Professional Documents
Culture Documents
Cse Syllabus
Cse Syllabus
BHOPAL - 462003
Prerequisite:
1. There are no prerequisites to learn C programming.
2. Just a bit of logical skills should be enough.
Course Outcomes:
On successful completion of the course, students should be able to
1. Identify tasks in which the numerical techniques learned are applicable and apply them
to write programs, and hence use computers effectively to solve the task.
2. Design algorithm and illustrate flowchart for a given problem.
3. Identify and abstract the programming task involved in a given computational problem,
4. Develop C programs on a computer, edit, compile, debug, correct, recompile and run it.
5. Learn the basics of the Internet of Things and its applications. Understand Arduino
Architecture, programming and interfacing with sensors.
List of Textbooks:
1. E. Balaguruswamy, “Programming in ANSI C”, Tata McGraw-Hill.
2. Suresh Kumar Srivastava, “C in Depth”, BPB Publication.
3. R. G. Dromey, "How to Solve It By Computer", Pearson
4. K R Venugopal, “Mastering C”, Tata McGraw-Hill.
List of Reference Books:
1. Yashavant P. Kanetkar, “Let us C”, BPB Publication
2. A.R. Bradley, "Programming for Engineers", Springer
3. Schildt Herbert, “C- The Complete Reference” ,Tata McGraw-Hill.
4. Dan Gookin,”Begin programming with C for Dummies”, Wiley
URLs:
1. https://nptel.ac.in/courses/106/105/106105171/
2. https://www.nptel.ac.in/courses/106/104/106104128/
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Name of
B.TECH Semester III Year II
Program
Name of Course Mathematics- 3
Prerequisite:
1. Mathematics of higher secondary level
Course Outcomes :
On successful completion of the course, students should be able to
1. Describe the basic principles of sets and operations in sets.
2. Determine the properties of relations and functions.
3. Define basic notions in graph theory and chromatic graph theory
4. Demonstrate different traversal methods for trees and graphs.
5. Recognize types of tree and graph algorithms, the issue of efficiency of algorithms and will
be able to use them to model problems in computer science.
Description of Contents in brief:
1. Sets, relations, partial ordered set and lattices.
Group Theory: Groups, subgroups, cyclic group, cosets, homomorphism and isomorphism,
2.
Lagrange’s theorem
3. Discrete numeric function, Recurrence relation and generating function.
Statistics: Introduction, Measure of central tendency, Measures of Dispersion, Probability:
4. Addition and multiplication theorems, Condition Probability, Bayes’ theorem. Random
variable, Probability distribution, Binomial, Poisson and Normal distribution.
Graph Theory: Basic fundamentals of Graph Theory, Connected and Disconnected graphs,
Matrix representation of Graphs, Euler and Hamilton Paths, Shortest path algorithms. Tree,
5. Property of tree, Spanning tree, Spanning tree algorithms, Fundamental circuits and cut
sets. Graph coloring, covering and Partitioning. Bipartite graph, chromatic number,
Chromatic Partitioning, Chromatic Polynomial, matching, covering – four color problem.
List of Text Books:
Kenneth, K. R., Discrete Mathematics and its Applications, 7th Ed., Tata McGraw Hill,
1.
2012.
2. Harary F., Graph Theory, Narosa, 1969.
Hogg, R. V. and Craig, A., Introduction to Mathematical Statistics, Pearson Education, 6th
3.
edition 2006.
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Programming Languages
Course Outcomes:
On successful completion of the course, students should be able to
1. Describe the concepts and importance of data structures.
2. Implement various types of data structures.
3. Determine the algorithm correctness and its efficiency.
Prerequisite:
1. Programming Languages and Data Structures
Course Outcomes:
On successful completion of the course, students should be able to
1. Discuss the database concepts and database management system software
2. Model an application’s data requirements using conceptual modeling tools like ER
diagrams and design database schemas based on the conceptual model.
3. Practice the DBMS query languages and representation of queries using Relational
algebra, calculus and SQL.
4. Design the database using bottom up approach
5. Describe the concurrent execution of transactions and their control and recovery
Prerequisite:
1. NIL
Course Outcomes:
On successful completion of the course, students should be able to
1. Design effective algorithms.
2. Implement the algorithms with use of existing programming languages.
3. Extend the vocabulary of useful programming constructs.
Description of Contents in brief:
Preliminary concepts of programming language, Language evaluation criteria, Issues in
Language Translation: Syntax, Semantics, Stages, analysis and synthesis, Data types,
Expressions and Statements, Subprograms and Blocks, Abstract Data types, Parameter
Passing, Scoping Rules, Exception handling, Runtime Environment, Object-oriented
programming concepts. Implementations of modern programming languages Java,
C++, Concurrency: Subprogram level concurrency, semaphores, monitors, message
passing. Functional Programming Languages, Logic Programming Languages.
Course Outcomes:
On successful completion of the course, students should be able to
1. Explore number system used in computer system.
2. Identify the logic gates and their implementation.
3. Develop combinational circuits e.g. multiplexer, decoder, parallel adder and subtracter.
4. Perform the processing and implementation of sequential circuits.
Prerequisite:
1 Fundamental Understanding of Personnel Administration is an integral part for Engineers
before entry into organization and to setup any startup business.
2 Organizational theories and Motivation for Entrepreneurship enthusiastic for systematic
approach to handle the materialistic and non-materialistic motivation.
3 Business Plan and fundamentals of Entrepreneur Development for engineering graduates to
survive in this competitive world.
4 A hybrid approach for technocrats to handle the multifunctional technicalities in case of
industrial laws and New social security and pension rules.
Course Outcomes:
On successful completion of the course, student be able to:
1. Apply administrative skills for Engineers to handle the all the matters related to personnel
and their dimensions.
2. Apply the industrial Laws and application of administrative principles for smooth
functioning of Industry and a fresh idea to setup new business.
3. Create business ideas to become successful entrepreneurs to setup new operational business
units to address the need of society.
