Problem 15: Creating Power Point: Student should work on basic power point utilities and tools in Latex and Ms Office/equivalent (FOSS) which help them create basic power point
2. Easy Leave
This project is aimed at developing a web based Leave Management Tool, which is of importance to either an organization or a college.
The Easy Leave is an Intranet based application that can be accessed throughout the organization or a specified group/Dept. This system can be used to automate the workflow of leave applications and their approvals. The periodic crediting of leave is also automated.
There are features like notifications, cancellation of leave, automatic approval of leave, report generators etc in this Tool.
Functional components of the project:
There are registered people in the system. Some are approvers. An approver can also be a requestor. In an organization, the hierarchy could be Engineers/Managers/Business Managers/Managing Director etc. In a college, it could be Lecturer/Professor/Head of the Department/Dean/Principal etc.
Following is a list of functionalities of the system: A person should be able to
login to the system through the first page of the application
change the password after logging into the system
see his/her eligibility details (like how many days of leave he/she is eligible for etc)
query the leave balance
see his/her leave history since the time he/she joined the company/college
apply for leave, specifying the from and to dates, reason for taking leave, address for communication while on leave and his/her superior's email id
see his/her current leave applications and the leave applications that are submitted to him/her for approval or cancellation
approve/reject the leave applications that are submitted to him/her
withdraw his/her leave application (which has not been approved yet)
120
Cancel his/her leave (which has been already approved). This will need to be approved by his/her Superior
get help about the leave system on how to use the different features of the system
As soon as a leave application /cancellation request /withdrawal /approval /rejection /password-change is made by the person, an automatic email should be sent to the person and his superior giving details about the action
The number of days of leave (as per the assumed leave policy) should be automatically credited to everybody and a notification regarding the same be sent to them automatically
An automatic leave-approval facility for leave applications which are older than 2 weeks should be there. Notification about the automatic leave approval should be sent to the person as well as his superior
3. E-Bidding
Auctions are among the latest economic institutions in place. They have been used since antiquity to sell a wide variety of goods, and their basic form has remained unchanged. In this dissertation, we explore the efficiency of common auctions when values are interdependent- the value to a particular bidder may depend on information available only to others-and asymmetric. In this setting, it is well known that sealed-bid auctions do not achieve efficient allocations in general since they do not allow the information held by different bidders to be shared.
Typically, in an auction, say of the kind used to sell art, the auctioneer sets a relatively low initial price. This price is then increased until only one bidder is willing to buy the object, and the exact manner in which this is done varies. In my model a bidder who drops out at some price can "reenter" at a higher price.
With the invention of E-commerce technologies over the Internet the opportunity to bid from the comfort of one’s own home has seen a change like never seen before. Within the span of a few short years, what may have began as an experimental idea has grown to an immensely popular hobby, and in some cases, a means of livelihood, the Auction Patrol gathers tremendous response every day, all day. With the point and click of the mouse, one may bid on an item they may need or just want, and in moments they find that either they are the top bidder or someone else wants it more, and you're outbid! The excitement of an auction all from the comfort of home is a completely different experience.
Society cannot seem to escape the criminal element in the physical world, and so it is the same with Auction Patrols. This is one area where in a question can be raised as to how safe Auction Patrols.
Proposed system
To generate the quick reports
To make accuracy and efficient calculations To provide proper information briefly
121 To provide data security
To provide huge maintenance of records
Flexibility of transactions can be completed in time 4. Electronic Cash counter
This project is mainly developed for the Account Division of a Banking sector to provide better interface of the entire banking transactions. This system is aimed to give a better out look to the user interfaces and to implement all the banking transactions like:
Supply of Account Information
New Account Creations
Deposits
Withdraws
Cheque book issues
Stop payments
Transfer of accounts
Report Generations.
Proposed System:
The development of the new system contains the following activities, which try to automate the entire process keeping in view of the database integration approach.
User friendliness is provided in the application with various controls.
The system makes the overall project management much easier and flexible.
Readily upload the latest updates, allows user to download the alerts by clicking the URL.
There is no risk of data mismanagement at any level while the project development is under process.
