Technologies and Applications, Springer, 1st Edition, 2010.
2. GuandongXu,Yanchun Zhang and Lin Li, Web Mining and Social Networking, Techniques and
applications, Springer, 1st Edition, 2011.
3. Giles, Mark Smith, John Yen, Advances in Social Network Mining and Analysis, Springer,
2010.
4. Ajith Abraham, Aboul Ella Hassanien, VáclavSnášel, Computational Social Network
Analysis: Trends, Tools and Research Advances, Springer, 2009.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Comprehensive Test9 (%)
Remember 35 20 -
Understand 35 30 -
Apply 20 40 70
Analyze 10 10 20
Evaluate -- - 10
Create -- - -
Total (%) 100 100 100

Remember
1. What are the limitations of current web?
2. List the statistical properties of social networks
3. Define social similarity.
4. What are the two different measures in influence related statistics

Understand
6. Explain about development of semantic web in research.
7. Demonstrate web based networks.
8. Illustrate the ways of visualizing social networks with matrix based representation and node – link diagram.

9
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

159
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

9. Explain core methods of community detection and mining.


10. Explain algorithms and systems for expert location in social networks.
11. Outline the models and algorithms for social influence analysis.
Apply
1. Make use of the following graph to solve Degree Centrality, Between-ness Centrality and Cliques.

2. Solve Path, Length and Distance between nodes (i.e., Density measures) using SNA Data Processing Tools.
3. Make use of the above graph to solve network density and cut points.
4. Develop random graphs using Erdos Reini Model
5. Solve Weak Ties,Traidic closure for the following graph.

Analyze
6. Compute PageRank for the following figure.

7. Discover Spectral Clustering steps for the following graph.

8. Examine the ways to visualize community‟s hubs and node centrality measures using sna package.
9. Analyze positive, moderate and negative feeds using sentiment analysis on twitter data.

160
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

IT4432 Data Analytics-II


3104
Course Outcomes
1. Design data architecture and familiarize various data sources and data management
2: Identify the export of data sources
3: Know the basics of Big Data Tools
4: Identify the standard reporting and compliance, decision Models
5: Identify the outlier and elimination
6: Prepare data for analysis.

COs–POs) Mapping
COs PO3 PO5 PO6 PO7
1 3 1 1 2
2 1 3 2 3
3 3 1 2 1
4 3 1 3 3
5 3 3 2 1
6 3 3 3 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit-1 (10+3)

Data Management: Sources of Big data, Introduction to Data Management and importance of Data
management,Functions of Data Management, Data Management Goals, Data Management Principles,
Data Management Issues, Design Data Architecture and manage the Data for analysis, understand various
sources of the Data, Export all the Data onto the cloud.

The relationship between data management and enterprise architecture

Unit – 2 (12+4)

Big Data Tools: Introduction to the Big Data tools like spark, Scala, Impala, Identify gaps in the
data and follow-up for decision making: Missing data Imputation, Model based Techniques.

Big Data Analytics: Introduction to Big Data Analytics, Relational Database to Big data-Key
Value store, Column Oriented database, Document based database, Graph database, Overview of
Hadoop, HDFS, MapReduce, Outlier detection and elimination, Data preprocessing for the
analysis.
Hadoop Clusters and the Hadoop Ecosystem

Unit – 3 (12+4)

Machine Learning Algorithms: Hypothesis testing and Determining the multiple analytical
methodologies: Supervised Learning, Unsupervised Learning, Reinforcement Learning, Train

161
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

model using statistical/machine learning algorithms, Test model, Sample for prediction, Explore
the chosen algorithms for more accuracy

Overview of neural networks

Unint-4 (11+4)

Data Visualization: Prepare the data for visualization, Draw insights out of the visualization
tool, Data Visualization in Tablue: Extract the data, the workspace, Data Visualization.

Case Study: Exploring Employee Attrition data in R

Total: 45+15 Hours


Text Book (s) :
1. Hadoop, The Definitive Guide, 4th Edition, O”Reilly Publisher (Unit-2 )
2. NASSCOM Study material.
Reference Book(s):

1. NASSCOM Study material.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test10 (%)
Remember 30 30 --
Understand 40 30 --
Apply 30 20 70
Analyze - 20 30
Evaluate - - --
Create - - --
Total (%) 100 100 100

Remember
1. Define Big data.
2. Define data analytics
3. Define No SQL
4. Define Machine Learning

Understand
1. Explain the functionalities of data management
2. Explain various sources of the data
3. What are the steps involved in Export job process in Amazon S3
4. What are the benefits of using spark, scala, and impala
5. what are the steps followed in machine learning algorithms

10
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

162
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Apply
1. how you identify gaps in the data and what are the methods for reducing missing values in data set
2. write down the steps involved in data visualization in tableu
3.
Analyze
1. Which source of data is more reliable and why
2. What are the outliers and how do we detect them.
3. Why do we use data visualization and what is the role of tableu in data visualization

163
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS013 Security Analyst II (Contemporary Course)


To be prescribed by NASSCOM
3103
Course Outcomes:
At the end of the course students will be able to:
1. Suggest appropriatesecurity metrics used for individual/organization
2. Implement various security audit used to find vulnerabilities/threats.
3. Implementation of various vulnerability management methods.
4. Implementation of configuration reviews.
5. Propose and implement appropriate security policy for individual/organization .
COs–POs Mapping
COs PO1 PO2 PO4 PO5
1 2 3
2 1 3
3 3 2
4 1 3
5 1 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


UNIT I: INTRODUCTION (11+4)
Hours
Introduction to security Metrics, Characteristics of good metrics,Categories/Classification of
Security Metrics:Classifications by different organizations,A sample list of metrics, Using
Security Metrics, Development Process of the Metrics , Metrics and Reporting, Designing
information security measurement Systems. Case studies:Indicators of Compromise,NIST
sample security metrics.

UNIT II (12+4)
Hours
Introduction to Security Audit: Definition and Need for security audit, Scope of an audit,Audit
Types & Phases, Audit methodology,AuditTasks,post auditing actions and reporting, case
studies:Firewall Security Auditing,IDS Security Auditing and Social Engineering Auditing.

UNIT – III: (10+3)


Hours
Vulnerability Management: Introduction to vulnerability management, Threats and
Vulnerabilities,VulnerabilityScanning,Information Security Assessments,Vulnerability
Assessment Methodology,Patch Management,
reporting,casestudies:VulnerabilityScanning&Assessment

UNIT –IV: (12 +4)


Hours
Configuration Reviews: Configuration Management, Organizational Security Configuration
management Policy, Identify Security configuration management Tools,Implementing secure
configurations,Unauthorized Access to Configuration Stores,

Total: 45+15

164
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. NASSCOM Study Material

Reference (s)
1. NASSCOM Study Material

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Comprehensive Test11 (%)
Remember 25 10 --
Understand 35 30 20
Apply 20 20 40
Total (%) 100 100 100

Remember
1. List the various security metrics
2. List advantages of security audit
3. Define Vulnerability.