Description of Contents in brief:
1 Meaning, nature and scope of Personnel Administration in India, functions and significance
of Personnel Administration, Recruitment, Training, Promotion and Disciplinary Action,
Classification of Services, Generalists and Specialists, Development of Public Services in
India, Bureaucracy and Modern Democratic System, Performance Appraisal
2 Organizational Development Theories, Fredric Winslow Taylor, Marry Parker Follett, Elton
Mayo, Max Weber, Henry Fayol, Power, Accountability, Responsibility, Control,
Transparency and Conflict Resolutions.
3 Meaning and importance of Entrepreneurship, Evolution of Entrepreneurship, Factors
influencing Entrepreneurship: Social factors, psychological factors, economical factors and
environmental factors. Characteristics of an Entrepreneur, Types of Entrepreneur: type of
business, use of technology, motivation. New Generation of entrepreneurship: social
entrepreneurship, tourism entrepreneurship, women entrepreneurship. Barriers to
Entrepreneurship.
4 Entrepreneurial motivation: Relevance of Motivation, Maslow’s Theory, Herzberg’s
Theory, Douglas McGregor, Ethics, Corruption and Anti-Corruption Machinery in country
5 Factory Act 1948, Provident Fund Act 1952, Compensation Act 1919, Special Economic
Zone (SEZ), National Small Industries, Quality Standard with Special reference to (ISO),
Small Industries Development Bank of India (ISDBI), New Pension Scheme 2004 Act.
List of Text Books:
1. D. Ravindra Prasad, V.S. Prasad, P. Satyanarayana, Y. Pardhasaradhi. Administrative
Thinkers. Sterling Publishers Private Limited Second Revised Enlarged Edition, New Delhi.
2010.
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
2. Haidi, Patricia & Brush, Teaching Entrepreneurship, Edward Elgar, United States of
America, 2014.
3. Norma M. Riccucci, Public Personnel Management, Rutledge, United States of America,
2017.
4. Padhi, Labour& Industrial Laws, PHI Learning Private Limited, Eastern Economy Edition.
New Delhi,2017
List of Reference Books:
1. Monappa&Saiyadain, Personnel Management, McGraw Hills, January-2001.
2. Howard & Donald, Entrepreneurship: Theory, Process &Practice, engage Learning,
Australia, 2010.
3 Jared, Donald & John, Public Personnel Management, Rutledge, United Kingdom,2018
4. Sinha&Sekhar, Industrial Relations, Trade Unions and Labor Legislations,Pearson
Publication,New Delhi.2017
URLs:
1. https://www.google.com/search?ei=soDDXtS_G4ma4-
EPo8CFyAs&q=entrepreneurship+development&oq=entreprenurship&gs_lcp=CgZwc3ktY
WIQARgCMgQIABAKMgQIABAKMgQIABAKMgQIABAKMgQIABAKMgQIABAK
MgQIABAKMgQIABAKMgQIABAKMgQIABAKOgQIABBHOgQIABBDOgIIADoOC
AAQ6gIQtAIQmgEQ5QI6BQgAEJECOgUIABCDAToJCAAQChBGEPkBUKAiWJd5Y
NKgAWgBcAF4A4ABoAGIAcESkgEEMC4xOZgBAKABAaoBB2d3cy13aXqwAQY&sc
lient=psy-ab
2. https://www.google.com/search?ei=soDDXtS_G4ma4-
EPo8CFyAs&q=personnel+administration&oq=personnel+administartaion&gs_lcp=CgZwc
3ktYWIQARgAMgQIABANMgQIABANMgQIABA
3. https://www.google.com/search?ei=soDDXtS_G4ma4-
EPo8CFyAs&q=industrial+laws+in+india&oq=industrial+laws&gs_lcp=CgZwc3ktYWIQ
ARgBMgIIADICCAAyAggAMgIIADICCAAyAggAMgIIADICCAAyAggAOgQIABBHO
gQIABBDOg4IABDqAhC0AhCaARDlAjoFCAAQgwE6BQgAEJECUJoYWKRBYKNka
AFwAXgDgAGRAYgB1BCSAQQwLjE5mAEAoAEBqgEHZ3dzLXdperABBg&sclient=p
sy-ab
4. https://www.amazon.in/Industrial-Relations-Unions-Labour-Legislation-
ebook/dp/B073TZDYGM/ref=pd_simd_14_1/257-1509110-
0248531?_encoding=UTF8&pd_rd_i=B073TZDYGM&pd_rd_r=89ddebbb-c2da-4413-
97cf-3dfb96f9d746&pd_rd_w=Sd4l2&pd_rd_wg=WvAxZ&pf_rd_p=189ccf44-51b2-4146-
8c7f-
876b3263b44b&pf_rd_r=TWD32YRDW3JPK75NA49K&psc=1&refRID=TWD32YRDW
3JPK75NA49K
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Course Outcomes:
On successful completion of the course, student be able to:
1. Analyze time and space complexity for the given algorithms.
2. Use various searching, sorting and graph traversal algorithms.
3. Use various techniques for efficient algorithm design like divide and conquer, greedy
and dynamic algorithms.
4. Describe minimum spanning tree algorithms, Single source shortest path, all pair
shortest path algorithms in a graph and backtracking concepts.
5. Describe polynomial and non-polynomial problems, classify NP hard and NP complete
problems with their application.
