Information Technology BE IV
Information Technology BE IV
Note:
(1) 1/4th of total strength of students subject to minimum strength of twenty students is required to offer an elective in the college in a
particular academic session.
(2) Choice of elective course once made for an examination cannot be changed in future examinations.
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Course objective:
• To Create cyber security awareness and to understand principles of web security
• To understand key terms and concepts in cyber law, intellectual property and cyber crimes, trademarks and domain
theft.
• To make attentive to students about possible hacking and threats in this communication era.
• Discuss Issues for creating Security Policy for a Large Organization.
Unit – 1: Cyber Security Fundamentals
Security Concepts: Authentication, Authorization, Non-repudiation, Confidentiality, Integrity, availability. Cyber
Crimes and Criminals: Definition of cyber-crime, types of cyber-crimes and types of cyber-criminals.
Unit – 2: Cyber attacker Techniques and Motivations
Anti-forensics: Use of proxies, use of tunneling techniques. Fraud techniques: Phishing and malicious mobile code,
Rogue antivirus, Click fraud. Threat Infrastructure: Botnets, Fast Flux and advanced fast flux.
Unit – 3: Exploitation
Techniques to gain foothold: Shellcode, Buffer overflows, SQL Injection, Race Conditions, DoS Conditions, Brute
force and dictionary attacks. Misdirection, Reconnaissance, and Disruption
Methods: Cross-Site Scripting (XSS), Social Engineering, WarXing, DNS Amplification Attacks.
Unit – 4: Information Technology Act 2000
Overview of IT Act 2000, Amendments and Limitations of IT Act, Electronic Governance, Legal Recognition of
Electronic Records, Legal Recognition of Digital Signature, Certifying Authorities, Cyber Crime and Offenses,
Network Service Providers Liability, Cyber Regulations Appellate Tribunal, Penalties and Adjudication.
Unit – 5: Cyber Law and Related Legislation
Patent Law, Trademark Law, Copyright, Software Copyright or Patented, Domain Names and Copyright disputes,
Electronic Data Base and its Protection, IT Act and Civil Procedure Code, IT Act and Criminal Procedural Code,
Relevant Sections of Indian Evidence Act, Relevant Sections of Bankers Book Evidence Act, Relevant Sections of
Indian Penal Code, Relevant Sections of Reserve Bank of India Act, Law Relating To Employees And Internet,
Alternative Dispute Resolution, Online Dispute Resolution (ODR).
Course Outcome –
• Students will be able to acknowledge about the cybercrime, cyber criminal, and intellectual property rights.
• Encouraging Open Standards.
• Protection and resilience of Critical Information Infrastructure.
• To enable effective prevention, investigation and prosecution of cybercrime and enhancement of law
enforcement capabilities through appropriate legislative intervention.
Text Books
1. Cyber Security Essentials, James Graham et al. CRC Press
2. Cyber Laws: Intellectual property & E Commerce Security, Kumar K. Dominant Publisher
Reference Books
1. Cyber Law Text & Cases, Gerald R. Ferrera, Margo E. K. Reder, CENGAGE LEARNING Publication.
2. Ethics in Information Technology, George W. Reynolds, CENGAGE LEARNING Publication.
3. Cyber Laws & IT Protection, Harish Chander, PHI Publication.
4. Ross J. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems. John Wiley,
New York, NY, 2001.
5. Matt Bishop. Computer Security: Art and Science. Addison Wesley, Boston, MA, 2003.
6. Frank Stajano. Security for Ubiquitous Computing. John Wiley, 2002.
7. Online Textbook Materials www.securityplusolc.com
CHHATTISGARH SWAMI VIVEKANAND TECHNICAL UNIVERSITY, BHILAI (C. G.)
List of Experiments:
1. Introduce students to network simulation through the NetSim or Qualnet simulation package, Create a simple
network model with multiple scenarios, collect statistics on network performance through the use of NetSim
tools, analyze statistics and draw conclusions on network performance.
3. Study the working of the spanning tree algorithm by varying the priority among the switches.
5. During client-server TCP downloads study the throughputs of Slow start + Congestion avoidance (also known
as Old Tahoe) and Fast Retransmit (also known as Tahoe), Congestion Control Algorithms.
6. To study how the Bit Error Rate (loss) and data of a Wireless LAN (IEEE 802.11b) network varies as the
distance between the Access Point and the wireless nodes is varied.
7. Study the working and routing table formation of Interior Routing Protocols, i.e. Routing Information protocol
(RIP) and Open Shortest Path First (OSPF).
9. Understand the impact of bit error rate on packet error and investigate the impact of error of a simple hub based
CSMA / CD network.
10. Study how call blocking probability varies as the load on a GSM network is continuously increased.
11. Study how the number of channels increases and the Call blocking probability decreases as the Voice activity
factor of a CDMA network is decreased.
Course Objectives:
• The objective of this lab is to develop an ability to design and implement static and dynamic website
• To learn how to create a simple& advanced web page using html along with the usage of style sheets, lists,
creation or tables with borders, padding and colors.
• To get acquainted with JavaScript procedures and usage of regular expressions in JavaScript.
Expt-1: Develop and demonstrate a XHTML document that illustrates the use external style sheet, ordered list, table,
borders, padding, color, and the <span> tag.