It provides high level of security with different level of authentication
122
PROFESSIONAL ETHICS
B.Tech. III Year I Sem. L T P C Course Code: MC500HS 3 0 0 0
Course Objective: To enable the students to imbibe and internalize the Values and Ethical Behaviour in the personal and Professional lives.
Course Outcome: The students will understand the importance of Values and Ethics in their personal lives and professional careers. The students will learn the rights and responsibilities as an employee, team member and a global citizen.
UNIT - I
Introduction to Professional Ethics: Basic Concepts, Governing Ethics, Personal &
Professional Ethics, Ethical Dilemmas, Life Skills, Emotional Intelligence, Thoughts of Ethics, Value Education, Dimensions of Ethics, Profession and professionalism, Professional Associations, Professional Risks, Professional Accountabilities, Professional Success, Ethics and Profession.
UNIT - II
Basic Theories: Basic Ethical Principles, Moral Developments, Deontology, Utilitarianism, Virtue Theory, Rights Theory, Casuist Theory, Moral Absolution, Moral Rationalism, Moral Pluralism, Ethical Egoism, Feminist Consequentialism, Moral Issues, Moral Dilemmas, Moral Autonomy.
UNIT - III
Professional Practices in Engineering: Professions and Norms of Professional Conduct, Norms of Professional Conduct vs. Profession; Responsibilities, Obligations and Moral Values in Professional Ethics, Professional codes of ethics, the limits of predictability and responsibilities of the engineering profession.
Central Responsibilities of Engineers - The Centrality of Responsibilities of Professional Ethics; lessons from 1979 American Airlines DC-10 Crash and Kansas City Hyatt Regency Walk away Collapse.
UNIT - IV
Work Place Rights & Responsibilities, Ethics in changing domains of Research, Engineers and Managers; Organizational Complaint Procedure, difference of Professional Judgment within the Nuclear Regulatory Commission (NRC), the Hanford Nuclear Reservation.
Ethics in changing domains of research - The US government wide definition of research misconduct, research misconduct distinguished from mistakes and errors, recent history of attention to research misconduct, the emerging emphasis on understanding and fostering responsible conduct, responsible authorship, reviewing & editing.
123 UNIT - V
Global issues in Professional Ethics: Introduction – Current Scenario, Technology Globalization of MNCs, International Trade, World Summits, Issues, Business Ethics and Corporate Governance, Sustainable Development Ecosystem, Energy Concerns, Ozone Deflection, Pollution, Ethics in Manufacturing and Marketing, Media Ethics; War Ethics; Bio Ethics, Intellectual Property Rights.
TEXT BOOKS:
1. Professional Ethics: R. Subramanian, Oxford University Press, 2015.
2. Ethics in Engineering Practice & Research, Caroline Whitbeck, 2e, Cambridge University Press 2015.
REFERENCES:
1. Engineering Ethics, Concepts Cases: Charles E Harris Jr., Michael S Pritchard, Michael J Rabins, 4e , Cengage learning, 2015.
2. Business Ethics concepts & Cases: Manuel G Velasquez, 6e, PHI, 2008.
124
COMPILER DESIGN
B.Tech. III Year II Sem. L T P C Course Code: CS601PC 4 0 0 4
Course Objectives:
To understand the various phases in the design of a compiler.
To understand the design of top-down and bottom-up parsers.
To understand syntax directed translation schemes.
To introduce lex and yacc tools.
To learn to develop algorithms to generate code for a target machine.
Course Outcomes:
Ability to design, develop, and implement a compiler for any language.
Able to use lex and yacc tools for developing a scanner and a parser.
Able to design and implement LL and LR parsers.
Able to design algorithms to perform code optimization in order to improve the performance of a program in terms of space and time complexity.
Ability to design algorithms to generate machine code UNIT - I
Introduction: Language Processors, the structure of a compiler, the science of building a compiler, programming language basics.
Lexical Analysis: The Role of the Lexical Analyzer, Input Buffering, Recognition of Tokens, The Lexical-Analyzer Generator Lex, Finite Automata, From Regular Expressions to Automata, Design of a Lexical-Analyzer Generator, Optimization of DFA-Based Pattern Matchers.
