ugmb7t02 management science - welcome to …r)itiv-isyllabus.pdf · management, operations ... co 5...
TRANSCRIPT
UGMB7T02 MANAGEMENT SCIENCE
Regulations: R14 Theory: 3 hrs
Year / Semester: IV /I Credits: 3
Course Objective:
To enlighten the technical students with functional management related issues like Principles of
Management, Operations Management, HRM, MM, Project Management techniques.
Course Outcomes:
CO 1 Create awareness about the concepts like Evolution of Management thought, functions &
principles of management, types of organizational structures.
CO 2 Gain knowledge about the types of plant layout, inventory control techniques, Statistical quality
control charts.
CO 3 Acquire in-depth knowledge about the functions of HRM, issues related to employees payment,
merit rating etc.,
CO 4 Provide all round information to the students about matters related to concepts & functions
related to Marketing.
CO 5 Familiarize problems related to Project Management techniques like PERT, CPM, and project
crashing for completion of Projects in scheduled times.
CO 6 Knowledge about Strategy formulation & implementation, SWOT analysis in order to compete
with the competition & to gain competency advantage.
UNIT I:
Introduction to Management
Concept and importance of Management, Functions of management, Evaluation of Management
thought, Fayol’s principles of Management, Maslow’s need hierarchy & Herzberg’s two factor theory of
Motivation, Decision making process, Designing organizational structure, Principles of Organization,
Types of organization structures
UNIT II:
Operations management
Principles and types of plant Layout, Work study, Statistical Quality control
Charts – R Chart, c chart, p chart, Simple problems on R, c and p charts, Materials Management:
Objectives - Need for inventory control- Inventory control techniques EOQ, ABC, HML, SDE, VED and FSN
analysis
UNIT III:
Human Resources management (HRM)
Concepts of HRM,HRD & Personnel management and industrial relations, Basic functions of HR
manager, Wage payment plans (simple problems), Job Evaluation and Merit Rating
UNIT IV:
Marketing Management
Functions of marketing, Marketing Mix, Marketing strategies based on Product life cycle, Channels of
distribution
UNIT V:
Project Management (PERT/CPM)
Network analysis, Programme Evaluation and Review Technique (PERT), Critical path method(CPM) -
Identifying critical path, Difference between PERT & CPM, Project Crashing (simple problems)
UNIT VI:
Strategic Management
Mission, Goals, objectives, policy, strategy, Elements of corporate planning process, Environmental
scanning, SWOT analysis Steps in strategy formulation and implementation Generic strategy alternatives
TEXT BOOKS:
1. Dr. Arya Sri – Management Science, TMH 2011
2. Principles & Practices of Management-L.M.PRASAD
3. Production and Operations Management- K.ASWATHAPPA and K.SRIDHARA BHAT
4. Marketing Management- PHILIP KOTLER
5. HRM & IR- P.SUBBA RAO
6. Business Policy & Strategic Management- FRANCIS CHERUNILAM
UGIT7T01 CLOUD & BIG DATA
Regulations: R14 Theory: 3 hrs
Year / Semester: IV /I Credits: 3
Course Objectives:
Upon completion of the course the student is familiar with the following aspects
1. Get the fundamentals of Cloud Computing
2. Understand the fundamentals of Big Data
3. Understand the fundamentals of Hadoop
Course Outcomes:
CO 1 Understand the Cloud environment and identify the private and public clouds.
CO 2 Ability to implement Cloud based services.
CO 3 Understand big data challenges in different domains
CO 4 Ability to install and perform applications on Hadoop
CO 5 Analyze Map-Reduce programming model for better optimization
CO 6 Ability to perform mining on stream data.
CO 7 Ability to perform mining on social network graphs
UNIT I:
CLOUD COMPUTING FUNDAMENTALS
Cloud Computing definition, private, and public and hybrid cloud, Cloud types; IaaS, PaaS, SaaS, Benefits
and challenges of cloud computing, public vs private clouds, role of virtualization in enabling the cloud
UNIT II:
CLOUD SERVICES MANAGEMENT
Reliability, availability and security of services deployed from the cloud. Performance and scalability of
services, tools and technologies used to manage cloud services deployment; Cloud Economics: Cloud
Computing infrastructures available for implementing cloud based services. Economics of choosing a
Cloud platform for an organization, based on application requirements.
UNIT III:
INTRODUCTION TO BIG DATA
What is Big Data? - differences between Big data Vs Data ware house – characteristics of Big Data-
Applications of Big Data – Challenges of Big Data – Technologies used in Big Data-Introduction to
Hadoop- Hadoop Infrastructure-How Hadoop Works-Advantages of Hadoop - NoSQL-HiVe
UNIT IV:
MapReduce
Distributed File System - Physical Organization of Compute Nodes- Large-Scale File-System Organization
– MapReduce - The Map Tasks – Grouping by a key – The Reduce Tasks – Combiners – Details of
MapReduce Execution – word count – Algorithms using MapReduce- Matrix –Vector Multiplication –
Relational algebra operations.