Expt-2: Develop and demonstrate a XHTML file that includes Java script for the following problems:
a) Input : A number n obtained using prompt
Output : The first n Fibonacci numbers
b) Input : A number n obtained using prompt
Output : A table of numbers from 1 to n and their squares using alert
Expt-3: Develop and demonstrate a XHTML file that includes JavaScript script that uses functions for the following
problems:
a) Parameter: A string
Output: The position in the string of the left-most vowel
b) Parameter: A number
Output: The number with its digits in the reverse order
Guideline:
1. Declare the script tag as text/javascript in the beginning of the <body> of html program
2. Get the number to be reversed from the user using prompt()
3. Validate input number (should be a positive number between 0 to 9) using the regular expression “/^[0-9]+$/ “
and alert the user for invalid input using alert()
4. Reverse the number using modulus operation.
5. Use math.floor(number/10) to get the floor of number after division (used for reversing)
6. Display the reversed string using alert()
Expt-4(a): Develop and demonstrate, using Java script, a XHTML document that collects the USN ( the valid format is:
A digit from 1 to 4 followed by two upper-case characters followed by two digits followed by two upper-case characters
followed by three digits; no embedded spaces allowed) of the user. Event handler must be included for the form element
that collects this information to validate the input. Messages in the alert windows must be produced when errors are
detected.
(b): Modify the above program to get the current semester also (restricted to be a number from 1 to 8)
Expt-5: Develop and demonstrate, using JavaScript script, a XHTML document that contains three short paragraphs of
text, stacked on top of each other, with only enough of each showing so that the mouse cursor can be placed over some
part of them. When the cursor is placed over the exposed part of any paragraph, it should rise to the top to become
completely visible.
Expt-6: Design an XML document to store information about a student in an engineering college affiliated to CSVTU.
• The information must include Enrolment, Univ_Roll, Name, Name of the College, Brach, Year of Joining, and
e-mail id.
• Create sample data for 10 students. Create a CSS style sheet and use it to display the document.
Expt-7: (a) Write a Perl program to display various Server Information like Server Name, ServerSoftware, Server
protocol, CGI Revision etc.
(b) Write a Perl program to accept UNIX command from a HTML form and to display the output of the command
executed.
Expt-8: Write a Perl program to accept the User Name and display a greeting message randomly chosen from a list of 4
greeting messages.
Expt-9: Write a Perl program to display a digital clock which displays the current time of the server
Expt-10: Write a Perl program to insert name and age information entered by the user into a table created using
MySQLand to display the current contents of this table.
EXPT-11: Write a PHP/.Net program to store current date-time in a COOKIE and display the “Last visited on date-
time on the web page upon reopening of the same page.
EXPT-12: Write a PHP/.Net program to store page views count in SESSION, to increment the count on each refresh,
and to show the count on web page.
EXPT-13: Create a XHTML form with Name, Address Line 1, Address Line 2, and E-mail text fields. On submitting,
store the values in MySQL table. Retrieve and display the data based on Name.
EXPT-14: Using PHP/.Net develop a program to accept book information viz. Accession number, title, authors, edition
and publisher from a web page and store the information in a database and to search for a book with the title specified
by the user and to display the search results with proper headings.
EXPT-15: Using PHP/.Net Technology develop an online portal of an online Book store. The pages should resemble
www.amazon.com the website should consist the following pages.
• Home page
• Registration and user Login
• User Profile Page
• Books catalog
• Shopping Cart
• Payment By credit card
• Order Conformation
Validate the Registration, user login, user profile and payment by credit card pages using JavaScript.
Course outcome:
At the end of the course, students should be able to:
• Design and implement dynamic websites with good aesthetic sense of designing and latest technical know-
how's.
• Have a Good grounding of Web Application Terminologies, Internet Tools, E – Commerce and other web
services
CHHATTISGARH SWAMI VIVEKANAND TECHNICAL UNIVERSITY, BHILAI (C. G.)
Course Objective:
Course outcome: Students who complete this course should be able to do the following things.
• Use of java in mobile applications.
• Design and develop different mobile applications using J2ME.
• Development of Mobile applications using J2ME, like SMS, Gaming and Multimedia.
1. a) Write a J2ME program to show how to change the font size and color.
b) Write a J2ME program which creates the following kind of menu.
• cut
• copy
• past
• delete
• select all
• unselect all
2. Event Handling- Create a J2ME menu which has the following options:
• cut - can be on/off
• copy - can be on/off
• paste - can be on/off
• delete - can be on/off
• select all - put all 4 options on
• unselect all - put all
6. Create a MIDP application, which draws a bar graph to the display. Data values can be given at int[] array.
You can enter four data (integer) values to the input text field.
7. Create an MIDP application which examines, that a phone number, which a user has entered is in the given
format (Input checking):
* Area code should be one of the following: 040, 041, 050, 0400, 044
* There should 6-8 numbers in telephone number (+ area code)
8. Write a program to show how to make a SOCKET Connection from J2ME phone. Many a times there is a
need to connect backend HTTP server from the J2ME application. Show how to make a SOCKET connection
from the phone to port 80.
9. Login to HTTP Server from a J2ME Program. Write program to shows how to display a simple LOGIN
SCREEN on the J2ME phone and how to authenticate to a HTTP server. Many J2ME applications for security
reasons require the authentication of the user.