UNIT - II
Syntax Analysis: Introduction, Context-Free Grammars, Writing a Grammar, Top-Down Parsing, Bottom-Up Parsing, Introduction to LR Parsing: Simple LR, More Powerful LR Parsers, Using Ambiguous Grammars, Parser Generators.
UNIT - III
Syntax-Directed Translation: Syntax-Directed Definitions, Evaluation Orders for SDD's, Applications of Syntax-Directed Translation, Syntax-Directed Translation Schemes, and Implementing L-Attributed SDD's.
Intermediate-Code Generation: Variants of Syntax Trees, Three-Address Code, Types and Declarations, Type Checking, Control Flow, Back patching, Switch-Statements, Intermediate Code for Procedures.
125 UNIT - IV
Run-Time Environments: Storage organization, Stack Allocation of Space, Access to Nonlocal Data on the Stack, Heap Management, Introduction to Garbage Collection, Introduction to Trace-Based Collection.
Code Generation: Issues in the Design of a Code Generator, The Target Language, Addresses in the Target Code, Basic Blocks and Flow Graphs, Optimization of Basic Blocks, A Simple Code Generator, Peephole Optimization, Register Allocation and Assignment, Dynamic Programming Code-Generation.
UNIT - V
Machine-Independent Optimizations: The Principal Sources of Optimization, Introduction to Data-Flow Analysis, Foundations of Data-Flow Analysis, Constant Propagation, Partial- Redundancy Elimination, Loops in Flow Graphs.
TEXT BOOKS
1. Compilers: Principles, Techniques and Tools, Second Edition, Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffry D. Ullman, Pearson.
REFERENCE BOOKS
1. Compiler Construction-Principles and Practice, Kenneth C Louden, Cengage Learning.
2. Modern compiler implementation in C, Andrew W Appel, Revised edition, Cambridge University Press.
3. The Theory and Practice of Compiler writing, J. P. Tremblay and P. G. Sorenson, TMH
4. Writing compilers and interpreters, R. Mak, 3rd edition, Wiley student edition.
5. lex & yacc – John R. Levine, Tony Mason, Doug Brown, O’reilly
126
WEB TECHNOLOGIES
B.Tech. III Year II Sem. L T P C Course Code: CS602PC 4 0 0 4
Course Objectives:
To introduce PHP language for server side scripting
To introduce XML and processing of XML Data with Java
To introduce Server side programming with Java Servlets and JSP
To introduce Client side scripting with Javascript and AJAX.
Course Outcomes:
gain knowledge of client side scripting, validation of forms and AJAX programming
have understanding of server side scripting with PHP language
have understanding of what is XML and how to parse and use XML Data with Java
To introduce Server side programming with Java Servlets and JSP UNIT - I
Introduction to PHP: Declaring variables, data types, arrays, strings, operators, expressions, control structures, functions, Reading data from web form controls like text boxes, radio buttons, lists etc., Handling File Uploads, Connecting to database (MySQL as reference), executing simple queries, handling results, Handling sessions and cookies
File Handling in PHP: File operations like opening, closing, reading, writing, appending, deleting etc. on text and binary files, listing directories
UNIT - II
XML: Introduction to XML, Defining XML tags, their attributes and values, Document Type Definition, XML Schemas, Document Object Model, XHTML
Parsing XML Data - DOM and SAX Parsers in java.
UNIT - III
Introduction to Servlets: Common Gateway Interface (CGI), Lifecycle of a Servlet, deploying a servlet, The Servlet API, Reading Servlet parameters, Reading Initialization parameters, Handling Http Request & Responses, Using Cookies and Sessions, connecting to a database using JDBC.
UNIT - IV
Introduction to JSP: The Anatomy of a JSP Page, JSP Processing, Declarations, Directives, Expressions, Code Snippets, implicit objects, Using Beans in JSP Pages, Using Cookies and session for session tracking, connecting to database in JSP.
127 UNIT- V
Client side Scripting: Introduction to Javascript: Javascript language - declaring variables, scope of variables, functions, event handlers (onclick, onsubmit etc.), Document Object Model, Form validation. Simple AJAX application.