Understand
7. Explain need of configurations
8. Explain Identification of Digital Evidence,
9. Write about NIST sample metrics
10. Discuss about vulnerability scanning.

Apply
1. Apply any auditing tool to perform security audit.
2. Apply different network scanning tools to collect vulnerable information.

Analyze
1. Analyze log files of IDS&IPS tools to find level of risk.

11
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

165
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT017 IBM’s Big Data Analytics with Hadoop platform


3103
Course Outcomes
1. Identify the concept and challenges of big data and its existing technologies.
2. Understand Big Data and Hadoop ecosystem
3. Understand Hadoop Distributed File System (HDFS)
4. Design and implement of Hive and Sqoop scripts
5. Apply and handle MapReduce programs and Pig Scripts
6. UseBig SQL and Big R Programming

COs–POs Mapping
COs PO3 PO5 PO6 PO7
1 3 2 3 3
2 2 1 1 2
3 2 1 2 3
4 1 3 2 2
5 1 3 3 1
6 1 3 2 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked

Unit I
Introduction to Hadoop & Big Data using IBM Infosphere Big Insights
Functions and features of Hadoop, Capabilities of Hadoop and HDFS, Administer HDFS, Big Data, , How Hadoop
solves the Big Data problem, IBM‟s 4V‟s, Hadoop ecosystem, Practical Questions
Linux Based Commands, The limitations of the existing solutions for Big Data problems, Types of Data.12+4 Hours
Unit II
Introduction to Sqoop, Sqoop Job & Hive
Import tables from RDBMS MYSQL FROM HDFS(HADOOP), Export data from HDFS TO RDBMS MYSQL,
Import particular columns of the table from RDBMS MYSQL TO HDFS, Import subset of tables RDBMS MYSQL
TO HDFS, Use of warehouse-dir in sqoop, Perform SQL queries in sqoop by using EVAL command, SQOOP
JOBS, Sqoop Job Incremental Import.
About Hive, Hive Components, Comparison with Traditional Database, Loading and Querying Data in Hive
Basic SQL Query Formation & Generation. 13+3 Hours
Unit III
Introduction to MapreduceProraming
Introduction to mapreduce Programing, Introduction to pig Latin language 11+3 Hours

Unit IV
Introduction of Big Data Programming & Big SQL
Introduction to Big Data Programming
Introduction to Big SQL , Big SQL Data Types, Big R overview 11+3 Hours
Total: 47+13 Hours

166
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. IBM CE - Essentials of Big Data with Hadoop using IBM InfoSphereBigInsights
2. IBM CE - Big Data Programming using IBM InfosphereBigInsights

Reference (s)
1. R. F. Gilberg, B. A.Forouzan, Data Structures A Pseudocode Approach with C, 2 ndEdition, CENGAGE
Learning, 2005
2. S. Tanenbaum, Y. Langsam and M.J. Augenstein,Data Structures using C, Pearson Education, 1990
3. Seymour Lipschutz, Data Structures with C, Schaum Series, McGraw Hill Education, 2010
4. Horowitz, Sahni and Anderson-Freed, Fundamentals of Data Structures in C, 2ndEdition, Universities Press,
2008
5. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, Pearson Education, 2002

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test12 (%)
Remember 40 30 --
Understand 35 30 --
Apply 25 40 70
Analyze -- -- 10
Evaluate -- - 10
Create -- - 10
Total (%) 100 100 100

Remember
1. List theactive and passive namenodes
2. Does Apache Sqoop have a default database?
3. Define sqoop job
4. Abbreviate 3V‟s
5. Give the syntax of orderby
6. Define Job Tracker

Understand
1. Explain the use of HDFS for applications having large data sets and not when there are a lot of small files?
2. Classify “HDFS Block” and an “Input Split”?
3. Illustrate the list all databases whose name starts with p.
4. Identify the procedure how the Namenode tackle Datanode failures
5. Represent Shuffling and Sorting in MapReduce?
Apply
1. On what concept the Hadoop framework needs to be applied? Name the port number for NameNode, Task
Tracker and Job Tracker and deploy the procedure how can you overwrite the replication factors in HDFS?
2. Demonstrate the statement “MapReduce chunks are handled by HDFS”.
3. Perform the following in Sqoop:

12
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

167
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

a. How do you fetch data which is the result of join between two tables ?.
b. How can you force sqoop to execute a free form Sql query only once and import the rows serially.
c. What are the basic differences between relational database and HDFS?
d. How to import only the updated rows form a table into HDFS using sqoop assuming the source has last
update timestamp details for each row?
Analyze
1. Start Pig Grunt in Hadoop/MapReduce mode.
Load records into a bag from:
/training/exercises/pig/input1.txt
The file contains two columns separated by a tab; be sure tocreate a schema where column one is of type
int and columntwo is of type charrarray.
Print the schema of the bag to screen.
Dump Records to the screen; your output should look like this:
(1,a)
(2,b)
(3,c)
(4,d)
Create another bag but limit the number of records to 2; print the bag to screen and Exit Pig Grunt.
2. Demonstrate speculative execution in Hadoop
3. Justify the role of Record Reader in Hadoop

Evaluate

1. Perform the following in Hive:


a. Start hive
b. Create a table called bookswith 3 columns that will be capable of storing data from
$/home/training/books.txt; Load data from books.txt(stored locally) into bookstable; bookstable should
have the following schema:(id INT, title STRING, publishDate STRING)
c. select record from bookstable with id of 2
d. create new table named purchasesby re-use existing HDFS location „/user/training/exercises/hive/ex1‟;
purchasestable will have 3 columns:
(id INT, buyer STRING, purchaseDate STRING
e. select 5 rows from purchasestable
f. create books_purchasestable with the following schema
(id INT, title STRING, buyer STRING, purchaseDate STRING)
g. populate books_purchasestable by joining booksandpurchasestables via id column
h. select 10 records from books_purchasestable
i. drop books, purchasesandbooks_purchasestables
2. Determine the detailed procedure to debug Hadoop code
3. Conclude the need to run a Hadoop job with an output directory which is already present.
Create
1. Consider a Data Frame df1 and the test scores as
df1=>data.frame(students=c(“suresh”,”sandeep”,”rama”),Test=c(45,67,78)), Coding R as a query language
create slicing, dicing for the above data.
2. Conclude a procedure to reduce mapper output and not the reducer output
3. Generate a procedure to configure the replication factor in HDFS

168
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS802 Machine Learning


3103
Course Outcomes:

1. Understand a wide variety of learning algorithms.


2. Understand how to apply a variety of learning algorithms to data using various tools of Machine Learning.
3. Identify the strengths and weaknesses of many popular machine learning approaches.
4. Analyze the performance of learning algorithms and model selection.
5. Identify mathematical relationships within and across Machine Learning algorithms and the paradigms of
supervised and un-supervised learning.
6. Apply Artificial Neural Networks and Deep Neural Networks in solving complex real world problems.
COs–POs Mapping
COs PO2 PO5
1 3 3
2 2 3
3 3 1
4 2 2
5 2 3
6 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

