Sie sind auf Seite 1von 26

Veermata Jijabai Technological Institute

VEERMATA JIJABAI TECHNOLOGICAL INSTITUTE


[ Autonomous Institute affiliated to University of Mumbai ]

SYLLABUS
FOR

T.Y. B. TECH.
(Computer Engineering)

[V.J.T.I.]

[ YEAR 2011-2012 ]

Academic Year 2011-12

1 of 26

Veermata Jijabai Technological Institute Scheme of Teaching and Evaluation T Y B Tech (Computer Engineering) (Semester V) Theory Courses Course Course Name Code

Hr/Week L T 1 1 1 3 P -

Credits TA 3 3 4 4 4 18 Credits P 3 3 3 3 12 1.5 1.5 1.5 1.5 6 Credits P 2 3 5 A/NA TA 50 50 50 100 10 10 10 10 10

Examination Scheme (Evaluation in % Weightage) IST 30 30 30 30 30 ESE 60 60 60 60 60 Total 100 100 100 100 100 ESE (W) (hrs) 3 3 3 3 3

CO0301 CO0302 CO0303 CO0304 CO0305

Microprocessor & Microcontroller Software Engineering System Programming & Compiler Construction Java Network Programming Database Management Systems Total

3 3 3 3 3 15

Laboratory Courses Course Course Name Code

Hr/Week L T -

Examination Scheme (Evaluation in % Weightage) ESE (O / P) 50 50 50 Total 100 100 100 100 ESE (P) (hrs)

CO1301 CO1302 CO1303 HM1321

System Hardware and software Lab Network Programming Lab Software Architecture Lab Communication & Presentation Skills Lab Total

Co-curricular Activities Course Course Name Code L CC4051 CC4052 Industry-Academia Interaction E-Library/ Internet Total -

Hr/Week T -

Total for L T P Total Hours Credits Semester 15 3 17 35 24 Abbreviations: L: Lectures, T: Tutorial, P: Practical, TA: Teacher Assessment, ESE (P): End Semester Practical Examination, ESE (O): End Semester Oral Examination, IST: In Semester Test/s, ESE (W): End Semester Written Examination, ESE (W) (hrs): End Semester Written Examination duration, ESE (O) (hrs): End Semester Practical Examination (duration), A/NA: Attended/Not Attended Notes: TA for Theory and Laboratory courses shall carry 25 marks. IST: One mid semester test (40 marks of two hour duration) and two surprise Tests/Quizzes (5% weightage each). ESE (W) shall be of 100 marks of 3 hours, ESE (P) and ESE (O) shall be decided as per course requirement. ESE (O) and ESE (P) shall together carry 25 marks. Industry - Academia Interaction: Wednesday afternoon slot will be used. Module or broad subject outline will be decided by the course coordinator. Lectures as per module in the defined areas of eminent personalities from industry or academia will be arranged. Assessment will be done on the attendance of the students for the module. More than 60%: Attended, otherwise: Not Attended. E- Library/ Internet: Every theory course must have at least one assignment or case-study which requires exhaustive internet search/support.

Academic Year 2011-12

2 of 26

Veermata Jijabai Technological Institute Scheme of Teaching and Evaluation T Y B Tech (Computer Engineering) (Semester VI) Theory Courses Course Code

Course Name L

Hr/Week T 1 1 1 3 P -

Credits TA 3 3 4 4 4 18 Credits TA 1.5 1.5 1.5 1.5 6 Credits 50 50 50 50 10 10 10 10 10

Examination Scheme (Evaluation in % Weightage) IST 30 30 30 30 30 ESE 60 60 60 60 60 Total 100 100 100 100 100 ESE (W) (hrs) 3 3 3 3 3

CO 0306 CO 0307 CO 0308 CO 0309 -

OO Software & Web Engineering Information Storage and Management Systems Web Technology Network Security & Privacy Elective I Total

3 3 3 3 3 15

Laboratory Courses Course Course Name Code L CO 1304 CO 1305 CO 1306 CO 1307 OO Software and Web Engineering Lab Storage Management Lab Information Security Lab Software Project Management Lab Total -

Hr/Week T P 3 3 3 3 12

Examination Scheme (Evaluation in % Weightage) ESE (O / P) 50 50 50 50 Total 100 100 100 100 ESE (P) (hrs)

Co-curricular Activities Course Course Name Code L CC4061 CC4062 Industry-Academia Interaction E-Library/ Internet Total -

Hr/Week T P 2 3 5

A/NA -

Total for L T P Total Hours Credits Semester 15 3 17 35 24 Abbreviations: L: Lectures, T: Tutorial, P: Practical, TA: Teacher Assessment, ESE (P): End Semester Practical Examination, ESE (O): End Semester Oral Examination, IST: In Semester Test/s, ESE (W): End Semester Written Examination, ESE (W) (hrs): End Semester Written Examination duration, ESE (O) (hrs): End Semester Practical Examination (duration), A/NA: Attended/Not Attended Notes: TA for Theory and Laboratory courses shall carry 25 marks. IST: One mid semester test (40 marks of two hour duration) and two surprise Tests/Quizzes (5% weightage each). ESE (W) shall be of 100 marks of 3 hours, ESE (P) and ESE (O) shall be decided as per course requirement. ESE (O) and ESE (P) shall together carry 25 marks. Industry - Academia Interaction: Wednesday afternoon slot will be used. Module or broad subject outline will be decided by the course coordinator. Lectures as per module in the defined areas of eminent personalities from industry or academia will be arranged. Assessment will be done on the attendance of the students for the module. More than 60%: Attended, otherwise: Not Attended. E- Library/ Internet: Every theory course must have at least one assignment or case-study which requires exhaustive internet search/support.

