HEAD
New Scheme Based On AICTE Flexible Curricula Information Technology, VI- semester
To introduce the principles of computer graphics and the components of a graphics system
To introduce basic algorithms for drawing line, circle and curves.
To develop understanding of the basic principles of 2D and 3D computer graphics and how to transform the shapes to fit them as per the picture definition.
To introduce multimedia architecture and hardware
To introduce multimedia file formats
Introduction to Raster scan displays, Storage tube displays, refreshing, flickering, interlacing, colour monitors, display processors resolution, working principle of dot matrix, inkjet laser printers, working principles of keyboard, mouse scanner, digitizing camera, track ball, tablets and joysticks, graphical input techniques, positioning techniques, rubber band techniques, dragging etc.
Scan conversion techniques, image representation, line drawing, simple DDA, Bresenham’s Algorithm, Circle drawing, general method, symmetric DDA, Bresenham’s Algorithm, curves, parametric function, Beizier Method, B-spline Method.
2D & 3D Co-ordinate system, Translation, Rotation, Scaling, Reflection Inverse transformation, Composite transformation, world coordinate system, screen coordinate system, parallel and perspective projection, Representation of 3D object on 2D screen, Point Clipping, Line Clipping Algorithms, Polygon Clipping algorithms, Introduction to Hidden Surface elimination, Basic illumination model, diffuse reflection, specular reflection, phong shading, Gourand shading ray tracing, color models like RGB, YIQ, CMY, HSV.
Introduction to multimedia components applications, Multimedia System Architecture, Evolving technologies for Multimedia, Defining objects for Multimedia systems, Multimedia Data interface standards, Multimedia Databases, Multimedia Hardware, SCSI, IDE, MCI, Multimedia Tools, presentation tools, Authoring tools.
Compression & Decompression, Multimedia Data & File Format standards, TIFF, MIDI, JPEG, DIB, MPEG, RTF, Multimedia I/O technologies, Digital voice and audio, Video image and animation, Full motion video, Storage and retrieval technologies.
Donald Hearn and M.Pauline Baker, Computer Graphics C Version, Pearson Education, 2003.
Prabat K Andleigh and Kiran Thakrar, Multimedia Systems and Design, PHI Learning,
Tay Vaughan, Multimedia making it work, Tata McGraw Hill edition.
Amarendra N Sinha & Arun D Udai, Computer Graphics, McGraw Hill publication.
Mukherjee, Fundamental of Computer Graphics and Multimedia, PHI Learning.
Write a program to implement DDA line drawing algorithm
Write a program to implement Bresenham’s line drawing algorithm.
Write a program to implement Bresenham’s circle drawing algorithm.
Write a program to draw an ellipse using Bresenham’s algorithm.
Write a program to perform various transformations on line , square & rectangle.
Write a program to implement Cohen Sutherland line clipping algorithm.
Write a program to implement Liang-Bersky line clipping algorithm.
Write a program to implement Cohen-Sutheland polygon clipping algorithm to clip a polygon with a Pattern.
Write a program to convert a color given in RGB space to it’s equivalent CMY color space.
Study of various Multimedia file formats:-RTF,MIDI,GIF,JPEG,MPEG,TIFF etc.
Write a program to implement JPEG compression scheme for still images.
Write a program to perform Packbits compression & decompression.
Write a short program to create a TIFF file using bitmap segments and text files as the TIFF File components.
Write a program to convert a BMP file into either JPEG or GIF file.
Study of various Multimedia Authoring Tools.
Upon completion of this course, students will be able to-
Understand the core concepts of computer graphics.
Implement various shapes drawing algorithms.
Apply geometric transformations on graphic objects and also implement clipping, shading and colour models.
Understand multimedia systems architecture, multimedia components and use various multimedia tools.
Perform activities involved in design, development and testing of modeling, rendering, shading and animation.
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
To provide an overview of Wireless Communication networks area and its applications in communication engineering.
To introduce various standards of mobile communication.
To explain the various terminology, principles, devices, schemes, concepts used in Wireless Communication Networks.
To introduce the concepts of Adhoc networks and Sensor networks and their issues
To introduce various security threats in wireless networks and the techniques for the prevention and detection of threats
Antenna , radiation pattern, antenna types, antenna gain, propagation modes, types of fading. Model for wireless digital communication, multiple access technique-SDMA, TDMA, FDMA, CDMA, DAMA, PRMA, MAC/CA, Cellular network organization, operations of cellular system, mobile radio propagation effects, handoff, power control, sectorization, traffic engineering, Infinite sources, lost calls cleared, grade of service, poison arrival process
GSM- Services, system architecture, radio interface, logical channels, protocols, localization and calling, handover, security, HSCSD, GPRS-architecture, Interfaces, Channels, mobility management DECT, TETRA, UMTS.
IEEE 802.11: LAN-architecture, 802.11 a, b and g, protocol architecture, physical layer, MAC layer , MAC management, HIPERLAN-protocol architecture, physical layer, access control sub layer, MAC sub layer. Bluetooth-user scenarios- physical layer, MAC layer.
Mobile IP, DHCP, Ad hoc networks: Characteristics, performance issue, routing in mobile host. Wireless sensor network, Mobile transport layer: Indirect TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission, transaction oriented TCP. Introduction to WAP.
Intruders, Intrusion detection, password management, viruses and related threads, worms, trojan horse defense, difference biometrics and authentication system, firewall design principle.
J. Schiller, “Mobile Communication”, Addision , Wiley
William Stalling, “Wireless Communication and Network”, Pearson Education
Upena Dalal,” Wireless Communication”, Oxford Higher Education
Dr. Kamilo Feher, “Wireless Digital communication”, PHI
William C.Y Lee, “Mobile Communication Design Fundamental” , John Wiley.