UNIT I
Introduction: Learning, Types of Machine Learning, Hypothesis Formulation and Model Selection, Phases of ML:
Training, Testing and Validation; Evaluation Machine Learning Models: Error Analysis, Performance Indices,
Datasets for ML; Regression: Linear Regression, Linear Regression with Multiple Variables, Logistic Regression,
Regularization; Examples of Machine Learning Tools: Weka, R, Python, MATLAB,TensorFlow.
Basic Statistics: Averages, Variance and Covariance, Probability Distributions, The Bias-Variance Trade-off.
10+3 Hours

UNIT II
Learning with Trees: Constructing Decision Trees, CART, Constructing Rules from a Decision Tress
Classification example;. Bayesian Learning: Bayes Theorem, Graphical Models: Bayesian Networks, Approximate
Inference, Making Bayesian Networks. Instance based Learning: Nearest Neighbor Classifiers.
Modelling a Supervised Learning System, ID3 Classifier, Conditional Probability, Naive Bayes Classifier, Distance
Metrics in Data mining.
10+3 Hours

UNIT III
Clustering: Introduction, Advanced Similarity and Distance Measures, Clustering Large Databases, Clustering with
Categorical Attributes, Comparison. ; Dimensionality Reduction: Linear Discriminant Analysis, Principal
Component Analysis.; Evolutionary Learning: Genetic Algorithms, Genetic Operators. Genetic Programming;
Ensemble Learning: Boosting, Bagging.
Types of Clustering Techniques, Similarity and Distance Measures
13+5 Hours

UNIT IV
Artificial Neural Networks: ANN Learning, The Multilayer Perceptron (MLP): Error Propagation, Delta Rule,
Back Propagation Algorithm, Applications; Deep Learning: Convolutional Neural Networks (CNN/ConvNets),
Recurrent Neural Networks (RNNs), Restricted Boltzmann Machines (RBMs), Deep Boltzmann Machines (DBMs);
Machine Learning with Large Datasets: ML Models for Large Scale Learning, Online Learning.
Linear Separability, The Perceptron, Sigmoid Function and its properties.

169
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

12+4 Hours
Total: 45+15 Hours

Textbook (s)
1. Stephen Marsland, "Machine Learning - An Algorithmic Perspective ", CRC Press, 2009.
2. Sunila Gollapudi, “Practical Machine Learning” First Edition 2016, Packt Publishing Ltd.
Reference (s)
1. Tom M. Mitchell, "Machine Learning ",Tata McGraw Hill, 1997.
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test13 (%)
Remember 40 30 --
Understand 40 40 --
Apply 20 30 80
Analyze -- -- 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100
Remember
1. Define Machine Learning.
2. List the types of Machine Learning.
3. State Bayes Theorem.
4. What is Regularization?
Understand
1. Demonstrate Linear Regression.
2. Explain Back Propagation Algorithm.
3. Illustrate Decision Tree Induction process in detail.
4. Demonstrate Genetic Operations in detail.
Apply

1. Apply the concept of Regularization to solve overfitting problem.


2. Build a Linear Regression for a given dataset.
3. Apply k-Means algorithm on a given dataset to identify clusters.
Analyze
1. Distinguish between Logistic Regression and SVM.
2. Analyze Dimensionality Reduction using PCA
3. Analyze various Neural Network Architectures in Machine Learning.

13
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

170
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT802 Professional Ethics


3103
Course Outcomes
1. Understand the importance of ethics in person and IT environment
2. Infer the management of security vulnerabilities and action plan on security incident.
3. Identify the right of privacy and laws of protection for privacy of data.
4. Exemplify the intellectual property andrights.
5. Interpret the concepts of intellectual property and ethical issues of software manufacturers,
6. Summarize the key ethical issues with the use of social networking and impact of IT on living.
COs–POs Mapping
CO PO6 PO8
1 2 3
2 3 3
3 3 3
4 3 3
5 3 3
6 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
UNIT-I
An Overview of Ethics and Ethics for IT Professional and IT Users
ETHICS: Definition of Ethics ,The Importance of Integrity ,The Difference Between Morals, Ethics, and Laws ,
Ethics in the Business World ,Why Fostering Good Business Ethics Is Important , Improving Corporate Ethics
,Creating an Ethical Work Environment ,Including Ethical Considerations in Decision Making .

Ethics for IT Workers and IT Users


IT Professionals ,The Changing Professional Services Industry ,Professional Relationships That Must Be managed
,Professional Codes of Ethics , Professional Organizations ,Certification ,Government Licensing ,IT Professional
Malpractice ,IT Users ,Common Ethical Issues for IT Users .

Ethics in Information Technology, Supporting the Ethical Practices of IT Users 10+5 Hours
Unit-II
Computer, Internet Crime and Privacy
IT Security Incidents: A Major Concern ,Why Computer Incidents Are So Prevalent ,Types of Exploits ,Types of
Perpetrators , Implementing Trustworthy Computing ,Risk Assessment ,Establishing a Security Policy ,Educating
Employees, Contractors, and Part-Time Workers , prevention ,Detection , Response.

Privacy: Privacy Protection and the Law, Information Privacy, Privacy Laws, Applications, and Court Rulings,Key
Privacy and Anonymity Issues, IdentityTheft, ConsumerProfiling, Treating Consumer Data Responsibly Workplace
Monitoring.

Federal Laws for Prosecuting Computer Attacks, Advanced Surveillance Technology. 10+3 Hours
Unit-III
Intellectual Property: Intellectual Property definition, Copyrights ,Copyright Term ,Eligible Works ,Fair Use
Doctrine ,Software Copyright Protection ,The Prioritizing Resources and Organization for IntellectualProperty
(PRO-IP) Act of 2008 ,General Agreement on Tariffs and Trade (GATT) ,The WTO and the WTO TRIPS
Agreement (1994) ,The World Intellectual Property Organization (WIPO) Copyright Treaty (1996) ,The Digital
Millennium Copyright Act (1998) , Patents ,Software Patents ,Software Cross-Licensing Agreements ,Defensive
Publishing and Patent Trolls , Submarine Patents and Patent Farming .
Key Intellectual Property Issues: Plagiarism, Reverse Engineering, Open Source Code, CompetitiveIntelligence.

171
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Software Development: Strategies for Engineering Quality Software, the Importance of Software Quality,
Software Product Liability, Key Issues in Software Development, Development of Safety-Critical Systems, Quality
Management Standards.
ACM code of ethics and professional conduct 12+4 Hours

Unit -IV
Social Networking
What Is a Social Networking Web Site? ,Business Applications of Online Social Networking ,Social Network
Advertising ,The Use of Social Networks in the Hiring Process ,Social Shopping Web Sites ,Social Networking
Ethical Issues ,Cyberbullying ,Cyberstalking ,Encounters with Sexual Predators ,Uploading of Inappropriate
Material .

