Department of Computer Science SEMESTER-III CC-5 (Theory): Data Structures

Similar documents
COURSE: DATA STRUCTURES USING C & C++ CODE: 05BMCAR17161 CREDITS: 05

Thomas H. Cormen Charles E. Leiserson Ronald L. Rivest. Introduction to Algorithms

Course Name: B.Tech. 3 th Sem. No of hours allotted to complete the syllabi: 44 Hours No of hours allotted per week: 3 Hours. Planned.

Syllabus for Computer Science General Part I

Table of Contents. Chapter 1: Introduction to Data Structures... 1

Analysis of Algorithms

Introduction to Algorithms Third Edition

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Paper - I : DATA STRUCTURES

Preface... (vii) CHAPTER 1 INTRODUCTION TO COMPUTERS

4.1.2 Merge Sort Sorting Lower Bound Counting Sort Sorting in Practice Solving Problems by Sorting...

1) What is information system? Describe the basic concepts of information systems.

DYNAMIC MEMORY ALLOCATION AND DEALLOCATION

The Bhopal School of Social Sciences, Bhopal

M.Sc. (Computer Science) I Year Assignments for May Paper I DATA STRUCTURES Assignment I

R10 SET - 1. Code No: R II B. Tech I Semester, Supplementary Examinations, May

SAURASHTRA UNIVERSITY

STRUCTURE AND SYLLABUS APPROVED IN THE BOARD OF STUDIES MEETING ON 2001 TO BE EFFECTIVE FROM THE ACADEMIC YEAR

M.Sc. (Previous) DEGREE EXAMINATION, MAY First Year Information Technology. Time : 03 Hours Maximum Marks : 75

Prof. G. Ram Reddy Centre for Distance Education Osmania University MCA II Year 2014 ASSIGNMENTS

Virtual University of Pakistan

R13. II B. Tech I Semester Supplementary Examinations, May/June DATA STRUCTURES (Com. to ECE, CSE, EIE, IT, ECC)

VALLIAMMAI ENGINEERING COLLEGE

OBJECT ORIENTED DATA STRUCTURE & ALGORITHMS

End-Term Examination Second Semester [MCA] MAY-JUNE 2006

Question Paper Code : 97044

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING Question Bank Subject Name: CS6402- Design & Analysis of Algorithm Year/Sem : II/IV UNIT-I INTRODUCTION

Punjab Technical University Bachelor in Mobile Computing & Internet Batch 2014 onwards THIRD SEMESTER

Data Structures and Algorithm Analysis in C++

VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur

Department of Computer Science & Engineering School of Engineering & Technology HNB Garhwal University Srinagar Garhwal

ADMINISTRATIVE MANAGEMENT COLLEGE

Preface... 1 The Boost C++ Libraries Overview... 5 Math Toolkit: Special Functions Math Toolkit: Orthogonal Functions... 29

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE.

Bachelor Level/ First Year/ Second Semester/ Science Full Marks: 60 Computer Science and Information Technology (CSc. 154) Pass Marks: 24

Introduction p. 1 Pseudocode p. 2 Algorithm Header p. 2 Purpose, Conditions, and Return p. 3 Statement Numbers p. 4 Variables p. 4 Algorithm Analysis

Review of course COMP-251B winter 2010

L1/L2 NETWORK PROTOCOL TESTING

Syllabus for Bachelor of Technology. Computer Engineering. Subject Code: 01CE0301. Subject Name: Data Structure. B.Tech. Year - II

UCS-406 (Data Structure) Lab Assignment-1 (2 weeks)

DATA STRUCTURES THROUGH C++

2) Explain in detail about different AVL rotation applied on unbalanced trees.

Discuss the following operations on One-Dimensional array with algorithms.