Academic Year 2011-12

3 of 26

Veermata Jijabai Technological Institute

LIST OF ELECTIVES Elective I CO 0801 Network Management Systems CO 0802 Image Processing CO 0803 High Performance Computing CO 0804 Embedded Systems INSTITUE LEVEL ELECTIVES HM0901 Entrepreneurship Development MA0901 Applied Statistics

Academic Year 2011-12

4 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title Course Contents: 1

: : :

T. Y. B Tech (Computer Engineering ) CO 0301 Microprocessors and Microcontroller

SEMESTER- V

Intel 8086/8088 microprocessor family: Architecture and organization of 8086/8088 microprocessor family. Study of its Instruction set. Assembly language programming, Introduction to mixed language programming using C and Assembly language. 8086 family minimum and maximum mode operation. Timing diagram for 8086 family, detailed study of maximum mode connection: study of 8288 bus controller. 8086 interrupt structure. 8086 Instruction Set & Programming: Addressing modes, Instruction Set in detail, ALP, Mixed language programming, Stacks, Strings, Procedures, Macros, Timers, Counters & delay. Programming examples using DOS And BIOS Interrupts, Device Drivers Programming 8086 Interrupt System: 8086 Interrupt structure, types and applications: Study of Interrupt Controller 8259A & Interrupt Priority Management using 8259A. Programmable

3 4

Memory System Design & I/O Interfacing: Interfacing SRAM, ROM and DRAM to 8086, Address decoding & Timing Considerations, I/O interfacing in 8086: Serial communication interface includes Synchronous & Asynchronous, Protocols, parallel communication Interface includes I/O Mapped I/O, Memory Mapped I/O, and Handshaking Signals. 8087 Math Co-processor: Study of architecture of 8087 floating point co- processor. Data types supported by 8087. Host and co - processor interface, Assembly language Programming for 8086 - 8087 based systems. Intel MCS 51 family: Introduction to Single chip microcontrollers of Intel MCS 51 family. Architectural and operational features. Its instruction set. CPU timing and machine cycles. Interrupt structure and priorities. Internal Timer / counters, serial interface. Connection of external memory. Power saving modes. Interfacing of 8051 with EPROM programming for EPROM versions. 8051 variation Introduction to the PIC18 Microcontroller: Overview of the PIC18 MCU. The PIC18 Memory Organization, The PIC18 CPU Register, The PIC18 Pipelining. PIC18 Instruction Format, Addressing Modes, A Sample of PIC18 Instruction, Overview of the 8-Bit MCU Market.

Text books: 1 2 Douglas Hall, Microprocessors and Interfacing, Programming and Hardware, Tata McGraw-Hill.1999, 2nd Edition. Han-Way Huan An Introduction to Software and Hardware Interfacing

Reference Books: 1 2 3 4 5 Peter Norton, IBM PC, Assembly Language programming, BPB publication.Appel John Uffenback, 8086/8088 Interfacing, Programming and Design, 1987,PHI. A. K. Ray, K. M. Bhurchandi, Advanced Microprocessors and Peripherals, Tata McGraw Hill, 2000. B. B. Brey, The Intel Microprocessors, PHI, 2003, Sixth Edition. Yu-Cheng Liu, Glenn A. Gibson, The 8086/8088 Family Architecture, Programming A.V.

Academic Year 2011-12

5 of 26

Veermata Jijabai Technological Institute

Programme Name Course Code Course Title

: : :

T. Y. B Tech (Computer Engineering ) CO 0302 Software Engineering

SEMESTER- V

Course Contents: 1 Software Project Management: Software Characteristics, Applications. Software Process, Process Models., Software Process and Project Metrics: Measures-Metrics-Indicators, Metrics in the process and project domains, Software measurement., Software Project Planning: Software scope, Resources, Software project estimation, Decomposition techniques, Empirical estimation models ,Risk Analysis and Management: Reactive versus proactive risk strategies, Software risks, Risk identification, Risk projection, Risk mitigation-monitoring-management, RMMM plan.,6 Project Scheduling and Tracking: Defining a task set for the software project, Selecting software Engineering tasks, Refinement of major tasks, Defining a task network, Scheduling, Project plan. Software Quality Assurance: Software quality assurance, Software reviews, Formal technical reviews, Statistical software quality assurance, SQA plan. Software Configuration Management: SCM process, Identification of objects in the software configuration, Version control, Change control, Configuration audit, Status reporting. System Engineering: Business process engineering, product engineering, Requirements engineering, and System modeling, Analysis Concepts and Principles: Requirement Analysis, Requirement elicitation for software, Analysis principles, Software prototyping, Specification. Analysis Modeling: Data modeling, Functional modeling and information flow, Behavioral modeling. Design Concepts and Principles: 6.1Software design and software engineering, Design process, Design principles, Design concepts, Effective modular design. Architectural Design: Software architecture, Data design, Architectural styles, Analyzing alternative architectural designs, Mapping requirements into a software architecture, Transform mapping, Transaction mapping, Refining architectural design. User Interface Design: The golden rules, User interface design, Task analysis and modeling, Interface design activities, Implementation tools, Design evaluation. Component-Level Design: Structured programming Design Notations. Formal & Algebraic Design specifications, Mathematical Notation for Formal Specification Software Testing Techniques: White-box testing, Black-box tests Reengineering: Software Reengineering, Software Maintenance, Software Reengineering Process Model, Reverse Engineering, Restructuring, Code Restructuring, Data Restructuring Forward Engineering

2 3 4 5

Text books: 1 2 Software Engineering, Roger Pressman, McGraw Hill, Fifth Edition. Software Engineering, Ian Sommerville, Pearson Education. Sixth Edition

Reference Books: 1 2 3 4 Software Engineering An Engineering Approach, James Peter, John Wiley, First Edition Software Engineering, W. S. Jawadekar, TMH. 1st Edition Fundamentals of Software Engineering, R. Mall, Prentice Hall of India, 2nd Edition Software Engineering Theory and Practice, S. L. Pfleeger, Pearson Education, 2nd Edition

Academic Year 2011-12

6 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title

: : :

T. Y. B Tech (Computer Engineering ) CO 0303 System Programming and Compiler Construction (SPCC)

SEMESTER- V

Course Contents: 1 Introduction: Introduction to different systems programs like assembler, macro-processor, compiler, linker and loader, phases of language processor, system components affecting design of system programs: Data Formats, Registers, instruction format and addressing modes. Comparison of CISC and RISC machines. Assemblers: Overview of Assembly Process, Design of single pass assembler data structures and algorithm, Design of multi passes assembler data structures and algorithm Example: MASM assembler. Macro and Macro Processors: Features of Macro: parameterized macro, conditional macro, nested macro and recursive macro. Design of simple two-pass macro processor, Example: C pre-processor directives. Loaders and Linkers: Basic Loader functions, Design of Absolute loader, Linking and Relocation concepts, Other linking methods and examples: linkage editors, dynamic linking, dynamic loading, Relocating loader and design of relocating loader, Example: A linker for MS-DOS, Dynamic Linking Library.