The Impact of Information Technology on Productivity and Quality of Life


The Impact of IT on the Standard of Living and Worker Productivity ,IT Investment and Productivity ,The Digital
Divide ,The Impact of IT on Healthcare Costs ,Electronic Health Records, Use of Mobile and Wireless Technology
in the Healthcare Industry ,Telemedicine ,Medical Information Web Sites for Laypeople.
Online Virtual Worlds, Crime in Virtual Worlds, Educational and Business Uses of Virtual Worlds
13+3 Hours
Total: 45+15 Hours
Text book (s)
1. George W Reynolds, “Ethics in Information Technology,” 5thEdition, Cengage Learning US, 2015,

Reference Book (s )
1. Deborah G. Johnson, “Computer Ethics,“ 3rd Edition, Prentice Hall, 2001,
2. Sara Base, A Gift of Fire: Social, Legal and Ethical Issues, for Computing and the Internet,” 4th Edition,
Pearson Edition 2012
SAMPLE QUESTION (S)
INTERNAL ASSESSMENT PATTERN
Cognitive Int. Test 1 Int. Test 2 Comprehensive Test14
Level (%) (%) (%)
Remember 40 40 --
Understand 50 40 30
Apply 10 10 30
Analyze -- 10 20
Evaluate -- -- 20
Create -- -- --
Total (%) 100 100 100

Remember

1. Name the qualities of a self-confident people.


2. Define risk benefit analysis.
3. State the importance of whistle blowing.

14
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.

172
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

4. Write the important aspects of technology transfer.


5. List the condition involved in valid informed consent.
6. Mention various types of vulnerabilities.

Understand

1. Generalize the term „self-confidence‟.


2. Illustrate empathy.
3. Discuss caring and sharing in brief.
4. List out the civic virtues.
5. Describe the importance of ethics in engineering filed.
6. Identify the importance of service learning.
7. Discuss the criteria required for a profession.
Apply

1. Explain the scope of engineering ethics.


2. Explain the skill needed to handle the problems about the moral issues in engineering ethics.
3. Discuss the different models of professional roles.
4. Discuss the importance of duties ethics and virtues in engineering profession.
5. Give the code of ethics played by the Institute of Electrical and Electronics Engineers. Discuss in detail
6. Give the criteria that help to ensure a safety design.
7. Illustrate the ethical theories for right-action, self-interest and duty ethics.

Analyze

1. Identify the categories of Risk.


2. Find out three conditions referred as safe exit.
3. Are the engineers possible to educate the public for safe operation of the equipment? If so, discuss with suitable
instance.
4. Compare and contrast the engineering equipment with standard experiments.
5. Take apart the effect of information on risk assessment.
6. Investigate on safety measures. Explain the safety measures considered in Net Banking Systems.

Evaluate

1. Assess the computer ethics against the usage of code of conduct.


2. Discuss the importance of IPR protection.
3. Criticize the similarities of internal and external whistle blowing.
4. Discuss the moral threats posed by the revolutionized communication using computer to the rights of privacy.
5. Discuss the functions of anonymity and privacy in terms of helpful and undesirable in computer-aided activities
with suitable example.
6. Plan the various test required to evaluate the ethical theories.

173
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16EC005 DIGITAL IMAGE PROCESSING

3103
Course Outcomes

1. Interpret fundamental concepts of digital image processing


2. Infer image transforms
3. Exemplify image enhancement and color image processing
4. Assess image restoration techniques
5. Summarize line, point, threshold and region based segmentation for digital images
6. Attribute various compression models and compression techniques for digital images
COs – POs Mapping
COs PO1 PO2 PO3

1 2 1

2 2 1

3 2 1

4 3 2 1

5 2 1 1

6 3 2 1

3–Strongly linked | 2–Moderately linked| 1–Weakly linked


Unit I
Digital Image Fundamentals
Fundamental steps in Digital image processing,Components of an Image processing system, Elements of visual
perception, Image sampling and quantization, basic relationships between pixels, An introduction to mathematical
tools in digital image processing.
Image transforms: 2D DFT and its properties, Discrete cosine transform, Discrete Wavelet Transform.
Walsh Transform, Hadamard Transform
13+4 Hours

Unit II
Image Enhancement and Color Image Processing
Enhancement in spatial domain: Intensity transformations, Histogram Processing, smoothing and sharpening, Image
Enhancement in Frequency Domain: Smoothing and Sharpening Filters
Color fundamentals, Color models, Pseudo color Image Processing, Full Color Image Processing, color
transformations.
Color Image Enhancement in spatial and frequency domain
13+4 Hours

Unit III
Image Restoration
Image Degradation/Restoration model, Noise models, Restoration using spatial filtering, Periodic noise reduction by
frequency domain filtering, Linear Position-Invariant Degradations, Inverse filtering, Minimum Mean Square Error
Filtering, Constrained Least squares filtering.
Estimating the degradation function, Geometric Mean filter

174
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

9+3 Hours

Unit IV
Image Segmentation and Compression
Image segmentation: Fundamentals, point, Line and Edge detection, Thresholding, Region based Segmentation,
Image Compression: Fundamentals, Image Compression Models, Lossless Compression, Lossy Compression,
Transform coding and JPEG compression standard.
Watershed algorithm 10+4 Hours
Total: 45+15 Hours
Textbook (s)

1. Rafel C.Gonzalez and Richard E.Woods, Digital Image Processing, Pearson Education,3 rdEdition 2011
2. S.Sridhar, Digital Image Processing, Oxford publishers, 2nd Edition, 2016
Reference (s)

1. Anil K. Jain, Fundamentals of Digital Image Processing, Pearson Education, 1st Edition, 2015
2. S.Jayaraman, S.Esakirajan, T.Veerakaumar, Digital Image Processing, McGraw Hill publishers, 2011
3. M.Sonka,V. Hlavac, R. Boyle, Image Processing, Analysis and Machine Vision, Vikas Publishing House,
2001

SAMPLE QUESTION (S)

Internal Assessment Pattern


Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test15 (%)
Remember 25 20 --
Understand 30 25 --
Apply 25 30 40
Analysis 20 25 60
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

REMEMBER

1. List the 6 components of digital image processing system


2. Define image enhancement
3. Define image segmentation
4. State the lossy compression
5. List out the 3 color models

UNDERSTAND

1. Interpret the process of image sampling and quantization


2. Summarize the fundamental steps in digital image processing
3. Represent RGB color model
4. Explain the properties of 2D Discrete Fourier Transform

15
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

175
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

5. Illustrate contrast stretching transformation function to increase the dynamic range of the gray levels in the
image

APPLY

1. Consider the image segment shown below. Compute N4, N8 distances

3 1 2 1 (q)

2 2 0 2

1 2 1 1

(p) 1 0 1 2

2. Compute histogram equalization for a given 8x8 image

3. Compute the efficiency of Huffman Coding for the given symbols


Symbol a1 a2 a3 a4 a5 a6

Probability 0.1 0.4 0.06 0.1 0.04 0.3

4. Implement segmentation on given image using bimodal thresholding

5. Show that a linear, spatially –invariant degradation system with additive noise can be modeled in the spatial
domain as the convolution of the degradation function with an image followed by addition of noise

ANALYSE

1. Differentiate between image enhancement and restoration in terms of processing and applications
2. Compare lossy and lossless compression methods in terms of entropy, applications and transforms used
3. Is image enhancement a subjective approach? Justify your answer
4. Is lossless compression preferred to lossy compression? Justify your answer
5. Differentiate region based segmentation and thresholding based segmentation in terms of approach and
applications

176
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT010 Computer Forensics (Elective VI)


3103
Course Outcomes
1. Understand the real time computer forensic issue.
2. Understand data recovery, forensics lab certification and physical requirements.
3. Identify different storage formats for data acquisition.
4. Analyze various data acquisition tools for collecting digital evidence.
5. Apply various strategies to secure digital evidences.
6. Identify and apply various computer forensics tools to solve the computer forensic cases.

