B.Tech (Computer Science & Technology) Syllabus
Semester VIII

COURSE CODECOURSE NAMECREDITS

JECS801
Cryptography & Network Security:
UNITI
Introduction to security attacks, services and mechanism, Classical encryption techniquessubstitution ciphers and transposition ciphers, cryptanalysis, steganography, Stream and block ciphers. Modern Block Ciphers: Block ciphers principles, Shannon's theory of confusion and diffusion,fiestal structure, Data encryption standard(DES), Strength of DES, Idea of differential cryptanalysis, block cipher modes of operations, Triple DES
UNITII
Introduction to group, field, finite field of the form GF(p), modular arithmetic, prime and relative prime numbers, Extended Euclidean Algorithm, Advanced Encryption Standard (AES) encryption and decryption Fermat's and Euler's theorem, Primality testing, Chinese Remainder theorem, Discrete Logarithmic Problem, Principals of public key crypto systems, RSA algorithm, security of RSA
UNITIII
Message Authentication Codes: Authentication requirements, authentication functions, message authentication code, hash functions, birthday attacks, security of hash functions, Secure hash algorithm (SHA) Digital Signatures: Digital Signatures, Elgamal Digital Signature Techniques, Digital signature standards (DSS), proof of digital signature algorithm,
UNITIV
Key Management and distribution: Symmetric key distribution, DiffieHellman Key Exchange, Public key distribution, X.509 Certificates, Public key Infrastructure. Authentication Applications: Kerberos Electronic mail security: pretty good privacy (PGP), S/MIME.
UNITV
IP Security: Architecture, Authentication header, Encapsulating security payloads, combining security associations, key management. Introduction to Secure Socket Layer, Secure electronic, transaction (SET) System Security: Introductory idea of Intrusion, Intrusion detection, Viruses and related threats, firewalls
Books:
 1. William Stallings, "Cryptography and Network Security: Principals and Practice", Pearson Education.
 2. Behrouz A. Frouzan: Cryptography and Network Security, Tata McGraw Hill
 3. Bruce Schiener, "Applied Cryptography". John Wiley & Sons
 4. Bernard Menezes," Network Security and Cryptography", Cengage Learning.
 5. AtulKahate, "Cryptography and Network Security", Tata McGraw Hill
04 
JECS802
Artificial Intelligence:
UNITI
Introduction To Al And Production Systems: Introduction to Al — Problem formulation, Problem Definition — Production systems, Control strategies, Search strategies. Problem characteristics, Production system characteristics — Specialized production systems— Problem solving methods — Problem graphs, Matching, Indexing and Heuristic functions — Hill Climbing, Depth first and Breath first, Constraints satisfaction — Related algorithms, Measure of performance and analysis of search algorithms.
UNITII
Representation of Knowledge: Game playing — Knowledge representation, Knowledge representation using Predicate logic, Introduction to predicate calculus, Resolution, Use of predicate calculus, Knowledge representation using other logic — Structured representation of knowledge.
UNITIII
Fundamentals of Expert Systems: Basic plan generation systems — Strips — Advanced plan generation systems — K strips — D Comp. Expert systems — Architecture of expert systems, Roles of expert systems — Knowledge Acquisition — Meta knowledge, Heuristics.
UNITIV
Knowledge Inference: Knowledge representation — Production based system, Frame based system. Inference — Backward chaining, Forward chaining, Rule value approach, Fuzzy reasoning — Certainty factors, Bayesian probability.
UNITV
Machine Learning: Strategic explanations — Why, Why not and how explanations.Learning — Machine learning, adaptive learning.  Typical expert systems — MYCIN, PIP, INTERNIST, DART, XOON, Expert systems shells
Books:
 1. Elaine Rich, "Artificial Intelligence", 2nd Edition, McGraw Hill, 2005
 2. Dan W.Patterson, " Introduction to AI and ES", Pearson Education, 2007
 3. Peter Jackson," Introduction to Expert Systems", Pearson Education.
 4. Stuart Russel, Peter Norvig "AI – A Modern Approach", Pearson Education.
04 
JECS081084
Departmental Elective III (Real Time System/ATM Networks/Bluetooth Technology/Pattern Recognition)
Real Time System:
UNITI
Introduction: Basic real time concepts  Introduction, Realtime Versus Conventional Software, Computer Hardware for Monitoring and Control, Software Engineering Issues
UNITII
Design Techniques: Real time specification and design techniques – structure of an RTOS  real time kernels – intertask communication and synchronization.
