• Tidak ada hasil yang ditemukan

R18 B.Tech. ITE JNTUH HYDERABAD

N/A
N/A
Protected

Academic year: 2023

Membagikan "R18 B.Tech. ITE JNTUH HYDERABAD"

Copied!
144
0
0

Teks penuh

Write down the matrix representation of a set of linear equations and analyze the solution of the system of equations. Matrices: Types of Matrices, Symmetric; Hermitian; Skew-symmetrical; Skew-Hermitian; orthogonal matrices; Unit matrices; ranking of a matrix according to Echelon form and Normal form, Inverse of Non-singular matrices according to Gauss-Jordan method; System of linear equations; solution system of Homogeneous and Non-Homogeneous equations. The required principles and concepts of electrochemistry, corrosion and to understand the problem of water and its treatments.

Electrochemistry and corrosion: Electrochemical cells – electrode potential, standard electrode potential, types of electrodes – calomel, quinhydrone and glass electrode. Causes and effects of corrosion – theories of chemical and electrochemical corrosion – mechanism of electrochemical corrosion, Types of corrosion: Galvanic, waterline and pit corrosion. Components of LT Switchgear: Switch Fuse Unit (SFU), MCB, ELCB, MCCB, types of wires and cables, earthing.

Raman effect' from the prescribed textbook 'English for Engineers' published by Cambridge University Press. Writing: Technical Reports - Introduction - Characteristics of a Report - Categories of Report Formats - Structure of Reports (Manuscript Format) - Types of Reports - Report Writing.

Computer Assisted Language Learning (CALL) Lab

Interactive Communication Skills (ICS) Lab

Write a program that prints the multiplication table for a given number and the number of rows in the table. Write a C program to find the sum of individual digits of a positive integer and test whether the given number is a palindrome. Write a C program to generate all prime numbers between 1 and n, where n is a value given by the user.

Write a program to read elements using pointer in array and display the values ​​using array. Write a C program to determine whether or not the given string is a palindrome (spelled the same in both directions with or without meaning like madam, civic, midday, abcba, etc.). Write a C program that displays the position of a character ch in the string S or – 1 if S does not contain ch.

Write a C program that sorts the given array of integers using selection sort in descending order h. Write a C program that sorts the given array of integers using ascending insertion sort i.

Identify the peripherals of a computer, components in a CPU and its functions. Draw the block diagram of the CPU along with the configuration of each peripheral and submit to your instructor

L T P C 0 0 3 1.5 Computer Hardware introduces students to a personal computer and its basic peripherals, the process of assembling a personal computer, installing system software such as MS Windows, Linux and necessary device drivers. Have students work on a working computer to take it apart and put it back into working order and install Windows and Linux on the same computer. The Internet & World Wide Web module presents various ways of connecting a computer to the Internet from home and at work, as well as efficient use of the Internet.

In addition, awareness of cyber hygiene, that is, protecting the personal computer from contamination by viruses, worms and other cyber attacks, would be introduced. The Productivity Tools module would enable the students to create professional word documents, Excel spreadsheets, power point presentations and personal websites using Microsoft's suite of office tools and LaTeX. Draw the block diagram of the CPU along with the configuration of each peripheral and send it to your instructor.

Every student should individually install MS windows on the personal computer. Lab instructor should verify the installation and follow it up with a Viva

A few topics will be given to the students for which they have to search on Google.

Cyber Hygiene: Students would be exposed to the various threats on the internet and would be asked to configure their computer to be safe on the internet. They need to first install an antivirus

Creating a Scheduler - Features to be covered: Gridlines, Format Cells, Summation, auto fill, Formatting Text

OBJECTIVES

To improve students' fluency in English, through a well-developed vocabulary, and enable them to listen to English spoken at normal conversational speed by well-educated English speakers and respond appropriately in various social- cultural and professional contexts.

SYLLABUS

MINIMUM REQUIREMENT

Introduction to Android OS: Design and Features of Android OS - Android Development Framework, SDK Features, Installing and Running Apps on Eclipse Platform, Creating AVDs, Types of Android Apps, Android Programming Best Practices, Android Tools. Persistent Storage: Files – Using application-specific folders and files, creating files, reading data from files, listing directory contents. Shared Preferences - Creating shared settings, storing and retrieving data with the Shared Preferences Database - Introduction to SQLite database, creating and opening a database, creating tables, inserting, retrieving and deleting data, registering content providers, use of content providers (insertion, deletion, retrieval and updating). Syntax Analysis: Introduction, Context-Free Grammars, Grammar Writing, Top-Down Parsing, Bottom-Up Parsing, Introduction to LR Parsing: Simple LR, More Powerful LR Parsers.