To implement mobile network using open source softwares like NS2 etc. Implement Code Division Multiple Access (CDMA).
To write a programme to implement concept of frequency reuse when given size of geographical area and the set of available frequencies.
Study of OPNET tool for modeling and simulation of different cellular standards. Study and Analysis of wired network.
Study and Analysis of wireless network. Study and Analysis of Bluetooth.
Study of Mobile IP.
Write programs using WML (Wireless Markup Language) Rajiv Gandhi Proudyogiki Vishwavid
Upon completion of this course, students will be able to-
Explain the basic concepts of wireless network and wireless generations.
Demonstrate the different wireless technologies such as CDMA, GSM, GPRS etc
Explain the design considerations for deploying the wireless network infrastructure.
Appraise the importance of Adhoc networks such as MANET and Wireless Sensor networks
Differentiate and support the security measures, standards. Services and layer wise security considerations
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
To teach the students the basic concepts of Compiler, programming languages and develop an understanding of the compilation phases
To make students understand what is syntax analysis and various types of parsers
To introduce syntax trees and dependency graphs
To introduce intermediate code generation, memory management and the role of symbol table and its organization
To introduce Code generation and code optimization
Introduction to Compiler, analysis of source program, phases and passes, Bootstrapping, lexical analyzers, data structures in compilation – LEX: lexical analyzer generator, Input buffering, Specification and Recognition of tokens, YACC, The syntactic specification of programming languages: Context free grammars, derivation and parse trees, capabilities of CFG.
Syntax Analysis: working of Parser, Top down parsing, Bottom-up parsing, Operator precedence parsing, predictive parsers, LR parsers (SLR, Canonical LR, LALR), constructing SLR parsing tables, constructing Canonical LR parsing tables, Constructing LALR parsing tables, using ambiguous grammars, an automatic parser generator.
Syntax Directed Translation: Definitions, Inherited Attributes, L-attributed definitions, S- attributed definitions, Dependency graph, Construction of syntax trees, Top down translation, postfix notation, bottom up evaluation.
Intermediate Code Generation: Three address code, quadruple & triples, translation of assignment statements, Boolean expression and control structures, Backpatching, Run Time Memory Management: Static and Dynamic storage allocation, stack based memory allocation schemes, Symbol Table management.
Code Optimization and Generation: organization of code optimizer, basic blocks and flow graphs, DAG representation of basic blocks, loops in flow graph, peephole optimization, Basic of block optimization.
A. V. Aho, R. Sethi & J. D. Ullman, Compilers: Principles, Techniques and Tools, Pearson Ed.
Alfred V. Aho, Jeffrey D. Ullman, Principles of Compiler Design, Narosa Publishing House.
Ronald Mak, Writing Compilers and Interpreters, Wiley IndiacEdition.
Louden, Compiler Construction, Cengage learning.
Upon completion of this course, students will be able to-
Demonstrate an understanding of the compilation phases.
Specify and analyze the lexical, syntactic and semantic structures of advanced language features.
Write a scanner, parser, and semantic analyser without the aid of automatic generators.
Describe techniques for intermediate code and machine code optimization.
Design the structures and support required for compiling advanced language features.
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-
To introduce data warehouse and its components
To introduce knowledge discovery process, data mining and its functionalities
To develop understanding of various algorithms for association rule mining and their differences
To introduce various classification techniques
To introduce various clustering algorithms.
Data Warehousing: Need for data warehousing , Basic elements of data warehousing, Data Mart, Data Warehouse Architecture, extract and load Process, Clean and Transform data, Star ,Snowflake and Galaxy Schemas for Multidimensional databases, Fact and dimension data, Partitioning Strategy-Horizontal and Vertical Partitioning, Data Warehouse and OLAP technology, Multidimensional data models and different OLAP Operations, OLAPServer: ROLAP, MOLAP, Data Warehouse implementation, Efficient Computation of Data Cubes, Processing of OLAP queries, Indexing data.
Data Mining: Data Preprocessing, Data Integration and Transformation, Data Reduction, Discretizaion and Concept Hierarchy Generation, Basics of data mining, Data mining techniques, KDP (Knowledge Discovery Process), Application and Challenges of Data Mining
Mining Association Rules in Large Databases: Association Rule Mining, Single- Dimensional Boolean Association Rules, Multi-Level Association Rule, Apriori Algorithm, Fp- Growth Algorithm, Time series mining association rules, latest trends in association rules mining.
Classification and Clustering: Distance Measures, Types of Clustering Algorithms, K-Means Algorithm, Decision Tree, Bayesian Classification, Other Classification Methods, Prediction, Classifier Accuracy, Categorization of methods, Outlier Analysis.
Introduction of Web Mining and its types, Spatial Mining, Temporal Mining, Text Mining, Security Issue, Privacy Issue, Ethical Issue.
Arun k Pujari “Data Mining Technique” University Press
Han,Kamber, “Data Mining Concepts & Techniques”,
M.Kaufman., P.Ponnian, “Data Warehousing Fundamentals”, John Wiley.
4, M.H.Dunham, “Data Mining Introductory & Advanced Topics”, Pearson Education.
Ralph Kimball, “The Data Warehouse Lifecycle Tool Kit”, JohnWiley.
E.G. Mallach , “The Decision Support & Data Warehouse Systems”, TMH
Upon completion of this course, students will be able to-
Demonstrate an understanding of the importance of data warehousing and OLAP technology
Organize and Prepare the data needed for data mining using pre preprocessing techniques
Implement the appropriate data mining methods like classification, clustering or Frequent Pattern mining on various data sets.
Define and apply metrics to measure the performance of various data mining algorithms.