PROGRAMMING IN C++ (Regulation 2008) Answer ALL questions PART A (10 2 = 20 Marks) PART B (5 16 = 80 Marks) function? (8)

TEACHING AND EXAMINATION SCHEME FOR MASTER OF COMPUTER APPLICATIONS

M.Sc. (CS) Second Semester Examination (Year 2016) Data Structures & Algorithms Subject Code: MSC-201 Paper Code: TMT-141

Algorithms: Design & Practice


Prof. G. Ram Reddy Centre for Distance Education Osmania University MCA II Year 2015 ASSIGNMENTS

SRM UNIVERSITY FACULTY OF ENGINEERING AND TECHNOLOGY SCHOOL OF COMPUTING DEPARTMENT OF CSE COURSE PLAN. Sec. Name Office Office hour Mail id

DEPARTMENT OF COMPUTER APPLICATIONS B.C.A. - FIRST YEAR ( REGULATION) SECOND SEMESTER LESSON PLAN SRM INSTITUTE OF SCIENCE AND TECHNOLOGY

n 2 ( ) ( ) + n is in Θ n logn

( ) 1 B. 1. Suppose f x

SECOND SEMESTER JAVA PROGRAMMING

Anany Levitin 3RD EDITION. Arup Kumar Bhattacharjee. mmmmm Analysis of Algorithms. Soumen Mukherjee. Introduction to TllG DCSISFI &

CS201 Design and Analysis of Algorithms Max.Marks:75

University of Southern California EE450: Introduction to Computer Networks

( ). Which of ( ) ( ) " #& ( ) " # g( n) ( ) " # f ( n) Test 1

CS 445: Data Structures Final Examination: Study Guide

Madhya Pradesh Bhoj (Open) University, Bhopal

INFORMATION TECHNOLOGY

M.Sc. (Previous) DEGREE EXAMINATION, MAY (Examination at the end of First Year) Computer Science. Time : 03 Hours Maximum Marks : 75

About this exam review

9. The expected time for insertion sort for n keys is in which set? (All n! input permutations are equally likely.)

«Computer Science» Requirements for applicants by Innopolis University

Multiple Choice. Write your answer to the LEFT of each problem. 3 points each

Test points UTA Student ID #

AP Computer Science 4325

9. Which situation is true regarding a cascading cut that produces c trees for a Fibonacci heap?

) $ f ( n) " %( g( n)

QUESTION BANK UNIT-I

CIS 1.5 Course Objectives. a. Understand the concept of a program (i.e., a computer following a series of instructions)

Department of Computer Applications. MCA 312: Design and Analysis of Algorithms. [Part I : Medium Answer Type Questions] UNIT I

( ) n 3. n 2 ( ) D. Ο

A6-R3: DATA STRUCTURE THROUGH C LANGUAGE

( ) ( ) C. " 1 n. ( ) $ f n. ( ) B. " log( n! ) ( ) and that you already know ( ) ( ) " % g( n) ( ) " #&

END-TERM EXAMINATION

CERTIFICATE IN WEB PROGRAMMING

Name of the Assistant/ Associate Professor:Annu Saini Class and Section:BCA 1 st sem Subject:Computer and Programming Fundamentals July 2018

Design and implement a program to solve a real-world problem using the language idioms, data structures,, and standard library.

ASSIGNMENTS. Progra m Outcom e. Chapter Q. No. Outcom e (CO) I 1 If f(n) = Θ(g(n)) and g(n)= Θ(h(n)), then proof that h(n) = Θ(f(n))

LESSON PLAN B.C.A. - FIRST YEAR ( REGULATION) SECOND SEMESTER

CHEME OF EXAMINATION FOR B.Sc. (COMPUTER SCIENCE) SEMESTER SYSTEM (Regular Course) w.e.f Scheme for B.Sc.-III.

Programming for the Web with PHP

R10 SET - 1. Code No: R II B. Tech I Semester, Supplementary Examinations, May

1. a) Discuss primitive recursive functions with an example? 15M Or b) Statements and applications of Euler s and Fermat s Theorems?

Big Java Late Objects

Adikavi Nannaya University, Rajahmundry MCA III Semester 3.1 Computer Networks (Model Question Paper) Time : 3 Hours Max.

Computer Networks. Andrew S. Tanenbaum

logn D. Θ C. Θ n 2 ( ) ( ) f n B. nlogn Ο n2 n 2 D. Ο & % ( C. Θ # ( D. Θ n ( ) Ω f ( n)

Department Curriculum and Assessment Outline

Algorithms and Data Structures

Syllabus Under Autonomy Mathematics

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year INFORMATION TECHNOLOGY.