2 3

Design of Compilers: 5 Lexical Analysis: Review of Regular Expressions, Finite Automata based Pattern Matching NFA, DFA and optimization of DFA, Role of Lexical analyzer, Specification and recognition of tokens, a language for specifying lexical analyzer, Design of lexical analyzer generator, LEX tool. Syntax and Semantic Analysis: Role of Parser, Top-down parsing, Recursive descent and predictive parsers (LL), Bottom-Up parsing, Operator precedence parsing, LR, SLR and LALR Syntax directed definitions, construction of syntax tree, Top-down translation and Bottom-up evaluation of inherited attributes, analysis of syntax directed definitions. YACC tool. Run Time Environments: Storage Organization: Static Versus Dynamic Storage Allocation, Stack Allocation of Space: Activation Trees, Activation Records, Calling Sequences, Variable-Length Data on the Stack, Access to Non-local Data on the Stack: Data Access Without Nested Procedures, Issues With Nested Procedures, A Language With Nested Procedure Declarations, Nesting Depth, Access Links, Manipulating Access Links, Access Links for Procedure Parameters, Displays Memory allocation in block structured language, Various algorithms for Garbage collection: Reference Counting Garbage Collectors, A Basic Mark-and-Sweep Collector, Mark-and-Compact Garbage Collectors, Incremental Garbage Collection, Generational Garbage Collection, The Train Algorithm Intermediate Code Generation: Intermediate languages: graphical representations, data flow analysis, DAGs, Three address code, types of three address statements, syntax directed translation into three address codes, implementation of three address statements. Semantic stacks, evaluation of expressions, control structures, and procedure calls. Code Optimization: Machine dependent and machine independent code optimization, Sources of optimization. Early Optimizations: Constant-Expression Evaluation (Constant Folding, Algebraic Simplifications and Reassociation, Value numbering, Copy Propagation. Redundancy Elimination: Common-Subexpression Elimination, Loop-Invariant Code Motion, Partial-Redundancy Elimination, Redundancy Elimination and Reassociation, Code Hoisting. Loop Optimizations: Induction-Variable optimizations, Unnecessary Bounds Checking Elimination.
Academic Year 2011-12

7 of 26

Veermata Jijabai Technological Institute

Procedure Optimizations: Tail-Call Optimization and Tail-Recursion Elimination, Procedure Integration, In-Line Expansion, Leaf-Routine Optimization and Shrink Wrapping. 10 Code Generation: Issues in the design of a code generator, The target machine, Run-time storage Management, Basic blocks and flow graphs, Next-use information, A simple code generator.

Text books: 1 2 D. M. Dhamdhere; Systems programming & Operating systems , Tata McGraw Hill Aho, Sethi and Ullmann, Compilers: Principles, techniques and tools, Pearson Education Asia

Reference Books: 1 2 3 4 5 6 Uday P. Khedker, Amitabha Sanyal, and Bageshri Karkare. Data Flow Analysis: Theory and Practice. CRC Press, USA (2009) Leland Beck , System Software, Addision Wesley A.V. Aho, and J.D.Ullman: Principles of compiler construction, Pearson Education Appel, "Modern Compiler Implementation in C", Cambridge University press Dick Grune, Koen G.L, Henri Bal; Modern Compiler Design, Wiley Publications Kenneth C. Louden; Compiler Construction, Principles and Practice, Cengage Learning

Academic Year 2011-12

8 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title

: : :

T. Y. B Tech (Computer Engineering ) CO 0304 Java Network Programming

SEMESTER- V

Course Contents: 1 Introduction to Java Programming: Basic Network and Web Concepts: The Internet Standards, Client/Server Model, URL, HTML, SGML, XML,HTTP, Server Side Programming , Streams: Input Stream, Output Stream and Filter Stream, Threads: Returning Information from Thread, Synchronization, Deadlock, Scheduling, Thread Pool Looking up Internet Addresses: The Inet4 Address and Inet6 Address, Network interface Class, URL & URLs:The URL Class , URL Decoder Socket Programming: Socket for Client, Socket for Server, Secure Socket UDP Datagrams and Socket Multicast Sockets URL Connections ,Protocol Handlers, Content Handlers RMI and javaMail API

3 4 5 6

Text books: 1 2 Elliotte Harold Java Network Programming O'relly Publications E. Comer, Internetworking with TCP/IP Vol- III, (BSD Sockets Version), second Edition, PHI

Reference Books: 1 Unix Network Prograaming volume- I and II Richard Stevens

Academic Year 2011-12

9 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title Course Contents: 1

: : :

T. Y. B Tech (Computer Engineering ) CO 0305 Database Management Systems

SEMESTER- V

2 3

5 6 7

9 10 11

Introductory Database Introduction to DBMS, Characteristics of database , Database users , Advantages of DBMS , Data Models , Schemas and Instances , Three schema Architecture and Data Indepndence , Database Languages and Interfaces, The Database System Environment , Centralized and Client / Server Architecture for DBMS Entity-Relationship Model Entity Types ,Entity Sets ,Attributes and Keys ;Relationship Types, Relationship sets , Roles and structural Constraints; Design Issues; Entity-Relationship diagram; Weak entity sets; Extended E- R features; Design of an E-R database schema; Reduction of an E-R schema to tables. Relational Model Concept of a relation; Relational Model Constraints; Relational Database Schema ,Entity Integrity , Referential Integrity and foreign keys; Update, Insert and Delete operations Structure of relational databases; The relational algebra and extended relational-algebra operations; Relational Database Design using ER-to-Relational Mapping. SQL and PL/SQL Background; Basic Structure; Set Operations; Aggregate functions; Null values; Nested Queries; Views; Complex queries; Database modification; DDL; Embedded SQL; Dynamic SQL; Other SQL features. PL/SQL Block: Pl/SQL Variables and Data types:PL/SQL Control structures:PL/SQL Cursors and Triggers ;Exception Handling ;PL/SQL Subprograms Procedures and Functions; PL/SQL Packages Integrity and Security Domain Constraints; Referential integrity; Assertions; Triggers; Triggers and assertions in SQL; Security and authorization; Authorization in SQL; Encryption and authentication. Relational-Database Design First normal form; Pitfalls in relational-database design; Functional dependencies; Decomposition; Desirable properties of decomposition; Boyce-Codd normal form; 3rd and 4th normal form; Mention of other normal forms; Overall database design process. File organization, Indexing and Hashing Organization of records in files; Data-dictionary storage. Basic Concepts of Indexing ; Types of Single Level Ordered Indices; Multilevel Indices using B+ Tree Index Files; B- Tree Index Files; Static Hashing; Dynamic Hashing; Index Definition in SQL; Multiple-Key Access. Transactions Transaction concept; Transaction and System Concepts ; Properties of Transaction; Schedules based on Serializability; Recoverability;; Transaction definition in SQL Concurrency Control Lock-based protocols; Timestamp-based protocols; Validation-based protocols; Multiple granularity; Multiversion schemes; Deadlock handling; Insert and delete operations; Weak levels of consistency; Concurrency in index structures. Recovery System Failure classification; Storage structure; Recovery and atomicity; Log-based recovery; Shadow paging; Recovery with concurrent transactions; Buffer management.