Demonstrate an understanding of data mining on various types of data like web data and spatial data
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
To introduce students with knowledge about the basic functions and applications of embedded systems
To introduce the architecture of embedded systems
To introduce the various communication protocols
To enable students to have knowledge of the memory types and supporting technologies of embedded systems.
To enable students to have knowledge about the development of embedded software
F Vahid, T Giogarvis, Embedded systems: A unified hardware/software approach, Wiley, 1999.
Raj Kamal, Embedded Systems Introduction, 2nd Ed., TMH publication, 2015.
David E Simons, An Embedded Software Primer, Pearson, 1999.
Upon completion of this course, students will be able to-
Explain the embedded system concepts and architecture of embedded systems
Describe the architecture of 8051 microcontroller and write embedded program for 8051 microcontroller
Select elements for an embedded systems tool.
Understand the memory types used in embedded systems
Design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability
New Scheme Based On AICTE Flexible Curricula
To enable Students to understand Primary forms of IPR
To enable Students to understand what is infringement of copyright and its consequences
To introduce criteria and procedure for obtaining patents
To enable Students to understand the registration procedures related to IPR.
To expose Students to contemporary issues and enforcement policies in IPR.
Introduction and Justifications of IPR, Nature of IP, Major forms of IP- Copyright, Patent, Trade Marks Designs, Geographic indication, layout design of Semi conductors, Plant varieties, Concept & Meaning of Intellectual Property. Major international documents relating to the protection of IP - Berne Convention, Paris Convention, TRIPS. The World Intellectual Property Organization (WIPO).
Meaning and historical development of copyright , Subject matter , Ownership of copyright, Term of copyright, Rights of owner, Economic Rights, Moral Rights. Assignment and licence of rights, Infringement of copyright, Exceptions of infringement, Remedies, Civil, Criminal, Administrative, Registration Procedure.
Meaning and historical development,. Criteria for obtaining patents, Non patentable inventions, Procedure for registration, Term of patent, Rights of patentee, Compulsory licence, Revocation, Infringement of patents, Exceptions to infringement, Remedies, Patent office and Appellate Board.
IPR & sustainable development, The Impact of Internet on IPR. IPR Issues in biotechnology, E- Commerce and IPR issues, Licensing and enforcing IPR, Case studies in IPR
P. Narayanan, Intellectual Property Law, Eastern Law House
. Neeraj Pandey and Khushdeep[ Dharni, Intellectual Property Rights, PHI, 2014
N.S Gopalakrishnan and T.G. Agitha, Principles of Intellectual Property, Eastern Book Co. Lucknow, 2009.
Anand Padmanabhan, Enforcement of Intellectual Property, Lexis Nexis Butterworths, Nagpur, 2012.
Managing Intellectual Property The Strategic Imperative, Vinod V. Sople, PHI.
Prabuddha Ganguli, “ Intellectual Property Rights” Mcgraw Hill Education, 2016.
Upon completion of this course, students will be able to:
Understand Primary forms of IPR
Assess and critique some basic theoretical justification for major forms of IP Protection
Compare and contrast the different forms of IPR in terms of key differences and similarities.
Uderstand the registration procedures related to IPR.
Have exposure to contemporary issues and enforcement policies in IPR.
New Scheme Based On AICTE Flexible Curricula Information Technology, VI- semester
To introduce software development life cycle and various software process models
To introduce measures and metrics for software quality, reliability and software estimation techniques
To develop an understanding of software analysis and design phases
To introduce coding standards, guidelines and various software testing techniques
To introduce various activities for software maintenance and quality assurance
Introduction, Software- problem and prospects Software development process: System Development Life Cycle, Waterfall Model, Spiral Model and other models, Unified process Agile development-Agile Process- Extreme Programming- Other agile Process models.
Measures, Metrics and Indicators, Metrics in the Process and Project Domains, Software Measurement, Metrics of Software Quality, S/W reliability, Software estimation techniques, LOC and FP estimation. Empirical models like COCOMO, project tracking and scheduling, reverse engineering.
Software requirements and specification: feasibility study, Informal/formal specifications, pre/post conditions, algebraic specification and requirement analysis models, Specification design tools. Software design and implementation: Software design objectives and techniques, User interface design, Modularity, Functional decomposition, DFD, Data Dictionary, Object oriented design, Design patterns implementation strategies like top- down, bottom-up.
Coding standard and guidelines, programming style, code sharing, code review, rapid prototyping, specialization, construction, class extensions, intelligent software agents, reuse performance improvement, debugging. Software Testing Strategies: Verification and Validation, Strategic Issues, test plan, white box, black-box testing, unit and integration testing, system testing test case design and acceptance testing, maintenance activities.
Software Maintenance: Software Supportability, Reengineering, Business Process Reengineering, Reverse Engineering, Restructuring, Forward Engineering, Economics of Reengineering, project scheduling and tracking plan, project management plan, SQA and quality planning, SCM activities
and plan, CMM, Software project management standards, Introduction to component based software engineering.
P.S. Pressman, Software Engineering. A Practitioner's Approach, TMH.
Rajib Mall, Fundamental of Software Engineering, PHI.
Hans Van Vliet, Software Engineering, Wiley India Edition.
James S. Peters, Software Engineering, Wiley India Edition.
Pankaj Jalote, Software Engineering: A Precise Approach, Wiley India.
Kelkar, Software Project Management, PHI Learning
Upon completion of this course, students will be able to-
Define various software application domains and remember different process model used in software development.
Understand various measures of software and Generate project schedule.
Describe functional and non-functional requirements of software and develop design models of software.
Investigate the reason for bugs and apply the software testing techniques in commercial environment.
Understand various activities to be performed for improving software quality and software maintenance.