SUBJECT COMPUTER SCIENCE PAGE 1

1. Attempt any three of the following: 15

Section I. 1 Review of user defined function,recursion, pointer, structure 05 2 Introduction to Data Structures and stack

Introduction... xiii Chapter 1: Introduction to Computer Networks and Internet Computer Networks Uses of Computer Networks...

1 P a g e A r y a n C o l l e g e \ B S c _ I T \ C \

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING B.E SECOND SEMESTER CS 6202 PROGRAMMING AND DATA STRUCTURES I TWO MARKS UNIT I- 2 MARKS

Chapter 1 Introduction

Transcription:

Department of Computer Science SEMESTER-III CC-5 (Theory): Data Structures Theory: 60 Lectures Credit: 4 1. 2. 3. 4. 5. 6. 7. 8. Arrays (5 L) Single and Multi-dimensional Arrays, Sparse Matrices (Array and Linked Representation) Stacks (5 L) Implementing single / multiple stack/s in an Array; Prefix, Infix and Postfix expressions, Utility and conversion of these expressions from one to another; Applications of stack; Limitations of Array representation of stack Linked Lists (10 L) Singly, Doubly and Circular Lists (Array and Linked representation); Normal and Circular representation of Stack in Lists; Self Organizing Lists; Skip Lists Queues (5 L) Array and Linked representation of Queue, De-queue, Priority Queues, Queue using Stack Recursion (5 L) Developing Recursive Definition of Simple Problems and their implementation; Advantages and Limitations of Recursion; Understanding what goes behind Recursion (Internal Stack Implementation) Trees (20 L) Introduction to Tree as a data structure; Binary Trees (Insertion, Deletion, Recursive and Iterative Traversals on Binary Search Trees); Threaded Binary Trees (Insertion, Deletion, Traversals); Searching and Sorting (5 L) Linear Search, Binary Search, Comparison of Linear and Binary Search, Selection Sort, Bubble Sort, Insertion Sort, Shell Sort, Comparison of Sorting Techniques HASHING: Introduction to Hashing, Deleting from Hash Table, Efficiency of Rehash Methods, Hash Table Reordering, Resolving collusion by Open Addressing, Coalesced Hashing, Separate Chaining, Dynamic and Extendible Hashing, Choosing a Hash Function, Perfect Hashing Function (5 L)

Theory: 60 Lectures CC-6: Operating Systems Credit:4 1. Introduction 10L Basic OS functions, resource abstraction, types of operating systems multiprogramming systems, batch systems, time sharing systems; operating systems for personal computers & workstations, process control & real time systems. 2. Operating System Organization 6L Processor and user modes, kernels, system calls and system programs. 3. Process Management 20L System view of the process and resources, process abstraction, process hierarchy, threads, threading issues, thread libraries; Process Scheduling, non-pre-emptive and pre-emptive scheduling algorithms; concurrent and processes, critical section, semaphores, methods for inter-process communication; deadlocks. 4. Memory Management 10L (10L) Physical and virtual address space; memory allocation strategies fixed and variable partitions, paging, segmentation, virtual memory 5. File and I/O Management 10L Directory structure, file operations, file allocation methods, device management. 6. Protection and Security 4L Policy mechanism, Authentication, Internal access Authorization.

