HEAD
New Scheme Based On AICTE Flexible Curricula Computer Science & Information Technology, VI-Semester
This course introduces the concepts and methods required for the construction of large software intensive systems.
The course aims are to develop a broad understanding of the discipline of software engineering and management of software systems.
Apply project management concepts and techniques to an IT project.
Identify issues that could lead to IT project success or failure.
Explain project management in terms of the software development process.
Describe the responsibilities of IT project managers.
Apply project management concepts through working in a group as team leader or active team member on an IT project.
Introduction, Software- problem and prospects Software development process: Software life cycle models, Open source software development, the unified process, documentation, configuration management, Safety, risk assessment.
Measures, Metrics and Indicators, Metrics in the Process and Project Domains, Software Measurement, Metrics of Software Quality, S/W reliability, Software estimation techniques, loc and FP estimation. Empirical models like COCOMO, project tracking and scheduling, reverse engineering.
Software requirements and specification: feasibility study, Informal/formal specifications, pre/post conditions, algebraic specification and requirement analysis models, Specification design tools. Software design and implementation: Software design objectives, design Like, Top-Down, bottom-up, team etc. techniques, User interface design, modularity Functional decomposition Data flow design, Data structure design, Object-oriented design, Design patterns implementation strategies.
Coding standard and guidelines, programming style, code sharing, code review, software components, rapid prototyping, specialization, construction, class extensions, intelligent software agents, reuse performance improvement, debugging. Software Testing Strategies: Verification and Validation, Strategic Issues, test plan, white box, black-box testing, unit and integration testing, system testing test case design and acceptance testing, maintenance activities.
Agile Vs Traditional SDLC Models, Phases of Agile Model, Principles of Agile model, Agile Model - Pros and Cons, , When to use the Agile Model? , Agile Testing Methods, Scrum, Product Backlog, Scrum Practices, Process flow of Scrum Methodologies, extreme Programming (XP), Phases of eXtreme programming, Crystal Methodologies, Dynamic Software Development Method (DSDM), Feature Driven Development (FDD), Lean Software Development, KANBAN, Agile metrics.
Schwalbe, Kathy (2016) Information Technology Project Management Edition: 8th ISBN-13: 978-1285452340, ISBN-10: 1285452348.
Software Engineering. A Practitioner's Approach by P, S. Pressman New edition McGraw.
Software project Management from concept to development Black Book by Kieron Conway, Dreamtech Press.
Software Engineering principle and practices- Deepak Jain Oxford University Press.
Software Engineering for students 4/e - Bell Douglas Pearson Education.
Software Project Management, Kelkar, PHI Learning.
Learning Agile: Understanding Scrum, XP, Lean, and Kanban, By Andrew Stellman, Jennifer Greene, 2015, O Reilly
Identifying the requirements from problem statements.
Modeling UML use case diagram & capturing use case scenarios.
E-R modeling from the problem statements.
Activity & state chart modeling.
Modeling UML class diagram & collaboration diagrams/sequence diagrams.
Identifying domain classes from the problem statements.
Modeling DFD.
Designing test suite.
Estimation of test coverage metrics & structural complexity.
Estimation of project metrics.
To introduce students to the basic concepts and techniques of Machine Learning and to develop skills of using recent machine learning software for solving practical problems.
Apply knowledge of computing and mathematics to machine learning problems, models and algorithms,
Analyze a problem and identify the computing requirements appropriate for its solution;
Design, implement, and evaluate an algorithm to meet desired needs.
Apply mathematical foundations, algorithmic principles, and computer science theory to the modeling and design of computer-based systems in a way that demonstrates comprehension of the trade-offs involved in design choices.
Introduction to machine learning, scope and limitations, regression, probability, statistics and linear algebra for machine learning, convex optimization, data visualization, hypothesis function and testing, data distributions, data preprocessing, data augmentation, normalizing data sets, machine learning models, supervised and unsupervised learning.
Linearity vs non linearity, activation functions like sigmoid, ReLU, etc., weights and bias, loss function, gradient descent, multilayer network, back propagation, weight initialization, training, testing, unstable gradient problem, auto encoders, batch normalization, dropout, L1 and L2 regularization, momentum, tuning hyper parameters.
Convolution neural network, flattening, sub sampling, padding, stride, convolution layer, pooling layer, loss layer, dance layer 1x1 convolution, inception network, input channels, transfer learning, one shot learning, dimension reductions, implementation of CNN like tensor flow, keras etc.
Recurrent neural network, Long short-term memory, gated recurrent unit, translation, beam search and width, Bleu score, attention model, Reinforcement Learning, RL-framework, MDP, Bellman equations, Value Iteration and Policy Iteration, , Actor-critic model, Q- learning, SARSA.
Support Vector Machines, Bayesian learning, application of machine learning in computer vision, speech processing, natural language processing etc, Case Study: ImageNet Competition.
Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer-Verlag New York Inc., 2nd Edition, 2011.
Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
Ian Goodfellow and Yoshua Bengio and Aaron Courville, “Deep Learning”, MIT Press, 2016.
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow: Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; First edition (2017).
Francois Chollet, "Deep Learning with Python", Manning Publications, 1 edition (10 January 2018).
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for Data Scientists", Shroff/O'Reilly; First edition (2016).
Russell, S. and Norvig, N. “Artificial Intelligence: A Modern Approach”, Prentice Hall Series in Artificial Intelligence. 2003.
How to setup a python environment for Machine Learning & Deep Learning with Anaconda.
Program to implement linear algebra (like Matrix multiplication, transposition etc.).
Write a program to implement linear regression.
Write a program to build ANN by implementing Back-propagation algorithm using some dataset.
Write a program to implement Neural Network in python with step by step.
Write a program to construct a Bayesian Network considering Medical data.
Write a program to implement Support vector machine.
Write a program to implement K-Means.
Write a program to implement Principal Component Analysis.
Write a program to implement of Dimensionality Reduction.
To explain the various terminology, principles, devices, schemes, concepts, algorithms and different methodologies used in Wireless Communication Networks. To enable students to compare and contrast multiple division techniques, mobile communication systems, and existing wireless networks.
Explain the basic concepts of wireless network and wireless generations.
Demonstrate the different wireless technologies such as CDMA, GSM, GPRS etc.
Explain the design considerations for deploying the wireless network infrastructure.
Appraise the importance of Adhoc networks such as MANET and Wireless Sensor networks.
Differentiate and support the security measures, standards. Services and layer wise security considerations.
Antenna, radiation pattern, antenna types, antenna gain, propagation modes, types of fading. Model for wireless digital communication, multiple access technique-SDMA, TDMA, FDMA, CDMA, DAMA, PRMA, MAC/CA, Cellular network organization, operations of cellular system, mobile radio propagation effects, handoff, power control, sectorization, traffic engineering, Infinite sources, lost calls cleared, grade of service, poison arrival process.