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
Course Objectives:
To Understand the basic WSN technology and supporting protocols
Understand the medium access control protocols and address physical layer issues
Learn localization concepts for sensor networks
Learn energy efficiency and power control in sensor networks
Understand the security challenges in sensor networks.
Overview of Wireless Sensor Networks: Network Characteristics, Network Applications, Network Design Objectives, Network Design Challenges, Technological Background : MEMS Technology , Wireless Communication Technology , Hardware and Software Platforms, Wireless Sensor Network Standards, Introduction, Network Architectures for Wireless Sensor Networks, Classifications of Wireless Sensor Networks, Protocol Stack for Wireless Sensor Networks.
Fundamental MAC Protocols, MAC Design for Wireless Sensor Networks, MAC Protocols for Wireless Sensor Networks: Contention-Based Protocols, Contention-Free Protocols, Hybrid Protocols. Introduction, Fundamentals and Challenges, Taxonomy of Routing and Data Dissemination Protocols, Overview of Routing and Data Dissemination Protocols: Location- Aided Protocols, Layered and In-Network Processing-Based Protocols, Data-Centric Protocols, Multipath-Based Protocols, Mobility-Based Protocols, QoS Based Protocols, Heterogeneity-Based Protocols.
Introduction, Query Processing in Wireless Sensor Networks, Data Aggregation in Wireless Sensor Networks, Node Localization: Concepts and Challenges of Node Localization Technologies, Ranging Techniques for Wireless Sensor Networks, Wireless Localization Algorithms, Wireless Sensor Node Localization.
Need for Energy Efficiency and Power Control in Wireless Sensor Networks, Passive Power Conservation Mechanisms: Physical-Layer Power Conservation Mechanisms, MAC Layer Power Conservation Mechanisms, Higher Layer Power Conservation Mechanisms, Active
Power Conservation Mechanisms: MAC Layer Mechanisms, Network Layer Mechanisms, Transport Layer Mechanisms.
Fundamentals of Network Security, Challenges of Security in Wireless Sensor Networks, Security Attacks in Sensor Networks, Protocols and Mechanisms for Security, IEEE 802.15.4 and ZigBee Security .
Wireless Sensor Networks A Networking Perspective, Jun Zheng & Abbas Jamalipour, a john Wiley & sons, Inc., publication .
Wireless sensor networks Technology, Protocols, and Applications , kazem sohraby, daniel minoli, taieb znati , a john Wiley & sons, Inc., publication .
Fundamentals of wireless sensor networks theory and practice, Waltenegus Dargie, Christian Poellabauer, A John Wiley and Sons, Ltd., Publication.
Upon completion of this course, students will be able to-
Have knowledge of some existing applications of wireless sensor actuator networks
Learn the various hardware, software platforms that exist for sensor networks
Have knowledge of the various protocols for sensor networks
Analyze modeling and simulation of sensor networks
Understand what research problems sensor networks pose in disciplines such as signal processing, wireless communications and even control systems
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-
Introduction, History, Features
Local Environment Setup, Getting Python, Installation of Python, Use of IDE
Python Identifiers, Reserved Words, Lines & Indentation, Multiline Statements, Quotation in Python, Comments & other useful constructs
Assigning Values to Variables, Multiple Assignment, Standard Data Types
Python Strings, Python Lists, Python Tuples, Dictionary, DataType Conversion
Types of Operators, Arithmetic Operators, Comparison Operators, Assignment Operators, Bitwise Operators, Logical Operators, Operator Precedence.
Flowchart, If statement Syntax
Syntax for defining a function, Calling a Function, Function Arguments, Anonymous Functions Python-Applications & Further Extensions
References:
Python Crash Course: A Hands-On, Project-Based Introduction to Programming, by Eric Matthes, No Starch Press
Learn Python the Hard Way’ by Zed A. Shaw (3rd Edition), Addison Wesley
Head-First Python, by Paul Barry, O’Reilly
‘Python Programming’ by John Zelle, Franklin, Beedle & Associates Inc;
Upon completion of this course, students will be able to-
Install Python and have knowledge of syntax of Python
Describe the Numbers, Math functions, Strings, List, Tuples and Dictionaries in Python
Express different Decision Making statements and Functions
Develop code in Python using functions, loops etc.
Design GUI Applications in Python and evaluate different database operations
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
A little Background about mobile technologies, Overview of Android, An Open Platform for Mobile development, Open Handset Alliance, What does Android run On – Android Internals, Why to use Android for mobile development,
My First Android Application, How to setup Android Development Environment, Android development Framework - Android-SDK, Eclipse, Emulators – What is an Emulator / Android AVD, Creating & setting up custom Android emulator, Android Project Framework, My First Android Application.
Understanding Intent, Activity, Activity Lifecycle and Manifest, Creating Application and new Activities, Expressions and Flow control, Android Manifest, Simple UI -Layouts and Layout properties, Fundamental Android UI Design, Introducing Layouts
Creating new Layouts, Drawable Resources, Resolution and density independence (px,dip,dp,sip,sp), XML Introduction to GUI objects viz., Push Button Text / Labels, EditText, ToggleButton, WeightSum, Padding, Layout Weight
Head First Android Development, 2nd edition, OREILLY.
Android App Development for Dummies, 3rd edition, Michael Burton, John Wiley sons Busy Coder’s Guide to Android Development, Mark L. Murphy, Commonsware
Upon completion of this course, students will be able to-
Experiment on Integrated Development Environment for Android Application Development.
Design and Implement User Interfaces and Layouts of Android App.
Use Intents for activity and broadcasting data in Android App.
Design and Implement Database Application and Content Providers.
Experiment with Camera and Location Based service and develop Android App with Security features.
New Scheme Based On AICTE Flexible Curricula Information Technology, VI- semester
To introduce the principles of computer graphics and the components of a graphics system
To introduce basic algorithms for drawing line, circle and curves.