Description of Contents in brief:
1. Fundamentals of algorithm- analysis of complexity, recurrence relations, disjoint set
structure
2. Algorithm design techniques and Masters Theorem to compute algorithms time
complexity
3. Greedy algorithm and Dynamic programming concepts
4. Spanning Tree algorithms, graph shortest path algorithms
5. Branch and Bound techniques, Backtracking algorithms and graph traversal algorithms
(BFS and DFS)
6. Introduction of NP-completeness and NP-hardness problems
List of Text Books:
1. Fundamentals of Computer Algorithms by Horowitz Ellis and Sartaj Sahni
2. An Introduction to Algorithm by Thoman H. Cormen, Ronald L. Rivest
List of Reference Books:
1. Sanjoy Dasgupta, Christos Papadimitriou, Umesh Vazirani: Algorithms
2. Data Structures and Algorithms Made Easy : Data Structure and Algorithmic Puzzles
URLs:
1. https://nasirmir.files.wordpress.com/2012/09/fundamentals-of-computer-algorithms-by-
ellis-horowitz-1984.pdf
2. https://nptel.ac.in/courses/106101060/
3. http://web.stanford.edu/class/cs161/schedule.html
4. https://www.coursera.org/specializations/algorithms
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Digital Circuit Design (CSE-214)
Course Outcomes:
On successful completion of the course, student be able to:
1. Analyze functioning of computer.
2. Analyze various components used in computers like CPU, Memory and I/O.
3. Analyze computer design (ALU and CU design).
Description of Contents in brief:
1. Overview of basic computer organization and design, Central processor organizations:
basic building blocks, bus organized computer memory, address structure, register
transfer languages, instruction formats, expanding op-codes and addressing modes.
2. Control unit organization: hardwired control & microprogrammed control organization,
control memory, address sequencing micro-instruction formats, micro-program
sequencer, and micro-programming.
3. Arithmetic processor design: addition and subtraction algorithm, multiplication
algorithm, division algorithm, processor configuration, and floating-point arithmetic.
Performance evaluation of processors. Introduction to pipeline processing, pipeline
hazards.
4. Input-Output organization: Asynchronous Data Transfer, Asynchronous
Communication Interface, Modes of Transfer: Interrupt-Initiated, Direct Memory
Access (DMA).
5. Memory Organization: Main Memory, Auxiliary Memory, Associative Memory:
Hardware Organization, Cache Memory: Mapping Schemes.
List of Text Books:
1. Computer Architecture Morris Mano.
List of Reference Books:
1. Computer Organization and architecture William Stallings.
2. Computer Architecture Schaum’s Outlines.
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Concepts of set theory
2. Concepts of functions and relations
Course Outcomes:
On successful completion of the course, student be able to:
1. Construct deterministic and nondeterministic finite state automata (DFA and NFA) for solving
simple decision problems and equivalence of regular expression with FSM.
2. Inspect capabilities of CFG and PDA.
3. Apply concept of Turing machine and un decidable problems.
Description of Contents in brief:
1. Introduction to Theory of computations, revision of basic set theory operations and relations
2. Finite State Machines, DFA, NFA and their conversions
3. Regular Expressions, Conversion of regular expression to NFA, DFA and vice versa
4. Regular Sets and their properties, Pumping Lemma
5. Output Machines Mealy and Moore machines
6. Context Free Grammar, Parse Tree, Simplification of CFG, Normalization of CFG
7. Push Down Automata, Non deterministic PDA
8. Context Free Languages and their properties, Regular Grammar
9. Turing Machines
10. Recursive and RE sets, Properties of recursive and RE sets.
11. Decidable and Un decidable problems, Non-RE language
12. The Universal Turing Machine, Rice’s Theorem, Post Correspondence Problem
List of Text Books:
1. Introduction to automata theory, language & computations Hopcroaf, Ullman and Motwani,
List of Reference Books:
1. Theory of Computer Sc. (Automata, Languages and computation): K.L.P. Mishra & N.
Chandrasekaran,
2. Introduction to formal Languages & Automata Peter Linz,
3. Fundamentals of the Theory of Computation- Principles and Practice, Ramond Greenlaw and
H. James Hoover
URLs:
1. https://nptel.ac.in/courses/106/104/106104148/
2. https://nptel.ac.in/courses/106/104/106104028/
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Basic Concept of Computer networks
2. Basic Concept of Analog and Digital Signals
Course Outcomes:
On successful completion of the course, student be able to:
1. Identify suitable transmission modes for information transfer.
2. Analyze various modulation techniques used for analog and digital transmission.
3. Analyze spread spectrum technology for wireless communication.
4. Identify various error detection and correction techniques.
Prerequisite:
1. Learn an OOP Language: Java, C++, Python etc. choose one and try to master it. There
are many tutorials/courses that cover these on Coursera and edX.
2. Algorithms and Data Structures: This is like the most important field of Computer
Science. Being good at Algorithms and Data Structures is ALWAYS a plus point.
Knowing how to implement a particular solution in the most efficient way is key for a
Software Developer. Working out problems alongside on platforms like CodeChef,
Hacker Rank will help you practice what you read.
3. Choose a Platform: iOS, Android, Windows, Web etc. Choose one and work towards
building your knowledge accordingly. Get to know the Platform in and out.
4. Analyze: This is the best way to learn and gain knowledge of how things are
happening. For example, if you want to work on Android, analyzing the source code
(since it's open source) will help a lot. Participate on forums like Stack Overflow etc.
Course Outcomes:
On successful completion of the course, student be able to:
1. Use the techniques necessary for software engineering practice.
2. Apply software engineering perspective through software design and construction,
requirements analysis, verification, and validation, to develop solutions to modern
problems such as security, data science, and systems engineering.
3. Apply new knowledge as needed, using appropriate learning strategies.
Description of Contents in brief:
1. Introduction to software engineering, software process & process models, Software
metrics and measurements.
2. software project management, software project planning, scheduling and tracking, cost
estimation methods
3. Requirements analysis: Principles, complexity, methods, structured analysis, SRS
Documentation. Design principles: abstraction, refinement, modularity, control
hierarchy, structured partitioning, design types and methods
4. Software coding: coding style, coding efficiency, capability maturity model (CMM),
Software quality assurance, Software testing: Software testing techniques, choice and
classification of test data, verification & validation methods.
5. Software maintenance, configuration management, system documentation, software
reusability, CASE tools.
List of Text Books:
1. Software Engineering: A Practitioner’s Approach by Roger S. Pressman, McGraw-Hill
International edition.