GSM- Services, system architecture, radio interface, logical channels, protocols, localization and calling, handover, security, HSCSD, GPRS-architecture, Interfaces, Channels, mobility management DECT, TETRA, UMTS.
IEEE 802.11: LAN-architecture, 802.11 a, b and g, protocol architecture, physical layer, MAC layer, MAC management, HIPERLAN-protocol architecture, physical layer, access control sub layer, MAC sub layer. Bluetooth-user scenarios- physical layer, MAC layer.
Mobile IP, DHCP, Ad hoc networks: Characteristics, performance issue, routing in mobile host. Wireless sensor network, Mobile transport layer: Indirect TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission, transaction oriented TCP. Introduction to WAP.
Intruders, Intrusion detection, password management, viruses and related threads, worms, trojan horse defense, difference biometrics and authentication system, firewall design principle.
J. Schiller, “Mobile Communication”, Addision , Wiley.
William Stalling, “Wireless Communication and Network”, Pearson Education.
Upena Dalal,” Wireless Communication”, Oxford Higher Education.
Dr. Kamilo Feher, “Wireless Digital communication”, PHI.
William C.Y Lee, “Mobile Communication Design Fundamental”, John Wiley.
Stojmenic Ivan, Handbook of Wireless Networks and Mobile Computing, John Wiley and Sons Inc 2002.
Yi Bing Lin and Imrich Chlamtac, Wireless and Mobile Network Architectures, John Wiley and Sons Inc 2000
Pandya .aj, Mobile and Personal Communications Systems and Services, PHI 2004.
New Scheme Based On AICTE Flexible Curricula Computer Science & Information Technology, VI-Semester
To introduce the principles of computer graphics and the components of a graphics system.
To introduce basic algorithms for drawing line, circle and curves.
To develop understanding of the basic principles of 2D and 3D computer graphics and how to transform the shapes to fit them as per the picture definit io n.
To introduce mult imedia architecture and hardware.
To introduce mult imedia file formats.
Understand the core concepts of computer graphics.
Implement various shapes drawing algorithms.
Apply geometric transformations on graphic objects and also implement clipping, shading and colour models.
Understand multimedia systems architecture, multimedia components and use various multimedia tools.
Perform activities involved in design, development and testing of modeling, rendering, shading and animation.
Introduction to Raster scan displays, Storage tube displays, Pixel, refreshing, flickering, interlacing, colour monitors, working of different types of printers , working principles of keyboard, mouse scanner, digit izing camera, track ball, tablets and jo yst icks, graphical input techniques, posit ioning techniques, rubber band techniques, dragging etc.
Scan conversio n techniques, image representation, line drawing, simple DDA, Bresenham’s Algorithm, Circle drawing, general method, symmetric DDA, Bresenham’s Algorithm, curves, parametric function, Bezier Method, B-spline Method.
2D & 3D Co-ordinate system, Translat ion, Rotation, Scaling, Reflect ion Inverse transformat ion, Composite transformat ion, world coordinate system, screen coordinate system, parallel and perspective project ion, Representation of 3D object on 2D screen, Point
Clipping, Line Clipping Algorithms, Polygon Clipping algorithms, Introduction to Hidden Surface elimination, Basic illuminat ion model, diffuse reflect ion, specular reflection, co lor models like RGB, YIQ, CMY, HSV.
Introduction to mult imedia components applications, Mult imedia System Architecture, Evolving techno logies for Mult imedia, Defining objects for Mult imedia systems, Mult imedia Data interface standards, Mult imedia Databases, Mult imedia Hardware, SCSI, IDE, MCI, Mult imedia Tools, presentation tools, Authoring tools.
Compression & Decompression, Multimedia Data & File Format standards, TIFF, MIDI, JPEG, DIB, MPEG, RTF, Multimedia I/O technologies, Digital voice and audio, Video image and animation, Full motion video, Storage and retrieval technologies.
Donald Hearn and M.Pauline Baker, Computer Graphics C Version, Pearson Education, 2003.
Prabat K Andleigh and Kiran Thakrar, Mult imedia Systems and Design, PHI Learning,
Tay Vaughan, Multimedia making it work, Tata McGraw Hill edit io n.
Amarendra N Sinha & Arun D Udai, Computer Graphics, McGraw Hill publicat ion.
Mukherjee, Fundamental of Computer Graphics and Mult imedia, PHI Learning.
This subject aims to provide students with a fundamental knowledge of computer hardware and computer systems, with an emphasis on system design and performance. The module concentrates on the principles underlying systems organization, issues in computer system design, and contrasting implementations of modern system
Discuss the classes of computers, and new trends and developments in computer architecture.
Study advanced performance enhancement techniques such as pipelines, dynamic scheduling branch predictions, caches.
Compare and contrast the modern computer architectures such as RISC, Scalar, and multi CPU systems.
Critically evaluate the performance of different CPU architecture.
Improve the performance of applications running on different CPU architectures.
Develop applications for high performance computing systems.
Flynn’s Classification, System Attributes to Performance, Parallel computer models - Multiprocessors and multicomputers, Multivector and SIMD Computers. Data and resource dependences, Hardware and software parallelism, Program partitioning and scheduling, Grain size and latency, Control flow, data flow and Demand driven mechanisms. Static interconnection networks, Dynamic interconnection Networks: Bus Systems, Crossbar Switch, Multiport Memory, Multistage and Combining Networks.
Instruction set architecture, CISC Scalar Processors, RISC Scalar Processors, VLIW architecture, Memory Hierarchy, Inclusion, Coherence and Locality, Memory capacity planning. Interleaved memory organization-memory interleaving, pipelined memory access, Bandwidth and Fault Tolerance. Backplane Bus System: Backplane bus specification, Addressing and timing protocols, Arbitration transaction and interrupt.
Linear pipeline processor, Nonlinear pipeline processor, Instruction pipeline design, Mechanisms for instruction pipelining, pipeline hazards, Dynamic instruction scheduling - score boarding and Tomosulo’s algorithm, Branch handling techniques, Arithmetic Pipeline Design, Static arithmetic pipeline, Multifunctional arithmetic pipelines. Superscalar pipeline design, Super pipeline processor design.
Cache coherence, Snoopy protocols, Directory based protocols. Message routing schemes in multicomputer network, deadlock and virtual channel. Vector Processing Principles, Vector instruction types, Vector-access memory schemes. Vector supercomputer architecture, SIMD organization: distributed memory model and shared memory model. Principles of Multithreading: Multithreading Issues and Solutions, Multiple-Context Processors.