To develop understanding of the basic principles of 2D and 3D computer graphics and how to transform the shapes to fit them as per the picture definition.
To introduce multimedia architecture and hardware
To introduce multimedia file formats
Introduction to Raster scan displays, Storage tube displays, refreshing, flickering, interlacing, colour monitors, display processors resolution, working principle of dot matrix, inkjet laser printers, working principles of keyboard, mouse scanner, digitizing camera, track ball, tablets and joysticks, graphical input techniques, positioning techniques, rubber band techniques, dragging etc.
Scan conversion techniques, image representation, line drawing, simple DDA, Bresenham’s Algorithm, Circle drawing, general method, symmetric DDA, Bresenham’s Algorithm, curves, parametric function, Beizier Method, B-spline Method.
2D & 3D Co-ordinate system, Translation, Rotation, Scaling, Reflection Inverse transformation, Composite transformation, world coordinate system, screen coordinate system, parallel and perspective projection, Representation of 3D object on 2D screen, Point Clipping, Line Clipping Algorithms, Polygon Clipping algorithms, Introduction to Hidden Surface elimination, Basic illumination model, diffuse reflection, specular reflection, phong shading, Gourand shading ray tracing, color models like RGB, YIQ, CMY, HSV.
Introduction to multimedia components applications, Multimedia System Architecture, Evolving technologies for Multimedia, Defining objects for Multimedia systems, Multimedia Data interface standards, Multimedia Databases, Multimedia Hardware, SCSI, IDE, MCI, Multimedia Tools, presentation tools, Authoring tools.
Compression & Decompression, Multimedia Data & File Format standards, TIFF, MIDI, JPEG, DIB, MPEG, RTF, Multimedia I/O technologies, Digital voice and audio, Video image and animation, Full motion video, Storage and retrieval technologies.
Donald Hearn and M.Pauline Baker, Computer Graphics C Version, Pearson Education, 2003.
Prabat K Andleigh and Kiran Thakrar, Multimedia Systems and Design, PHI Learning,
Tay Vaughan, Multimedia making it work, Tata McGraw Hill edition.
Amarendra N Sinha & Arun D Udai, Computer Graphics, McGraw Hill publication.
Mukherjee, Fundamental of Computer Graphics and Multimedia, PHI Learning.
Write a program to implement DDA line drawing algorithm
Write a program to implement Bresenham’s line drawing algorithm.
Write a program to implement Bresenham’s circle drawing algorithm.
Write a program to draw an ellipse using Bresenham’s algorithm.
Write a program to perform various transformations on line , square & rectangle.
Write a program to implement Cohen Sutherland line clipping algorithm.
Write a program to implement Liang-Bersky line clipping algorithm.
Write a program to implement Cohen-Sutheland polygon clipping algorithm to clip a polygon with a Pattern.
Write a program to convert a color given in RGB space to it’s equivalent CMY color space.
Study of various Multimedia file formats:-RTF,MIDI,GIF,JPEG,MPEG,TIFF etc.
Write a program to implement JPEG compression scheme for still images.
Write a program to perform Packbits compression & decompression.
Write a short program to create a TIFF file using bitmap segments and text files as the TIFF File components.
Write a program to convert a BMP file into either JPEG or GIF file.
Study of various Multimedia Authoring Tools.
Upon completion of this course, students will be able to-
Understand the core concepts of computer graphics.
Implement various shapes drawing algorithms.
Apply geometric transformations on graphic objects and also implement clipping, shading and colour models.
Understand multimedia systems architecture, multimedia components and use various multimedia tools.
Perform activities involved in design, development and testing of modeling, rendering, shading and animation.
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
To provide an overview of Wireless Communication networks area and its applications in communication engineering.
To introduce various standards of mobile communication.
To explain the various terminology, principles, devices, schemes, concepts used in Wireless Communication Networks.
To introduce the concepts of Adhoc networks and Sensor networks and their issues
To introduce various security threats in wireless networks and the techniques for the prevention and detection of threats
Antenna , radiation pattern, antenna types, antenna gain, propagation modes, types of fading. Model for wireless digital communication, multiple access technique-SDMA, TDMA, FDMA, CDMA, DAMA, PRMA, MAC/CA, Cellular network organization, operations of cellular system, mobile radio propagation effects, handoff, power control, sectorization, traffic engineering, Infinite sources, lost calls cleared, grade of service, poison arrival process
GSM- Services, system architecture, radio interface, logical channels, protocols, localization and calling, handover, security, HSCSD, GPRS-architecture, Interfaces, Channels, mobility management DECT, TETRA, UMTS.
IEEE 802.11: LAN-architecture, 802.11 a, b and g, protocol architecture, physical layer, MAC layer , MAC management, HIPERLAN-protocol architecture, physical layer, access control sub layer, MAC sub layer. Bluetooth-user scenarios- physical layer, MAC layer.
Mobile IP, DHCP, Ad hoc networks: Characteristics, performance issue, routing in mobile host. Wireless sensor network, Mobile transport layer: Indirect TCP, Snooping TCP, Mobile TCP, Time out freezing, Selective retransmission, transaction oriented TCP. Introduction to WAP.
Intruders, Intrusion detection, password management, viruses and related threads, worms, trojan horse defense, difference biometrics and authentication system, firewall design principle.
J. Schiller, “Mobile Communication”, Addision , Wiley
William Stalling, “Wireless Communication and Network”, Pearson Education
Upena Dalal,” Wireless Communication”, Oxford Higher Education
Dr. Kamilo Feher, “Wireless Digital communication”, PHI
William C.Y Lee, “Mobile Communication Design Fundamental” , John Wiley.