UNIT V:
MINING DATA STREAMS
Introduction To Streams Concepts – Stream Data Model and Architecture - Stream Computing -
Sampling Data in a Stream – Filtering Streams – Counting Distinct Elements in a Stream – Estimating
Moments – Estimating Moments-Counting Ones in a Window – Decaying Window.
UNIT VI:
MINING SOCIAL-NETWORK GRAPHS
Social Network as Graphs- Clustering of Social – Network Graphs – Partitioning of Graphs – simrank –
Counting triangles in a graph
TEXT BOOKS:
1. AnandRajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”, Cambridge University
Press, 2012.
2. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, 2007.
3. Bill Franks, “Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with
Advanced Analytics”, John Wiley & sons, 2012.
Cloud:
1. Cloud Computing - Web Based Applications That Change the way you Work and Collaborate
Online - Michael Miller, Pearson Education.
2. Cloud Application Architectures, 1st Edition by George Reese O'Reilly Media.
UGIT7T02 PYTHON PROGRAMMING
Regulations: R14 Theory: 3 hrs
Year / Semester: IV /I Credits: 3
Course Objective
Learn to program and programming paradigms brought in by Python with a focus on Collections, File
Handling and Regular Expressions.
Course Outcomes:
CO 1 Understand the architecture and programming constructs of python
CO 2 Design, implement, test, and debug functions and modules
CO 3 Analyze and demonstrate the use of objects and lists in Python.
CO 4 Study Regular Expressions
CO 5 Understand the file handling mechanism
UNIT I:
Introduction and overview
Introduction, What is Python, Origin, Comparison, Comments, Operators, Variables and Assignment,
Numbers, Strings, Lists and Tuples, Dictionaries, if Statement, while Loop, for Loop and the range() Built-
in Function, Files and the open() Built-in Function, Errors and Exceptions, Functions, Classes, Modules.
Syntax and Style
Statements and Syntax, Variable Assignment, Identifiers, Basic Style Guidelines, Memory Management,
Python Application Examples
UNIT II:
Conditionals and Loops
if statement, else Statement, else if Statement, while Statement, for Statement, break Statement,
continue Statement, pass Statement, else Statement.
Numbers and Strings
Introduction to Numbers, Integers, Floating Point Real Numbers, Complex Numbers, Operators, Built-in
Functions. Sequences: Strings, Lists, and Tuples, Sequences, Strings, Strings and Operators, String-only
Operators, Built-in Functions, String Built-in Methods, Special Features of Strings.
UNIT III:
Python Objects
Python Objects, Standard Types, Other Built-in Types, Internal Types, Standard Type Operators,
Standard Type Built-in Functions, Categorizing the Standard Types, Unsupported Types.
Lists
Operators, Built-in Functions, List Type Built-in Methods, Special Features of Lists, Tuples, Tuple
Operators and Built-in Functions, Special Features of Tuples.
UNIT IV:
Functions:
What are Functions, Calling Functions, Passing Arguments, Variable Length Arguments, Functional
Programming, Recursion
Modules:
What are Modules, Modules and Files, Namespaces, Importing Modules, Module Built-in Functions,
Packages.
UNIT V:
Files and Input/output
File Objects, File Built-in Function, File Built-in Methods, File Built-in Attributes, Standard Files,
Command-line Arguments, File System, File Execution, Persistent Storage Modules
UNIT VI:
Regular Expressions
Introduction/Motivation, Special Symbols and Characters for REs, REs and Python.
Applications: Check for data error in CSV files: Numeric Check, Alphanumeric Check, Email Check, Date
Check.
TEXT BOOKS:
1. Chun, J Wesley, Core Python Programming, 2nd
Edition, Pearson, 2007 Reprint 2010.
2. Python How to Program- Dietel and Dietel
3. Python in a Nutshell, Alex Martelli-Orielly
REFERENCE BOOKS:
1. Barry, Paul, Head First Python, 2nd
Edition, O Rielly, 2010.
2. Lutz, Mark, Learning Python, 4th
Edition, O Rielly, 2009.
3. Beginning Python, James Payne, Wrox Publisher
UGIT7T03 UML & DESIGN PATTERNS
Regulations: R14 Theory: 3 +2 hrs
Year / Semester: IV /I Credits: 4
Course Objectives
Up on successful completion of this course the student will be able to analyze and document the
requirements, so that they can design the models by using various patterns and also can evaluate
problems of various categories
Course Outcomes
CO 1 Ability to communicate using Models
CO 2 Clear understanding of various features available in UML throughout lifecycle of Project
CO 3 Comprehend the nature of design patterns by understanding a small number of examples
from different pattern categories, and to be able to apply these patterns in creating an OO
design.