CO-PO Mapping:
COs PO5 PO6 PO7 PO8
1 3 2 1 1
2 3 1 1 1
3 3 1 1 1
4 1 2 3 3
5 1 3 1 1
6 2 3 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Computer Forensics and Investigations & Investor’s Office and Laboratory
Understanding Computer Forensics, Preparing for Computer Investigations, Taking A Systematic Approach,
Procedure for Corporate High-Tech Investigations, Understanding Data Recovery Workstations and
Software,Understanding Forensics Lab Certification Requirements, Determining the Physical Requirements for a
Computer Forensics Lab, Selecting a Basic Forensic Workstation.

Nature and scope of cybercrime-categories of cybercrime, social engineering 11+4 Hours


Unit II
Data Acquisition& Processing Crime and Incident Scenes
Understanding Storage Formats for Digital Evidence, Determining the Best Acquisition Method, Contingency
Planning for Image Acquisitions, Using Acquisition Tools, Validating Data Acquisition, Performing RAID Data
Acquisition, Using Remote Network Acquisition Tools, Using Other Forensics Acquisition Tools

Open source data acquisition tools 11+4 Hours

UNIT-III
Digital Evidence:
Identifying Digital Evidence, Collecting the Evidence in Private-Sector Incident Scenes, Processing law
Enforcement Crime Scenes, Preparing for a Search, Securing a Computer Incident or Crime Scene, Sizing Digital
evidence at the Scene, Storing Digital evidence, obtaining a Digital Hash.
Selecting a basic forensic work station, methodologies to store digital evidence 12+3 Hours
UNIT-IV
Current Computer Forensics Tools
Evaluating Computer Forensics Toll Needs, Computer Forensics Software Tools, Computer Forensics Hardware
Tools, Validating and Testing Forensics Software
Computer Forensics Analysis and Validation:Determining What Data to Collect and Analyze, Validating Forensic
Data, Addressing Data-Hiding Techniques, Performing Remote Acquisition
Digital evidence handling procedures, Linux system forensics, windows system forensics 11+4 Hours
Total: 45+15 Hours

177
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook (s)
1. Nelson, Phillips Eninger, Steuart, Computer Forensics and Investigations, Cengage Learning, 4 th Edition,
2009
2. Man Young Rhee, Internet Security: Cryptographic Principles, Algorithms and Protocols, Wiley
Publications, 2003
Reference (s)
1. John R.Vacca, Computer Forensics, Cengage Learning, 2005
2. MarjieT.Britz, Computer Forensics and Cyber Crime: An Introduction, 3rdEd, Prentice Hall, 2013
SAMPLE QUESTION (S)
Internal Assessment Pattern
Cognitive Int. Test 1 Int. Test 2 Comprehensive
Level (%) (%) Test16 (%)
Remember 30 20 --
Understand 35 30 --
Apply 30 30 50
Analyze 15 20 30
Evaluate -- -- 20
Create -- -- --
Total (%) 100 100 100
Remember
1. List the various disk storage formats
2. List some digital evidences
3. List some tools used for digital evidences
4. List different type of compression methods.
Understand
1. Explain RAID Data Acquisition
2. Explain Identification of Digital Evidence,
3. Write about Locating and Recovering Graphics
4. Discuss about Mobile Device Forensics
Apply
1. Apply any different digital forensics tool to create OS image.
2. Apply different networking tools to collect evidences.
Analyze
1. Compare different digital forensic open source tools to select a suitable tool which
identifies hidden data.
Evaluate
1. Evaluate the performance of dd and dfcldd LINUX commands
2. Evaluate the performance of Widows based tools when compared with LINUX
Create
1. Use any open source tool to create ISO image of a disk.
16
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

178
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT011 E&M-Commerce (Elective VI)

3103
Course Outcomes
1. Identify E – commerce principles in market place.
2. Understand different business models for e-commerce
3. Identify M – commerce principles to various business domains
4. Understand the Framework Of Mobile Commerce
5. Get an exposure to current technological advancements in M-commerce.
6. Analyze security issues in E – commerce business models.

COs–POs Mapping
COs PO5 PO6 PO8
1 1 3 1
2 2 3 1
3 2 3 2
4 2 2 3
5 2 3 2
6 2 3 3
3–Strongly linked | 2–Moderately linked | 1–Weakly linked
Unit I
Fundamentals of E-Commerce
Introduction -The e-commerce environment - The e-commerce marketplace -Focus on portals, Location of trading in
the marketplace - Commercial arrangement for transactions - Focus on auctions - Business models for e-commerce -
Revenue models - Focus on internet start-up companies - the dot-com - E-commerce versus E-business.
E-Business models-Role of Internet
10+5 Hours
Unit II
Mobile Commerce
Introduction – Infrastructure Of M– Commerce – Types Of Mobile Commerce Services – Technologies Of Wireless
Business – Benefits And Limitations, Support, Mobile Marketing & Advertisement, Non–Internet Applications In
M– Commerce – Wireless/Wired Commerce Comparisons
Internet Security standards -E-commerce ethics 12+4 Hours

Unit III
Mobile Commerce: Technology
A Framework For The Study Of Mobile Commerce – NTT Docomo‟s I– Mode – Wireless Devices For Mobile
Commerce – Towards A Classification Framework For Mobile Location Based Services – Wireless Personal And
Local Area Networks –The Impact Of Technology Advances On Strategy Formulation In Mobile Communications
Networks
M-commerce application 13+3 Hours

UNIT-IV
Security in E&M-Commerce
Electronic payment systems-Digital Token-Based-Smart Cards-Credit Cards-Risks in Electronic Payment systems.
New kind of payments:E-Wallet,Paytm,paypal. Inter Organizational Commerce-EDI-EDI Implementation-Value
added networks. Focus on security design for e-business: Managing computer viruses,Controlling information
service usage,Monitoring of electronic communications, E-mail management,Hacking,Secure e-commerce
transactions,Approaches to developing secure systems,Current approaches to e-commerce security and Reassuring
the customer.