To implement mobile network using open source softwares like NS2 etc. Implement Code Division Multiple Access (CDMA).
To write a programme to implement concept of frequency reuse when given size of geographical area and the set of available frequencies.
Study of OPNET tool for modeling and simulation of different cellular standards. Study and Analysis of wired network.
Study and Analysis of wireless network. Study and Analysis of Bluetooth.
Study of Mobile IP.
Write programs using WML (Wireless Markup Language) Rajiv Gandhi Proudyogiki Vishwavid
Upon completion of this course, students will be able to-
Explain the basic concepts of wireless network and wireless generations.
Demonstrate the different wireless technologies such as CDMA, GSM, GPRS etc
Explain the design considerations for deploying the wireless network infrastructure.
Appraise the importance of Adhoc networks such as MANET and Wireless Sensor networks
Differentiate and support the security measures, standards. Services and layer wise security considerations
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
To teach the students the basic concepts of Compiler, programming languages and develop an understanding of the compilation phases
To make students understand what is syntax analysis and various types of parsers
To introduce syntax trees and dependency graphs
To introduce intermediate code generation, memory management and the role of symbol table and its organization
To introduce Code generation and code optimization
Introduction to Compiler, analysis of source program, phases and passes, Bootstrapping, lexical analyzers, data structures in compilation – LEX: lexical analyzer generator, Input buffering, Specification and Recognition of tokens, YACC, The syntactic specification of programming languages: Context free grammars, derivation and parse trees, capabilities of CFG.
Syntax Analysis: working of Parser, Top down parsing, Bottom-up parsing, Operator precedence parsing, predictive parsers, LR parsers (SLR, Canonical LR, LALR), constructing SLR parsing tables, constructing Canonical LR parsing tables, Constructing LALR parsing tables, using ambiguous grammars, an automatic parser generator.
Syntax Directed Translation: Definitions, Inherited Attributes, L-attributed definitions, S- attributed definitions, Dependency graph, Construction of syntax trees, Top down translation, postfix notation, bottom up evaluation.
Intermediate Code Generation: Three address code, quadruple & triples, translation of assignment statements, Boolean expression and control structures, Backpatching, Run Time Memory Management: Static and Dynamic storage allocation, stack based memory allocation schemes, Symbol Table management.
Code Optimization and Generation: organization of code optimizer, basic blocks and flow graphs, DAG representation of basic blocks, loops in flow graph, peephole optimization, Basic of block optimization.
A. V. Aho, R. Sethi & J. D. Ullman, Compilers: Principles, Techniques and Tools, Pearson Ed.
Alfred V. Aho, Jeffrey D. Ullman, Principles of Compiler Design, Narosa Publishing House.
Ronald Mak, Writing Compilers and Interpreters, Wiley IndiacEdition.
Louden, Compiler Construction, Cengage learning.
Upon completion of this course, students will be able to-
Demonstrate an understanding of the compilation phases.
Specify and analyze the lexical, syntactic and semantic structures of advanced language features.
Write a scanner, parser, and semantic analyser without the aid of automatic generators.
Describe techniques for intermediate code and machine code optimization.
Design the structures and support required for compiling advanced language features.
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-
To introduce data warehouse and its components
To introduce knowledge discovery process, data mining and its functionalities
To develop understanding of various algorithms for association rule mining and their differences
To introduce various classification techniques
To introduce various clustering algorithms.
Data Warehousing: Need for data warehousing , Basic elements of data warehousing, Data Mart, Data Warehouse Architecture, extract and load Process, Clean and Transform data, Star ,Snowflake and Galaxy Schemas for Multidimensional databases, Fact and dimension data, Partitioning Strategy-Horizontal and Vertical Partitioning, Data Warehouse and OLAP technology, Multidimensional data models and different OLAP Operations, OLAPServer: ROLAP, MOLAP, Data Warehouse implementation, Efficient Computation of Data Cubes, Processing of OLAP queries, Indexing data.
Data Mining: Data Preprocessing, Data Integration and Transformation, Data Reduction, Discretizaion and Concept Hierarchy Generation, Basics of data mining, Data mining techniques, KDP (Knowledge Discovery Process), Application and Challenges of Data Mining
Mining Association Rules in Large Databases: Association Rule Mining, Single- Dimensional Boolean Association Rules, Multi-Level Association Rule, Apriori Algorithm, Fp- Growth Algorithm, Time series mining association rules, latest trends in association rules mining.
Classification and Clustering: Distance Measures, Types of Clustering Algorithms, K-Means Algorithm, Decision Tree, Bayesian Classification, Other Classification Methods, Prediction, Classifier Accuracy, Categorization of methods, Outlier Analysis.
Introduction of Web Mining and its types, Spatial Mining, Temporal Mining, Text Mining, Security Issue, Privacy Issue, Ethical Issue.
Arun k Pujari “Data Mining Technique” University Press
Han,Kamber, “Data Mining Concepts & Techniques”,
M.Kaufman., P.Ponnian, “Data Warehousing Fundamentals”, John Wiley.
4, M.H.Dunham, “Data Mining Introductory & Advanced Topics”, Pearson Education.
Ralph Kimball, “The Data Warehouse Lifecycle Tool Kit”, JohnWiley.
E.G. Mallach , “The Decision Support & Data Warehouse Systems”, TMH
Upon completion of this course, students will be able to-
Demonstrate an understanding of the importance of data warehousing and OLAP technology
Organize and Prepare the data needed for data mining using pre preprocessing techniques
Implement the appropriate data mining methods like classification, clustering or Frequent Pattern mining on various data sets.
Define and apply metrics to measure the performance of various data mining algorithms.