TEXT BOOKS:
1. Web Technologies, Uttam K Roy, Oxford University Press
2. The Complete Reference PHP – Steven Holzner, Tata McGraw-Hill REFERENCE BOOKS:
1. Web Programming, building internet applications, Chris Bates 2nd edition, Wiley Dreamtech
2. Java Server Pages –Hans Bergsten, SPD O’Reilly 3. Java Script, D. Flanagan, O’Reilly,SPD.
4. Beginning Web Programming-Jon Duckett WROX.
5. Programming World Wide Web, R. W. Sebesta, Fourth Edition, Pearson.
6. Internet and World Wide Web – How to program, Dietel and Nieto, Pearson.
128
CRYPTOGRAPHY AND NETWORK SECURITY
B.Tech. III Year II Sem. L T P C Course Code: CS603PC 4 0 0 4
Course Objectives:
Explain the objectives of information security
Explain the importance and application of each of confidentiality, integrity, authentication and availability
Understand various cryptographic algorithms.
Understand the basic categories of threats to computers and networks
Describe public-key cryptosystem.
Describe the enhancements made to IPv4 by IPSec
Understand Intrusions and intrusion detection
Discuss the fundamental ideas of public-key cryptography.
Generate and distribute a PGP key pair and use the PGP package to send an encrypted e-mail message.
Discuss Web security and Firewalls Course Outcomes:
Student will be able to understand basic cryptographic algorithms, message and web authentication and security issues.
Ability to identify information system requirements for both of them such as client and server.
Ability to understand the current legal issues towards information security.
UNIT – I
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security
Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks.
UNIT – II
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA, Block cipher operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Elgamal Cryptography, Diffie-Hellman Key Exchange, Knapsack Algorithm.
129 UNIT – III
Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm (SHA- 512), Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures, Elgamal Digital Signature Scheme.
Key Management and Distribution: Symmetric Key Distribution Using Symmetric &
Asymmetric Encryption, Distribution of Public Keys, Kerberos, X.509 Authentication Service, Public – Key Infrastructure
UNIT – IV
Transport-level Security: Web security considerations, Secure Socket Layer and Transport Layer Security, HTTPS, Secure Shell (SSH)
Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN, IEEE 802.11i Wireless LAN Security
UNIT – V
E-Mail Security: Pretty Good Privacy, S/MIME IP Security: IP Security overview, IP Security architecture, Authentication Header, Encapsulating security payload, Combining security associations, Internet Key Exchange
Case Studies on Cryptography and security: Secure Multiparty Calculation, Virtual Elections, Single sign On, Secure Inter-branch Payment Transactions, Cross site Scripting Vulnerability.
TEXT BOOKS:
1. Cryptography and Network Security - Principles and Practice: William Stallings, Pearson Education, 6th Edition
2. Cryptography and Network Security: Atul Kahate, Mc Graw Hill, 3rd Edition REFERENCE BOOKS:
1. Cryptography and Network Security: C K Shyamala, N Harini, Dr T R Padmanabhan, Wiley India, 1st Edition.
2. Cryptography and Network Security : Forouzan Mukhopadhyay, Mc Graw Hill, 3rd Edition
3. Information Security, Principles, and Practice: Mark Stamp, Wiley India.
4. Principles of Computer Security: WM. Arthur Conklin, Greg White, TMH 5. Introduction to Network Security: Neal Krawetz, CENGAGE Learning 6. Network Security and Cryptography: Bernard Menezes, CENGAGE Learning
130
MOBILE COMPUTING (PROFESSIONAL ELECTIVE - I)
B.Tech. III Year II Sem. L T P C Course Code: CS611PE 3 0 0 3
Course Objectives:
To make the student understand the concept of mobile computing paradigm, its novel applications and limitations.
To understand the typical mobile networking infrastructure through a popular GSM protocol
To understand the issues and solutions of various layers of mobile networks, namely MAC layer, Network Layer & Transport Layer
To understand the database issues in mobile environments & data delivery models.
To understand the ad hoc networks and related concepts.
To understand the platforms and protocols used in mobile environment.
Course Outcomes:
Able to think and develop new mobile application.
Able to take any new technical issue related to this new paradigm and come up with a solution(s).
Able to develop new ad hoc network applications and/or algorithms/protocols.