Note: Use Apache Tomcat Server as Web Server and MySQL as Database Server.
10. Create a MIDP application, which show to the user 5-10 quiz questions. All questions have 4 possible options and
one right option exactly. Application counts and shows to the user how many right answers were right and shows them
to user.
11-15. Developing network applications using wireless toolkit- create a simple client-server UDP based
application. The following should be carried out with respect to the given set of application domains: (Assume
that the Server is connected to the well-maintained database of the given domain. Mobile Client is to be
connected to the Server and fetch the required data value/information)
• Students Marks Enquiry
• Town/City Movie Enquiry
• Railway/Road/Air (For example PNR) Enquiry/Status
• Sports (say, Cricket) Update
• Town/City Weather Update
• Public Exams (say Intermediate or SSC)/ Entrance (Say EAMCET) Results Enquiry
Divide Student into Batches and suggest them to design database according to their domains and render
information according the requests.
CHHATTISGARH SWAMI VIVEKANAND TECHNICAL UNIVERSITY, BHILAI (C. G.)
1. Information regarding broad area must be made available to the students well in advance (may be during previous
semester).
2. Information must cover following parameters.
I. Broad area: Subject or expertise/application area.
II. Required skills: Knowledge of subject(s), software, tools & other characteristics.
III. Type of project: Hardware, software, design, survey, study based etc.
IV. Guide available: Name of Guide (S) from Department & Institute.
V. Other related information depending upon specific branch & institute.
3. It is also recommended to give proper counseling to pick up suitable project.
4. Students must get chance to select projects as per their choice or decided mutually between students and department
faculty (HoD) concern.
5. One project group must contain maximum four students, however students can do project individually but it should
be approved by department.
6. Compiled list of projects must be submitted to the University within 25 days of start of semester.
7. Compiled list may contain following parameters.
Monitoring of project:
1. It is recommended to give projects as per the specializations of existing faculty of the department instead of outside
person/agency.
2. Project must be allocated, developed and monitored by department / institution itself, but not by outside agencies.
3. Regular review by guide is recommended to ensure development & contribution of students.
External Evaluation:
External assessment of project would be like conduction of practical exams of University, and must be executed as per
the norms of practical exams.
NOTE: Completion of Project outside the department/Institution should not be encouraged.
CHHATTISGARH SWAMI VIVEKANAND TECHNICAL UNIVERSITY, BHILAI
Semester: VIII Branch: Information Technology
Subject: Software Testing Code: 322849(22)
Total Marks in End Semester Exam: 80. Total Tutorial Periods: Nil.
Minimum number of class tests to be conducted: 02. Total Theory Periods: 50
COURSE OBJECTIVE:
• To study software testing objectives, process, criteria, strategies, and methods.
• To study various software testing issues and solutions in software unit, integration, regression, and system
testing.
• To study planning of a test project, design test cases, conduction of testing operations, generation of a test
report.
• To understand automation testing processes its problems and solutions.
Unit-I: Quality Revolution, Software Quality, Role of Testing, Objectives of Testing, Concept of Complete
Testing, Central Issue of Testing, Sources of Information for Test Case selection, Test Planning and Design,
Monitoring and Measuring Test Execution, Test Tools and Automation, Test Team Organization and
Management.
Unit-II: Basic Concepts of Testing Theory, Theory of Goodenough and Gerhart, Theory of Weyuker and
Ostrand, Theory of Gourlay, Adequacy of Testing, Limitations of Testing, Static Unit Testing, Defect
Prevention, Dynamic Unit Testing, Debugging.
Unit-III: Outline of Control Flow Testing, Control Flow Graph, Paths in Control Flow Graphs, Path Selection
Criteria, Data Flow Testing criteria, Comparison of Data Flow and Test Selection Criteria, Domain Error,
Testing of Domain Errors.
Unit-IV: System Test design, Test design Factors, Requirement Identification, Test Objective Identification,
Structure of a System Test Plan, Assumptions, Test Approach, Test Suite Structure, Types Of Acceptance
Testing
Unit-V: Five Views of Software Quality, Quality Control, Quality assurance, Cost of quality, Software Quality
Assurance, SQA Plan, ISO 9000, Capability Maturity Model, McCall s Quality Factors.
Text Books:
1. Kshirasagar Naik, “Software Testing and Quality Assurance”, John Wiley & Sons.
2. William Perry, “Effective Methods for Software Testing”, John Wiley & Sons.
Reference Books
1.Cem Kaner and Jack Falk,
“Testing Computer Software”, Wiley.
2.Ron Patton, “Software Testing”, SAMS Publications
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Semester – VIII Branch: Information Technology
Subject: Advance Information Systems Code: 333846(33)
Total Theory Periods: 50 Total Tutorial Periods: NIL
Class Test (Minimum): 02 Assignments (Minimum): 02
Course Objective: The main Objective to include this subject in Information Technology discipline is:
• To explore brief idea about the basic working of advance communications systems, new trends and
technology and different services provided in this field.
• To motivate our students to understand the different technology for working of these devices, their
advantages and disadvantages and emerging problems regarding these.
• To develop a view regarding their applications, software development and emerging trends.
• To give the student an understanding of present day communication technologies like DTH, SONET,
OTDR, GPS, NAVIGATION, TRACKING RADAR Systems.