Parallel Programming Models, Shared-Variable Model, Message-Passing Model, Data-Parallel Model, Object-Oriented Model, Functional and Logic Models, Parallel Languages and Compilers, Language Features for Parallelism, Parallel Programming Environment, Software Tools and Environments.
Kai Hwang, “Advanced computer architecture”, TMH.
J.P.Hayes, “computer Architecture and organization”; MGH.
V.Rajaranam & C.S.R.Murthy, “Parallel computer”; PHI Learning.
Kain,”Advance Computer Architecture: -A System Design Approach”, PHI Learning.
M.J Flynn, “Computer Architecture, Pipelined and Parallel Processor Design”; Narosa Publishing.
Hwang and Briggs, “Computer Architecture and Parallel Processing”; MGH.
David E. Callav & Jaswinder Pal Singh Marge Kaufmann”,Advance Computer Architecture”, EIS India.
Sajjan G. Shiva, Taylar & Francis, “Advance Computer Architecture.
This Course focuses towards the introduction of network security using various cryptographic algorithms. It also focuses on the practical applications that have been implemented and are in use to provide email and web security.
Analyze and evaluate the cyber security needs of an organization.
Analyze software vulnerabilities and security solutions to reduce the risk of exploitation.
Measure the performance and troubleshoot cyber security systems.
Implement cyber security solutions and use of cyber security, information assurance, and cyber/computer forensics software/tools.
Design and develop security architecture for an organization.
Design operational and strategic cyber security strategies and policies.
Introduction to Network Security, Computer Securit y and Cyber Security. Security Terminologies and Principle, Security Threats, Types of attacks (Operating System, application level, Shrink Wrap code, Misconfiguration attacks etc.). Introduction to Intrusion, Terminologies, Intrusion Detection System (IDS), Types of Intrusion Detection Systems, System Integrity Verifiers (SIVS).Indication of Intrusion: System Indications, File S ystem Indications Network Indications. Intrusion Detection Tools ,Post attack IDS Measures & Evading IDS Systems. Penetration Testing, Categories of security assessments, Vulnerability Assessment, Types of Penetration Testing. Risk Management.
Cryptography, Classical Cryptographic Techniques, Encryption, Decryption, Code Breaking: Methodologies, Cryptanalysis, Cryptography Attacks, Brute-Force Attack, Use of Cryptography. Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms RSA, Data Encryption Standard (DES), RC4, RC5, RC6,
Blowfish, Key Management, Diffie- Hellman key exchange, elliptic curve cryptography.
Hash Functions, One-way Hash Functions, SHA (Secure Hash Algorithm), Authentication Requirements, Authentication Functions, Kerberos. Message Authentication codes, Message Digest Functions, MD5, SSL (Secure Sockets Layer), SSH (Secure Shell), Algorithms and Security, Disk Encryption, Government Access to Keys (GAK) Digital Signature: Analysis, Components, Method, Applications, Standard, Algorithm: Signature Generation/Verification, ECDSA, EIgamal Signature Scheme, Digital Certificates.
IP Security, Web Security, Firewalls: Types, Operation, Design Principles, Trusted Systems. Computer Forensics, Need, Objectives,Stages & Steps of Forensic Investigation in Tracking Cyber Criminals, Incident Handling. Hacking, Classes of Hacker (Black hats, grey hats, white hats, suicide hackers), Footprinting, Scanning (Types-Port, Network, Vulnerability), E-Mail Spiders, Overview of System Hacking Cycle.
William Stallings, “Cryptography and Network Security: Principles and Practice” Pearson Charlie Kaufman, Radia Perlman, Mike Speciner, Michael Speciner, “Network Security - Private communication in a public world” TMH
Fourozon, “Cryptography & Network Security” TMH.
Joseph Migga Kizza, Computer Network Security, Springer International Edition.
Atul Kahate, “Cryptography and Network Security” Mc Graw Hill
Carl Endorf, Eugene Schultz, Jim Mellander “Intrusion Detection & Prevension” TMH.
Neal, Krawetz, Introduction to Network Security,Cengage Learning.
New Scheme Based On AICTE Flexible Curricula Computer Science & Information Technology, VI-Semester
To introduce students with knowledge about the basic funct ions and applicat ions of embedded systems.
To introduce the architecture of embedded systems.
To introduce the various communicat ion protocols.
To enable students to have knowledge of the memory t ypes and supporting techno logies of embedded systems.
To enable students to have knowledge about the development of embedded software.
Explain the embedded system concepts and architecture of embedded systems.
Describe the architecture of 8051 microcontroller and write embedded program for 8051 microcontroller.
Select elements for an embedded systems tool.
Understand the memory t ypes used in embedded systems.
Design a system, component, or process to meet desired needs within realist ic constraints such as economic, environmental, social, polit ical, ethical, healt h and safet y, manufacturabilit y, and sustainabilit y.
Introduction to Embedded Systems: Definit io n of embedded system, embedded systems vs. general co mput ing systems, history of embedded systems, classificat ion, major applicat ion areas, purpose of embedded systems, characteristics and qualit y attributes of embedded systems, commo n design metrics, and processor technology: general purpose processor, applicat ion specific processor, single purpose processor.
Embedded System Architecture: Von Neumann v/s Harvard architecture, instruction set architecture, CISC and RISC instructions set architecture, basic embedded processor, microcontroller architecture, CISC & RISC examples: 8051, ARM, DSP processors.
Input Output and Peripheral Devices Timers and counters, watchdog timers, interrupt controllers, PWM, keyboard controller, analog to digital converters, real t ime clock. Introduction to communicat ion protocols: basic termino logies, concepts, serial protocol:
I2C, CAN, firewire, USB. Parallel protocols: PCI bus, IrDA, bluetooth, IEEE 802.11, wireless protocols.
Memory System Architecture Caches, virtual memory, MMU, address translat ion, memory and int er facing, memory write abilit y and storage performance. Memory types, composing memory – advance RAM interfacing, microprocessor interfacing I/O addressing, interrupts, direct memory access, arbitration mult ilevel bus architecture.
Embedded System Supporting Techno logies Difference between normal OS and RTOS, scheduling algorithms. Case study: Tiny OS, VxWorks, QNX. Overview of VLSI techno logy, introduction to device drivers. Case studies: washing machine, air-condit io ning, auto focus camera.
F Vahid, T Giogarvis, Embedded systems: A unified hardware/software approach, Wiley, 1999.
Raj Kamal, Embedded Systems Introduction, 2nd Ed., TMH publicat ion, 2015.
David E Simo ns, An Embedded Software Primer, Pearson, 1999.
To enable Students to understand Primary forms of IPR, infringement of copyright and its consequences and to introduce criteria and procedure for obtaining patents.
Understand Primary forms of IPR.