Text books: 1 2 Elmasri and Navathe, "Fundamentals of Database Systems", Fourth Edition, Addison Korth, Silberchatz, Sudarshan, "Database System Concepts", Fourth Edition, McGraw

Reference Books: 1 2 3 4 Cadcim Technologies Sham Tickoo Sunil Raina Oracle 11G with PL/SQL Approach Pearson Peter Rob and Carlos Colonel, "Database Systems, Design, Implementation and Management", Thomson Learning, Fifth Edition. C. J. Date, "Introduction To Database Systems", Seventh Edition, Addison Wesley Longman. Raghu Ramkrishnan and Johannes Gehrke, "Data base Management Systems", TMH.

Academic Year 2011-12

10 of 26

Veermata Jijabai Technological Institute

Programme Name Course Code Course Title Course Contents: 1 2 3 4 5 6 7 8 9 10 11 12

: : :

T. Y. B Tech (Computer Engineering ) CO 1301 System Hardware & Software Lab

SEMESTER- V

Implementation of 2-pass assembler/Macro Processor using JAVA. Consider MASM as base assembler for designing purpose Implementation of lexical analyzer using LEX tool. Implementation of parser using YACC tool. Implementation of compiler using JAVA Write assembly program for multiplication of 32-bit numbers. Write a program for multiplication of 64-bit. Assembly program for sorting N numbers in ascending order. Write a program for check whether a string is palindrome or not? Write a program to sort string in Alphabetical order. Write a program to interface LED, with PIC-18 using VMSIM (using 4 proteus). Write a program to interface LCD with PIC-18. Write a program to find two largest no. from a given block of data. Using KEIL & to interface steeper motor.

Text Books: 1 Andrew W. Appel and Jens Palsberg, " Modern Compiler Implementation In Java", second edition, Cambridge University Press 2 Han-Way Huan An Introduction to Software and Hardware Interfacing Reference Books: 1 Peter Norton, IBM PC, Assembly Language programming, BPB publication.Appel 2 John Uffenback, 8086/8088 Interfacing, Programming and Design, 1987,PHI Programme Name Course Code Course Title Course Contents: 1 2 3 4 5 6 7 8 9 Building Applications in network environment Client Server socket programming. Building E-Mail systems. Implement FTP, chat applications. Study Linux network command and network diagnostic tools (e.g. Tcpdump, Ethereal). UDP socket programming Managing and tuning the TCP connection. Implement RMI using JAVA Implement RPC using JAVA : : : T. Y. B Tech (Computer Engineering ) CO 1302 Network Programming Lab SEMESTER - V

Reference Books: 1 2 TCP/IP Essentials a lab based approach by Shivendra Panwar, Shiwen Mao, Jeong-dong Ryoo, and Yihan Li. JAVA Network Programming Wielly Publications

Academic Year 2011-12

11 of 26

Veermata Jijabai Technological Institute

Programme Name Course Code Course Title Course Contents: 1

: : :

T. Y. B Tech (Computer Engineering ) CO 1303 Software Engineering Lab

SEMESTER - V

Software Engineering: Give detailed Problem Statement Perform Software scoping activity Estimate required Resources Perform Software Estimation using following methods Perform Risk Analysis and Management: Carry out Project Scheduling and Tracking Prepare Project Plan Prepare Software Quality Assurance Plan (SQA plan) Carry out Requirement Analysis Modeling Carry out Design Perform Software Testing DBMS: DDL and DML statements for table, view, sequence and various datatypes Adding primary key, foreign key, check constraints for tables, Alter table command for adding columns, adding and dropping constraints SQL Queries, WHERE clause, relational ,logical and arithmetic operators, UNION, INTERSECTION and MINUS operators Joins in queries, Cartesian product, Inner Join, Natural Join , Outer join Nested sub queries , Use of IN , EXISTS Queries using aggregate operators like MAX, MIN,COUNT,SUM etc , HAVING , GROUP BY and ORDER BY clause Creating Triggers on tables, Row level and statement level triggers Creating Indexes on tables Programming using PL/SQL PL/SQL block, variables, operators, Built-in functions, control structures and Exception Handling Cursors , Procedures, functions and packages in PL/SQL Using BLOB,CLOB and BFILE data types for storing complex types like images , documents Creating types using extended SQL Creating and managing users, Grant and Revoke command, Roles

Text Books: 1 2 Software Engineering A Practitioners Approach by Roger S. Pressman, Mc-Graw Hill, 5th Edition Cadcim Technologies Sham Tickoo Sunil Raina Oracle 11G with PL/SQL Approach Pearson Ivan Bayross SQL/PL SQL The Programming Language of Oracle BPB Publications.

Reference Books: 1 2 3 Kevin Loney Oracle Database 11G The Complete Reference McGraw Hill Steven Feuerstein, Bill Pribyl Oracle PL/SQL Programming O'Reilly Media James R. Groff , Paul N Weinberg SQL: The Complete Reference Osborne/McGraw Hill Alex Kriegel and Boris Turkhnov SQL Bible Wiley

Academic Year 2011-12

12 of 26

Veermata Jijabai Technological Institute

Programme Name Course Code Course Title

: : :

T. Y. B Tech (Computer Engineering ) HM 1321 Communications and Presentation Skills Lab

SEMESTER V

Course Contents: 1 2 3 4 5 6 7 Communication in an organization: process, types, barriers Speaking Skills: Voice modulation, pronunciation, speaking with confidence, prepared and extempore speeches, video-conferencing Listening, Note-making and Minutes of Meeting Technical Writing: Vocabulary building, effective sentences and paragraph, organizational pattern, and summarizing Special Types of Technical writing: Business Letter, E-mail, Brochure, Report, Memo, Proposal, Research paper, Conference Paper Interview skills: Resume and job application, preparation for interviews, Interview questions and answers, Group Discussion Presentation Skills: Planning, preparing, organizing and delivering an oral presentation

Assignments: Communication: Analysis of cases on communication in an organization with students presentation in groups Speaking Skills: i) Each student gives a prepared speech on any topic (current affair / news analysis / film review) ii) Demonstration of a simulated video-conference Listening and Note-making: Participating in role-play of a business meeting and making notes of the meeting (minutes) Technical Writing: Solving excises in vocabulary building, effective sentences and paragraph, organizational pattern, and summarizing Special Types of Technical writing: Each student has to submit 2 written assignments of 1500 words each on any two types of writing, selecting an industry related communication problem. Interview skills: every students has to compulsorily participate in a mock interview or Group discussion Presentation: Group of 5-7 students will select a topic and make a formal power point presentation and submit a formal report. Text Books: 1 2 Effective Technical Communication, Ashraf Rizvi, Tata McGraw Hill Technical Communication, Meenakshi Raman, Sangeeta Sharma, OUP

Reference Books: 1 2 3 4 5 6 Business communication- process and product, Mary Ellen Guffey, Thomson Report writing for Business, Raymond Lesikar, John Petit, Irwin McGraw hill Basic Business Communication, Raymond Lesikar, John Petit, Irwin McGraw hill Guide to Presentation, Mary Munter, Lynn Russell, Prentice hall Speaking Effectively; Jeremy Comfort, Pamela Rogerson et al, CUP Effective Technical Communication, Anne Eisenberg, Mc GrawHill.