2. Software Engineering by Ian Sommerville, Addison-Wesley. 5. Fundamentals of
Software Engineering by Rajib Mall, PHI
List of Reference Books:
1. An Integrated Approach to Software Engineering, by Pankaj Jalote, Narosa Publishing
House.
2. Software Engineering by K.K. Agarwal.
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
Basics of Computer Architecture
Course Outcomes:
On successful completion of the course, student be able to:
1. Describe functional architecture of operating system
2. Describe process concept and its implementation, compare process scheduling
algorithms
3. Classify memory management schemes and compare them on the basis of related
advantages and disadvantages
4. Describe Process synchronization mechanisms used to solve synchronization problems,
describe mechanisms for handling Deadlock problems
5. Express various file allocation and access methods, Disk structure, describe and compare
various Disk scheduling algorithms
Description of Contents in brief:
1. Describe the general architecture of operating system, PCB, Process state transition
diagram, Process scheduling algorithms
2.
Concepts of uni-programming, Multiprogramming, Multitasking system
3. MVT and MFT memory management techniques, Paging schemes
4. Virtual memory concept, Page replacement algorithms and Segmentation scheme
5. Process synchronization and Deadlock concepts
6. Disk and File structure, Disk scheduling, I/O systems and System security
List of Text Books:
1. Operating System Concepts by Avi Silberschatz and Peter Galvin
2. Operating Systems: A Concept-Based Approach by D M Dhamdhere
3. Operating Systems: Internals and Design Principles by William Stallings
List of Reference Books:
1. Operating Systems: A Modern Perspective” by Gary J Nutt
2. Operating System: A Design-oriented Approach” by Charles Crowley
3. MODERN OPERATING SYSTEMS” by Andrew S Tanenbaum
URLs:
1. http://web.stanford.edu/~ouster/cgi-bin/cs140-spring20/index.php
2. http://faculty.salina.k-state.edu/tim/ossg/index.html
3. https://nptel.ac.in/courses/106105214/
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
1. http://sgbm.in/ebooks/cs/Compiler.pdf
2. https://holub.com/goodies/compiler/compilerDesignInC.pdf
3. https://nptel.ac.in/courses/106/104/106104123/
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Data Communications
2. Data Structures and Algorithms
3. C Programming
4. Fundamentals of Operating System and Computer Architecture
Course Outcomes: On successful completion of the course, students should be able to
1. Adapt computer network basics, network architecture, TCP/IP and OSI
reference models.
2. Interpret data link protocols, multi-channel access protocols and IEEE 802
standards for LAN.
3. Interpret routing and congestion in the network layer with routing algorithms
and classify IPV4 addressing scheme.
4. Determine the elements and protocols of the transport layer
5. Interpret network security and study various protocols such as FTP, HTTP,
Telnet, DNS.
Description of Contents in brief:
Introduction to TCP/IP and OSI reference model, polling techniques,
multiplexing, and concentration, transmission media used in physical layer. MAC
protocols ALOHA, CSMA/CA, CSMA/CD Ethernet, token bus, token ring,
(IEEE 802.3, IEEE 802.4, IEEE 802.5) DLL protocols, error correction and
detection codes, flow control protocols performance evaluation with error or
without error, protocol specification and verification, framing, HDLC. Switching
techniques, Routing and congestion in network layer, routing and congestion
control algorithms. Connection management in transport layer, protocols of
transport layer, TCP , UDP etc., world wide web (www), electronic mail(E-mail),
Study of high speed fibre optic networks, FDDI.
Prerequisite:
1. Nil
Course Outcomes:
On successful completion of the course, student be able to:
1. Apply techniques of statistical models and their applications for the analysis of data.
2. Create models for regression and time series forecasting.
3. Compare if there is a significant difference between two or more algorithms.
Description of Contents in brief:
1 Introduction to Statistics, Types of data, Categorical data, Numerical data, Association between
categorical and numerical data
2 Introduction to Data Analysis, Measures of Central Tendency, Measures of Dispersion,
Moments, Skewness and Kurtosis
3 Presentation of Data, Data Visualization, Histograms, Box Plots, Surface Plots etc.
4 Population and Sample, Methods of sampling.
5 Random variables, Different Probability density distributions, Bayesian Statistics, Central
Limit Theorem
6 Hypothesis Testing, confidence interval, T-Test, Wilcoxon test, ANOVA
7 Regression, Correlation
8 Time series forecasting.
3. Acquire advanced Data Analysis skills, Learn Industry relevant Applications of AI, and
Create AI solutions for various business problems.
4. Basic plan generation systems, Strips, Advanced plan generation systems, K strips,
Strategic explanations -Why, Why not and how explanations. Learning.
2. Stuart Russel and Peter Norvig “AI – A Modern Approach”, 2nd Edition, Pearson
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Education 2007.
URLs:
1. https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-034-
artificial-intelligence-fall-2010/
2. http://nptel.ac.in
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite if any:
1. None
Course Outcomes: On successful completion of the course, students should be able to
1. Determine the relevance and importance of Management Practices for Engineers.
2. Knowledge and Practices on the interdisciplinary course content that combines an engineering
focus with core business and management knowledge.
3. Interpret various methods of analysis and decision making related to operations, human
resources, finances and marketing management.
Description of Contents in brief:
Unit 1. Principles/Functions of Management, Measure of Productivity and ways to enhance
Productivity. Management challenges for Engineers.
Unit 2. Operations Management and its scope, Production Systems, Facility Location, Facility
Planning & Plant Layouts.
Unit 3. Industrial Design, Product Design, Product / Project Life Cycle, Quality Control and Quality
Management, Forecasting Methods, Introduction to Supply Chain Management.
Unit 4. Material Management – Purchasing, Inventory & JIT Systems, Material Resource Planning,
Scheduling, Project Management, PERT and CPM, Project Crashing.