Assess and critique some basic theoretical justification for major forms of IP Protection
Compare and contrast the different forms of IPR in terms of key differences and similarities.
Understand the registration procedures related to IPR.
Have exposure to contemporary issues and enforcement policies in IPR.
Introduction and Justifications of IPR, Nature of IP, Major forms of IP- Copyright, Patent, Trade Marks Designs, Geographic indication, layout design of Semiconductors, Plant varieties, Concept & Meaning of Intellectual Property. Major international documents relating to the protection of IP - Berne Convention, Paris Convention, TRIPS. The World Intellectual Property Organization (WIPO).
Meaning and historical development of copyright , Subject matter , Ownership of copyright, Term of copyright, Rights of owner, Economic Rights, Moral Rights. Assignment and licence of rights, Infringement of copyright, Exceptions of infringement, Remedies, Civil, Criminal, Administrative, Registration Procedure.
Meaning and historical development,. Criteria for obtaining patents, Non patentable
inventions, Procedure for registration, Term of patent, Rights of patentee, Compulsory licence, Revocation, Infringement of patents, Exceptions to infringement, Remedies, Patent office and Appellate Board.
IPR & sustainable development, The Impact of Internet on IPR. IPR Issues in
biotechnology, E- Commerce and IPR issues, Licensing and enforcing IPR, Case studies in IPR.
P. Narayanan, Intellectual Property Law, Eastern Law House
Neeraj Pandey and Khushdeep[ Dharni, Intellectual Property Rights, PHI, 2014
N.S Gopalakrishnan and T.G. Agitha, Principles of Intellectual Property, Eastern Book Co. Lucknow, 2009.
Anand Padmanabhan, Enforcement of Intellectual Property, Lexis Nexis Butterworths, Nagpur, 2012.
Managing Intellectual Property The Strategic Imperative, Vinod V. Sople, PHI.
Prabuddha Ganguli, “ Intellectual Property Rights” Mcgraw Hill Education, 2016.
Universal's Guide to Patents Law (English) 4th Edition (Paperback, MANISH ARORA) - Publisher: Universal Law Publishing House ISBN: 9788175345836, 8175345837 Edition: 4thEdition, 2007.
The course is designed to provide Basic knowledge of Python. Python programming is intended for software engineers, system analysts, program managers and user support personnel who wish to learn the Python programming language. Learning Outcomes: Problem solving and programming capability.
Install Python and have knowledge of syntax of Python.
Describe the Numbers, Math functions, Strings, List, Tuples and Dictionaries in Python.
Express different Decision Making statements and Functions.
Develop code in Python using functions, loops etc.
Design GUI Applications in Python and evaluate different database operations.
Introduction, History, Features, Python –Environment Setup Local Environment Setup, Getting Python, Installation of Python, Use of IDE.
Python –Basic SyntaxPython Identifiers, Reserved Words, Lines & Indentation, Multiline Statements, Quotation in Python, Comments & other useful constructs, Python –Variables Assigning Values to Variables, Multiple Assignment, Standard Data Types.
Python –Variables, Assigning Values to Variables, Multiple Assignment, Standard Data Types; Python Numbers, Python Strings, Python Lists, Python Tuples, Dictionary, DataType Conversion.
Python –Basic Operators, Types of Operators, Arithmetic Operators, Comparison Operators, Assignment Operators, Bitwise Operators, Logical Operators, Operator Precedence, Python – Decision Making & Loops, Flowchart, If statement Syntax.
Python-Functions, Syntax for defining a function, Calling a Function, Function Arguments, Anonymous Functions Python-Applications & Further Extensions.
Python Crash Course: A Hands-On, Project-Based Introduction to Programming, by Eric Matthes, No Starch Press.
Learn Python the Hard Way’ by Zed A. Shaw (3rd Edition), Addison Wesley.
Head-First Python, by Paul Barry, O’Reilly.
‘Python Programming’ by John Zelle, Franklin, Beedle & Associates Inc;
Write a program for literals, constants, data type, i/o.
To create a program for list, tuples and dictionary.
To write a program to find mean, median, mode for the given set of numbers in a list.
To write a program to find the first n prime numbers.
Write a Program for checking whether the given number is an even number or not.
Write a program to find the square root of a number.
To write a program to find the exponentiation (Power of a number).
To write a program to print Fibonacci Series.
To write a program to show Inheritance.
To achieve functional Polymorphism.
Write a program to print each line of a file in reverse order.
New Scheme Based On AICTE Flexible Curricula Computer Science & Information Technology, VI-Semester
The course is designed with an objective to Install and configure Android application development tools. Design and develop user Interfaces for the Android platform, Save state information across important operating system events and apply Java programming concepts to Android application development.
Experiment on Integrated Development Environment for Android Application Development.
Design and Implement User Interfaces and Layouts of Android App.
Use Intents for activity and broadcasting data in Android App.
Design and Implement Database Application and Content Providers.
Experiment with Camera and Location Based service and develop Android App with Security features.
A little Background about mobile technologies, Overview of Android, An Open Platform for Mobile development, Open Handset Alliance, What does Android run On – Android Internals, Why to use Android for mobile development.
My First Android Application, How to setup Android Development Environment, Android development Framework - Android-SDK, Eclipse.
Emulators – What is an Emulator / Android AVD, Creating & setting up custom Android emulator, Android Project Framework, My First Android Application.
Understanding Intent, Activity, Activity Lifecycle and Manifest, Creating Application and new Activities, Expressions and Flow control, Android Manifest, Simple UI -Layouts and Layout properties, Fundamental Android UI Design.
Introducing Layouts, Creating new Layouts, Drawable Resources, Resolution and density independence (px,dip,dp,sip,sp), XML Introduction to GUI objects viz., Push Button Text / Labels, EditText, ToggleButton, WeightSum, Padding, Layout Weight.
Head First Android Development, 2nd edition, OREILLY.
Android App Development for Dummies, 3rd edition, Michael Burton, John Wiley sons Busy Coder’s Guide to Android Development, Mark L. Murphy, Commonsware.
Setting up the development Environment.
Implement an android application that demonstrates the use of scroll view for text with HTML formatting.
Develop an application that uses GUI components, Font and Colors.
Develop an application that uses Layout Managers and event listeners.
Write an application that draws basic graphical primitives on the screen.
Develop an application that makes use of database.
Develop an application that makes use of RSS Feed.
Develop a native application that uses GPS location information.
Implement an application that creates an alert upon receiving a message. 10.Implement an application that implements Multi threading. 11.Implement an application that writes data to the SD card.
New Scheme Based On AICTE Flexible Curricula Computer Science & Information Technology, VI-Semester
This course introduces the concepts and methods required for the construction of large software intensive systems.