Academic Year 2011-12

13 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title

: : :

T. Y. B Tech (Computer Engineering ) CO 0306 Object Oriented Software & Web Engineering

SEMESTER VI

Course Contents: 1 Object Oriented Software Engineering: Concepts Such as object, class, inheritance, polymorphism, encapsulation, overloading overriding, and OO Process model. Object oriented Analysis , Use Case Diagram, Class Diagram, Dynamic Model, State transition and Interaction Diagram, Sequence and collaboration Diagram ,Activity Diagram. Object Oriented Design: Data structure Design, Component Diagram, Deployment Diagram. An Introduction to Web Engineering: Characteristics of Web Application, Requirements Engineering for Web Application, RE Specifics in Web Engineering, Principles for RE of Web Application, Adapting RE Methods to Web Application Development. Modeling Web Application: Modeling Specifics in Web Engineering, Modeling Requirements, Content Modeling, Hypertext Modeling, Presentation Modeling, Customization Modeling. Technology-aware Web Engineering: Web Design from an Evolutionary Perspective, Web App design, Presentation Design, Interaction Design, Information design, Functional Design. Conceptual Modeling of Web Application: UML Approach, The OOWS Approach, The OOHDM approach, W2000: A Modeling Notation for Complex Web Application.

2 3

4 5 6

Text books: 1 2 Gerti Kappel Brigit Proll ; Web Engineering , WILEY-INDIA EDITION Roger S Pressman and David Love; Web Engineering, The Tata McGraw-Hill

Reference Books: 1 2 3 Mendes. Mosely (Eds) , Web Engineering, Springer Roger S. Pressman, Software Engineering, The Tata McGraw-Hill Stephen R. Scatch, Object-Oriented and Classical Software Engineering, The Tata McGraw-Hill

Academic Year 2011-12

14 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title

: : :

T. Y. B Tech (Computer Engineering ) CO 0307 Information Storage and Management Systems

SEMESTER VI

Course Contents: 1 2 3 4 5 6 7 8 Introduction to Storage Management: Importance of Storage, Evolution of Storage Technology, Data and Information, Structured and Unstructured Information, Information Lifecycle Management. Data Protection: RAID, RAID levels, Implementation of Software and Hardware RAID, RAID Impact on Disk Performance. Intelligent Storage System: Components of an Intelligent Storage System, Intelligent Storage Array. Direct Attached Storage (DAS) and introduction to SCSI, Internal and External NAS, SCSI Architecture and Addressing, Network Attached Storage: NAS File I/O System and Operations, Components and Architecture and IP SAN Content Addressed Storage: Fixed Content and Archives, CAS Architecture, Object Storage and Retrieval, Content Authenticity, Case Studies. Storage Virtualization: Forms of virtualization, Server Configuration Backup and Recovery: Local and Remote Replication, Securing and managing the Storage Infrastructure

Text books: 1 2 Information Storage and Management, G. Somasundaram, Alok Shrivastava, EMC Education Services. Wiley Publishing Inc Storage Area Network Essentials- Richard Barker and Paul Massiglia, Publisher: John Wiley & Sons ISBN: 0471034452

Reference Books: 1 2 3 Hardening Network Infrastructure Wesley J. Noonan Storage Networking Fundamentals- Author: Marc Farley, Publisher: Cisco Press, ISBN: 1587051621. Network Management Fundamentals ,Cisco Press; 1st edition (November 29, 2006) ISBN: 1587201372

Academic Year 2011-12

15 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title

: : :

T. Y. B Tech (Computer Engineering ) CO 0308 Web Technology

SEMESTER VI

Course Contents: 1 2 Introduction: Introduction to WEB Technology, TCP/IP, Protocols, Telnet, Electronic Mail (Email) File Transfer Protocol (FTP), Word Wide Web, Domain Name System (DNS), Uniform Resource Locator (URL) HTML and Java Script Programming: Html: Introduction to Hypertext Markup Language, Tags, Anchors, Backgrounds, Images, Web page structure, Hyper linking, Lists, Character Formatting, Color Control, Images, Tables, Frames, Multimedia, DHTML: Introduction to DHTML, use of DHTML and its elements, cascading style sheet, Java Script Programming: Introduction to java script, Client side benefits of using java Script over VB Script, Embedding java Script in HTML Pages, Handling events, Using Variable in Java Script, Using Array in Java Script, Creating Objects in Java Script, Using Operators, Working with control flow Statement, working with function. Servlet and Java Server Pages programming: Servlet: Introduction the Servlet life cycle, Servlet configuration, creating a sample Servlet, Httpservlet request, Httpservlet response, feature of java servlet, exploring the servlet API Java Server Pages: Introducing JSP, JSP life cycle, creating sample JSP pages, JSP basic TAGs and implicity objects, java beans, action tags, JSP standerd tags library (JSTL), JSTl SQL tags, JSTL formatting tags, JSTL XML tags Java Database programming: Introduction Java Database Connectivity (JDBC), JDBC drivers, features of JDBC, JDBC APIS, Implementing JDBC processes with java.sql packages, Implementing JDBC processes with javax.sql packages, Working with Transaction ASP.NET and PHP: ASP.NET: Introduction ASP and ASP.NET, New features in ASP.NET, ASP.NET life cycle, Overview of visual studio 2008, New features in visual studio 2008, Exploring sample ASP.NET Web Application, Exploring sample ASP.NET Website, Exploring ASP.NET Web pages, page directives, server control, provider model, coding model PHP: Introduction to Personal Home Page (PHP), creating PHP, running PHP, handling error in PHP, working with variables and constants, program flow, Function in PHP, Array in PHP, Files in PHP, Directories in PHP, form and database in PHP, Content Management for Dynamic Web Delivery: Content Management in Your Future? , Implementing a Content: Management Solution, Taking a Close Look at Your Information Resources, Creating an Information Model, Developing Information Types and Content Units, Using Content Units to Structure Information Types, Developing Content Plans for Static Web Sites, Developing Content Plans for Dynamic Web Sites, Developing a Single-Source Strategy, Authoring for Reuse, Staffing for Content Management, Making a Business Case for Content Management.