URLs:
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
1. https://nptel.ac.in/courses/112/107/112107238/
2. https://nptel.ac.in/courses/110/107/110107144/
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
6. Image Segmentation:
Multi-level Thresh holding, Local Thresh holding, Region-based Approach, Detection of
discontinuation by point detection, Edge and Line Detection: Edge Detection, Edge
Operators,Pattern Fitting Approach, Edge Linking and Edge Following, Edge Elements
Extraction by Thresh holding Edge Detector Performance, Line Detection, Corner
Detection
7 Introduction of Image Transformation:
Discrete image transform. Wavelet transformation. Image Compression.
List of Text Books:
1. Jayaraman, S., Esakkirajan, S., & Veerakumar, T. (2009). Digital image processing tmh
publication. Year of Publication.
2. Digital Image Processing Second Edition (English, Paperback, S. Sridhar)
List of Reference Books:
1. Digital Image Processing 2nd Edition, Rafael C. Gonzalvez and Richard E. Woods.
Published by: Pearson Education.
2. Digital Image Processing and Computer Vision, R.J. Schalkoff. Published by: John
Wiley and Sons, NY.
3. Fundamentals of Digital Image Processing, A.K. Jain. Published by Prentice Hall,
Upper Saddle River, NJ.
URLs:
1. https://www.tutorialspoint.com/dip/index.htm
2. https://en.wikipedia.org/wiki/Digital_image_processing
3. https://www.geeksforgeeks.org/digital-image-processing-basics/
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Knowledge of computer networks, operating systems, data structures and algorithms.
2. Basic understanding of programming languages.
Course Outcomes: On successful completion of the course, students should be able to
1. Acquire professional/academic knowledge and skills. Describe some common problems
or attacks on network security. And also Describe some network security services and
mechanisms.
2. Design a security solution for a given application, a system with respect to the security
of the system.
Description of Contents in brief:
1. Introduction to Network And System Security. Basic concepts, common security goals.
Exploiting bugs in programs. Buffer overflows, return oriented programming, fuzzing.
2. Cryptography and cryptographic protocols, including encryption, authentication,
message authentication codes, Hash Functions - Security of Hash Functions and MACs -
MD5 message Digest algorithm - Secure Hash Algorithm - RIPEMD - HMAC Digital
Signatures, one way functions, public key cryptography, secure channels, zero
knowledge in practice, models and methods for security protocol analysis.
3. Malicious code analysis and defense. Intruders, Viruses, Worms, Trojan horses,
spyware, rootkits, botnets etc. and defenses against them, Detecting Attackers.
4. Software security. Secure software engineering, defensive programming, buffer overruns
and other implementation flaws.
5. Language based security: analysis of code for security errors, safe languages, and
sandboxing techniques. Operating system security. Memory protection, access control,
authorization, authenticating users, enforcement of security, security evaluation, trusted
devices, digital rights management.
6. Network security. Security services, Network based attacks, Security Issues in TCP/IP
suite- Sniffing, spoofing, buffer overflow, ARP poisoning, ICMP Exploits, IP address
spoofing, IP fragment attack, routing exploits, UDP exploits, TCP
exploits.Kerberos,X.509, firewalls, intrusion detection systems, DoS attacks and
defense. Case studies: DNS, IPSec.
7. Web security. Securing Internet Communication, XSS attacks and defenses, etc.
Advanced topics. Security monitoring, surreptitious communication, data remanence,
trusted devices, privacy and security of low powered devices (RFID) electronic voting,
quantum cryptography, penetration analysis, digital rights management and copy
protection, security and the law.
List of Text Books:
1. Network and System Security:John R. Vacca,2nd Edition (2010),ISBN 978-1-59749-
535-6 (1-7)
2. Computer Security: A Hands-on Approach, Wenliang Du, CreateSpace Independent
Publishing Platform; 1-st edition (2017)(1,3-7)
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
3. Cryptography and Network Security: Principles and Practice, 6th Edition, William
Stallings, 2014, Pearson, ISBN13:9780133354690.(1-2)
List of Reference Books:
1. Network Security: Private Communications in a Public World, M. Speciner, R. Perlman,
C. Kaufman, Prentice Hall, 2002.
2. Network Security, Firewalls And VPNs, J. Michael Stewart, Jones & Bartlett Learning,
2013, ISBN-10: 1284031675, ISBN-13: 978-1284031676.
3. The Network Security Test Lab: A Step-By-Step Guide, Michael Gregg, Dreamtech
Press, 2015, ISBN-10:8126558148, ISBN-13: 978-8126558148.
URLs:
https://nptel.ac.in/courses/106105031/
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Theoretical underpinning of the concepts related to Economics is crucial.
2. Technical knowledge and basic understanding of IPR laws is important.
Course Outcomes: On successful completion of the course, students should be able to
1. Be in a position to link the concepts of Economics and Engineering
2. Explore the production and relate it with cash flow and payments
3. Interpret the benefits of IPR
4. Explore the Indian laws and acts regarding IPR
Description of Contents in Brief:
1.Introduction to Economics- Flow in an economy, Law of supply and demand, Concept
of Engineering Economics – Engineering efficiency, Economic efficiency, Scope of
engineering economics – Element of costs, Marginal cost, Marginal Revenue, Sunk cost,
Opportunity cost, Break-even analysis – V ratio, Elementary economic Analysis –
Material selection for product Design selection for a product, Process planning.
2.Methods of comparison of alternatives – present worth method (Revenue dominated
cash flow diagram), Future worth method (Revenue dominated cash flow diagram, cost
dominated cash flow diagram), Annual equivalent method (Revenue dominated cash
flow diagram, cost dominated cash flow diagram), rate of return method, Examples in all
the methods.
3. Make or buy decision, Value engineering – Function, aims, and Value engineering
procedure. Interest formulae and their applications –Time value of money, Single
payment compound amount factor, Single payment present worth factor, Equal payment
series sinking fund factor, Equal payment series payment Present worth factor- equal
payment series capital recovery factor – Uniform gradient series annual equivalent
factor, Effective interest rate, Examples in all the methods.