The course aims are to develop a broad understanding of the discipline of software engineering and management of software systems.
Apply project management concepts and techniques to an IT project.
Identify issues that could lead to IT project success or failure.
Explain project management in terms of the software development process.
Describe the responsibilities of IT project managers.
Apply project management concepts through working in a group as team leader or active team member on an IT project.
Introduction, Software- problem and prospects Software development process: Software life cycle models, Open source software development, the unified process, documentation, configuration management, Safety, risk assessment.
Measures, Metrics and Indicators, Metrics in the Process and Project Domains, Software Measurement, Metrics of Software Quality, S/W reliability, Software estimation techniques, loc and FP estimation. Empirical models like COCOMO, project tracking and scheduling, reverse engineering.
Software requirements and specification: feasibility study, Informal/formal specifications, pre/post conditions, algebraic specification and requirement analysis models, Specification design tools. Software design and implementation: Software design objectives, design Like, Top-Down, bottom-up, team etc. techniques, User interface design, modularity Functional decomposition Data flow design, Data structure design, Object-oriented design, Design patterns implementation strategies.
Coding standard and guidelines, programming style, code sharing, code review, software components, rapid prototyping, specialization, construction, class extensions, intelligent software agents, reuse performance improvement, debugging. Software Testing Strategies: Verification and Validation, Strategic Issues, test plan, white box, black-box testing, unit and integration testing, system testing test case design and acceptance testing, maintenance activities.
Agile Vs Traditional SDLC Models, Phases of Agile Model, Principles of Agile model, Agile Model - Pros and Cons, , When to use the Agile Model? , Agile Testing Methods, Scrum, Product Backlog, Scrum Practices, Process flow of Scrum Methodologies, extreme Programming (XP), Phases of eXtreme programming, Crystal Methodologies, Dynamic Software Development Method (DSDM), Feature Driven Development (FDD), Lean Software Development, KANBAN, Agile metrics.
Schwalbe, Kathy (2016) Information Technology Project Management Edition: 8th ISBN-13: 978-1285452340, ISBN-10: 1285452348.
Software Engineering. A Practitioner's Approach by P, S. Pressman New edition McGraw.
Software project Management from concept to development Black Book by Kieron Conway, Dreamtech Press.
Software Engineering principle and practices- Deepak Jain Oxford University Press.
Software Engineering for students 4/e - Bell Douglas Pearson Education.
Software Project Management, Kelkar, PHI Learning.
Learning Agile: Understanding Scrum, XP, Lean, and Kanban, By Andrew Stellman, Jennifer Greene, 2015, O Reilly
Identifying the requirements from problem statements.
Modeling UML use case diagram & capturing use case scenarios.
E-R modeling from the problem statements.
Activity & state chart modeling.
Modeling UML class diagram & collaboration diagrams/sequence diagrams.
Identifying domain classes from the problem statements.
Modeling DFD.
Designing test suite.
Estimation of test coverage metrics & structural complexity.
Estimation of project metrics.
To introduce students to the basic concepts and techniques of Machine Learning and to develop skills of using recent machine learning software for solving practical problems.
Apply knowledge of computing and mathematics to machine learning problems, models and algorithms,
Analyze a problem and identify the computing requirements appropriate for its solution;
Design, implement, and evaluate an algorithm to meet desired needs.
Apply mathematical foundations, algorithmic principles, and computer science theory to the modeling and design of computer-based systems in a way that demonstrates comprehension of the trade-offs involved in design choices.
Introduction to machine learning, scope and limitations, regression, probability, statistics and linear algebra for machine learning, convex optimization, data visualization, hypothesis function and testing, data distributions, data preprocessing, data augmentation, normalizing data sets, machine learning models, supervised and unsupervised learning.
Linearity vs non linearity, activation functions like sigmoid, ReLU, etc., weights and bias, loss function, gradient descent, multilayer network, back propagation, weight initialization, training, testing, unstable gradient problem, auto encoders, batch normalization, dropout, L1 and L2 regularization, momentum, tuning hyper parameters.
Convolution neural network, flattening, sub sampling, padding, stride, convolution layer, pooling layer, loss layer, dance layer 1x1 convolution, inception network, input channels, transfer learning, one shot learning, dimension reductions, implementation of CNN like tensor flow, keras etc.
Recurrent neural network, Long short-term memory, gated recurrent unit, translation, beam search and width, Bleu score, attention model, Reinforcement Learning, RL-framework, MDP, Bellman equations, Value Iteration and Policy Iteration, , Actor-critic model, Q- learning, SARSA.
Support Vector Machines, Bayesian learning, application of machine learning in computer vision, speech processing, natural language processing etc, Case Study: ImageNet Competition.
Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer-Verlag New York Inc., 2nd Edition, 2011.
Tom M. Mitchell, “Machine Learning”, McGraw Hill Education, First edition, 2017.
Ian Goodfellow and Yoshua Bengio and Aaron Courville, “Deep Learning”, MIT Press, 2016.
Aurelien Geon, “Hands-On Machine Learning with Scikit-Learn and Tensorflow: Concepts, Tools, and Techniques to Build Intelligent Systems”, Shroff/O'Reilly; First edition (2017).
Francois Chollet, "Deep Learning with Python", Manning Publications, 1 edition (10 January 2018).
Andreas Muller, "Introduction to Machine Learning with Python: A Guide for Data Scientists", Shroff/O'Reilly; First edition (2016).
Russell, S. and Norvig, N. “Artificial Intelligence: A Modern Approach”, Prentice Hall Series in Artificial Intelligence. 2003.
How to setup a python environment for Machine Learning & Deep Learning with Anaconda.
Program to implement linear algebra (like Matrix multiplication, transposition etc.).
Write a program to implement linear regression.
Write a program to build ANN by implementing Back-propagation algorithm using some dataset.
Write a program to implement Neural Network in python with step by step.
Write a program to construct a Bayesian Network considering Medical data.
Write a program to implement Support vector machine.
Write a program to implement K-Means.
Write a program to implement Principal Component Analysis.
Write a program to implement of Dimensionality Reduction.
To explain the various terminology, principles, devices, schemes, concepts, algorithms and different methodologies used in Wireless Communication Networks. To enable students to compare and contrast multiple division techniques, mobile communication systems, and existing wireless networks.
Explain the basic concepts of wireless network and wireless generations.
Demonstrate the different wireless technologies such as CDMA, GSM, GPRS etc.
Explain the design considerations for deploying the wireless network infrastructure.
Appraise the importance of Adhoc networks such as MANET and Wireless Sensor networks.
Differentiate and support the security measures, standards. Services and layer wise security considerations.