4 5

Text books: 1 2 Web Technologies, BLACK BOOK edition 2010 , Dreamtech Press New Delhi Content Management for Dynamic Web Delivery by John S. Rhodes Wiley publication

Reference Books: 1 2 3 4 Java server programming for Professional, Bayross and Shah, SPD Web Technology by Godbole and Kahate, TMH Schaum's Easy Outline of XML by Ed Tittel ISBN: 9780071422451 Pub Date: FEB-04 Copyright Year: 2004 Programming the Web, by Larry Lagerstrom ISBN: 9780071199971 Pub Date: JUL-03 Copyright Year: 2003
Academic Year 2011-12

16 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title Course Contents: 1

: : :

T. Y. B Tech (Computer Engineering ) CO 0309 Network Security & Privacy

SEMESTER VI

Cryptography symmetric key- Substitution, transposition, stream and block ciphers, DES and AES and asymmetric keyRSA, raybin elliptical curve, DH key exchange algorithm, cryptographic Hash function Hash and Mac algorithm and digital signature, Program Security Secure Programs, Nomalicious Program Errors, Viruses and other Malicious code. Target Malicious code, Secure software life cycle and control threats Against program Threats, SQL Attacks , Buffer Overflow, cross script Protection in Operating System Protected Objects and methods of protection, Memory and address protection, Control of access General objects, File protection Mechanisms, User authentication Database security Security Requirements, Reliability and integrity, Sensitive data, Inference multilevel databases Proposal for multilevel security. Security in Networks Threats in Networks, Network security protocols, electronic mail security, IP security an web security System Security Intruders viruses worms Security Planning Risk Analysis, Organizational Security Policies, Physical Security, firewall and IDS and IPS

4 5 6

Text Books: 1 2 Charles P. Pfleeger and Shari L Pfleeger ; Security in Computing , Pearson education William Stallings ; Cryptography and network security Pearson education

Reference Books: 1 2 3 Mendes. Mosely (Eds) , Web Engineering, Springer Pressman Software Engineering The Tata McGraw-Hill Stephen R. Scatch Object-Oriented and Classical Software Engineering The Tata McGraw-Hill

Academic Year 2011-12

17 of 26

Veermata Jijabai Technological Institute

Programme Name Course Code Course Title Course Contents: 1 2 3 4 5 6 7

: : :

T. Y. B Tech (Computer Engineering ) CO 1304 OO Software and Web Engineering Lab

SEMESTER VI

Analysis of the Case study for the using web engineering model Design of the Case study using web engineering model Implementation of JDBC Connectivity Implementation of case study using web technology such as HTML, JSP, and JDBC and authoring tool Analysis design and implementation of authoring systems using authoring tools and web technology Building Object Oriented Systems using Java. Building E-commerce Application Using Web Technology. Building Multimedia Systems.

Text Books: 1 2 Web Technologies, BLACK BOOK edition 2010, Dreamtech press New Delhi Programming the Web, by Larry Lagerstrom ISBN: 9780071199971 Pub Date: JUL-03 Copyright Year: 2003

Reference Books: 1 2 3 Java server programming for Professional, Bayross and Shah, SPD Content Management for Dynamic Web Delivery by John S. Rhodes wiley publication Schaum's Easy Outline of XML by Ed Tittel ISBN: 9780071422451 Pub Date: FEB-04 Copyright Year: 2004

Academic Year 2011-12

18 of 26

Veermata Jijabai Technological Institute

Programme Name Course Code Course Title

: : :

T. Y. B Tech (Computer Engineering ) CO 1305 Storage Management Lab

SEMESTER VI

Course Contents: 1 Basic Configuration (Kernel Configuration, Internet deamon, installing PPP) 2 Configure routing and DNS 3 Local Network services 4 Send mail 5 Configure Apache 6 Installation and configuration of storage area network 7 Storage Security and Management 8 Backup and recovery 9 Remote control and management of N/W devices (routers, switches, gateway, firewall) Network management tool Zenoos Text Books: 1 TCP/IP Network Administrator O, RELLY publications. By Craig Hunt 2 TCP/IP Essential Shivendra Panwar, Shiwen mao ( A lab based Approach), Cambridge Infrastructure storage management WILLY publications Reference Books: 1 Storage Area Network Essentials- Richard Barker and Paul Massiglia, Publisher: John Wiley & Sons ISBN: 0471034452 2 Storage Networking Fundamentals- Author: Marc Farley, Publisher: Cisco Press, ISBN: 1587051621 Hardening Network Infrastructure Wesley J. Noonan 3 Network Management Fundamentals 4 Cisco Press; 1st edition (November 29, 2006) ISBN: 1587201372 5 Network Infrastructure Security Wong, Angus, Yeung, Alan 2009, XIV, 266 p. 10 illus., Hardcover ISBN: 6 978-1-4419-0165Programme Name Course Code Course Title : : : T. Y. B Tech (Computer Engineering ) CO 1306 Information Security Lab SEMESTER VI

Course Contents: 1 Implementation of the cryptographic algorithm using JAVA 2 SQL attacks buffer overflow cross scripting attacks and defenses mechanism for program security Applying secure software life cycle on case study 3 Ethical hacking of the networks using various tools 4 Study of packet analyzer and packet building tools 5 Building firewall 6 Network intrusion prevention system (NIPS) and Network intrusion detection system (NIDS) like SNORT 7 Security in LINUX operating system 8 Text Books: 1 Charles P. Pfleeger and Shari L Pfleeger ; Security in Computing , Pearson education Ethical Hacking by ankit Fadia Reference Books: 1 William Stallings ; Cryptography and network security Pearson education 2 Stephen R.Scatch Object-Oriented and Classical Software Engineering The Tata McGraw-Hill

Academic Year 2011-12

19 of 26

Veermata Jijabai Technological Institute

Programme Name Course Code Course Title Course Contents: 1 2 3 4 5 6

: : :

T. Y. B Tech (Computer Engineering ) CO 1307 Software Project Management Lab

SEMESTER VI

Calculate Effort, Duration and Cost for the management of Structured Project. Calculate Effort, Duration and Cost for Object Oriented Project Management. Calculate Effort, Duration and Cost for Web Project Management. Give the RMMN Plan for Structured Project Management. Give the RMMN Plan for Object Oriented Project Management. Give the RMMN Plan for Web Project Management