179
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Security Risks in M-Commerce 10+3 Hours


Total: 45+15 Hours

Textbook(s)
1. Dave Chaffey, “E-Business and E-Commerce Management”, Third Edition, 2009, PearsonEducation
2. Dr.Pandey , Saurabh Shukla E-commerce and Mobile commerce Technologies , Sultan chand ,2011
3. Kalakata, Whinston, Frontiers of electronic commerce, Pearson, 2006.
Reference(s)
1. Brian E. Mennecke, Troy J. Strader, “Mobile Commerce: Technology, Theory andApplications”, Idea
Group Inc., IRM press
2. Hendry Chan, Raymond Lee, Tharam Dillon-EllizabethChang, E-Commerce fundamentals and applications,
John Wiley, 2001
3. S.Jaiswal, Galgotia,E-Commerce, 2000

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test17 (%)
Remember 40 40 --
Understand 50 50 --
Apply 10 10 70
Analyze -- -- 30
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. Define E-commerce
2. What is EDI
3. State the approaches of Supply chain management
4. List the factors Digital Video electronic Commerce
Understand
1. Demonstrate mercantile models.
2. Illustrate Electronic payment systems
5. InterpretAdvertising models for marketing

Analyze
1. Distinguish Desktop video processing and desktop video conferencing
2. Categorize advertising models
3. Analyze Commerce Catalogue

17
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course.

180
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS010 Multimedia Databases


3 1 0 3
Course Outcomes
1. Analyse the issues and Apply techniques for building effective Multimedia Database Systems
2. Implement temporal database design techniques on past and current data
3. Apply Spatial Query Languages on Spatial databases
4. Analyze Text Types and Document Retrievals and Image DBs with Relations and R-Tree
5. Apply Handling techniques of Audio and video Databases
6. Apply Query Languages for Retrieving Multimedia Data with Multidimensional Data structures

COs–POs Mappings

COS PO3 PO5 PO6


1 2 3 1
2 3 2 2
3 2 3 2
4 3 3 1
5 2 1 2
6 2 2 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

UNIT I - MULTIMEDIA DATABASE DESIGN ISSUES


Data types – Indexing and Retrieval of Audio, Image and Video – Techniques and Data Structures for efficient
Multimedia Fundamental Concepts – Defining, Querying and modifying State Tables - Transaction-Time State
Tables - Bitemporal Tables - Temporal Database Design Introduction to Spatial Databases – Spatial objects –
Constraint Data Model – Spatial Access Methods ,Spatial Query Languages: Extending the SQL for spatial data

Examples of queries that emphasis spatial data.


12+4 Hours

UNIT II - TEXT/DOCUMENT DATABASES


Text/Document Databases - Precision and Recall - Stop Lists - Word Stems and Frequency Tables - Latent Semantic
Indexing - TV-Trees - Other Retrieval Techniques
Image Databases - Raw Images - Compressed Image Representations - Similarity-Based Retrieval - Alternative
Image DB Paradigms - Representing Image DBs with Relations - Representing Image DBs with R-Trees

Retrieving Images By Spatial Layout - Implementations.


12+4 Hours
UNIT III - AUDIO AND VIDEO DATABASES
Audio Databases - A General Model of Audio Data - Capturing Audio Content through Discrete Transformation -
Indexing Audio Data.
Video Databases - Organizing Content of a Single Video - Querying Content of Video Libraries

Video Segmentation
11+3 Hours

UNIT IV - MULTIMEDIA DATABASE ARCHITECTURE


Design and Architecture of a Multimedia Database - Organizing Multimedia Data Based on The Principle of
Uniformity - Media Abstractions - Query Languages for Retrieving Multimedia Data. Multidimensional Data
Structures: k-d Trees - Point Quad trees - The MX-Quad tree - R-Trees
Comparison of Different Data Structures
10+4 Hours

181
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Textbook(s)
1. Principles of Multimedia Database Systems, V.S. Subrahmanian, Elseveir(Morgan Kauffman).
Reprint 2011.
2. Guojun Lu, "Multimedia Database Management Systems”, Artech House Publishers

Reference(s)
1. Spatial Databases, Shashi Shekhar, Sanjiv Chawla, Pearson Education
3. Multimedia Database Systems, Prabhakaram, Springer
4. Philippe Rigaux, Michel O. Scholl, Agnes Voisard, "Spatial Databases: With Application to
GIS”, Morgan Kaufmann Publisher.
5. http://srmnotes.weebly.com/cs1138-multimedia-database.html.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test18 (%)
Remember 30 20 --
Understand 35 30 --
Apply 30 30 60
Analyze 15 20 20
Evaluate -- 10
Create -- -- 10
Total (%) 100 100 100

Remember
1. List the various issues of multimedia databases
2. Write the different Word Stems
3. Define Spatial Databases
4. List the steps to design a multimedia for real time application

Understand
1. Explain Multimedia Data Based on The Principle of Uniformity.
2. Explain Representing Image DBs with R-Trees
3. Write about Video Segmentation
4. Discuss about Video Databases

Apply
1. Compare k-d Trees with Point Quad trees and which one is efficient?
2. Compare and contrast Transaction-Time State Tables - Bitemporal Tables

Analyze
1. Compare Spatial Access Methods with respect toSpatial Query Languages
2. How the Query Languages is plays role for Retrieving Multimedia Data

18
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills Pertaining to this course

182
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16CS012 Wireless Ad hoc Network (Elective VI)


3103
Course Outcomes
1. Understand the various challenging issues of wireless Ad hoc networks
2. Apply the MAC protocols using reservation and scheduling mechanism
3. Apply the routing protocols and transport layer protocol using various TCS mechanism inwireless Ad hoc
networks
4. Understand the issues of MAC and network layer solution to provide quality of service
5. Understand the significances of various battery management schemes for wireless Ad hoc networks
6. Analyze the security requirements and secure routing in wireless Ad hoc networks

COs–POs Mapping
COs PO3 PO5 PO6
1 1 3 1
2 3 1 2
3 3 1 2
4 1 3 1
5 1 3 1
6 1 3 1
3–Strongly linked | 2–Moderately linked | 1–Weakly linked

UNIT-I
Wireless Ad Hoc Networks: Introduction, Properties, applications, limitations, Issues in Ad Hoc Wireless
Networks, Ad Hoc Wireless Internet.
MAC Protocols: Introduction, Issues in Designing a MAC protocol for Ad Hoc Wireless Networks, Design goals of
a MAC Protocol for Ad Hoc Wireless Networks, Classifications of MAC Protocols, Contention - Based Protocols,
Contention - Based Protocols with reservation Mechanisms

Contention – Based MAC Protocols with Scheduling Mechanisms


15 Hrs
UNIT -II
Routing Protocols: Introduction, Issues in Designing a Routing Protocol for Ad Hoc WirelessNetworks,
Classification of Routing Protocols, Proactive/ Table–Driven Routing Protocols, Reactive/ On–Demand Routing
Protocols, Hybrid Routing Protocols, Hierarchical Routing Protocols, Power – Aware Routing Protocols.
Transport Layer: Introduction, Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks,
Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks, Classification of Transport Layer
Solutions, TCP Over Ad Hoc Wireless Networks

Other Transport Layer Protocol for Ad Hoc Wireless Networks.