Antenna, radiation pattern, antenna types, antenna gain, propagation modes, types of fading. Model for wireless digital communication, multiple access technique-SDMA, TDMA, FDMA, CDMA, DAMA, PRMA, MAC/CA, Cellular network organization, operations of cellular system, mobile radio propagation effects, handoff, power control, sectorization, traffic engineering, Infinite sources, lost calls cleared, grade of service, poison arrival process.
GSM- Services, system architecture, radio interface, logical channels, protocols, localization and calling, handover, security, HSCSD, GPRS-architecture, Interfaces, Channels, mobility management DECT, TETRA, UMTS.
IEEE 802.11: LAN-architecture, 802.11 a, b and g, protocol architecture, physical layer, MAC layer, MAC management, HIPERLAN-protocol architecture, physical layer, access control sub layer, MAC sub layer. Bluetooth-user scenarios- physical layer, MAC layer.
Mobile IP, DHCP, Ad hoc networks: Characteristics, performance issue, routing in mobile host. Wireless sensor network, Mobile transport layer: Indirect TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission, transaction oriented TCP. Introduction to WAP.
Intruders, Intrusion detection, password management, viruses and related threads, worms, trojan horse defense, difference biometrics and authentication system, firewall design principle.
J. Schiller, “Mobile Communication”, Addision , Wiley.
William Stalling, “Wireless Communication and Network”, Pearson Education.
Upena Dalal,” Wireless Communication”, Oxford Higher Education.
Dr. Kamilo Feher, “Wireless Digital communication”, PHI.
William C.Y Lee, “Mobile Communication Design Fundamental”, John Wiley.
Stojmenic Ivan, Handbook of Wireless Networks and Mobile Computing, John Wiley and Sons Inc 2002.
Yi Bing Lin and Imrich Chlamtac, Wireless and Mobile Network Architectures, John Wiley and Sons Inc 2000
Pandya .aj, Mobile and Personal Communications Systems and Services, PHI 2004.
New Scheme Based On AICTE Flexible Curricula Computer Science & Information Technology, VI-Semester
To introduce the principles of computer graphics and the components of a graphics system.
To introduce basic algorithms for drawing line, circle and curves.
To develop understanding of the basic principles of 2D and 3D computer graphics and how to transform the shapes to fit them as per the picture definit io n.
To introduce mult imedia architecture and hardware.
To introduce mult imedia file formats.
Understand the core concepts of computer graphics.
Implement various shapes drawing algorithms.
Apply geometric transformations on graphic objects and also implement clipping, shading and colour models.
Understand multimedia systems architecture, multimedia components and use various multimedia tools.
Perform activities involved in design, development and testing of modeling, rendering, shading and animation.
Introduction to Raster scan displays, Storage tube displays, Pixel, refreshing, flickering, interlacing, colour monitors, working of different types of printers , working principles of keyboard, mouse scanner, digit izing camera, track ball, tablets and jo yst icks, graphical input techniques, posit ioning techniques, rubber band techniques, dragging etc.
Scan conversio n techniques, image representation, line drawing, simple DDA, Bresenham’s Algorithm, Circle drawing, general method, symmetric DDA, Bresenham’s Algorithm, curves, parametric function, Bezier Method, B-spline Method.
2D & 3D Co-ordinate system, Translat ion, Rotation, Scaling, Reflect ion Inverse transformat ion, Composite transformat ion, world coordinate system, screen coordinate system, parallel and perspective project ion, Representation of 3D object on 2D screen, Point
Clipping, Line Clipping Algorithms, Polygon Clipping algorithms, Introduction to Hidden Surface elimination, Basic illuminat ion model, diffuse reflect ion, specular reflection, co lor models like RGB, YIQ, CMY, HSV.
Introduction to mult imedia components applications, Mult imedia System Architecture, Evolving techno logies for Mult imedia, Defining objects for Mult imedia systems, Mult imedia Data interface standards, Mult imedia Databases, Mult imedia Hardware, SCSI, IDE, MCI, Mult imedia Tools, presentation tools, Authoring tools.
Compression & Decompression, Multimedia Data & File Format standards, TIFF, MIDI, JPEG, DIB, MPEG, RTF, Multimedia I/O technologies, Digital voice and audio, Video image and animation, Full motion video, Storage and retrieval technologies.
Donald Hearn and M.Pauline Baker, Computer Graphics C Version, Pearson Education, 2003.
Prabat K Andleigh and Kiran Thakrar, Mult imedia Systems and Design, PHI Learning,
Tay Vaughan, Multimedia making it work, Tata McGraw Hill edit io n.
Amarendra N Sinha & Arun D Udai, Computer Graphics, McGraw Hill publicat ion.
Mukherjee, Fundamental of Computer Graphics and Mult imedia, PHI Learning.
This subject aims to provide students with a fundamental knowledge of computer hardware and computer systems, with an emphasis on system design and performance. The module concentrates on the principles underlying systems organization, issues in computer system design, and contrasting implementations of modern system
Discuss the classes of computers, and new trends and developments in computer architecture.
Study advanced performance enhancement techniques such as pipelines, dynamic scheduling branch predictions, caches.
Compare and contrast the modern computer architectures such as RISC, Scalar, and multi CPU systems.
Critically evaluate the performance of different CPU architecture.
Improve the performance of applications running on different CPU architectures.
Develop applications for high performance computing systems.
Flynn’s Classification, System Attributes to Performance, Parallel computer models - Multiprocessors and multicomputers, Multivector and SIMD Computers. Data and resource dependences, Hardware and software parallelism, Program partitioning and scheduling, Grain size and latency, Control flow, data flow and Demand driven mechanisms. Static interconnection networks, Dynamic interconnection Networks: Bus Systems, Crossbar Switch, Multiport Memory, Multistage and Combining Networks.
Instruction set architecture, CISC Scalar Processors, RISC Scalar Processors, VLIW architecture, Memory Hierarchy, Inclusion, Coherence and Locality, Memory capacity planning. Interleaved memory organization-memory interleaving, pipelined memory access, Bandwidth and Fault Tolerance. Backplane Bus System: Backplane bus specification, Addressing and timing protocols, Arbitration transaction and interrupt.
Linear pipeline processor, Nonlinear pipeline processor, Instruction pipeline design, Mechanisms for instruction pipelining, pipeline hazards, Dynamic instruction scheduling - score boarding and Tomosulo’s algorithm, Branch handling techniques, Arithmetic Pipeline Design, Static arithmetic pipeline, Multifunctional arithmetic pipelines. Superscalar pipeline design, Super pipeline processor design.
Cache coherence, Snoopy protocols, Directory based protocols. Message routing schemes in multicomputer network, deadlock and virtual channel. Vector Processing Principles, Vector instruction types, Vector-access memory schemes. Vector supercomputer architecture, SIMD organization: distributed memory model and shared memory model. Principles of Multithreading: Multithreading Issues and Solutions, Multiple-Context Processors.