UNIT-I: Optical Receiver and Transmission Systems Operation: Receiver operation, Preamplifier types,
receiver performance and sensitivity, Eye diagrams, Coherent detection, Specification of receivers.
Transmission Systems :Point –to-point link –system considerations, Link power budget and rise time budget
methods for design of optical link, BER calculation Semiconductor optical Amplifier, EDFA, Raman
Amplifier, Wideband Optical Amplifiers.
UNIT-II: Advances in Optical Fiber Systems: Principles of WDM, DWDM, Telecommunications &
broadband application, SONET/SDH, MUX, Analog & Digital broadband, optical switching Optical couplers,
Tunable sources and Filters ,optical MUX/DEMUX, Arrayed waveguide grating, optical add drop multiplexer
(OADM), optical circulators, attenuators, optical cross connects, wavelength converter, Mach-Zender
Interferometer, Fiber Optical Measurements : Test Equipments, OTDR , Set ups for Measurement of
Attenuation, Dispersion, NA and EYE pattern .
UNIT-III: Applications of satellite communication: INTELSAT Series, INSAT, VSAT, Mobile satellite
services: GSM, GPS, INMARSAT, LEO, MEO, Satellite Navigational System. Direct Broadcast satellites
(DBS)- Direct to home Broadcast (DTH), Digital audio broadcast (DAB)- World space services, Business
TV(BTV), GRAMSAT, Specialized services – E –mail, Video conferencing, Internet.
UNIT-IV: satellite Navigation and the Global Positioning System: Radio and Satellite Navigation, GPS
Position Location principles, GPS Receivers and codes, Satellite signal acquisition, GPS Navigation Message,
GPS signal levels, GPS receiver operation, GPS C/A code accuracy, Differential GPS.
UNIT-V: Radar and its Application: Radar: Basic principles, Radar equation, factors influencing maximum
range, effect of noise, power and frequencies used in Radar, types of Radar, Basic pulsed Radar system,
Modulators, receivers, Bandwidth requirements, factors governing pulse characteristics, Duplexer, moving
target indicator (MTI), tracking Radar systems and search systems.
Course Outcome:
• Students will be able to acknowledge about the working and development of advamce communication
systems in detail, services provided by them and recent application development trends in this field.
• They may go to choose their carrier in application development for these systems.
• Students will have detailed understanding current and proposed modern communication technologies.
• The student will have the ability to work in advanced research in wireless and optical technologies.
Text Books:
1. 'Fiber optic Communication', Joseph C. Palais, Prentice Hall.
2. 'Satellite Communication', Dr. D. C. Agrawal, Khanna Publishers.
3. Principle of Radar communication, Grolsky.
Reference Books:
1. Satellite Communication System Engg. W.L. Pritchard & J. A. Sciulli:Prentice Hall.
2. Optoelectronics and Fiber Communication Sarkar and Sarkar New age international publication.
3. Satellite Communication, Robert M Gagliardi
4. Satellite Communications, Timothy Pratt, Charles W. Bostian
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Course Objective:
• To provide the student with the basic understanding of neural networks and fuzzy logic fundamentals,
Program the related algorithms and Design the required and related systems.
• To cater the knowledge of Neural Networks and Fuzzy Logic Control and use these for controlling real
time systems.
UNIT-IV Applications:
Talking Network and Phonetic typewriter: Speech Generation and Speech recognition,
Neocognitron – Character Recognition and Handwritten Digit recognition, Pattern Recognition Applications.
Course outcome:
• To provide adequate knowledge about concepts of feed forward neural networks and feedback neural
networks.
• To teach about the concept of fuzziness involved in various systems.
• To provide adequate knowledge about fuzzy set theory.
• To provide comprehensive knowledge of fuzzy logic control and adaptive fuzzy logic and to design the
fuzzy control using genetic algorithm.
• To provide adequate knowledge of application of fuzzy logic control to real time systems.
Text Books:
1. Artificial Neural Networks by B. Yagna Narayan, PHI
2. Neural Networks Fuzzy Logic & Genetic Alogrithms by Rajshekaran & Pai, Prentice Hall
Reference Books:
1. Neural Networks by James A. Freeman and David M. Strapetuns, Prentice Hall,.
3. Neural Network & Fuzzy System by Bart Kosko, PHI.
4. Neural Network Design by Hagan Demuth Deale Vikas Publication House
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Course Objective:
• To develop structural intuition of how the hardware and the software work, starting from simple systems to
complex shared resource architectures.
• Get a broad understanding of parallel computer architecture and different models for parallel computing.
• To learn about strategies for how algorithms that were originally developed for single-processor systems
can be converted to run efficiently on parallel computers.
• To know about current practical implementations of parallel architectures.
• To learn how to design parallel programs and how to evaluate their execution
• To understand the characteristics, the benefits and the limitations of parallel systems and distributed
infrastructures
UNIT – I: Parallel processing – Definition, Architectures; Programmability- Operating Systems Support,
Types of Os, Parallel Programming Models, Software Tools; Data Dependency Analysis; Shared Memory
Programming: Thread based Implementation- Management, Example, Attributes Mutual exclusion, Events &
condition Variables, Deviation computation
UNIT-II: Distributed Computing -I- message passing, general model, programming model, PVM-Process
Control, Information, Message Buffers, Signaling, Sending, receiving, Group Operations, Starting PVM,
Compiling PVM Application, PVM Console Commands.