4. Basic concepts, characteristics and nature of Intellectual Property Right, IPR and
Economic Development, major international instrument relating to the protection of IP.
Meaning, Criteria for obtaining patents, Non Patentable inventions, procedure for
registration, term of Patent, Rights of patentee, basic concept of compulsory license and
government use of patent, infringement of patents and remedies in case of infringement,
Relevant Sections.
5. Meaning of mark, trademark, and categories of trademark: Certification Mark and
well known mark and Non-conventional marks, concepts of distinctiveness. Designs, GI
and other forms of IP, Designs: meaning design protection, concept of original design,
term of protection, relevant sections. Geographical Indication: meaning of GI, difference
between GI and Trade Mark, Concept of Authorized Use, Homonymous GI, Relevant
section,. Trade-secret: meaning, Criteria of Protection, relevant sections. Plant Variety,
Protection and Farmer’s Right: meaning, criteria of protection, relevant sections.
List of Text Books:
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Understanding of the basic database concepts such as schema. ER model, Structured Query
language.
1. Data Warehousing and Business Analysis: - Data warehousing Components –Building a Data
warehouse –Data Warehouse Architecture – DBMS Schemas for Decision Support – Data
Extraction, Cleanup, and Transformation Tools –Metadata – reporting – Query tools and
Applications – Online Analytical Processing (OLAP) – OLAP and Multidimensional Data
Analysis.
2. Data Mining: - Data Mining Functionalities – Data Preprocessing – Data Cleaning – Data
Integration and Transformation – Data Reduction – Data Discretization and Concept Hierarchy
Generation- Architecture of a typical Data Mining Systems- Classification of Data Mining
Systems. Association Rule Mining: - Efficient and Scalable Frequent Item set Mining Methods –
Mining Various Kinds of Association Rules – Association Mining to Correlation Analysis –
Constraint-Based Association Mining.
1. J. Hahn and Micheline Kamber - Data Mining: Concepts and Techniques {Ch. 1,2,3,4,5}
1. Alex Berson and Stephen J. Smith “Data Warehousing, Data Mining & OLAP”, Tata McGraw –
Hill Edition, Tenth Reprint 2007.
2. K.P. Soman, Shyam Diwakar and V. Ajay “Insight into Data mining Theory and Practice”,
Easter Economy Edition, Prentice Hall of India, 2006.
3. G. K. Gupta “Introduction to Data Mining with Case Studies”, Easter Economy Edition, Prentice
Hall of India, 2006
URLs:
Prerequisite:
1. Demonstrate the data mining concepts such as classification, clustering etc. in real-world data
sets.
2. Perform data preprocessing tasks and association rule mining on data sets.
6. Probabilistic reasoning: Bayes nets, conditional independence, exact and approximate inference
7. Uncertainty: Formal and Empirical approaches including Bayesian Theory, Fuzzy Logic, Non-
monotonic Logic, Default Reasoning
1. Data Mining: Practical Machine Learning Tools and Techniques by Ian H. Witten, Eibe Frank,
Mark A. Hall
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
4. The Elements of Statistical Learning by Trevor Hastie, Robert Tibshirani, and Jerome Friedman
4. Automated Planning: Theory & Practice by Malik Ghallab, Dana Nau, Paolo Traverso.
URLs:
1. https://mrcet.com/pdf/Lab%20Manuals/CSE%20IV-I%20SEM.pdf
2. https://portal.iitb.ac.in/asc/Courses/crsedetail.jsp
3. https://portal.iitb.ac.in/asc/Courses/crsedetail.jsp
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Linear Algebra, Calculus
2. Programming skills in C, C++
3. Matrices, Vectors, Polynomials
Course Outcomes: At the end of the course, students should be able to
1. Analyze the development of computer graphics technologies.
2. Apply various operations on computer graphics.
3. Create to interactive computer graphics using OpenGL.
4. Perform geometric transformations on graphics objects.
Description of Contents in brief:
1. Introduction to Computer Graphics
Overview of Computer Graphics, Computer Graphics Application and Software,
Description of some graphics devices, Input Devices for Operator Interaction, Active
and Passive Graphics Devices
2. Two-Dimensional Transformations
Transformations and Matrices, Transformation Conventions, 2D Transformations,
Homogeneous Coordinates and Matrix Representation of 2D Transformations,
Translations and Homogeneous Coordinates
3. Three-Dimensional Transformations
Introduction, Three-Dimensional Scaling, Three-Dimensional Shearing, Three-
Dimensional Rotation, Three-Dimensional Reflection, Three-Dimensional Translation,
Multiple Transformation
4. Plane Curves and Surfaces
Curve Representation, Nonparametric Curves, Parametric Curves, Parametric
Representation of a Circle, Parametric Representation of an Ellipse, Parametric
Representation of a Parabola, Parametric Representation of a Hyperbola
5. Surfaces
Quadric Surfaces, Bezier Surfaces & spline B-spline surfaces.
6. Illumination & Shading
Illumination Models for Polygons, Reflectance properties of surfaces, Ambient.
Introduction, Various models of shading.
2. Ron Patton, “Software Testing”, Second Edition, Sams Publishing, Pearson Education,
2007.
List of Reference Books:
"The Art of Software Testing" Book by Glenford Myers ,Wiley 2011 Wiley
publication.
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Data Structures and Algorithms
2. C/C++ Programming
Course Outcomes: At the end of the course, students should be able to
1. Evaluate the application specific advanced data structures and analyze their amortized
complexity.
2. Use the proper data structure to reduce the running time of different applications.
Prerequisite:
1. Probability Theory and Distributions
2. Statistics
3. Linear Algebra
Course Outcomes: At the end of the course, students should be able to
1. Apply data science techniques to the organization’s data management challenges.
2. Interpret analytical models to make appropriate business decisions.
Description of Contents in brief:
1. The foundations of data science, statistics, Data Collection, Data Preprocessing and Data
modelling.