Parallel Programming Models, Shared-Variable Model, Message-Passing Model, Data-Parallel Model, Object-Oriented Model, Functional and Logic Models, Parallel Languages and Compilers, Language Features for Parallelism, Parallel Programming Environment, Software Tools and Environments.
Kai Hwang, “Advanced computer architecture”, TMH.
J.P.Hayes, “computer Architecture and organization”; MGH.
V.Rajaranam & C.S.R.Murthy, “Parallel computer”; PHI Learning.
Kain,”Advance Computer Architecture: -A System Design Approach”, PHI Learning.
M.J Flynn, “Computer Architecture, Pipelined and Parallel Processor Design”; Narosa Publishing.
Hwang and Briggs, “Computer Architecture and Parallel Processing”; MGH.
David E. Callav & Jaswinder Pal Singh Marge Kaufmann”,Advance Computer Architecture”, EIS India.
Sajjan G. Shiva, Taylar & Francis, “Advance Computer Architecture.
This Course focuses towards the introduction of network security using various cryptographic algorithms. It also focuses on the practical applications that have been implemented and are in use to provide email and web security.
Analyze and evaluate the cyber security needs of an organization.
Analyze software vulnerabilities and security solutions to reduce the risk of exploitation.
Measure the performance and troubleshoot cyber security systems.
Implement cyber security solutions and use of cyber security, information assurance, and cyber/computer forensics software/tools.
Design and develop security architecture for an organization.
Design operational and strategic cyber security strategies and policies.
Introduction to Network Security, Computer Securit y and Cyber Security. Security Terminologies and Principle, Security Threats, Types of attacks (Operating System, application level, Shrink Wrap code, Misconfiguration attacks etc.). Introduction to Intrusion, Terminologies, Intrusion Detection System (IDS), Types of Intrusion Detection Systems, System Integrity Verifiers (SIVS).Indication of Intrusion: System Indications, File S ystem Indications Network Indications. Intrusion Detection Tools ,Post attack IDS Measures & Evading IDS Systems. Penetration Testing, Categories of security assessments, Vulnerability Assessment, Types of Penetration Testing. Risk Management.
Cryptography, Classical Cryptographic Techniques, Encryption, Decryption, Code Breaking: Methodologies, Cryptanalysis, Cryptography Attacks, Brute-Force Attack, Use of Cryptography. Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms RSA, Data Encryption Standard (DES), RC4, RC5, RC6,
Blowfish, Key Management, Diffie- Hellman key exchange, elliptic curve cryptography.
Hash Functions, One-way Hash Functions, SHA (Secure Hash Algorithm), Authentication Requirements, Authentication Functions, Kerberos. Message Authentication codes, Message Digest Functions, MD5, SSL (Secure Sockets Layer), SSH (Secure Shell), Algorithms and Security, Disk Encryption, Government Access to Keys (GAK) Digital Signature: Analysis, Components, Method, Applications, Standard, Algorithm: Signature Generation/Verification, ECDSA, EIgamal Signature Scheme, Digital Certificates.
IP Security, Web Security, Firewalls: Types, Operation, Design Principles, Trusted Systems. Computer Forensics, Need, Objectives,Stages & Steps of Forensic Investigation in Tracking Cyber Criminals, Incident Handling. Hacking, Classes of Hacker (Black hats, grey hats, white hats, suicide hackers), Footprinting, Scanning (Types-Port, Network, Vulnerability), E-Mail Spiders, Overview of System Hacking Cycle.
William Stallings, “Cryptography and Network Security: Principles and Practice” Pearson Charlie Kaufman, Radia Perlman, Mike Speciner, Michael Speciner, “Network Security - Private communication in a public world” TMH
Fourozon, “Cryptography & Network Security” TMH.
Joseph Migga Kizza, Computer Network Security, Springer International Edition.
Atul Kahate, “Cryptography and Network Security” Mc Graw Hill
Carl Endorf, Eugene Schultz, Jim Mellander “Intrusion Detection & Prevension” TMH.
Neal, Krawetz, Introduction to Network Security,Cengage Learning.
New Scheme Based On AICTE Flexible Curricula Computer Science & Information Technology, VI-Semester
To introduce students with knowledge about the basic funct ions and applicat ions of embedded systems.
To introduce the architecture of embedded systems.
To introduce the various communicat ion protocols.
To enable students to have knowledge of the memory t ypes and supporting techno logies of embedded systems.
To enable students to have knowledge about the development of embedded software.
Explain the embedded system concepts and architecture of embedded systems.
Describe the architecture of 8051 microcontroller and write embedded program for 8051 microcontroller.
Select elements for an embedded systems tool.
Understand the memory t ypes used in embedded systems.
Design a system, component, or process to meet desired needs within realist ic constraints such as economic, environmental, social, polit ical, ethical, healt h and safet y, manufacturabilit y, and sustainabilit y.
Introduction to Embedded Systems: Definit io n of embedded system, embedded systems vs. general co mput ing systems, history of embedded systems, classificat ion, major applicat ion areas, purpose of embedded systems, characteristics and qualit y attributes of embedded systems, commo n design metrics, and processor technology: general purpose processor, applicat ion specific processor, single purpose processor.
Embedded System Architecture: Von Neumann v/s Harvard architecture, instruction set architecture, CISC and RISC instructions set architecture, basic embedded processor, microcontroller architecture, CISC & RISC examples: 8051, ARM, DSP processors.
Input Output and Peripheral Devices Timers and counters, watchdog timers, interrupt controllers, PWM, keyboard controller, analog to digital converters, real t ime clock. Introduction to communicat ion protocols: basic termino logies, concepts, serial protocol:
I2C, CAN, firewire, USB. Parallel protocols: PCI bus, IrDA, bluetooth, IEEE 802.11, wireless protocols.
Memory System Architecture Caches, virtual memory, MMU, address translat ion, memory and int er facing, memory write abilit y and storage performance. Memory types, composing memory – advance RAM interfacing, microprocessor interfacing I/O addressing, interrupts, direct memory access, arbitration mult ilevel bus architecture.
Embedded System Supporting Techno logies Difference between normal OS and RTOS, scheduling algorithms. Case study: Tiny OS, VxWorks, QNX. Overview of VLSI techno logy, introduction to device drivers. Case studies: washing machine, air-condit io ning, auto focus camera.
F Vahid, T Giogarvis, Embedded systems: A unified hardware/software approach, Wiley, 1999.
Raj Kamal, Embedded Systems Introduction, 2nd Ed., TMH publicat ion, 2015.
David E Simo ns, An Embedded Software Primer, Pearson, 1999.