CO 4 Understand Design Pattern principles and strategies to apply on object oriented design
and uncover recurring design problems
CO 5 Recognize and apply design patterns, and make judgments about when a particular
pattern will improve a design
UNIT I:
INTRODUCTION TO OBJECT-ORIENTED SOFTWARE DEVELOPMENT
Overview - Functional Decomposition - Problem of Requirements - Using Functional Decomposition –
Object Oriented Paradigm - Special Object Methods.
UNIT II:
UML DIAGRAMS AND NOTATIONS
UML –Use case Diagrams- Class Diagram - Interaction Diagram State chart, Activity Diagram,
Deployment Diagram, Notations Standard Object-Oriented Solution.
UNIT III:
INTRODUCTION TO DESIGN PATTERNS
Design Patterns Arose from Architecture and Anthropology - Architectural to Software Design Patterns -
Advantages of Design Patterns - Adapter Pattern Strategy Pattern - Bridge Pattern - Abstract Factory
Pattern.
UNIT IV:
NEW PARADIGM OF DESIGN
Principles and Strategies of Design Patterns - Open-Closed Principle - Designing from Context -
Encapsulating Variation. Commonality and Variability Analysis, Analysis Matrix - Decorator Pattern.
UNIT V:
VALUES OF PATTERNS
Observer Pattern - Categories of Patterns - Template Method Pattern - Applying the Template Method
to the Case Study - Using Template Method Pattern to Reduce Redundancy.
UNIT VI:
FACTORIES
Design Patterns: Factories - Singleton Pattern and the Double-Checked Locking Pattern - Applying
Singleton Pattern to Case Study. Object Pool Pattern Management of Objects. Factory Method Pattern -
Factory Method Pattern and Object-Oriented Languages.
TEXT BOOKS:
1. Jason McC. Smith (Apr 7, 2012), “Elemental design Patterns”, Pearson, 2012.
2. Erich Gamma, Richard Helm, Ralph Johnson, John Vlissides, “Design Patterns: Elements of
Reusable Object-Oriented Software”, Addison-Wesley, 2003.
REFERENCES:
1. Eric Freeman, Elisabeth Freeman, Kathy Sierra, Bert Bates, “Head First Design Patterns”, O'Reilly
Media, Inc., 2004
UGIT7T04 OPTIMIZATION TECHNIQUES
(Elective - 5)
Regulations: R14 Theory: 3 hrs
Year / Semester: IV /I Credits: 3
Course Objectives:
The student will learn about the mathematical modelling, Linear Programming, Simplex method,
Transportation problem, assignment problems, processing jobs through several machines, queuing,
Inventory management and management decision making, Project management techniques, simulation
techniques, probability distributions and markov analysis.
Course Outcomes:
CO 1 Concept of mathematical modelling and development of a model.
CO 2 Use of graphical solution in solving LPP.
CO 3 Determining minimum transportation costs.
CO 4 Use of assignment models in business and industry
CO 5 Processing of jobs through different number of machines.
CO 6 Solving queuing problems in single-channel and multiple-channel situations
CO 7 Inventory management and management decision making
CO 8 Project management and simulation techniques
CO 9 Understand application of probability distributions and markov process in different situations.
UNIT I:
Introduction to Operations Research: Definition, Features, types of OR models, Methodology, Tools,
Limitations and applications of Linear Programming.
Linear Programming I: Introduction, Formulation of LPP, Assumptions for solving LPP, Applications of
LPP, Graphical method of solving LPP.
UNIT II:
Linear Programming II: Introduction, steps in solving problems using simplex method, Principle of
simplex method- Maximization and minimization problems, solution by simplex method, limitations of
LPP simplex method.
Linear Programming III: Introduction, concept of primal dual relationship, formulation of the dual of the
primal problem, solution of LP problems using duality.
UNIT III:
The Transportation Problem: Basics, Solution of Transportation problem with several methods,
performing optimality test, degeneracy in transportation problem.
Assignment model: Definition, Formulation, Different methods of solutions, Hungarian assignment
method, unbalanced assignment problems
UNIT IV:
The Sequencing problems: introduction, basics, types of sequencing problems, priority sequencing,
sequencing n jobs through two machines, n jobs and m machines, two jobs 3 machines case.
Waiting Line(Queuing) Theory: introduction, objectives and models, benefits and limitations, single
channel and multi-channel queuing models.
UNIT V:
Inventory Management: introduction, objectives, developing the model, EOQ, Selective inventory
management.
Project management PERT & CPM: introduction, construction of networks, calculation of EST, LST, EFT
and LFT, drawing of networks and calculation of timings
UNIT VI:
Simulation: introduction, applications, advantages and limitations, Monte Carlo simulation technique,
steps involved in use of simulation, generating and using random system, simulation of queuing system,
investment decisions using simulation.
Probability theory and markov analysis: Basics, law of probability, discreet and continuous random
variables, cumulative distribution function, frequency and probability distributions, mean and standard
deviation, Binomial probability distribution, Normal probability distribution. Markovian process-
applications, Markovian decision problems.