Demonstrate an understanding of data mining on various types of data like web data and spatial data
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
To introduce students with knowledge about the basic functions and applications of embedded systems
To introduce the architecture of embedded systems
To introduce the various communication protocols
To enable students to have knowledge of the memory types and supporting technologies of embedded systems.
To enable students to have knowledge about the development of embedded software
F Vahid, T Giogarvis, Embedded systems: A unified hardware/software approach, Wiley, 1999.
Raj Kamal, Embedded Systems Introduction, 2nd Ed., TMH publication, 2015.
David E Simons, An Embedded Software Primer, Pearson, 1999.
Upon completion of this course, students will be able to-
Explain the embedded system concepts and architecture of embedded systems
Describe the architecture of 8051 microcontroller and write embedded program for 8051 microcontroller
Select elements for an embedded systems tool.
Understand the memory types used in embedded systems
Design a system, component, or process to meet desired needs within realistic constraints such as economic, environmental, social, political, ethical, health and safety, manufacturability, and sustainability
New Scheme Based On AICTE Flexible Curricula
To enable Students to understand Primary forms of IPR
To enable Students to understand what is infringement of copyright and its consequences
To introduce criteria and procedure for obtaining patents
To enable Students to understand the registration procedures related to IPR.
To expose Students to contemporary issues and enforcement policies in IPR.
Introduction and Justifications of IPR, Nature of IP, Major forms of IP- Copyright, Patent, Trade Marks Designs, Geographic indication, layout design of Semi conductors, Plant varieties, Concept & Meaning of Intellectual Property. Major international documents relating to the protection of IP - Berne Convention, Paris Convention, TRIPS. The World Intellectual Property Organization (WIPO).
Meaning and historical development of copyright , Subject matter , Ownership of copyright, Term of copyright, Rights of owner, Economic Rights, Moral Rights. Assignment and licence of rights, Infringement of copyright, Exceptions of infringement, Remedies, Civil, Criminal, Administrative, Registration Procedure.
Meaning and historical development,. Criteria for obtaining patents, Non patentable inventions, Procedure for registration, Term of patent, Rights of patentee, Compulsory licence, Revocation, Infringement of patents, Exceptions to infringement, Remedies, Patent office and Appellate Board.
IPR & sustainable development, The Impact of Internet on IPR. IPR Issues in biotechnology, E- Commerce and IPR issues, Licensing and enforcing IPR, Case studies in IPR
P. Narayanan, Intellectual Property Law, Eastern Law House
. Neeraj Pandey and Khushdeep[ Dharni, Intellectual Property Rights, PHI, 2014
N.S Gopalakrishnan and T.G. Agitha, Principles of Intellectual Property, Eastern Book Co. Lucknow, 2009.
Anand Padmanabhan, Enforcement of Intellectual Property, Lexis Nexis Butterworths, Nagpur, 2012.
Managing Intellectual Property The Strategic Imperative, Vinod V. Sople, PHI.
Prabuddha Ganguli, “ Intellectual Property Rights” Mcgraw Hill Education, 2016.
Upon completion of this course, students will be able to:
Understand Primary forms of IPR
Assess and critique some basic theoretical justification for major forms of IP Protection
Compare and contrast the different forms of IPR in terms of key differences and similarities.
Uderstand the registration procedures related to IPR.
Have exposure to contemporary issues and enforcement policies in IPR.
New Scheme Based On AICTE Flexible Curricula Information Technology, VI- semester
To introduce software development life cycle and various software process models
To introduce measures and metrics for software quality, reliability and software estimation techniques
To develop an understanding of software analysis and design phases
To introduce coding standards, guidelines and various software testing techniques
To introduce various activities for software maintenance and quality assurance
Introduction, Software- problem and prospects Software development process: System Development Life Cycle, Waterfall Model, Spiral Model and other models, Unified process Agile development-Agile Process- Extreme Programming- Other agile Process models.
Measures, Metrics and Indicators, Metrics in the Process and Project Domains, Software Measurement, Metrics of Software Quality, S/W reliability, Software estimation techniques, LOC and FP estimation. Empirical models like COCOMO, project tracking and scheduling, reverse engineering.
Software requirements and specification: feasibility study, Informal/formal specifications, pre/post conditions, algebraic specification and requirement analysis models, Specification design tools. Software design and implementation: Software design objectives and techniques, User interface design, Modularity, Functional decomposition, DFD, Data Dictionary, Object oriented design, Design patterns implementation strategies like top- down, bottom-up.
Coding standard and guidelines, programming style, code sharing, code review, rapid prototyping, specialization, construction, class extensions, intelligent software agents, reuse performance improvement, debugging. Software Testing Strategies: Verification and Validation, Strategic Issues, test plan, white box, black-box testing, unit and integration testing, system testing test case design and acceptance testing, maintenance activities.
Software Maintenance: Software Supportability, Reengineering, Business Process Reengineering, Reverse Engineering, Restructuring, Forward Engineering, Economics of Reengineering, project scheduling and tracking plan, project management plan, SQA and quality planning, SCM activities
and plan, CMM, Software project management standards, Introduction to component based software engineering.
P.S. Pressman, Software Engineering. A Practitioner's Approach, TMH.
Rajib Mall, Fundamental of Software Engineering, PHI.
Hans Van Vliet, Software Engineering, Wiley India Edition.
James S. Peters, Software Engineering, Wiley India Edition.
Pankaj Jalote, Software Engineering: A Precise Approach, Wiley India.
Kelkar, Software Project Management, PHI Learning
Upon completion of this course, students will be able to-
Define various software application domains and remember different process model used in software development.
Understand various measures of software and Generate project schedule.
Describe functional and non-functional requirements of software and develop design models of software.
Investigate the reason for bugs and apply the software testing techniques in commercial environment.
Understand various activities to be performed for improving software quality and software maintenance.