UNITIII
Memory Management: Real time memory management.System performance analysis and optimization.
UNITIV
Queuing Models and Fault Tolerant Architectures: Queuing models – Reliability, testing and fault tolerance, HW/SW faults, diagnosis, functional testing. Fault tolerant architectures: TMR systems  multiprocessing systems.
UNITV
Applications: Hardware/Software integration, real time applications case studies.
Books:
 1. Laplante Philip. A, "Realtime systems design and analysis: An engineer's handbook", PHI.
 2. C.M. Krishna, Kang G. Shin, "Realtime systems" – McGraw Hill, 1997.
 3. Alan C. Shaw , "Real – Time Systems and software", John Wiley & Sons Inc,2001
 4. Buhr R J and Bailey D L, "An Introduction to RealTime Systems", PrenticeHall 1999.
 5. Burns, A and Wellings, A, "Real Time Systems and Programming Languages: Ada 95, RealTime Java and RealTime C/POSIX", AddisonWesley. ISBN.
 6. Levi S.T. and Agarwal A.K., "Real time System Design", McGraw Hill International Edition.
 7. Rajibmall "Realtime systems, Theory & Practice", Pearson Education.
ATM Networks::
UNITI
Introduction: ATM – Historical perspective – Protocol Architecture – Logical connections – Cells – Transmission of ATM cells – SDH /SONET architecture.
UNITII
ATM Protocol: Routing,Switching,Signaling techniques ATM Service categories – QOS parameters – ATM Adaptation Layer.
UNITIII
Routing Issues: Routing for high speed networks – RSVP, Traffic and Congestion control – Traffic shaping – Peak cell rate algorithms – Rate based congestion control – Connection admission control.
UNITIV
High Speed Lans: Fast Ethernet – ATM LAN's – LAN Emulation(LANE)
UNITV
Protocols Over ATM: Multiple protocols over ATM, IP over ATM, TCP over ATM – Real time transport protocol – Wireless ATM – Current trends.
Books:
 1. William Stallings, "High Speed Networks TCP/IP and ATM Design Principles", Prentice Hall International, 1998.
 2. William Stalling, "ISDN with Broad Lane ISDN with frame relay and ATM", PHI,4th edition,1999.
 3. Rainer Handel, Manfred N. Huber, Stefan Schroder, "ATM Networks", Addison Wesley,1999.
 4. Uyless Black, "ATM Vol.1 and 2", PHI, 1999.
Bluetooth Technology:
UNITI
The Bluetooth Module: Introductionoverview  the Bluetooth moduleantennasbasebandintroduction bluetooth device address – masters, slaves, and Pico netssystem timingphysical linksBluetooth packet structurelogical channelsfrequency hopping.
UNITII
The Link Controller: The link controller link control protocollink controller operation Pico net, scatter net operationmaster/slave role switchingbase band/link controller architectural overview link managerthe host controller interface.
UNITIII
The Bluetooth Host: The blue tooth hostlogical link control and adaptation protocol –RFCOMM the service discovery protocol – the wireless access protocolOBEX and IrDAtelephony control protocol.
UNITIV
Cross Layer Functions: Cross layer functionsEncryption and securitylow power operations controlling low power modeshold modesniff modepark modequality of servicemanaging Bluetooth devices.
UNITV
Test and Qualification: Test and qualification test modequalification and type approvalimplementation – related standards and technologies.