TEXT BOOKS:
1. Operations research, 2ed, Col D S Cheema, University Science Press, Lakshmi Publications
2. Hamdy H. Taha, “Operations Research -An Introduction” Pearson Education,2003
3. Taha Hamdy- Operations Research- An Introduction ,Prentice-Hall, 7th edition
REFERENCE BOOKS:
1. Operations Research, Panneer Selvan, Prentice Hall of India.
2. Banks, J, Carson II J. S., Nelson B.L., and Nicol D.M. Discrete – Event System Simulation. Pearson
Education Asia, 3 edition,
3. Principles of Operation Research (with applications to managerial decisions) – H.M Wagher, PHI,
New Delhi
UGIT7T05 INTERNET OF THINGS
(Elective - 5)
Regulations: R14 Theory: 3 hrs
Year / Semester: IV /I Credits: 3
Course Objectives:
Student knows the basics of Internet of Things; get an idea of some of the application areas where
Internet of Things can be applied, the middleware for Internet of Things
To understand the concepts of Web of Things, the concepts of Cloud of Things with emphasis on Mobile
cloud computing, the IOT protocols
Course Outcomes:
CO 1 Identify and design the new models for market strategic interaction
CO 2 Design business intelligence and information security for WoB
CO 3 Analyze various protocols for IoT
CO 4 Design a middleware for IoT
CO 5 Analyze and design different models for network dynamics
UNIT I:
INTRODUCTION: Definitions and Functional Requirements –Motivation – Architecture - Web 3.0 View of
IoT– Ubiquitous IoT Applications – Four Pillars of IoT – DNA of IoT - The Toolkit Approach for End-user
Participation in the Internet of Things. Middleware for IoT: Overview – Communication middleware for
IoT –IoT Information Security
UNIT II:
IOT PROTOCOLS: Protocol Standardization for IoT – Efforts – M2M and WSN Protocols – SCADA and
RFID Protocols –Issues with IoT Standardization – Unified Data Standards – Protocols – IEEE 802.15.4 –
BACNet Protocol – Modbus – KNX – Zigbee Architecture – Network layer – APS layer – Security
UNIT III:
WEB OF THINGS: Web of Things versus Internet of Things – Two Pillars of the Web – Architecture,
Standardization for WoT– Platform Middleware for WoT – Unified Multitier WoT Architecture – WoT
Portals and Business Intelligence.
UNIT IV:
Cloud of Things: Grid/SOA and Cloud Computing – Cloud Middleware – Cloud Standards – Cloud
Providers and Systems – Mobile Cloud Computing – The Cloud of Things Architecture
UNIT V:
Integrated Billing Solutions in the Internet of Things Business Models for the Internet of Things -Network
Dynamics: Population Models – Information Cascades - Network Effects - Network Dynamics: Structural
Models - Cascading Behavior in Networks - The Small-World Phenomenon
UNIT VI:
APPLICATIONS: The Role of the Internet of Things for Increased Autonomy and Agility in Collaborative
Production Environments - Resource Management in the Internet of Things: Clustering, Synchronisation
and Software Agents. Applications - Smart Grid – Electrical Vehicle Charging.
TEXT BOOKS:
1. The Internet of Things in the Cloud: A Middleware Perspective - Honbo Zhou – CRC Press
2. Architecting the Internet of Things - Dieter Uckelmann; Mark Harrison; Florian Michahelles-
(Eds.) – Springer
REFERENCES:
1. Networks, Crowds, and Markets: Reasoning About a Highly Connected World - David Easley and
Jon Kleinberg, Cambridge University Press
2. The Internet of Things: Applications to the Smart Grid and Building Automation by - Olivier
Hersent, Omar Elloumi and David Boswarthick - Wiley
3. Olivier Hersent, David Boswarthick, Omar Elloumi , “The Internet of Things – Key applications
and Protocols”, Wiley
UGIT7T06 SOFTWARE PROJECT MANAGEMENT
(Elective - 5)
Regulations: R14 Theory: 3 hrs
Year / Semester: IV /I Credits: 3
Course Objectives:
The student will be able to understand the roles of a manager, practical management issues in various
domains like quality, people, and risk management and apply the knowledge for various software
projects.
Course Outcomes:
CO 1 Apply theoretical knowledge on project management and software development into
practice.
CO 2 Understand project time and cost management for effective project management
CO 3 Understand human recourse management
CO 4 Understand risk analysis and management for a given project
CO 5 Apply procurement management in strategic planning and managing project execution
CO 6 Analyze project monitoring and controlling activities
UNIT I:
Introduction to software project Management: Project Stakeholders, Project Management Knowledge
Areas, Project Management Tools and Techniques, Program and Project Portfolio Management, the Role
of the Project Manager, the Project Management Profession, Project Phases and the Project Life Cycle.