UNIT-III: Distributed Computing-II- remote procedure call, parameter passing, Locating the server,
semantics, security, problem areas, Java Remote method invocation, DCE, Deploying application in DCE,
POSIX Thread reference-Creation, Attributes, Termination, Mutual Exclusion primitives, Condition Variables,
Cancellations, Specific data Functions.
UNIT-IV: Algorithms for parallel machines- Computations, Histogram Computation, Parallel Reduction,
Quadrature problem, Matrix Multiplication, Parallel Sorting Algorithms, solving linear systems, probabilistic
algorithms.
UNIT-V: Parallel programming languages- Sample Problem; Fortran 90; n-CUBE C; Occam; C-Linda.
Debugging parallel programming- techniques, message passing, shared memory; Data Flow Computing,
Systolic Architecture, functional and logical paradigms, distributed shared memory. Distributed Data Bases-
Objectives, Issues, System, Distribution Options Data Base Integrity, Concurrency Control, DDBMS Structure.
Distributed Operating Systems-Need, Network Operating Systems, DOS Goals, Design Issues, Amoeba.
Course outcome: On completion of this subject the student is expected to:
• Have an understanding of parallel algorithms, analysis and architectures.
• Obtain experience developing parallel algorithms for various parallel architectures.
• Be able to reason about ways to parallelize a problem and evaluate a parallel platform for a given problem
• Become familiar with programming with MPI and Map Reduce/Hadoop
TEXT BOOKS
1. Introduction to Parallel Processing by M. Sasikumar et al- Prentice Hall of India.
2. Parallel Distributed Processing by David E Ramulhat , MIT press
REFERENCE BOOKS
1. Parallel Processing by Rajaraman V - Prentice Hall of India.
2. An Introduction to Distributed and Parallel Processing by John A. Sharp; Alfred Waller Ltd
3. Parallel and Distributed Processing by Rolim, Jose; Springer
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Course Objective:
• To understand the systems aspects of creating and deploying interactive multimedia applications.
• To study the data coding, streaming multimedia servers, temporal specification languages and rendering
systems required to store and deploy multimedia information in distributed, networked environments.
Unit-I: Components of Distributed system: Application software, Document store, Image and still video
store, Audio and full motion video store, Object directory service agent, Components service agent, User
interface service agent. Distributed Client- Server Operation: Clients in distributed work group computing,
Database operations, Middleware in distributed work group computing.
Unit-II: Multimedia object server: Types of multimedia server, mass storage for multimedia servers, write
once read many optical disks, rewritable optical disks, Optical disk libraries, network topologies for multimedia
object servers. Multi server Network topologies: traditional LANs, Extended LANs, High Speed LANs,
WANs, Network performance issues.
Unit-III: Distributed Multimedia database: Database organization for multimedia applications, transaction
management for multimedia system, managing hypermedia records as objects.
Managing distributed object: Inter server communication, object server architecture, object identification,
object revision management, optimizing network location of object, object directory services, multimedia
object retrieval, database replication techniques, Object migrations schemes, Optimizing object storage.
Unit-V: Designing for performance: Storage management, Access management and optimization of storage
distribution, Maximizing network transportation, managing system performance. Multimedia system design:
System design methodology, designing system object, object oriented multimedia system, designing objects,
system design analysis, system extensibility.
Text Books
1. Multimedia system design Prabhat K.Andleigh, Kiran Thakrar
2. Multimedia: Computing, Communication and Application by Ralf Steinmetz and Klara Nahrstedt.
Reference Books
1. Data and Computer Communication by William Stallings
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Course Objective:
• To review and clarify the fundamental terms, concepts and theories associated with Decision Support
Systems, computerized decision aids, expert systems, group support systems and executive information
systems.
• To examine examples and case studies documenting computer support for organizational decision making,
and various planning, analysis and control tasks.
• To discuss and develop skills in the analysis, design and implementation of computerized Decision Support
Systems.
• To understand that most Decision Support Systems are designed to support rather than replace decision
makers and the consequences of this perspective for designing DSS.
• To discuss organizational and social implications of Decision Support Systems.
Unit-I: Overview of different types of decision-making: Strategic, tactical and operational. Consideration of
organizational structures. Mapping of databases, MIS, EIS, KBS, expert systems OR modeling systems and
simulation, decision analytic systems onto activities within an organization. Extension to other 'non
organizational' areas of decision making. Relationship with knowledge management systems
Unit-II: Studies of human cognition in relation to decision making and the assimilation of information.
Cultural issues. Implications for design of decision-making support. Communication issues.
Unit –III: Normative, descriptive and prescriptive analysis: requisite modeling. Contrast with recognition
primed decision tools.
Unit –IV: Database, MIS, EIS, KBS, Belief nets, data mining. OR modeling tools: simulation and
optimization. History, design, implementation: benefits and pitfalls. Risk assessment. Decision analysis and
strategic decision support.