2. Analyze big data and make data-driven predictions through probabilistic modeling and
statistical inference.
3. Finishing this MicroMasters program will prepare you for job titles such as: Data
Scientist, Data Analyst, Business Intelligence Analyst, Systems Analyst, Data Engineer
List of Reference Books:
1. James, G., Witten, D., Hastie, T., Tibshirani, R. An introduction to statistical learning with
applications in Springer, 2013.
2. Hastie, T., Tibshirani, R., Friedman, J. The elements of statistical learning 2nd edition
Springer.
3. Han, J., Kamber, M., Pei, J. Data mining concepts and techniques. Morgan Kaufmann,
2011.
URLs:
1. https://www.edx.org/micromasters/mitx-statistics-and-data
science?source=aw&awc=6798_1584454842_ddf569d7fa91a7ea267eb38042b11800&ut
m_source=aw&utm_medium=affiliate_partner&utm_content=text-
link&utm_term=315645_LearnDataSci
2. http://cs109.github.io/2015/pages/videos.html
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Data Structure
2. Analysis and Design of Algorithms
3. Operating systems
4. Computer Architecture
Course Outcomes: At the end of the course, students should be able to
1. Interpret the parallel architecture.
2. Implement parallel algorithms for any given problem.
3. Calculate the speed-up, cost and efficiency of parallel algorithm.
Description of Contents in brief:
1. Introduction to parallel algorithm, data parallel and control parallel approach
2. Models of parallel computation, PRAM Model, Parallel Complexity, Elementary
Parallel Algorithms, Matrix Multiplication
3. Searching, sorting, and graph algorithms.
4. Introduction to distributed algorithms, synchronous algorithms network model, leader
election algorithm, minimum spanning tree, shortest path.
5. Distributed consensus k agreement problem, two phase commit, three phase commit,
mutual exclusion algorithms, and applications of distributed algorithm.
List of Text Books:
1. Parallel algorithms Michael. J. Quinn
2. Michael J Quinn, Parallel Computing, TMH
3. Joseph Jaja, An Introduction to Parallel Algorithms, Addison Wesley
List of Reference Books:
1. Implicit Parallel Programming in PH
2. Distributed algorithm Nancy Lynch
3. Guy Blelloch, Prefix Sums and Their Applications, in Synthesis of Parallel Algorithms,
edited by John H Reif, Morgan Kaufmann, 1991.
4. Alan Gibbons and Wojciech Rytter, Efficient Parallel Algorithms, Cambridge
University Press, 1989.
5. Mark Harris, Shubhabrata Sengupta, and John Owens, Parallel Prefix Sum (Scan) with
CUDA, in GPU Gems 3, edited by Hubert Nguyen, 2007.
URLs:
1. http://www.toves.org/books/distalg/
2. https://www.comp.nus.edu.sg/~rahul/allfiles/cs6234-16-pds.pdf
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Course Code
CSE 452
Core / Elective / Other Group 3(A), 4(A),5(A),6(A)Department Elective
Prerequisite:
1. Algorithms
2 Discrete Mathematics, Computer and Network Security
Course Outcomes: At the end of the course, students should be able to
1. Analyze different cryptosystems.
2. Identify the differences between secret key and public key cryptosystems.
3. Identify the different approaches to quantify secrecy.
Description of Contents in brief:
Introduction to cryptography, Security Attacks, Mechanism and Services,
Cryptosystems,Conventional encryption model and techniques, classical encryption
techniques – substitution ciphers and transposition ciphers – Hill Cipher, Vigenere, Playfair,
Caesar, Multiplicative, Enigma machine, cryptanalysis, stream and block ciphers. Block
ciphers principals, feistel and non-feistel structure, DES, 3DES, AES, IDEA encryption and
decryption, key distribution. Finite field: Introduction to graph, ring, and field, modular
arithmetic, Fermat’s and Euler’s theorem, Euclid’s algorithm, Chinese remainder theorem,
Comparison of symmetric and public-key cryptographic systems, Modern Trend in
asymmetric-key cryptography – Elliptic curve based cryptography, Principals of public-key
cryptosystems, RSA algorithm, Diffie-Hellman key exchange algorithm, Message
Authentication and Hash Function: security of hash functions and MACS, message digest,
MD5, SHA, RIPEMD, HMAC
List of Text Books:
1. Cryptography and Network Security: Principles and Practice, William Stallings
List of Reference Books:
1. Cryptography Theory and Practice, Douglas R. Stinson
2. Applied Cryptography: Protocols, Algorithms, Bruce Schneier
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
3. Describe data link protocols, multi-channel access protocols and IEEE 802standards for
LAN.
4. Classify routing, congestion and IPV4 addressing scheme.
Description of Contents in brief:
Introduction to TCP/IP network model, IP: Internet Protocol- IP header, IP Routing
Principal,IP Fragmentation, Checksum, IP options. Subnetting, Subnet masks,
Supernetting, CIDRDirectly/indirectly connected machines, IP addresses. Ethernet,
framing, ARP, ARP Cache,ARP Packet Format, RARP, Serial Links, Bridges,
Spanning Tree algorithm, ICMP- ICMP
message type, ICMP address mask request and reply, ICMP Query and Error
message,determining the path MTU.RARP and ARP. Transport layer protocols: TCP
and UDP: TCPand UDP header, Connection Establishment and Termination, TCP State
Transition diagram,Segmentation, Maximum Segment Size. ISN and sequence
numbers. TCP data transfer --sliding windows, slow start, congestion avoidance, fast
retransmit, fast recovery. TCP –Timeout and Retransmission. Sockets. Web
Technology: DNS, IGMP, FTP, POP, SMTP,HTTP, HTML, XML Basic concept of
client/server computing.
List of Text Books:
1. W Richard Stevens, TCP/IP Illustrated Vol. I: The Protocols, Pearson
Education Asia, 2000.