UNIT II:
Software project Time and Cost management: Time management The Importance of Project Schedules,
Estimating Activity Resources, Estimating Activity Durations, Developing the Schedule, Controlling the
Schedule, Using Software to Assist in Project Time Management. Cost management: The Importance of
Project Cost Management, Basic Principles of Cost Management, Estimating Costs, Types of Cost
Estimates, Cost Estimation Tools and Techniques, Determining the Budget, Controlling Costs.
UNIT III:
Human Resources Management: The Importance of Human Resource Management, Keys to Managing
People, Developing the Human Resource Plan, Acquiring the Project Team, Developing the Project
Team, Managing the Project Team, Using Software to Assist in Human Resource Management.
UNIT IV:
Risk Management: Planning Risk Management, Common Sources of Risk on Information Technology
Projects, Identifying Risks, Performing Qualitative Risk Analysis, Performing Quantitative Risk Analysis,
Planning Risk Responses, Monitoring and Controlling Risks, sing Software to Assist in Project Risk
Management.
UNIT V:
Procurement Management: Strategic Planning and Project Selection, Developing a Project Charter,
Developing a Project Management Plan, Directing and Managing Project Execution
UNIT VI:
Monitoring and Controlling: Project Work, Performing Integrated Change Control, Closing Projects or
Phases.
TEXT BOOKS:
1. INFORMATION TECHNOLOGY PROJECT MANAGEMENT, Kathy Schwalbe,6th edition, Cengage
Learning, 2011
2. SOFTWARE PROJECT MANAGEMENT A Unified Framework Walker Royce Pearson Edition.
REFERENCES:
1. Ramesh, Gopalaswamy, "Managing Global Projects", Tata McGraw Hill, 2001
2. Jalote, “Software Project Management in Practice”, Pearson Education, 2002
UGIT7T07 INFORMATION RETRIEVAL SYSTEMS
(Elective - 6)
Regulations: R14 Theory: 3 hrs
Year / Semester: IV/I Credits: 3
Course Objectives:
To give knowledge on Information Retrieval System data structures, algorithms for effective information
retrieval.
Course Outcomes
CO 1 Understand the importance of Information Retrieval System and its data structures
CO 2 Familiarize the representation of Information retrieval system in various formats like
inverted files and signature files.
CO 3 Understand PAT trees and PAT arrays for representation of information
CO 4 Understand stemming algorithms to compress the data in text preprocessing
CO 5 Analyze the thesaurus construction from the given text
UNIT I:
Introduction to Information Storage and Retrieval System: Introduction, Domain Analysis of IR systems
and other types of Information Systems, IR System Evaluation.
Introduction to Data Structures and Algorithms related to Information Retrieval: Basic Concepts, Data
structures, Algorithms
UNIT II:
Inverted files: Introduction, Structures used in Inverted Files, Building Inverted file using a sorted array,
Modifications to Basic Techniques.
UNIT III:
Signature Files: Introduction, Concepts of Signature Files, Compression, Vertical Partitioning, Horizontal
Partitioning.
UNIT IV:
New Indices for Text: PAT Trees and PAT Arrays: Introduction, PAT Tree structure, algorithms on the
PAT Trees, Building PAT trees as PATRICA Trees, PAT representation as arrays.
UNIT V:
Stemming Algorithms: Introduction, Types of Stemming Algorithms, Experimental Evaluations of
Stemming to Compress Inverted Files
UNIT VI:
Thesaurus Construction: Introduction, Features of Thesauri, Thesaurus Construction, Thesaurus
construction from Texts, Merging existing Thesauri
TEXT BOOKS:
1. Frakes, W.B., Ricardo Baeza-Yates: Information Retrieval Data Structures and Algorithms,
Prentice Hall, 1992.
2. Modern Information Retrival By Yates Pearson Education.
3. Information Storage & Retieval By Robert Korfhage – John Wiley & Sons.
REFERENCES:
1. Kowalski, Gerald, Mark T Maybury: Information Retrieval Systems: Theory and Implementation,
Kluwer Academic Press, 1997.
2. Information retrieval Algorithms and Heuristics, 2ed, Springer
UGIT7T08 NETWORK SECURITY
(Elective - 6)
Regulations: R14 Theory: 3 hrs
Year / Semester: IV /I Credits: 3
Course Objective:
To introduce various cryptographic algorithms and their applications in securing the networking
environment
Course Outcomes:
CO 1 Understand various security services and mechanisms, various types of attacks
CO 2 Study various symmetric cryptography algorithms and mathematical foundation required
in the study of security protocols
CO 3 Study various Asymmetric cryptography algorithms and their applications
CO 4 Study the applications of authentication protocols
CO 5 Understand the security issues if IP layer and Transport layer
CO 6 Understand various types of malicious software and Firewall
UNIT I:
Introduction: Security Attacks, Security Services, Security Mechanisms, and a Model for Network
Security. Non-Cryptographic Protocol Vulnerabilities-DoS, DDoS, Session Hijacking and Spoofing,
Software Vulnerabilities- Phishing, Buffer Overflow, Format String Attacks, SQL Injection. Basics of
Cryptography – Steganography, Symmetric Cipher Model, Substitution Techniques, Transportation
Techniques, Other Cipher Properties- Confusion, Diffusion, Block and Stream Ciphers.