Unit –V: Group decision support systems and decision conferencing. Intelligent decision support systems: tools
and applications. Cutting-edge decision support technologies. History, design, implementation: benefits and
pitfalls. Deliberative e-democracy and e-participation
Text Books
1. P.R. Kleindorfer, H.C. Kunreuther, P.J.H. Schoemaker , “Decision Sciences: an integration Perspective”,
Cambridge University Press 1993
2. G.M. Marakas, Decision support Systems in the 21st Century, Prentice Hall.
Reference Books
1. E. Turban and J.E. Aronson, Decision support Systems and Intelligent Systems. Prentice Hall
2. V.S.Janakiraman and K.Sarukesi, Decision Support Systems, PHI
3. Efrem G. Mallach, Decision Support and Data Warehouse Systems, tata McGraw-Hill.
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Semester: VIII Branch: Information Technology.
Subject: Real Time Systems Code: 322845(22)
Total Theory Periods: 50 Total Tutorial Periods: NIL
Total Marks in End Semester Exam: 80 Minimum number of CT to be conducted: 02
Course Objective:
• To study real-time computer control systems and their implementation techniques.
• Provide examples of real-time systems including functionality and implementation platforms.
• Describe and exemplify design parameters for real-time systems including execution time, implementation,
communication & user interface.
• Study a range of methodologies for specifying and designing real time systems.
• Understand hardware and software design and implementation of real-time systems
• Describe and apply systems engineering methods and techniques in the design and analysis of real-time
systems.
Unit-I: Basic Real- Time Concepts, Computer Hardware, Language Issues:
Basic component Architecture, terminology, Real Time Design Issues, CPU, Memories, Input- Output, Other
Devices Language Features, Survey of Commonly Used Programming Languages, Code Generation
Unit-II: Software life cycle, Real Time Specification and Design Techniques, Real Time Kernels: Phases
of software life cycle, Non-temporal Transition in the software life cycle, Spiral model, Natural languages,
Mathematical Specification, Flow Charts, Structure Charts, Pseudocode and programmable Design Languages,
Finite state Automata, Data Flow Diagrams, Petrinets, Statecharts, Polled Loop Systems, phase/State Driven
Code, Coroutines, Interrupt Driven System, Foreground/Background Systems Full Featured Real Time OS
Unit-III: Intertask Communication and Synchronization, Real Time memory Management, System
Performance Analysis and Optimization: Buffering Data, Mail boxes Critical Region, Semaphores, Event
Flags and Signals, Deadlock, Process Stack Management, Dynamic Allocation, Static Schemes, Response Time
Calculation, Interuupt Latency, Time Loading and its Measurement, Scheduling NP Complete, Relocating
Response Times And time Loading, Analysis of Memory Requirements, Reducing Memory Loading, I/O
Performance.
Unit-IV: Queuing Models, Reliability, Testing, And Fault Tolerance, Multiprocessing Systems:
Basic Buffer size Calculation, Classical Queuing Theory, Little’s Law, Faults, Failures ,bugs AND effects.
Reliability, Testing, Fault Tolerence, Classification of Architectures, Distributed Systems, Non Von Neumann
Architectures.
Unit-V: Hardware/ Software Integration, Real Time Applications:
Goals of Real Time System Integration, Tools, Methodology, The Software Hesisenberg Uncertainity Principle,
Real Time Systems As Complex System, First Real Time Application Real Time Databases, Real time Image
Processing Real Time UNIX, building Real Time Applications with Real Time Programming Languages.
Course outcome:
• Clearly differentiate the different issues that arise in designing soft and hard real-time, concurrent, reactive,
safety-critical and embedded systems.
• Explain the various concepts of time that arise in real-time systems.
• Describe the design and implementation of systems that support real-time applications. Justify and critique
facilities provided by real-time operating systems and networks.
• Design, construct and analyze a small, concurrent, reactive, real-time system.
• Select and use appropriate engineering techniques, and explain the effect of your design decisions on the
behavior of the system.
Text Books :
1. Real Time System, Jane W.S.Liu
2. Real Time Systems Design and Analysis by Phillip A. Laplante,PHI
Reference Books:
1 Hard Real Time Computing Systems Predictable Scheduling Algorithms and applications by Giorgio C.
Buttazzo
2 Real Time Design Patterns: Robust Scalable Architecture for Real Time System by BrucePowel Douglass
3. Real Time System: Scheduling, Analysis and Verification by Albert M.K. Change
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Course Objective:
1. To introduce students to the modern embedded systems and to show how to understand and program such
systems using a concrete platform built around A modern embedded processor like the Intel ATOM.
Challenges of Embedded Systems – Embedded system design process. Embedded processors – ARM processor
– Architecture, ARM and Thumb Instruction sets
C-looping structures – Register allocation – Function calls – Pointer aliasing – structure arrangement – bit
fields – unaligned data and endianness – inline functions and inline assembly – portability issues.
Profiling and cycle counting – instruction scheduling – Register allocation – conditional execution – looping
constructs – bit manipulation – efficient switches – optimized primitives.
Multiple tasks and processes – Context switching – Scheduling policies – Interprocess communication
mechanisms – Exception and interrupt handling - Performance issues.