List of Reference Books:
1. W Richard Stevens, TCP/IP Illustrated Vol. III: TCP for Transaction, HTTP, NNTP,
and the UNIX Domain Protocols, Pearson Education Asia,2000.
URLs:
1. https://docs.oracle.com/cd/E23823_01/html/816-4554/ipov-6.html
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Edges - Canny, LOG, DOG; Line detectors (Hough Transform), Corners - Harris and
Hessian Affine, Orientation Histogram, SIFT, SURF, HOG, GLOH, Scale-Space Analysis-
Image Pyramids and Gaussian derivative filters, Gabor Filters and DWT.
4. Image Segmentation
Photometric Stereo; Use of Surface Smoothness Constraint; Shape from Texture, color,
motion and edges.
List of Text Books:
1. Digital Image Processing using MATLAB, By: Rafael C. Gonzalez, Richard Eugene
Woods, 2nd Edition, Tata McGraw-Hill Education 2010
2. Richard Szeliski, Computer Vision: Algorithms and Applications, Springer-Verlag
London Limited 2011.
3. Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Pearson Education,
2003.
List of Reference Books:
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer Vision,
Second Edition, Cambridge University Press, March 2004.
2. K. Fukunaga; Introduction to Statistical Pattern Recognition, Second Edition, Academic
Press, Morgan Kaufmann, 1990.
3. R.C. Gonzalez and R.E. Woods, Digital Image Processing, Addison- Wesley, 1992.
URLs:
1. https://nptel.ac.in/courses/106105216/
2. https://towardsdatascience.com/computer-vision-for-beginners-part-1-7cca775f58ef
3. https://www.tutorialspoint.com/artificial_intelligence_with_python/artificial_intelligence_
with_python_computer_vision.htm
4. https://www.mathworks.com/products/matlab.html
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Name of B.Tech
Program
Name of Course Information Theory & Coding
Source coding, Coding Efficiency, Shannon Fano Coding. Error detecting and error
correcting codes, Types of codes: block codes, hamming and Lee metrics, linear block codes,
parity check codes, cyclic code. Convolutional codes. Compression: loss less and lossy
compression, Huffman Coding, LZW algorithm, Binary image compression schemes, Video
image compression techniques.
List of Text Books:
1. Communication Systems: Analog and Digital by Singh and Sapre TMH Publications
2. Multimedia Communications by Fred Halsall, Pearson Publications.
List of Reference Books:
1. Information Theory, Coding and Crptography, by R Bose, TMH 2007
2. Multimedia system Design by Prabhat K Andleigh and Kiran Thakrar PHI
Publications.
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Computer Networks
2. Basic Programming
Course Outcomes: At the end of the course, students should be able to
1. Use various architectures in designing distributed systems.
2. Build distributed systems using various inter-process communication techniques.
3. Attain the knowledge of different distributed algorithms.
Description of Contents in brief:
Distributed Computing: Introduction, Types, and Various system models.
Communication and Processes: RPC, RMI and others, Client and Server threads. Clock
Synchronization: Types of clock and their synchronization, Introduction to distributed
mutual exclusion, Election of a process, Consensus and related problems; Consistency:
Various types of consistency, Consistency protocols, Fault tolerance: Introduction to
fault tolerance, Process resilience; Protection and security in distributed systems:
Various types of security techniques, Cryptography; Examples of distributed systems:
Distributed file systems, Distributed shared memory and others.
List of Text Books:
Distributed Systems Principles and paradigms Andrew S. Tanenbaum and Maarten
List of Reference Books:
Distributed systems, concepts and design, George Colouris, Jean Dollimore and Tim
Kindberg.
MAULANA AZAD NATIONAL INSTITUTE OF TECHNOLOGY
BHOPAL - 462003
Prerequisite:
1. Basic Programming
Prerequisite:
1. Nil
Course Outcomes: At the end of the course, students should be able to
1. Develop mathematical models.
2. Formulate optimization problems.
3. Analyze standard techniques of optimization.
Description of Contents in brief:
1 Unconstrained Optimization, Convex Optimization, Optimization Using Calculus
2 Graphical Optimization, Linear Programming
3 Quadratic Programming.
4 Optimization Problem Formulation of machine learning algorithms like SVM and its
variants, ELM and its variant etc..
5 Study of evolutionary optimization techniques like PSO, Artificial Bee Colony
Algorithm, Genetic Algorithm, Ant Colony Optimization, Simulated Annealing, Neadler
Mead Algorithm etc.
6 Integer Programming
7 Dynamic Programming
8 Error Functions and their minimization techniques
URLs:
1. https://swayam.gov.in/nd2_nou19_cs08/
2. https://cybercrime.gov.in/pdf/Cyber%20Security%20Awareness%20Booklet%20for%2
0Citizens.pdf
3. https://en.wikipedia.org/wiki/Information_warfare
3. Types of Biometric :
Physical : Fingerprints, Hand Geometry, Retina Scanning, Iris scanning
Facial Recognition, DNA
Behavioral : Signature, Voice, Key stroke pattern, Gait Body dynamics
6. Pattern Classification, By: Richard O. Duda, David G.Stork, Peter E. Hart, Wiley 2007
List of Reference Books:
1. D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Handbook of Fingerprint
recognition, Springer Verlag, 2003.
2. A. K. Jain, R. Bolle, S. Pankanti (Eds.), BIOMETRICS: Personal Identification in
Networked Society, Kluwer Academic Publishers, 1999.
3. J. Wayman, A.K. Jain, D. Maltoni, and D. Maio (Eds.), Biometric Systems:
Technology, Design and Performance Evaluation, Springer, 2004.
4. Anil Jain, Arun A. Ross, Karthik Nandakumar, Introduction to biometric,
Springer,2011.
URLs:
1. https://nptel.ac.in/courses/106104119/
2. https://www.tutorialspoint.com/biometrics/index.htm
3. https://www.mathworks.com/products/matlab.html
4. https://www.coursera.org/lecture/usable-security/biometric-authentication-RXVog