UNIT II:
Secret Key Cryptography: S-DES, Data Encryption Standard (DES), Strength of DES, Block Cipher Design
Principles and Modes of Operations, Triple DES, AES.
Number Theory: Divisibility and the Division Algorithm, Prime and Relatively Prime Numbers, Modular
Arithmetic, Fermat’s and Euler’s Theorems, the Chinese Remainder Theorem, Discrete Logarithms.
UNIT III:
Public Key Cryptography: Principles of Public Key Cryptosystems, RSA Algorithm, Diffie-Hellman Key
Exchange, Introduction to Elliptic Curve Cryptography.
Cryptographic Hash Functions: Applications of Cryptographic Hash Functions, Secure Hash Algorithm,
Message Authentication Codes – Message Authentication Requirements and Functions, HMAC, Digital
signatures, Digital Signature Standards.
UNIT IV:
Authentication Applications: Kerberos, Key Management and Distribution, X.509 Directory
Authentication service, Public Key Infrastructure, Electronic Mail Security: Pretty Good Privacy.
UNIT V:
IP Security: Overview, Architecture, Authentication Header, Encapsulating Security Payload, Combining
security Associations, Internet Key Exchange.
Web Security: Web Security Considerations, Secure Sockets Layer and Transport Layer Security,
Electronic Payment.
UNIT VI:
System Security: Malicious Software – Types, Viruses, Virus Countermeasures, Worms.
Firewalls: Characteristics, Types of Firewalls, Placement of Firewalls, Firewall Configuration, Trusted
systems.
TEXT BOOKS:
1. Cryptography and Network Security: Principles and Practice,5th
edition, William Stallings,
Pearson Education,2011
2. Network Security and Cryptography, Bernard Menezes, Cengage Learning, 2011
3. Cryptography and Network, 2nd
edition, Behrouz A.Fourouzan and Debdeep Mukhopadhyay,
McGraw-Hill, 2010
REFERENCE BOOKS:
1. Fundamentals of Network Security by Eric Maiwald, Dreamtech press.
2. Principles of Information Security, Whitman, Thomson.
3. Introduction to Cryptography, Buchmann, Springer.
4. Applied Cryptography. 2nd
Edition, Bruce Schneier, Johnwiley & Sons
UGIT7T09 MIDDLEWARE TECHNOLOGIES
(Elective - 6)
Regulations: R14 Theory: 3 hrs
Year / Semester: IV /I Credits: 3
Course Objective
To create a practical exposure on Middleware Technologies to understand distributed environment and
start building complex distributed systems with confidence.
Course Outcomes
At the end of the course, the student will be able to
CO 1 Use Middleware to Build Distributed Applications.
CO 2 Implement distributed Business objects
CO 3 Understand existing Distributed Technologies like CORBA and .NET Remoting
CO 4 Understand SOA and Web services architectures.
UNIT I:
Introduction to Middleware Technologies
General Middleware, Service Specific Middleware, Client/Server Building blocks – RPC - Messaging –
Peer – to – Peer, Java RMI.
UNIT II:
Distributed Objects
Computing standards, OMG, Overview of CORBA, Overview of COM/DCOM, and Overview of EJB.
UNIT III:
CORBA
Introduction and concepts, distributed objects in CORBA, CORBA components, architectural features,
method invocations, static and dynamic: IDL (Interface Definition Language) models and interfaces.
Structure of CORBA IDL, CORBA's self-describing data; CORBA interface repository. Building an
application using CORBA.
UNIT IV:
COM and .NET
Introduction to COM ,Evolution of DCOM, COM clients and servers, COM IDL, COM Interfaces, COM
Threading Models, Comparison of COM and CORBA, Introduction to .NET, Overview of .NET
architecture, .NET Remoting.
UNIT V:
Service Oriented architecture (SOA) Fundamentals
Defining SOA, Business value of SOA, SOA characteristics, Concept of a service, Basic SOA , Enterprise
Service Bus (ESB), SOA enterprise Software Models.