Course Objective
• Describe the important features of the Web and Web browser software
• Evaluate e-mail software and Web-based e-mail services
• Use FTP and other services to transfer and store data
• Demonstrate the use of real-time chat and briefly describe the history of the wireless Internet
• Create HTML documents and enhance them with browser extensions
UNIT-III XML
What is XML – Basic Standards, Schema Standards, Linking & Presentation Standards, Standards that build on XML, Generating XML
data, Writing a simple XML File, Creating a Document type definition, Documents & Data ,Defining Attributes & Entities in the DTD
,Defining Parameter Entities & conditional Sections, Resolving a naming conflict, Using Namespaces, Designing an XML data
structure, Normalizing Data, Normalizing
DTDS
Text Books
1. Internet & Intranet Engineering,- Daniel Minoli, TMH.
2 .Alexis Leon and Mathews Leon – Internet for Every One, Tech World.
Reference Books
1. Eric Ladd, Jim O’Donnel –“Using HTML 4, XML and JAVA”-Prentice Hall of India -
1999.
2. “Beginning Java Script “– Paul Wilton – SPD Publications –2001.
3. Frontiers of Electronics of Commerce, Ravi kalakota & Andrew B. Whinston
Addison Wesley
4 Advance Java– Gajendra Gupta , firewall Media
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY BHILAI (C.G.)
Course Objective
The objective of this module is to provide the participants with a good knowledge on supply chain management and how these topics
can be related with the organization and their business needs.
Supply chain networks, Integrated supply chain planning, Decision phases in s supply chain, process view of a supply chain, supply
chain flows, Overview of supply chain models and modeling systems, Supply chain planning: Strategic, operational and tactical,
Understanding supply chain through process mapping and process flow chart.
Supply chain strategies, achieving strategic fit, value chain, Supply chain drivers and obstacles, Strategic Alliances and Outsourcing,
purchasing aspects of supply chain, Supply chain performance measurement: The balanced score card approach, Performance Metrics.
Planning demand and supply: Demand forecasting in supply chain, Aggregate planning in supply chain, Predictable variability.
Introduction to Supply Chain Inventory Management. Inventory theory models: Economic Order Quantity Models, Reorder Point
Models and Multiechelon Inventory Systems, Relevant deterministic and stochastic inventory models and Vendor managed inventory
models.
Role of transportation in a supply chain - direct shipment, warehousing, cross-docking; push vs. pull systems; transportation decisions
(mode selection, fleet size), market channel structure, vehicle routing problem. Facilities decisions in a supply chain. Mathematical
foundations of distribution management, Supply chain facility layout and capacity planning,
The financial impacts, Volume leveraging and cross docking, global logistics and material positioning, global supplier development,
target pricing, cost management enablers, Measuring service levels in supply chains, Customer
Satisfaction/Value/Profitability/Differential Advantage.
Outcomes: On completion of this program student will know how the Supply chain management is essential to company success and
customer satisfaction and also how SCM knowledge and capabilities can be used to support medical missions, conduct disaster relief
operations, and handle other types of emergencies. SCM also plays a role in cultural evolution and helps improve our quality of life.
REFERENCES
1. David Simchi-Levi, Philip Kaminsky, and Edith Simchi-Levi Designing and Managing the Supply Chain: Concepts, Strategies, and
Case Studies, Second Edition, , McGraw-Hill/Irwin, New York, 2003. 31
2. Sunil Chopra and Peter Meindel. Supply Chain Management: Strategy, Planning, and Operation, Prentice Hall of India, 2002.
3. Sunil Chopra & Peter Meindl, Supply Chain Management , Prentice Hall Publisher, 2001
4. Robert Handfield & Ernest Nichols, Introduction to Supply Chain Management , Prentice hall Publishers, 1999.
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY BHILAI (C.G.)
Course Objective
The basic objective in offering this course is to study the state-of-the-art in biometrics technology can explore the way to improve the
current technology. The students can learn and implement various biometrics technologies using advanced algorithm.
Biometrics: definition, history, basic working architecture, types; Performance measures of biometrics; applications and benefits of
biometrics; design of biometrics; biometric identification versus verification.
Background of face and iris recognition; Face recognition methods: Eigen face methods, contractive transformation method; Challenges
of face biometrics; Design of iris biometrics: image segmentation, image preprocessing, determination of iris region; Advantages and
disadvantages of face and iris biometrics.
Fingerprint matching: image acquisition, image enhancement and segmentation, image binarization, minutiae extraction and matching;
Sign language biometrics: Indian sign language (ISL) biometrics, SIFT algorithm, advantages and disadvantages of ISL and fingerprint
biometrics.
Introduction to biometric cryptography; general purpose cryptosystems; Cryptographic algorithms: DES and RSA; Privacy concerns and
issues related to biometrics; biometrics with privacy enhancement; soft biometrics; comparison of various biometrics; Identity and
privacy.
Multimodal biometrics: basic architecture and fusion scheme, application, example of AADHAAR; scope and future market of
biometrics; role of biometrics in enterprise and border security; DNA biometrics; biometric standards; biometric APIs.
Suggested Books:
1. Biometrics: concepts and applications by Dr G R Sinha and Sandeep B. Patil, Wiley India Publications, 2013.
2. Introduction to biometrics by Anil K Jain, Arun Ross and Karthik Nandakumar, Springer, 2011.
3. Biometrics Identity verification in a networked world by Samir nanawati, Michael Thieme and Raj Nanawati, US edition of
Wiley India, 2012.