Books:
 1. Jennifer Bray and Charles F Sturman," Bluetooth: Connect Without Cables", Pearson Education, 2002.
 2. By Jennifer Bray, Brain Senese, Gordon McNutt, Bill Munday," Bluetooth
 3. Application Developer Guide", Syngress Media, 2001.
 4. Discovering Bluetooth M. Miller (paperback 2001)
 5. C S R Prabhu, P A Reddi, "Bluetooth Technology and its applications with JAVA and J2ME", PHI,2006
Pattern Recognition:
UNITI
Introduction: Pattern and features – Training and learning in pattern recognition systems – Pattern recognition approaches – Statistical pattern recognition – Syntactic pattern recognition – Neural pattern recognition – Reasoning driven pattern recognition – Discriminant functions – Linear and Fisher's discriminant functions.
UNITII
Statistical Pattern Recognition: Gaussian model – Supervised learning – Parametric estimation – Maximum likelihood estimation – Bayesian parameter estimation – Perceptron algorithm – LMSE algorithm – Problems with Bayes approach – Pattern classification by distance functions – Maximum distance pattern classifier.
UNITIII
Cluster Analysis: Unsupervised learning – Clustering for unsupervised learning and classification – Cmeans algorithm – Hierarchical clustering procedures – Graph theoretic approach to pattern clustering – Validity of clustering solutions.
UNITIV
Syntactic Pattern Recognition: Elements of formal grammar – String generation as pattern description – Recognition of syntactic description – Parsing – Stochastic grammar and applications – Graph based structural representation.
UNITV
Features Extraction and Recent Advances: Entropy minimization – Karhunen –Loeve transformation – Neural network structures for pattern recognition – Unsupervised learning – Self organizing networks – Fuzzy pattern classifiers – Genetic algorithms – Application to pattern recognition.
Books:
 1. Robert J, Schalkoff, "Pattern Recognition: Statistical, Structural and Neural Approaches", John Wiley & Sons Inc., New York, 1992.
 2. Duda R.O. and Hart P.E., "Pattern Classification and Scene Analysis", John Wiley, New York, 2001
 3. Morton Nadler and Eric Smith P., "Pattern Recognition Engineering", John Wiley and Sons, New York, 1993.
 4. Touand , Gonzalez R. "Patten Recognition Principles" Addision Wesley, 1974.
 5. Earl Gose, Richard Johnsonbaugh, Steve Jost, "Pattern Recognition and Image Analysis", Prentice Hall of India Private Ltd., New Delhi – 110 001, 1999.
 6. Duda R.O, Hart .P.E., D.G. Stal, " Pattern Classification",John Wiley, 2001
 7. SergiousTheodoridis, KonstantinosKoutroumbus, "Pattern Recognition", Elsevier,2006
04 
JEOE081084
Open Elective (Non Conventional Energy Resources/Optimization Techniques in Engineering/Product Development/Automation and Robotics)
Non Conventional Energy Resources:
UNITI
Introduction: Various nonconventional energy resources Introduction, Availability, Classification, Relative Merits and Demerits. Solar Cells: Theory of solar cells. Solar Cell Materials, Solar Cell Array, Solar Cell Power Plant, Limitations.
UNITII
Solar Thermal Energy: Solar Radiation, Flat Plate Collectors and their Materials, Applications and Performance, Focusing of Collectors and their Materials, Applications and Performance; Solar Thermal Power Plants, Thermal Energy Storage for Solar Heating and Cooling, Limitations.
UNITIII
Geothermal Energy: Resources of Geothermal Energy, Thermodynamics of GeoThermal Energy ConversionElectrical Conversion, NonElectrical Conversion, Environmental Considerations. Magnetohydrodynamics (MHD): Principle of working of MHD Power Plant, Performance and Limitations. Fuel Cells: Principle of working of various types of fuel cells and their working, performance and limitations.
UNITIV
Thermoelectrical and thermionic Conversions: Principle of working, performance and limitations. Wind Energy: Wind power and its sources, site selection, criterion, momentum theory, classification of rotors, concentrations and augments, wind characteristics. Performance and limitations of energy conversion systems.
UNITV
Biomass: Availability of biomass and its conversion theory. Ocean Thermal Energy Conversion (OTEC): Availability, theory and working principle, performance and limitations. Wave and Tidal Wave: Principle of working, performance and limitations. Waste Recycling Plants.