To enable Students to understand Primary forms of IPR, infringement of copyright and its consequences and to introduce criteria and procedure for obtaining patents.
Understand Primary forms of IPR.
Assess and critique some basic theoretical justification for major forms of IP Protection
Compare and contrast the different forms of IPR in terms of key differences and similarities.
Understand the registration procedures related to IPR.
Have exposure to contemporary issues and enforcement policies in IPR.
Introduction and Justifications of IPR, Nature of IP, Major forms of IP- Copyright, Patent, Trade Marks Designs, Geographic indication, layout design of Semiconductors, Plant varieties, Concept & Meaning of Intellectual Property. Major international documents relating to the protection of IP - Berne Convention, Paris Convention, TRIPS. The World Intellectual Property Organization (WIPO).
Meaning and historical development of copyright , Subject matter , Ownership of copyright, Term of copyright, Rights of owner, Economic Rights, Moral Rights. Assignment and licence of rights, Infringement of copyright, Exceptions of infringement, Remedies, Civil, Criminal, Administrative, Registration Procedure.
Meaning and historical development,. Criteria for obtaining patents, Non patentable
inventions, Procedure for registration, Term of patent, Rights of patentee, Compulsory licence, Revocation, Infringement of patents, Exceptions to infringement, Remedies, Patent office and Appellate Board.
IPR & sustainable development, The Impact of Internet on IPR. IPR Issues in
biotechnology, E- Commerce and IPR issues, Licensing and enforcing IPR, Case studies in IPR.
P. Narayanan, Intellectual Property Law, Eastern Law House
Neeraj Pandey and Khushdeep[ Dharni, Intellectual Property Rights, PHI, 2014
N.S Gopalakrishnan and T.G. Agitha, Principles of Intellectual Property, Eastern Book Co. Lucknow, 2009.
Anand Padmanabhan, Enforcement of Intellectual Property, Lexis Nexis Butterworths, Nagpur, 2012.
Managing Intellectual Property The Strategic Imperative, Vinod V. Sople, PHI.
Prabuddha Ganguli, “ Intellectual Property Rights” Mcgraw Hill Education, 2016.
Universal's Guide to Patents Law (English) 4th Edition (Paperback, MANISH ARORA) - Publisher: Universal Law Publishing House ISBN: 9788175345836, 8175345837 Edition: 4thEdition, 2007.
The course is designed to provide Basic knowledge of Python. Python programming is intended for software engineers, system analysts, program managers and user support personnel who wish to learn the Python programming language. Learning Outcomes: Problem solving and programming capability.
Install Python and have knowledge of syntax of Python.
Describe the Numbers, Math functions, Strings, List, Tuples and Dictionaries in Python.
Express different Decision Making statements and Functions.
Develop code in Python using functions, loops etc.
Design GUI Applications in Python and evaluate different database operations.
Introduction, History, Features, Python –Environment Setup Local Environment Setup, Getting Python, Installation of Python, Use of IDE.
Python –Basic SyntaxPython Identifiers, Reserved Words, Lines & Indentation, Multiline Statements, Quotation in Python, Comments & other useful constructs, Python –Variables Assigning Values to Variables, Multiple Assignment, Standard Data Types.
Python –Variables, Assigning Values to Variables, Multiple Assignment, Standard Data Types; Python Numbers, Python Strings, Python Lists, Python Tuples, Dictionary, DataType Conversion.
Python –Basic Operators, Types of Operators, Arithmetic Operators, Comparison Operators, Assignment Operators, Bitwise Operators, Logical Operators, Operator Precedence, Python – Decision Making & Loops, Flowchart, If statement Syntax.
Python-Functions, Syntax for defining a function, Calling a Function, Function Arguments, Anonymous Functions Python-Applications & Further Extensions.
Python Crash Course: A Hands-On, Project-Based Introduction to Programming, by Eric Matthes, No Starch Press.
Learn Python the Hard Way’ by Zed A. Shaw (3rd Edition), Addison Wesley.
Head-First Python, by Paul Barry, O’Reilly.
‘Python Programming’ by John Zelle, Franklin, Beedle & Associates Inc;
Write a program for literals, constants, data type, i/o.
To create a program for list, tuples and dictionary.
To write a program to find mean, median, mode for the given set of numbers in a list.
To write a program to find the first n prime numbers.
Write a Program for checking whether the given number is an even number or not.
Write a program to find the square root of a number.
To write a program to find the exponentiation (Power of a number).
To write a program to print Fibonacci Series.
To write a program to show Inheritance.
To achieve functional Polymorphism.
Write a program to print each line of a file in reverse order.
New Scheme Based On AICTE Flexible Curricula Computer Science & Information Technology, VI-Semester
The course is designed with an objective to Install and configure Android application development tools. Design and develop user Interfaces for the Android platform, Save state information across important operating system events and apply Java programming concepts to Android application development.
Experiment on Integrated Development Environment for Android Application Development.
Design and Implement User Interfaces and Layouts of Android App.
Use Intents for activity and broadcasting data in Android App.
Design and Implement Database Application and Content Providers.
Experiment with Camera and Location Based service and develop Android App with Security features.
A little Background about mobile technologies, Overview of Android, An Open Platform for Mobile development, Open Handset Alliance, What does Android run On – Android Internals, Why to use Android for mobile development.
My First Android Application, How to setup Android Development Environment, Android development Framework - Android-SDK, Eclipse.
Emulators – What is an Emulator / Android AVD, Creating & setting up custom Android emulator, Android Project Framework, My First Android Application.
Understanding Intent, Activity, Activity Lifecycle and Manifest, Creating Application and new Activities, Expressions and Flow control, Android Manifest, Simple UI -Layouts and Layout properties, Fundamental Android UI Design.
Introducing Layouts, Creating new Layouts, Drawable Resources, Resolution and density independence (px,dip,dp,sip,sp), XML Introduction to GUI objects viz., Push Button Text / Labels, EditText, ToggleButton, WeightSum, Padding, Layout Weight.
Head First Android Development, 2nd edition, OREILLY.
Android App Development for Dummies, 3rd edition, Michael Burton, John Wiley sons Busy Coder’s Guide to Android Development, Mark L. Murphy, Commonsware.
Setting up the development Environment.
Implement an android application that demonstrates the use of scroll view for text with HTML formatting.
Develop an application that uses GUI components, Font and Colors.
Develop an application that uses Layout Managers and event listeners.
Write an application that draws basic graphical primitives on the screen.
Develop an application that makes use of database.
Develop an application that makes use of RSS Feed.
Develop a native application that uses GPS location information.
Implement an application that creates an alert upon receiving a message. 10.Implement an application that implements Multi threading. 11.Implement an application that writes data to the SD card.