Course outcomes:
1. Understand the basic definition of ‘Biometric Recognition’ and the distinctive of this form of biometrics.
2. Be able to state precisely what functions these systems perform.
3. Be able to draw a system-level diagram for any biometric system and discuss its components.
4. Be able to solve verification, identification, and synthesis problems for a variety of biometrics such as fingerprint, face, iris,
hand gestures and cryptography.
5. Be able to use the biometrics ingredients of existing system to obtain a given security goal.
6. Judge the appropriateness of proposal in research papers for a given applications.
7. Be able to design a biometric solution for a given application.
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Semester: VIII Branch: Computer Science & Engg.
Subject: Decision Support and Executive Information System Code: 300854(33)
Total Theory Periods: 50 Total Tutorial Periods: NIL
Total Marks in End Semester Exam: 80 Minimum number of CT to be conducted: 02
Course Objective
1. To review and clarify the fundamental terms, concepts and theories associated with Decision Support
Systems, computerized decision aids, expert systems, group support systems and executive information
systems.
2. To examine examples and case studies documenting computer support for organizational decision making,
and various planning, analysis and control tasks.
3. To discuss and develop skills in the analysis, design and implementation of computerized Decision Support
Systems.
Unit-IV Designing A DSS:Planning for DSS, Designing a Specific DSS, Interviewing Techniques,
OtherTechniques, Situational AnalysisDesign Approaches, Systems Built from Scratch,
Using Technology to Form the Basis of the DSS, Evaluating a DSS Generator, Using a DSS Generator,The Design
Team, DSS Design and Re-engineering Discussion .
Unit-V Implementation and Evaluation of DSS : Implementation Strategy , Prototypes, Interviewing , User
Involvement , Commitment to Change, Managing Change, Institutionalize System, Implementation and System
Evaluation, Technical Appropriateness, Measurement Challenges , Organizational Appropriateness.
Course outcomes:
1. Recognize the relationship between business information needs and decision making
2. Appraise the general nature and range of decision support systems
3. Appraise issues related to the development of DSS
Course Objective
• The basic objective in offering this course is to be employed as a practicing engineer in fields such as design,
research, development, testing, and manufacturing
UNIT-2 LINKERS
Linking -Combining Object Modules, Pass I, Pass II; Library Linking; Position Independent Code
(PIC); Shared Library Linking. LOADERS- Binary Image; Types of Loaders.
UNIT 3
MACROPROCESSORS
Macro in NASM- Local Labels in Macro Body, Nested Macros.; Design of Macroprocessors – Major Data
Structures, Macroprocessing Technique, Simple macroprocessors without nesting, Nested calls & definitions
UNIT – 4 COMPILERS
Lexical Analysis; Syntax Analysis; Intermediate Code Generation; Target Code Generation;
Optimizing Transformation
Textbooks
1. SYSTEM SOFTWARE by Santanu Chattopadhyay ; Prentice Hall of India
2. Software Engineering By Roger S Pressman ; Mc -Graw Hill
References
1. Foundations of Software Technology and Theoretical Computer Science, By V. (Venkatesh) Raman: Springer
2. Software Visualization by John Stasko; MIT press
3. Software Engineering By Rajib Mall : PHI
CHHATTISGARH SWAMI VIVEKANAD TECHNICAL UNIVERSITY, BHILAI (C.G.)
Course Objective
1. This course aims to provide students with a practical and hands-on experience with common
bioinformatics tools and databases.
2. Students will be trained in the basic theory and application of programs used for database
searching, protein and DNA sequence analysis, prediction of protein function.
UNIT-1
Bioinformatics-introduction, Application, Data Bases and Data Management, Central Dogma; information
search and Data retrieval, Genome Analysis and Gene mapping- Analysis, Mapping, Human Genome Project
(HGP).
UNIT-2
Alignment of Pairs and Sequences; Alignment of Multiple Sequences and Phylogenetic Analysis; Tools for
similarity Search and Sequence Alignment- FASTA BLAST.
UNIT-3
Profiles and Hidden Marcov Models (HMMs); Gene Identification and Prediction-Basics, Pattern Recognition,
Methods and Tools; Gene Expression and Micro arrays.
UNIT-4
Protein Classification and Structure Visualization; Protein Structure Prediction; Proteomics; Computational
methods-Analysis of Pathways, Metabolic Network Properties, Metabolic Control Analysis, Stimulation of
Cellular Activities, Biological Mark Up Languages.
UNIT-5
Drug Discovery-Introduction, Technology and Strategies, Cell Cycle, G-protein, Coupled, Receptors.
Computer Aided Drug Design-Introduction, Drug Design Approaches, Designing methods, ADME-Tox
Property Prediction.
Outcomes: After successful completion of the course, student will be able to have a good working knowledge
of basic bioinformatics tools and databases such as GenBank, BLAST, multiple alignment, and phylogenetic
tree construction. Further students will understand the basic theory behind these procedures and be able to
critically analyze the results of their analysis using such tools.
TEXT BOOKS
REFERENCES
1. BIOINFORMATIC COMPUTING by Bergeron, MIT Press.
2. Evolutionary Computation in Bioinformatics, Gary B. Fogel, David W. Corne (Editors), 2002
3. Introduction to Bioinformatics, Arthur M. Lesk, 2002, Oxford University Press
4. Current Topics in Computational Molecular Biology (Computational Molecular Biology), Tao Jiang,
Ying Xu, Michael Zhang (Editors), 2002, MIT Press