 1. Raja et al, "Introduction to NonConventional Energy Resources" Scitech Publications.
 2. John Twideu and Tony Weir, "Renewal Energy Resources" BSP Publications.
 3. M.V.R. Koteswara Rao, "Energy Resources: Conventional & NonConventional "BSP Publications.
 4. D.S. Chauhan," Nonconventional Energy Resources" New Age International.
 5. C.S. Solanki, "Renewal Energy Technologies: A Practical Guide for Beginners" PHI Learning.
Optimization Techniques in Engineering:
UNITI
Unconstrained Optimization: Optimizing SingleVariable Functions, conditions for Local Minimum and Maximum, Optimizing MultiVariable Functions
UNITII
Constrained Optimization: Optimizing Multivariable Functions with Equality Constraint: Direct Search Method, Lagrange Multipliers Method, Constrained Multivariable Optimization with inequality constrained: KuhnTucker Necessary conditions, Kuhn – Tucker Sufficient Conditions.
UNITIII
Optimization: QuasiNewton Methods and line search, least squares optimization, GaussNewton, Levenberg Marquartd, Extensions of LP to Mixed Integer Linear Programming (MILP), NonLiner Programming, The Newton Algorithm, NonLinear Least Squares, Sequential Quadratics Programming (SQP), Constrained Optimization, SQP Implementation, MultiObjective Optimization, Branch and Bound Approaches, Genetic Algorithms and Genetic Programming, Singular Based Optimization, OnLine RealTime Optimization, Optimization in Econometrics Approaches – Blue.
UNITIV
Optimization and Functions of a Complex Variable and Numerical Analysis: The Finite Difference Method for Poisson's Equation in two Dimensions and for the Transient Heat Equation, Eulers Method, The Modified Euler Method and the RungaKutta Method for Ordinary Differential Equations, Gaussian Quardative Tranzoidal Rule and Simpson's 1/3 and 3/8 Rules, the Newton Raphson in one and two Dimensions, Jacobi's Iteration Method.
UNITV
Optimization in Operation Research: Dynamic Programming, Transportation – Linear Optimization Simplex and Hitchcock Algorithms, Algorithms, Minimax and Maximum Algorithm, Discrete Simulation, Integer Programming – Cutting Plane Methods, Separable Programming, Stochastic Programming, Goal Programming, Integer Linear Programming, Pure and Mixed Strategy in theory of Games, Transshipment Problems, Heuristic Methods
 1. Winston W L: Operations Research: Applications and Algorithms
 2. Rao S.S., Optimization: Theory and Applications.
 3. Walsh G R: M methods of Optimization.
 4. Williams H.P.: Model Building in Mathematics Programming.
 5. Williams H.P.: Model Solving in Mathematics Programming
 6. G.L. Nemhauser and L.A. Wolsey: Intger and Combinational Optimization.
 7. R.G. Parker and R.L. Rardin: Discrete Optimization.
Product Development:
UNITI
Concept of Product, definition and scope. Design definitions, old and new design methods, design by evolution, examples such as evolution of sewing M/C, bicycle, safety razor etc., need based developments, technology based developments physical relaibility & economic feasibility of design concepts.
UNITII
Murphology of design, divergent, transformation and convergent phases of product design, identification of need, Analysis of need. Design criteria; functional, aesthetics, ergonomics, form, shape, size, colour.
Mental blocks, Removal blocs, Ideation techniques, Creativity, Check list.UNITIII
Transformations, Brainstorming& Synetics, Morephological techniques. Utility Concept, Utility Valaue, Utility Index, Decision making under Multiple Criteria. Economic aspects, Fixed and variable costs, Breakeven analysis.
UNITIV
Reliability considerations, Bath tub curve, Reliability of systems in series and parallel, Failure rate, MTTF and MTBF, Optimum spares from Reliability considerations. Design of display and controls, Manmachine interface, Compatibility of displays and controls. Ergonomic aspects, Anthroprometric data and its importance in design. Application of Computers in Product development & design.
UNITV
Existing techniques, such as workstudy, SQC etc. for improving method & quality of product. Innovation versus Invention. Technological Forecasting. Use of Standards for Design.