16 Hrs
UNIT –III
Quality of Service: Introduction, Issues and Challenges in Providing QoS in Ad Hoc WirelessNetworks,
Classification of QoS Solutions, MAC Layer Solutions, Network Layer Solutions, QoS Frameworks for Ad Hoc
Wireless Networks.
Energy Management: Introduction, Need for Energy Management in Ad Hoc Wireless Networks, Classification of
Ad Hoc Wireless Networks, Battery Management Schemes, Transmission Power Management Schemes

183
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

System Power Management Schemes.


14 Hrs

UNIT – IV
Security Protocols: Network Security Requirements, Issues and Challenges in Security Provisioning, Network
Security Attacks, Key Management, Secure Routing in Ad Hoc Wireless Networks.
Wireless Sensor Networks: Introduction, Sensor Network Architecture, Data Dissemination, Data Gathering,
Location Discovery
Quality of a Sensor Network, Evolving Standards, Other Issues
15 Hrs

Total: 45+15 Hours


TEXT BOOKS
1. Ad Hoc Wireless Networks: Architectures and Protocols - C. Siva Ram Murthy and B.S.Manoj, 2004, PHI.
2. Wireless Ad- hoc and Sensor Networks: Protocols, Performance and Control - JagannathanSarangapani,
CRC Press

REFERENCE BOOKS
1. Wireless Sensor Networks - C. S. Raghavendra, Krishna M. Sivalingam, 2004, Springer
2. Ad- Hoc Mobile Wireless Networks: Protocols & Systems, C.K. Toh ,First ed. Pearson Education

SAMPLE QUESTION (S)

Internal Assessment Pattern


Cognitive Int. Test Int. Test Assignment
Level 1 (%) 2 (%) Test19 (%)
Remember 40 50 -
Understand 35 30 -
Apply 25 20 80
Analyze -- -- 20
Evaluate -- -- --
Create -- -- --
Total (%) 100 100 100

Remember
1. Find out the major significance of cellular wireless networks and Ad hoc wireless networks.
2. List few latest application systems of Ad hoc wireless networks.
3. Identify the challenging issues in Ad hoc network configuration and maintenance.
4. Show the proactive steps to solve the hidden terminal problem.
5. List the transmission impediments of wireless channel.
6. List the issues that affect the design deployment and performance of ad hoc wireless system.
7. List the benefits when deployment of a commercial ad hoc wireless networks compared to wired
network
8. Write the advantages of hybrid wireless networks.

19
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

184
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

9. Define Scalability.
10. Write the design goals of MAC protocol for ad- hoc networks.
11. Describe the issues of MAC protocol for ad hoc networks in brief.
12. Show the classifications of MAC protocol.
13. Identify the effects of exposed terminal problem in wireless networks.
14. Relate the advantages of directional antennas of MMAC over MACAW.
15. Name the mechanisms used in MAC layer.
16. List any two specific requirement of real- time MAC protocol.
17. Give the classification of contention based protocol.
18. State the major challenges in designing routing protocols.
19. List the characteristics of a routing protocol for ad hoc wireless networks.
20. Mention any four qualities of service metrics that are used to evaluate the performance of the
network.
21. List the types of hybrid routing protocols.
22. Draw the structure of layered architecture.
23. Find out the components of WSN.
24. Define LEACH.

Understand
1. Summarize the issues that affect the deployment and performance of ad hoc wireless system.
2. Outline the benefits when deployment of a commercial ad hoc wireless networks compared to wired
network.
3. Compare Ad-hoc Networks and Wireless LAN.
4. Compare the efficiency of the packet queuing mechanism adopted in MACA and MACAW.
5. Relate contention based protocols with reservation mechanism and contention based protocols with
scheduling mechanism by means of packet delivery, reception and acknowledgement ratio.
6. Describe the design strategies of MACAW protocol.
7. Illustrate various steps involved in five phase reservation protocol with its frame format.
8. Compare the differences of Ad hoc on demand Distance vector routing protocol (AODV) and
dynamic sequence routing protocol (DSRP).
9. Identify any four reasons that lead to the quick power drain of nodes in mobile ad hoc network.
10. Explain the sensor network architecture with a suitable illustration.

Apply
1. Calculate the maximum achievabledata rateovera9KHzchannelwhose signaltonoiseratiois20dB.
2. Think of four scenarios where wireless networks can replace wired networks in order to
improve the efficiency of people at their workplace. Briefly describe how in each case a
wireless network will fit the role better than a wired network.
3. Determine the transfer time of a 22 KB file with a mobile data network (a) with a transmission
rate of 10 Kbps and (b) repeat the same for 802.11 WLAN operating at 2 Mbps. (c) What is the
length of the file that WLAN can carry in the time that mobile data service carried a 20 KB
file? (d) What do you infer from the answers to the above questions?
4. Assume that in one slot in Bluetooth 256 bits of payload could be transmitted. How many slots
are needed if the payload size is (a) 512 bits, (b) 728 bits, and (c) 1,024 bits. Assume that the
non-payload portions do not change.

185
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

5. With reference to the discussion on scatternets, illustrate the trade-off of synchronization and
bandwidth using a timing diagram. (Hint: Consider the case when a Bluetooth device acts as a
master in one piconet and as a slave in another.)
6. Calculate the probability of data packet collision in the MACA protocol. Assume that Tc is the
control packet transmission and propagation delay, Tw is the optimal maximum back-off time,
β is the percentage of ready nodes, and R is the transmission range of each node.

Analyze
1. Discussthedeployment scenariosforvariousHIPERLAN standardsintheETSIBRANsystem.
2. Compare the EY-NPMA and the CSMA/CA mechanisms.
3. In the serial communications, the baud rate of transmission is specified. Legacy applications on
Bluetooth devices specify the baud rate. In the case of the old serial communications, the data rate is
the specified baud rate, but in the case of Bluetooth serial communications, it is not so. Why?
4. Identify and elaborate some of the important issues in pricing for multi-hop wireless communication.
5. Channel quality estimation can be done both at the sender and the receiver. Which is more
advantageous? Why?
6. Compare an ad hoc network and a cellular network with respect to bandwidth usage and cost
effectiveness.
7. Compare the pros and cons of using scheduling-based MAC protocols over reservation- based MAC
protocols.

Evaluate
Consider the topology given in below OS simulate DSR,SSA, and ABR protocol s for path establishment
from node 1 to node 10,find thepathsfoundandtheratioofthenumberofRouteRequestpacketssent
inthenetwork.(Links labeled"U"refertounstable ones.)

1. Justify whether the LCC algorithm (when run consistently with node degrees or node IDs)
give a deterministic result? If so, prove the above fact. Otherwise, give a counter -example.
2. Critique on how content-based multicasting (CBM) could be advantageous or
disadvantageous as far as the bandwidth utilization of the network is concerned.
3. Discuss how network security requirements vary in the following application scenarios of ad
hoc wireless networks:
A. Home Network
B. Classroom Network
C. Military Network
D. Emergency Search and Rescue Network
4. Discuss how security provisioning in ad hoc wireless networks differs from that in infrastructure-
based networks?