UNIT VI:
Web Services Technologies
XML in Web Services, WSDL, SOAP, UDDI, Web Services and Service Oriented Enterprise (SOE)
TEXT BOOKS:
1. G. Sudha Sadasivam “Distributed Component Architecture”, Wiley India edition.
2. Thomas Erl “Service Oriented Architecture: Concepts , Technology & Design”.
3. G. Brose, A Vogel and K. Duddy, “Java programming with CORBA”, 3rd Edition, Wiley-dreamtech,
India John Wiley and sons
REFERENCES:
1. Robert Orfali, Dan Harkey, “Client/server Programming with Java & Corba W/cd”, Wiley India Pvt.
2. Wolfgang Emmerich, “Engineering Distributed Objects”, John Wiley, 2000.
3. Web Services: Concepts, Architectures and Applications
UGIT7P10 HADOOP & BIG DATA LAB
Regulations: R14 Lab: 3 hrs
Year / Semester: IV /I Credits: 1
Week 1, 2:
1. (i)Perform setting up and Installing Hadoop in its three operating modes:
Standalone, Pseudo distributed, Fully distributed
(ii)Use web based tools to monitor your Hadoop setup.
Week 3:
2. Implement the following file management tasks in Hadoop:
• Adding files and directories
• Retrieving files
• Deleting files
Hint: A typical Hadoop workflow creates data files (such as log files) elsewhere and copies them
into HDFS using one of the above command line utilities.
Week 4:
3. Run a basic Word Count MapReduce program to understand MapReduce Paradigm.
Week 5:
4. Write a mapreduce program that mines weather data.
Weather sensors collecting data every hour at many locations across the globe gather a large
volume of log data, which is a good candidate for analysis with MapReduce, since it is semi
structured and record-oriented.
Week 6:
5. Use MapReduce to find the shortest path between two people in a social graph.
Hint: Use an adjacency list to model a graph, and for each node store the distance from the
original node, as well as a backpointer to the original node. Use the mappers to propagate the
distance to the original node, and the reducer to restore the state of the graph. Iterate until the
target node has been reached.
Week 7:
6. Implement Friends-of-friends algorithm in MapReduce.
Hint: Two MapReduce jobs are required to calculate the FoFs for each user in a social network.
The first job calculates the common friends for each user, and the second job sorts the common
friends by the number of connections to your friends.
Week 8:
7. Implement an iterative PageRank graph algorithm in MapReduce.
Hint: PageRank can be implemented by iterating a MapReduce job until the graph has
converged. The mappers are responsible for propagating node PageRank values to their
adjacent nodes, and the reducers are responsible for calculating new PageRank values for each
node, and for re-creating the original graph with the updated PageRank values.
Week 9:
8. Create a Bloom filter in MapReduce.
Hint: Write a MapReduce job to create and output a Bloom filter using the Hadoop built-in
BloomFilter class. The mappers are responsible for creating intermediary Bloom filters, and the
single reducer combines them together to output a combined Bloom filter.
Week 10:
9. Perform an efficient semi-join in MapReduce.
Hint: Perform a semi-join by having the mappers load a Bloom filter from the Distributed Cache,
and then filter results from the actual MapReduce data source by performing membership
queries against the Bloom filter to determine which data source records should be emitted to
the reducers.
Week 11:
10. Install and Run Pig then write Pig Latin scripts to sort, group, join, project, and filter your
data.
Week 12:
Install and Run Hive then use Hive to create, alter, and drop databases, tables, views, functions, and
indexes
UGIT7P11 PYTHON PROGRAMMING LAB
Regulations: R14 Lab: 3 hrs
Year / Semester: IV /I Credits: 1
1. Write a script to compute and print the prime number below N Read N from console.
2. Write a program that computes the minimum number of bills and coins needed to make change for a
person. For instance, if you need to give 2788 in change you would need two thousand rupees, one Five
hundred rupees, two hundred rupees, one fifty rupees, one twenty rupees, one ten rupees, one five
rupee coin, one two rupee coin, and single one rupee coin.
3. Write a function called zip that is given two lists of the same length and creates a new list of two -
tuples where each two - tuple is the tuple of the corresponding elements from the two lists. For
example, zip([1,2,3],[4,5,6])would re-turn [(1, 4), (2, 5), (3, 6)].
4. Write a function called unzip that returns a tuple of two lists that result from unzipping a zipped list .
So unzip([(1,4),(2,5),(3,6)])would return ([1, 2, 3], [4, 5, 6]).
5. Creating a CSV File based on user input.
6. Reading a CSV File already created and check for a specific pattern.
7.
a) Write a function that accepts a text and a character as argument and returns the no. of occurrences
of the character in the text.
b) Modify the function in the previous task, such that the caller can specify whether case should be
ignored. The default is to ignore case.
8.
A table of names and telephone no. is given below.
Name Telephone
Jack 4098
Sape 4139
a. Represent the table as dictionary mapping names to telephone numbers.
b. Add a new entry that maps guido to 4127.
c. Get the telephone no. of jack, from the dictionary.
d. Remove the entry for sape from the dictionary.
e. Get the names from the dictionary.
f. Get the telephone nos. from the dictionary.
g. Check if guido is in the dictionary.
9. Define a function that accepts the student names as a list in the first argument, and the student’s
mark as a list in the second argument and prints the name and the mark.
10.
a. Write a module with the following contents, and name it fibo.py.