Text Books: 1 2 3 Bob Hughes and Mike Cotterell. Software Project Management. 3rd Edition, McGraw Hill, 2002. ISBN 007-709834-X BLACK BOOK edition 2010, Web Technologies, dreamtech press New Delhi Roger S Pressman and David Love; Web Engineering The Tata McGraw-Hill 1st Edition 2004

Reference Books: 1 2 Darrel Ince, Helen Sharp and Mark Woodman. Introduction to Software Project Management and Quality Assurance. McGraw Hill, 1993. ISBN Stephen R. Schach, Object-Oriented and Classical Software Engineering, Eighth Edition McGraw-Hill, New York, 2011

Academic Year 2011-12

20 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title Course Contents: 1

: : :

T. Y. B Tech (Computer Engineering ) CO 0801 Network Management Systems

SEMESTER VI

Introduction: Devices for Network and Internetwork connectivity: Routers, Switches, Hubs, Gateways, ATM Switches and VLANs. Network Configuration: Selecting the right network media, Topology ,Estimating Networking costs, Managing Network Performance Network Management Standards, Models: Organizational Model, Information Model, Communication Model and Functional Model. SNMP v1 ,v2 and v3 Account Management: Setting account policies, Creating Home Directories, Setting Group Policies and Auditing Account activities. Network Security: Setting Passwords, Managing Access Privileges, Database Security, Data Encryption, Firewalls, Virus protection Fault-Tolerance Techniques: Fault Detection, Fault Location and Fault Isolation Techniques Monitoring the Network: Establishing Network Traffic characteristics, Network Monitoring Tools, Troubleshooting Network Problems. Remote Network Monitoring: RMON SMI and MIB, RMON1, RMON2

2 3 4

6 7

Text books: 1 2 Mani Subramaniam, Network Management Principles and Practices, Pearson Education India 2010 William Stalling, SNMP, Snmpv2, And Rmon: Practical Network Management (2nd Edition) AddisonWesley Publication

Reference Books: 1 2 Michael J Palmer, Hands-on Networking Essentials with Projects Douglas Mauro Kevin Schmidt, Essential SNMP ,Second Edition,O'Reilly Media, Inc.

Academic Year 2011-12

21 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title Course Contents: 1

: : :

T. Y. B Tech (Computer Engineering ) CO 0802 Image Processing

SEMESTER VI

Introduction and Fundamental of Image Processing: Digital Image Processing, Origins of Digital Image Processing, Examples of Fields that Use Digital Image Processing, Fundamental Steps in Digital Image Processing, Components of an Image Processing System, Elements of Visual Perception, Light and the Electromagnetic Spectrum. Digital Image Characterization, Image Sampling and Reconstruction, Image Quantization, Discrete TwoDimensional Processing, Discrete Image Mathematical Characterization, Superposition and Convolution, Unitary Transforms. Image Enhancement in the Spatial Domain and Frequency Domain ,Some Basic Gray Level Transformations, Histogram Processing, Basics of Spatial Filtering, Smoothing Spatial Filters, Sharpening Spatial Filters, Introduction to the Fourier Transform and the Frequency, Domain Smoothing FrequencyDomain Filters, Sharpening Frequency Domain Filters. Image Restoration, A Model of the Image Degradation/Restoration Process Noise Models, Restoration in the Presence of Noise OnlySpatial Filtering, Periodic Noise Reduction by Frequency Domain Filtering, Color Image Processing Basics of Full-Color Image Processing, Color Transformations, Color Segmentation. Image Segmentation, Detection of Discontinuities, Edge Linking and Boundary Detection, Thresholding, Region-Based Segmentation, Segmentation by Morphological Watersheds Image Representation, Boundary Descriptors, Regional Descriptors, Object Recognition, Patterns and Pattern Classes, Image Detection and Registration, Matched Filtering of Discrete Images, Matched Filtering of Continuous Images,

5 6

Text books: 1 Digital Image Processing (3rd edition), Rafael C. Gonzalez and Richard E. Woods, PHI, 2009

Reference Books: 1 2 3 4 William K Pratt, Digital Image Processing John Willey (2006) Image Processing Analysis and Machine Vision Millman Sonka, Vaclav hlavac, Roger Boyle, Broos/colic, Thompson Learniy (1999). A.K. Jain, PHI, New Delhi (1995)-Fundamentals of Digital Image Processing Chanda Dutta Magundar Digital Image Pr ocessing and Applications, Prentice Hall of India, 2007.

Academic Year 2011-12

22 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title Course Contents: 1 2 3

: : :

T. Y. B Tech (Computer Engineering ) CO 0803 High Performance Computing

SEMESTER VI

Parallel Computing Models: Evolution of Computer Architecture, Parallel Computer Structures, Pipeline Computers, Array Computers, Multi processors and Multicomputers Program and Network properties: Conditions of parallelism, System Interconnect Architectures Principles of scalable performance: Parallelism profile in programs, Massive parallelism for grand challenges, Application models of parallel computers, Scalability of parallel Algorithms, Scalability Metrics and goals Pipelining: Linear Pipelining, Nonlinear Pipelining, Instruction & Arithmetic Pipeline designs Parallel and Scalable Architectures: Multiprocessor system interconnects, Cache coherence problem, Message passing mechanisms Multi Vector and SIMD Computers: Vector processing principles, Compound vector processing, SIMD computer organizations Scalable, Multi threaded and Dataflow architectures, Principles of Multithreading, Scalable, and Multi threaded Architectures, Dataflow Architectures Parallel Models, Languages and Compilers: Parallel programming Models, Parallel Languages and Compilers, Code optimizations, Loop parallelization and pipelining Parallel program development and environments: Parallel programming environments, Synchronization and Multiprocessing modes, Shared variable program structures, Message passing programs development

4 5 6 7 8 9

Text Books: 1 2 Advanced Computer Architecture: Parallelism, Scalability, Programmability by Kai Hwang, McGraw Hill. First Edition Computer Architecture and Parallel Processing by Kai Hwang and Briggs, McGraw Hill, First Edition

Reference Books: 1 2 3 4 Introduction to Parallel Processing, Shasikumar M., PHI Practical Parallel Programming, Wilson G.V., PHI Parallel Computer Architecture, D. E. Culler, J. P. Singh, A. Gupta, Morgan Kaufman Parallel Programming, M. J. Quinn, TMH