Machine Independent Optimizations: Introduction, The Main Sources of Optimization, Introduction to Data Flow Analysis, Foundations of Data Flow Analysis. Ability to understand how the choice of data structures and the algorithm design methods affect the performance of programs. Decision Tree Learning – Introduction, decision tree representation, appropriate problems for decision tree learning, the basic decision tree learning algorithm, hypothesis exploration in decision tree learning, inductive bias in decision tree learning, issues in decision tree learning.

Bayesian Learning – Introduction, Bayesian Theorem, Bayesian Theorem and Conceptual Learning, Maximum Likelihood and Least Square Error Hypotheses, Maximum Likelihood Hypotheses for Predicting Probabilities, Minimum Description Length Principle, Bayes Optimal Classifier, Gibs Algorithm, Naive Bayes Classifier, a example: learning to classify text, Bayesian belief networks, the EM algorithm. Genetic Algorithms – Motivation, Genetic algorithms, an illustrative example, hypothesis space search, genetic programming, models of evolution and learning, parallelization of genetic algorithms. Reinforcement learning – Introduction, the learning task, Q–learning, non-deterministic, rewards and actions, temporal differences, generalization from examples, relation to dynamic programming.

Combining inductive and analytical learning – Motivation, inductive-analytic approaches to learning, using prior knowledge to initialize hypothesis. To understand the data/file structures that are necessary to design and implement information retrieval (IR) systems. Introduction to Information Retrieval Systems: Definition of Information Retrieval System, Objectives of Information Retrieval Systems, Functional Overview, Relation to Database Management Systems, Digital Libraries and Data Warehouses.

Data Structure: Introduction to Data Structure, Stem Algorithms, Inverted File Structure, N-Gram Data Structures, PAT Data Structure, Signature File Structure, Hypertext and XML Data Structures, Hidden Markov Models. Text Search Algorithms: Introduction to text search techniques, software text search algorithms, hardware text search systems. Multimedia information retrieval: Speech language audio retrieval, non-speech audio retrieval, graph retrieval, image retrieval, video retrieval.

Create a screen that has input boxes for User Name, Password, Address, Gender (radio buttons for male and female), Age (numeric), Date of Birth (Date Picket), State (Spinner) and a Submit button

Develop an application that shows names as a list and on selecting a name it should show the details of the candidate on the next screen with a “Back” button. If the screen is rotated to landscape mode

Develop an application that inserts some notifications into Notification area and whenever a notification is inserted, it should show a toast with details of the notification

Create an application that uses a text file to store user names and passwords (tab separated fields and one record per line). When the user submits a login name and password through a screen, the

Create a user registration application that stores the user details in a database table

Create a database and a user table where the details of login names and passwords are stored

Ability to understand the types of data to be mined and present a general classification of tasks and primitives to integrate a data mining system. Representation: data structures for pattern representation, cluster representation, proximity measurements, pattern size, dataset abstractions, feature extraction, feature selection, classification evaluation, clustering evaluation. An application handwritten digit recognition: description of the digit data, data preprocessing, classification algorithms, selection of representative patterns, results.

Get to know some of the problems and solutions of NLP and their relationship to linguistics and statistics. Finding the structure of documents: introduction, methods, complexity of the approaches, performance of the approaches. Demonstrate knowledge of the basic concepts of two-dimensional signal acquisition, sampling and quantization.

Ability to understand the latest research in the emerging topic of Ad Hoc and Wireless Sensor Networks. Chronos device is a programmable Texas Instruments clock that can be used for multiple purposes such as PPT control, mouse operations, etc. Exploit the features of the device by connecting with devices. Despite the fact that the data is German, you should probably use it for this assignment.

L T P C 3 0 0 3 Course objectives: The aim of the course is to give the students the conceptual framework and the theories that underlie Organizational behaviour. Cloud Computing Architecture and Management: Cloud architecture, Layer, Anatomy of the Cloud, Network connection in Cloud Computing, Applications, on the Cloud, Administration of the Cloud, Administration of the Cloud Infrastructure Administration of the Cloud application, Migration of application to the Cloud, Phases of the Cloud Migration Approaches to cloud migration. The goal of the course is to introduce the methods and framework of ethical hacking to increase security.

Gain knowledge of the use and availability of tools to support an ethical hack. The purpose of this course is to teach students the principles and techniques of Big Data Analytics. Ability to explain the foundations, definitions and challenges of Big Data and various analytical tools.

A brief explanation of the objective is to provide digital evidence obtained from digital media. Examining the Role of Email in Research, Exploring the Roles of the Client and the Server in Email, Investigating Email Crimes and Violations, Understanding Email Servers, the use of specialized forensic email tools.

Referensi

Dokumen terkait

This study aims to determine how the organizational culture conditions of the Kodiklatal Health Unit by using indicators according to the Denison organizational culture model,