# Fibonacci numbers module
def fib(n): # write Fibonacci series up to n
a, b = 0, 1
while b < n:
print b,
a, b = b, a+b
def fib2(n): # return Fibonacci series up to n
result = []
a, b = 0, 1
while b < n:
result.append(b)
a, b = b, a+b
return result
b. Import the module.
c. Access the function fib defined within the module.
d. Access and print the module’s name.
e. Assign a local name for the function fibo.fib, and invoke the function using local name.
f. Import the function fibo.fib directly into the local name fib.
11. Write a Time class that has three fields: hours, minutes and seconds. The class should have the
following methods.
a. Initialization method.
b. print_time - that prints the time.
c. increment - that increments the time.
Web References
1. http://www.swaroopch.com/notes/python/
2. http://www.python.org/download/releases/3.2.3/
3. http://wiki.python.org/moin/IntegratedDevelopmentEnvironments
4. http://zetcode.com/lang/python/
5. http://www.programiz.com/python-programming/
UGIT7P12 UML & DESIGN PATTERNS LAB
Regulations: R14 Lab: 3 hrs
Year / Semester: IV /I Credits: 1
1. To create a UML diagram of ATM APPLICATION
2. To create a UML diagram of LIBRARY MANAGEMENT SYSTEM
3. To create a UML diagram of ONLINE BOOK SHOP
4. To create a UML diagram of RAILWAY RESERVATION SYSTEM
5. To create a UML diagram of BANKING SYSTEM
6. To design a Document Editor
7. Using UML, design Abstract Factory design pattern
8. Using UML, design Builder design pattern
9. Using UML, design Façade design pattern
10. Using UML, design Bridge design pattern
11. Using UML, design Decorator design pattern
12. User gives a print command from a word document. Design to represent this chain of
responsibility design pattern
UGEE7A12 ENERGY STUDIES
(Audit Course)
Regulations: R14 Theory: 3 hrs
Year / Semester: IV /I Credits: --
Course Outcomes:
Student should be able to
CO 1 Analyze solar radiation data, extraterrestrial radiation, radiation on earth’s surface.
CO 2 Design solar thermal collections.
CO 3 Design solar photo voltaic systems.
CO 4 Develop maximum power point techniques in solar PV and wind.
CO 5 Explain wind energy conversion systems, Betz coefficient, tip speed ratio.
CO 6 Explain basic principle and working of hydro, tidal, biomass, fuel cell and geothermal
systems.
UNIT I:
Fundamentals of Energy Systems
Energy conservation principle – Energy scenario (world and India) – Solar radiation: Outside earth’s
atmosphere – Earth surface – Analysis of solar radiation data – Geometry – Radiation on tilted surfaces –
Numerical problems.
UNIT II:
Solar Thermal Systems
Liquid flat plate collections: Performance analysis – Transmissivity – Absorptivity product collector
efficiency factor – Collector heat removal factor – Numerical problems. Introduction to solar air heaters
– Concentrating collectors and solar pond.
UNIT III:
Solar Photovoltaic Systems
Balance of systems – IV characteristics – System design: storage sizing – PV system sizing – Maximum
power point tracking techniques: Perturb and observe (P&O) technique – Hill climbing technique.
UNIT IV:
Wind Energy
Wind patterns – Types of turbines – Kinetic energy of wind – Betz coefficient – Tip–speed ratio –
Efficiency – Power output of wind turbine – Selection of generator(synchronous, induction) – Maximum
power point tracking.
UNIT V:
Hydro and Tidal power systems
Basic working principle of small and micro hydro turbines – measurement of head and flow – Energy
equation-Tidal power – Basics – Kinetic energy equation – Numerical problems – Wave power – Basics –
Kinetic energy equation.
UNIT VI:
Biomass, fuel cells and geothermal systems
Biomass Energy: Fuel classification – Pyrolysis – Direct combustion of heat – Different digesters and
sizing.
Fuel cell: Classification – Efficiency – VI characteristics.
Geothermal: Classification – Dry rock and acquifer – Energy analysis.
TEXT BOOKS:
1. Solar Energy: Principles of Thermal Collection and Storage, S. P. Sukhatme and J. K. Nayak, TMH,
New Delhi, 3rd Edition.
2. Renewable Energy Resources, John Twidell and Tony Weir, Taylor and Francis -second
edition,2013.
3. Energy Science: Principles, Technologies and Impacts, John Andrews and Nick Jelly, Oxford.
REFERENCE BOOKS:
1. Renewable Energy- Edited by Godfrey Boyle-oxford university.press,3rd
edition,2013.
2. Handbook of renewable technology Ahmed and Zobaa, Ramesh C Bansal, World scientific,
Singapore.
3. Renewable Energy Technologies /Ramesh & Kumar /Narosa.
4. Renewable energy technologies – A practical guide for beginners – Chetong Singh Solanki, PHI.
5. Non conventional energy source –B.H.khan- TMH-2nd
edition.