 1. A.K. Chitab& R.C. Gupta "Product design & Manufacturing" – Prentice Hall
 2. R.P. Crewford, "The Technology of creation Thinking" Prentice Hall.
 3. C.D. Cain, "Product Design & Decision" Bussiness Books.
 4. C.D. Cain, "Engg. Product Design" Bussiness Books.
Automation and Robotics:
UNITI
Introduction: Definition, Classification of Robots, geometric classification and control classification. Robot Elements: Drive system, control system, sensors, end effectors, gripper actuators and gripper design.
UNITII
Robot Coordinate Systems and Manipulator Kinematics: Robot coordinate system representation, transformation, homogenous transform and its inverse, relating the robot to its world. Manipulators Kinematics, parameters of links and joints, kinematic chains, dynamics of kinematic chains, trajectory planning and control, advanced techniques of kinematics and dynamics of mechanical systems, parallel actuated and closed loop manipulators.
UNITIII
Robot Control: Fundamental principles, classification, position, path velocity and force control systems, computed torque control, adaptive control, Seroo system for robot control, and introduction to robot vision.
UNITIV
Robot Programming: Level of Robot Programming, Language Based Programming, Task Level Programming, Robot Programming Synthesis, Robot Programming for Welding, Machine Tools, Material Handling, Assembly Operations, Collision Free Motion Planning.
UNITV
Applications: Application of Robot in Welding, Machine Tools, Material Handling, Assembly Operations Parts Sorting and Parts Inspection.
 1. Coifet Chirroza, "An Introduction to Robot Technology" Kogan Page.
 2. Y. Koren "Robotics for Engineers" Mcgraw Hill.
 3. K. S. Fu, R.C. Gonzalez Y & CSG Lee, "Robotics" McGraw Hill.
 4. J.J. Craig, "Robotics" AddisonWesley.
 5. Grover, Mitchell Weiss, Nagel Octrey, "Industrial Robots" Mcgraw Hill.
 6. Asfahl, "Robots & Manufacturing Automation" Wily Eastern.
 7. Peter Auer, "Advances in Energy System and Technology". Vol. 1 & II Edited by Academic Press.
02 
JECS851
Cryptography Lab:
 1. Lab  Encryption Using Classical Techniques
 2. Lab on encryption using binary/byte addition
 3. Encryption using binary ExclusiveOR (XOR)
 4. Lab on Testing Different Modes in Symmetric Ciphers
 5. Lab on RSA Encryption and Factorization Attacks
 6. Attack on RSA encryption with short RSA modulus
 7. Lab on Short Message RSA Attacks and Padding
 8. Lab on RSA Timing Attacks
 9. Lab on hash generation and sensitivity of hash functions to plaintext modifications
 10. Lab on Hash Function
 11. Lab on Digital Signature Visualization
 12. Lab on RSA Signature
 13. Lab on Attack on Digital Signature/Hash Collision
 14. Lab on Digital Signature
02 
JECS852
Artificial Intelligence Lab:
List of Experiments:
 1. Water Jug Problem (Using DFS And BFS)
 2. Single Player Game(Using Heuristic Function)
 3. Two Player Game(Using Heuristic Function)
 4. A* Algorithm
 5. AO* Algorithm
 6. Predicate To Prepositional Logic
 7. Syntax Checking of English sentencesEnglish Grammar.
 8. Develop an Expert system for Medical diagnosis.
 9. Develop any Rule based system for an application of your choice.
 10. Develop an algorithm for morphological derivation / verb derivation and implement it.
Reference: Laboratory Manual
02 
JECS853
Project Phase II:
Each student is given a Project which will cover all the aspects ( to the extent possible) like investigation, planning, designing, detailing and estimating of a Computer Science and engineering structure in which the aspects like analysis, application of relevant codes, etc., will find a place. Alternately, a few research problems also may be identified for investigation and the use of laboratory facilities to the fullest extent may be taken as a project work. Alternately, a student is encouraged to take an industrial project with any Computer Science and engineering organization or firm. A project report is to be submitted on the topic which will be evaluated.
08 
JGP801
General Proficiency
02 
Total Credits30