Able to understand & develop any existing or new protocol related to mobile environment
UNIT - I
Introduction: Mobile Communications, Mobile Computing – Paradigm, Promises/Novel Applications and Impediments and Architecture; Mobile and Handheld Devices, Limitations of Mobile and Handheld Devices.
GSM – Services, System Architecture, Radio Interfaces, Protocols, Localization, Calling, Handover, Security, New Data Services, GPRS, CSHSD, DECT.
UNIT – II
(Wireless) Medium Access Control (MAC): Motivation for a specialized MAC (Hidden and exposed terminals, Near and far terminals), SDMA, FDMA, TDMA, CDMA, Wireless LAN/(IEEE 802.11)
Mobile Network Layer: IP and Mobile IP Network Layers, Packet Delivery and Handover Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization, DHCP.
UNIT – III
Mobile Transport Layer: Conventional TCP/IP Protocols, Indirect TCP, Snooping TCP, Mobile TCP, Other Transport Layer Protocols for Mobile Networks.
131
Database Issues: Database Hoarding & Caching Techniques, Client-Server Computing &
Adaptation, Transactional Models, Query processing, Data Recovery Process & QoS Issues.
UNIT - IV
Data Dissemination and Synchronization: Communications Asymmetry, Classification of Data Delivery Mechanisms, Data Dissemination, Broadcast Models, Selective Tuning and Indexing Methods, Data Synchronization – Introduction, Software, and Protocols.
UNIT - V
Mobile Adhoc Networks (MANETs): Introduction, Applications & Challenges of a MANET, Routing, Classification of Routing Algorithms, Algorithms such as DSR, AODV, DSDV, etc. , Mobile Agents, Service Discovery.
Protocols and Platforms for Mobile Computing: WAP, Bluetooth, XML, J2ME, Java Card, Palm OS, Windows CE, Symbian OS, Linux for Mobile Devices, Android.
TEXT BOOKS:
1. Jochen Schiller, “Mobile Communications”, Addison-Wesley, Second Edition, 2009.
2. Raj Kamal, “Mobile Computing”, Oxford University Press, 2007, ISBN: 0195686772.
REFERENCE BOOKS:
1. Jochen Schiller, “Mobile Communications”, Addison-Wesley, Second Edition, 2004.
2. Stojmenovic and Cacute, “Handbook of Wireless Networks and Mobile Computing”, Wiley, 2002, ISBN 0471419028.
3. Reza Behravanfar, “Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML”, ISBN: 0521817331, Cambridge University Press, Oct 2004.
132
OBJECT ORIENTED ANALYSIS AND DESIGN (PROFESSIONAL ELECTIVE – I)
B.Tech. III Year II Sem. L T P C Course Code: IT612PE 3 0 0 3
Course Objectives:
Concisely define the following key terms: class, object, state, behavior, object class, class diagram, object diagram, operation, encapsulation, constructor operation, query operation, update operation, scope operation, association, association role, multiplicity, association class, abstract class, concrete class, class-scope attribute, abstract operation, method, polymorphism, overriding, multiple classification, aggregation, and composition.
Describe the activities in the different phases of the object-oriented development life cycle.
State the advantages of object-oriented modeling vis-à-vis structured approaches.
Compare and contrast the object-oriented model with the E-R and EER models.
Model a real-world application by using a UML class diagram.
Provide a snapshot of the detailed state of a system at a point in time using a UML (Unified Modeling Language) object diagram.
Recognize when to use generalization, aggregation, and composition relationships.
Specify different types of business rules in a class diagram.
Course Outcomes: Graduate can able to take up the case studies and model it in different views with respect user requirement such as use case, logical, component and deployment and etc, and preparation of document of the project for the unified Library application.
UNIT - I
Introduction to UML: Importance of modeling, principles of modeling, object oriented modeling, conceptual model of the UML, Architecture, Software Development Life Cycle.
UNIT - II
Basic Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams.
Advanced Structural Modeling: Advanced classes, advanced relationships, Interfaces, Types and Roles, Packages.
Class & Object Diagrams: Terms, concepts, modeling techniques for Class & Object Diagrams.
UNIT - III
Basic Behavioral Modeling-I: Interactions, Interaction diagrams.
Basic Behavioral Modeling-II: Use cases, Use case Diagrams, Activity Diagrams.