Academic Year 2011-12

23 of 26

Veermata Jijabai Technological Institute

Programme Name Course code Course Title Course Contents: 1

: : :

T. Y. B Tech (Computer Engineering ) CO 0804 Embedded Systems

SEMESTER VI

Introduction: Introduction to embedded systems hardware and software components , types , examples , characteristics , Challenges in Embedded computing system design , Embedded system design processes, Introduction to IC Technology. Analysis & Design of Embedded System: Software Engineering practices in the embedded systems, software develop process, Interprocess communication &synchronization of process, task,& threads, Programme Language, Program concept & Embedded programming in C, Software components Interpreter, Compiler, Assembler, Cross Assembler OS for Embedded Systems: Introduction to real time theory Operating System Services Real time Operating System concepts, Basic design using a RTOS ,Introduction to RTOS programming tools Micro C/OSII & VxWorks. Hardware for Embedded Systems: Hardware components, SOC, Processors, CPU, Types of memory ,Memory management, I/O devices and interfacing, parallel I/O interface, blind counting synchronization and busy waiting, parallel port interfacing with switches, keypads and display unit, Memory & high speed interfacing, Interfacing of data acquisition systems, Interfacing of controllers, serial communication interface, Implementation of above using C language Performance Issues of an Embedded System: CPU performance ,CPU Power Consumption, Analysis and Optimization of CPU Power Consumption program execution time ,Analysis and optimization of energy and power , Analysis of program size , Hardware accelerators Design Examples & Case Studies: Personal Digital Assistants, Set Top Boxes, Ink Jet Printers, digital thermometer, Case Studies of Digital Camera, Smart card, Case study of coding for sending application layer byte stream on TCP/IP network using RTOS VxWorks.

Text books: 1 2 Raj Kamal, Embedded Systems Architecture, and Programming, TMH Pub. Iyer, Gupta, Embedded Real Time Systems Programming, TMH Pub

Reference Books: 1 2 3 4 Wayne Wolf, (2001). Computer as Components Principles of Embedded Computing System Design, Harcourt India Pvt Ltd., David E Simon, (2004) An Embedded Software Primer, Pearson Education, Raj Kamal, (2003) Embedded Systems Architecture, Programming and Design, Tata McGraw Hill. .Sriram V Iyer, Pankaj Gupta, (2004) Embedded Realtime Systems Programming, Tata McGraw Hill,

Academic Year 2011-12

24 of 26

Veermata Jijabai Technological Institute

Programme Name Course Code Course Title Course Contents: 1

: : :

T. Y. B Tech (Computer Engineering ) HM 0901 Entrepreneurship Development

SEMESTER VI

Entrepreneurship Awareness Entrepreneurship: Need for entrepreneurship and self employment, scope and trends of small enterprises, role of Small business in national growth. Small business enterprise: Types of small enterprises, Entrepreneur Self assessment Business Opportunities Identifying and evaluating business opportunities: Ideas and opportunities, ideas into opportunities. Quick start methods: franchise, turn-key or packaged business, multi-level marketing scheme, buying an existing business. International business: Pricing a product foe export sale. Planning The business planning process: Need for a good business plan, benefits of a business plan, contents and format of a business plan. Refining your business idea: Description of a business idea. Business financing: Need for planning the finance of business, start-up and operating capital needs, Sources of finance. Market research: Identification of market, determination of market segment, identifying competition. Developing a marketing plan: Image, location, pricing, promotion and advertising, channels of distribution, selling skills, credit and collections. Inventory: Types of inventory. Managerial and legal considerations Forms of ownership: sole proprietor, partnership. Government policies and facilities for small enterprise: Elements of contract law Selling your venture: planning for succession, valuation of business.

Methodology: 1. Theory will be supplemented with case studies. 2. Students will be required to make field visits to entrepreneurs and also prepare a business plan. 3. Workshops will be arranged for opportunity identification, idea generation and evaluation and writing business plan. 4. Interaction with entrepreneurs, venture capitalists and mentors may be arranged. Text book: 1. Entrepreneurship Development, (prepared by: Colombo plan staff college for technician education. Adapted by: Centre for research and industrial staff performance. ISBN 0-07-463329-5) Tata McGrawHill publishing company 1998. 2. A handbook for new entrepreneurs, (sponsors: Department of Science and Technology, Govt. of India, New Delhi) Published by: Entrepreneurship Development Institute of India, Ahmadabad. First ed, 1986. Reference books: 1. Innovation and entrepreneurship, Drucker Peter F, Heinemann, London, First ed, 1985. 2. Entrepreneurship, Holt David H, Prentice Hall India, 2005. 3. The successful Entrepreneurs Guidebook: Colin Barrow, Robert Brown and Liz Clarke(Kogan Page India)

Academic Year 2011-12

25 of 26

Veermata Jijabai Technological Institute

Programme Name Course Code Course Title Course Contents: 1

: : :

T. Y. B Tech (Computer Engineering ) MA0901 Applied Statistics

SEMESTER VI

Probability: Classical and axiomatic definitions of probability, addition rule, multiplication rule, conditional probability, total probability, Bayes theorem. Random Variables: Discrete and continuous random variables, Probability mass, probability density and cumulative distribution functions and their properties, Mathematical expectation, Moments, Moments generating functions, characteristic functions, Chebyshev's inequality. Distributions: Uniform, Binomial, Geometric, Poisson, Exponential, Gamma and Normal distribution with their properties. Joint Probability Distributions: Joint , Marginal and Conditional distributions , Product moment correlation , Independence of random variables, Bivariate normal distribution. Sampling Distribution: Types of sampling, The central limit theorem ,Distribution of sample mean and sample variance ,Chi square, t and F distributions, Estimation ,confidence intervals for the means and variances of normal populations. Testing of Hypothesis: Null and alternative Hypothesis, Critical and acceptance region, two types of errors, Pearson fundamental Lemma, large and small samples. Testing of significance for large sample and small sample: a) Test of significance of the difference between sample mean and population mean. b) Test for significance between mean of two large samples test and proportion. c) Test for significance between mean of two small samples. d) Paired t-test. e) The test for variance of two small samples using F test. Test of Goodness and independence of attributes using Chi square distribution. Correlation and regression : Simple linear regression and correlation Analysis of single factor experiments: Designing engineering experiments completely randomised single factor experiments and Latin square design, Analysis of variance. Non Parametric tests: Sign test, Signed rank test, Ranksum test

7 8

Text Books: 1 Applied Statistics for Engineers by Montgomery and John Wiley

Academic Year 2011-12

26 of 26

Das könnte Ihnen auch gefallen