186
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT014 Data Analytics-III


3104
Course Outcomes
1. Describe the business processes involved in marketing and customer relationship
management and explain the role of analytical and predictive tools in these processes.
2. Analyze the import of predictive analytics on the organization
3. Implement data mining and machine learning techniques using a high-level
programming.
4. design and analyze appropriate predictive models
5. Understand how best to apply Analytics methods and techniques in addressing strategic
business problems
6. Conduct an in-depth analysis of a strategic business problems

COs–POs) Mapping
COs PO3 PO5 PO6
1 3 1 2
2 1 3 3
3 3 1 2
4 3 3 3
5 3 1 2
6 3 3 3

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit – 1 12+3
Introduction to Predictive Analytics & Linear Regression

What and Why Analytics, Introduction to Tools and Environment, Application of Modelling in
business, Databases & Types of data and variables, Data modelling techniques, Missing
Imputations etc.
Need for business modelling, Regression – concepts, Blue property –assumptions-Least Square
Estimation, Variable Rationalization, and model Building.

Introduction to Analytics and Analytics in Decision Making

Unit – 2 (10+4)

Logistic Regression, Objective Segmentation


Model Theory, Model fit statistics, Model conclusion, Analytics applications to Various business
domain etc.
Regression Vs segmentation – Supervised and unsupervised Learning, Tree building –
Regression, Classification, Overfitting, Pruning and complexity, Multiple decision trees etc.
Unstructured data analysis

187
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Unit – III 12+4


Time Series Methods/Forecasting, Feature Extraction:
ARIMA, Measures of forecast Accuracy, STL approach, Extract features from generated model
as height, Average, Energy etc and analyze for prediction.

Additive & Multiplicative models


Unit-IV

Working with documents 11+4

Standard operating procedures for documentation and knowledge sharing, Defining purpose and
scope documents, understanding structure of documents – case studies, articles, white papers,
technical reports, minutes of meeting etc. Style and forma, Intectual property and copyright .
Document preparation tools – Visio, Power point, word, excel etc. Version control, Accessing
and updating corporate knowledge base, peer review and feed back.

Understanding the Word Object Model

Total: 45+15 Hours

1. Text Books:
3. NASSCOM Study material.
Reference Books:

1. NASSCOM Study material.

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Level Int. Test 1 (%) Int. Test 2 (%) Assignment Test20 (%)
Remember 30 30 --
Understand 40 30 --
Apply 30 20 70
Analyze - 20 30
Evaluate - - --
Create - - --
Total (%) 100 100 100

Remember
5. Define Predictive analytics
6. What is linear regression
7. Define imputation
8. What is ETL
9. Define time series

20
Assignment test should contain only questions related to Higher Order Thinking (HOT) Skills pertaining to this course

188
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Understand
1. What are the steps involved in analysis of data
2. What is Ordinary Least square method? Explain with example
3. What is the difference between and ARMA and ARIMA? Explain with suitable example
4. What tools should use for documentation

Apply
4. How to impute missing data in R
5. What are the various methods of creating a decision tree
6. Write a procedure for creating diagrams in Visio
Analyze
1. Write the steps for preparing case study
2. Write a procedure creating flowcharts and organization charts in Visio

189
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

16IT018 Foundation course in Security Identity and Access management


3103
Course Outcomes
1. Identify the need of ISIM in Organization.
2. Manage users, accounts and resources in Organization
3. Create, Manage and configure services, policies and workflows as per business requirements.
4. The requirement of IBM security Access manager in the Organization
5. Describe the purpose of junctions, enable web protection and auditing and tracking of users
6. Manage users groups and Policies

COs–POs Mapping
COs PO3 PO5 PO6 PO7
1 3 1 1
2 3 3 2 3
3 2 3 2
4 3 1 1 2
5 1 3 1 1
6 1 1 3 2

3–Strongly linked | 2–Moderately linked | 1–Weakly linked


Unit I
Introduction to IBM Security Identity Manager 6.0, ISIM system Architecture , Deployment Architecture ,
Components of ISIM , Planning an ISIM Implementation , Identify the business requirement ,Security policy
,Topology Considerations for ISIM deployment , ISIM installation and configuration, Organization Management ,
Organization structure , Basic of Directory Server , User Management and role management , Separation of duty
policies , Role Modeling , Role engineering basic concepts , Role engineering tools, Identity feeds , Types of feeds ,
feeds creation and management 10+3 Hours

Unit II
Services and policies, Understanding services, Service selection policies, Identity policies, Provisioning resources,
Account provisioning for users, Configuring an entitlement, Provisioning policy join directives, Workflows,
Understanding workflows, Understanding notifications, Workflow elements, Approval requests, Access control,
Understanding Access Control items, Life Cycle Management , Auditing and Reporting
11+4 Hours
Unit III
IBM Security Access Manager for Web,Security Access Manager architecture,Understanding reverse proxy
concepts,Using the reverse proxy as a policy enforcer,Describing reverse proxy features,Using the Web Gateway
Appliance,Administration overview,Administering users,groups and domains,Managing ACLS and Protected object
policy,Importing and exporting from Policy Administration

11+4 Hours
Unit IV
Authentication Overview,Authentication methods,understanding Instances,understanding reverse proxy
junctions,using junction mapping table,using transparent junctions,using virtual host junctions,Creating HTTP

190
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

transformations,using Trust association interceptor,using WCP,Using logs ,audit and traces,Advanced topics,IBM
security Access Manager support

13+4 Hours
Total: 45+15 Hours
Textbook (s)
1. IBM Security Identity Manager 6 Basic Administration
2. IBM Security Access Manager Admin Guide

Reference (s)
 >https://www.ibm.com/support/knowledgecenter/en/SSRMWJ_6.0.0/com.ibm.isim.doc_6.0/ic-homepage.htm
 >http://www-01.ibm.com/support/docview.wss?uid=swg21689113
 >https://www-03.ibm.com/software/products/sl/access-mgr
 >http://www-01.ibm.com/support/docview.wss?uid=swg27046801

SAMPLE QUESTION (S)


Internal Assessment Pattern
Cognitive Int. Test 1 Int. Test 2 Comprehensive Test21
Level (%) (%) (%)
Remember 25 10 --
Understand 35 30 20
Apply 20 20 40
Analyze -- -- 20
Evaluate -- -- 20
Total (%) 100 100 100

Remember
1. Explain ISIM deployment architecture in brief
2. List down the Types of users and brief it?
3. List down the types of identity feed?
Understand
1. What is provisioning, and list down the types?
2. What is workflow? Types of Workflow and explain design options ?

Apply
1. What is workflow? Types of Workflow and explain design options ?
2. Write down the steps for manager approval workflow?

21
Comprehensive test should contain only questions related to Higher Order Thinking (HOT) Skills

191
Department of Information Technology, GMRIT | Syllabi | Regulation 2016

Analyze
1. What are the components of the organization tree in IBM Security Identity Manager ?
explain with examples
2. What is the need of reporting? How do we use Tivoli Common Reporting? Name the
script name used to configure.
Evaluate
1. Justify the security of roles in ISIM
Prove that the roles in ISIM cannot access other accounts without proper authentication

192

Vous aimerez peut-être aussi