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
Course Objectives:
To Understand the basic WSN technology and supporting protocols
Understand the medium access control protocols and address physical layer issues
Learn localization concepts for sensor networks
Learn energy efficiency and power control in sensor networks
Understand the security challenges in sensor networks.
Overview of Wireless Sensor Networks: Network Characteristics, Network Applications, Network Design Objectives, Network Design Challenges, Technological Background : MEMS Technology , Wireless Communication Technology , Hardware and Software Platforms, Wireless Sensor Network Standards, Introduction, Network Architectures for Wireless Sensor Networks, Classifications of Wireless Sensor Networks, Protocol Stack for Wireless Sensor Networks.
Fundamental MAC Protocols, MAC Design for Wireless Sensor Networks, MAC Protocols for Wireless Sensor Networks: Contention-Based Protocols, Contention-Free Protocols, Hybrid Protocols. Introduction, Fundamentals and Challenges, Taxonomy of Routing and Data Dissemination Protocols, Overview of Routing and Data Dissemination Protocols: Location- Aided Protocols, Layered and In-Network Processing-Based Protocols, Data-Centric Protocols, Multipath-Based Protocols, Mobility-Based Protocols, QoS Based Protocols, Heterogeneity-Based Protocols.
Introduction, Query Processing in Wireless Sensor Networks, Data Aggregation in Wireless Sensor Networks, Node Localization: Concepts and Challenges of Node Localization Technologies, Ranging Techniques for Wireless Sensor Networks, Wireless Localization Algorithms, Wireless Sensor Node Localization.
Need for Energy Efficiency and Power Control in Wireless Sensor Networks, Passive Power Conservation Mechanisms: Physical-Layer Power Conservation Mechanisms, MAC Layer Power Conservation Mechanisms, Higher Layer Power Conservation Mechanisms, Active
Power Conservation Mechanisms: MAC Layer Mechanisms, Network Layer Mechanisms, Transport Layer Mechanisms.
Fundamentals of Network Security, Challenges of Security in Wireless Sensor Networks, Security Attacks in Sensor Networks, Protocols and Mechanisms for Security, IEEE 802.15.4 and ZigBee Security .
Wireless Sensor Networks A Networking Perspective, Jun Zheng & Abbas Jamalipour, a john Wiley & sons, Inc., publication .
Wireless sensor networks Technology, Protocols, and Applications , kazem sohraby, daniel minoli, taieb znati , a john Wiley & sons, Inc., publication .
Fundamentals of wireless sensor networks theory and practice, Waltenegus Dargie, Christian Poellabauer, A John Wiley and Sons, Ltd., Publication.
Upon completion of this course, students will be able to-
Have knowledge of some existing applications of wireless sensor actuator networks
Learn the various hardware, software platforms that exist for sensor networks
Have knowledge of the various protocols for sensor networks
Analyze modeling and simulation of sensor networks
Understand what research problems sensor networks pose in disciplines such as signal processing, wireless communications and even control systems
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-
Introduction, History, Features
Local Environment Setup, Getting Python, Installation of Python, Use of IDE
Python Identifiers, Reserved Words, Lines & Indentation, Multiline Statements, Quotation in Python, Comments & other useful constructs
Assigning Values to Variables, Multiple Assignment, Standard Data Types
Python Strings, Python Lists, Python Tuples, Dictionary, DataType Conversion
Types of Operators, Arithmetic Operators, Comparison Operators, Assignment Operators, Bitwise Operators, Logical Operators, Operator Precedence.
Flowchart, If statement Syntax
Syntax for defining a function, Calling a Function, Function Arguments, Anonymous Functions Python-Applications & Further Extensions
References:
Python Crash Course: A Hands-On, Project-Based Introduction to Programming, by Eric Matthes, No Starch Press
Learn Python the Hard Way’ by Zed A. Shaw (3rd Edition), Addison Wesley
Head-First Python, by Paul Barry, O’Reilly
‘Python Programming’ by John Zelle, Franklin, Beedle & Associates Inc;
Upon completion of this course, students will be able to-
Install Python and have knowledge of syntax of Python
Describe the Numbers, Math functions, Strings, List, Tuples and Dictionaries in Python
Express different Decision Making statements and Functions
Develop code in Python using functions, loops etc.
Design GUI Applications in Python and evaluate different database operations
New Scheme Based On AICTE Flexible Curricula Information Technology, VI-Semester
A little Background about mobile technologies, Overview of Android, An Open Platform for Mobile development, Open Handset Alliance, What does Android run On – Android Internals, Why to use Android for mobile development,
My First Android Application, How to setup Android Development Environment, Android development Framework - Android-SDK, Eclipse, Emulators – What is an Emulator / Android AVD, Creating & setting up custom Android emulator, Android Project Framework, My First Android Application.
Understanding Intent, Activity, Activity Lifecycle and Manifest, Creating Application and new Activities, Expressions and Flow control, Android Manifest, Simple UI -Layouts and Layout properties, Fundamental Android UI Design, Introducing Layouts
Creating new Layouts, Drawable Resources, Resolution and density independence (px,dip,dp,sip,sp), XML Introduction to GUI objects viz., Push Button Text / Labels, EditText, ToggleButton, WeightSum, Padding, Layout Weight
Head First Android Development, 2nd edition, OREILLY.
Android App Development for Dummies, 3rd edition, Michael Burton, John Wiley sons Busy Coder’s Guide to Android Development, Mark L. Murphy, Commonsware
Upon completion of this course, students will be able to-
Experiment on Integrated Development Environment for Android Application Development.
Design and Implement User Interfaces and Layouts of Android App.
Use Intents for activity and broadcasting data in Android App.
Design and Implement Database Application and Content Providers.
Experiment with Camera and Location Based service and develop Android App with Security features.