CC-7: Computer Networks Theory: 60 Lectures Credit: 4 1. Introduction to Computer Networks 8L Network definition; network topologies; network classifications; network protocol; layered network architecture; overview of OSI reference model; overview of TCP/IP protocol suite. 2. Data Communication Fundamentals and Techniques 10L Analog and digital signal; data-rate limits; digital to digital line encoding schemes; pulse code modulation; parallel and serial transmission; digital to analog modulation-; multiplexing techniques- FDM, TDM; transmission media (twistedpair, coaxial-cable, fibre-optic cable), satellite communications. 3. Network Switching Techniques and Access mechanisms 10L Circuit switching; packet switching- connectionless datagram switching, connectionoriented virtual circuit switching; dial-up modems; digital subscriber line; cable TV for data transfer. 4. Data Link Layer Functions and Protocol 10L Error detection and error correction techniques (CRC, Hamming-codes); data-link control- framing and flow control; error recovery protocols- stop and wait ARQ, goback-n ARQ; Point to Point Protocol on Internet. 5. Multiple Access Protocol and Networks 5L ALOHA & CSMA protocols; CDMA; Ethernet LANs; connecting LAN and backbone networks- repeaters, hubs, switches, bridges, router and gateways; 6. Networks Layer Functions and Protocols 5L Routing; static and dynamic routing algorithms; network layer protocol of Internet- IP protocol, Internet control protocols. 7. Transport Layer Functions and Protocols 5L Transport services- error and flow control, Connection establishment and releasethree way handshake, TCP and UDP. 8. Overview of Application layer protocol 5L Overview of DNS protocol; overview of WWW & HTTP protocol.

SEC-1 SEC-1: Programming in Python (1 Th. + 2 Labs) Theory: 15 Lectures Credit: 1 Planning the Computer Program: Concept of problem solving, Problem definition, Program design, Debugging, Types of errors in programming, Documentation. Techniques of Problem Solving: Flowcharting, decision table, algorithms, Structured programming concepts, Programming methodologies viz. top-down and bottom-up programming. (2L) (2 L) Overview of Programming: Structure of a Python Program, Elements of Python (3 L) Introduction to Python: Python Interpreter, Using Python as calculator, Python shell, Indentation. Atoms, Identifiers and keywords, Literals, Strings, Operators(Arithmetic operator, Relational operator, Logical or Boolean operator, Assignment, Operator, Ternary operator, Bit wise operator, Increment or Decrement operator). Creating Python Programs : Input and Output Statements, Control statements(branching, Looping, Conditional Statement, Exit function, Difference between break, continue and pass.), Defining Functions, default arguments. (4L) (4L) SEC-1: R-Programming (1 Th.+2 Labs) Theory: 15 Lectures Credit: 1 Introduction: Overview and History of R, Getting Help, Data Types, (5L) Subsetting, Vectorized Operations, Reading and Writing Data. Control Structures, Functions, lapply, tapply, split, mapply, apply, Coding Standards. Scoping Rules, Debugging Tools, Simulation, R Profiler. (5L) (5L)

SEMESTER IV CC-8 (Theory): Design and Analysis of Algorithms Theory: 60 Lectures Credit: 4 1. Introduction (5 L) Basic Design and Analysis techniques of Algorithms, Correctness of Algorithm. 2. Algorithm Design Techniques Iterative techniques, Divide and Conquer (Karatsuba integer multiplication, Strassen s matrix multiplication, etc.), Dynamic Programming (Convex hull, DFT & FFT), Greedy Algorithms (Knapsack, Denomination of notes/coins), Scheduling. 3. Sorting and Searching Techniques (8 L) (17 L) Elementary sorting techniques Merge Sort, Advanced Sorting techniques - Heap Sort, Quick Sort, Sorting in Linear Time - Bucket Sort, Radix Sort and Count Sort, Searching Techniques, Medians & Order Statistics, complexity analysis. 4. Lower Bounding Techniques: Decision Trees (2 L) 5. Balanced Trees: AVL Trees, Red-Black Trees (10 L) 6. Advanced Analysis Technique: Amortized analysis (5 L) 7. Graphs Graph Algorithms Breadth First Search, Depth First Search and its Applications, Minimum Spanning Trees (Prim, Kruskal), Shortest Paths (Dijkstra, Bellman-Ford, Floyd-Warshall). 8.String Processing: String Matching, Edit Distance, Document distance, Rabin- Karp, KMP, Boyer-Moore Techniques (5 L) (5 L) 9.Cryptographic algorithms and Overview of complexity Classes: Basic cryptographic algorithms like DSA, RSA; P, NP, NP-Hard, NP-Complete (3 L)

CC-9: Software Engineering Theory: 60 Lectures Credit: 4 1. Introduction (8L) The Evolving Role of Software, Software Characteristics, Changing Nature ofsoftware, Software Engineering as a Layered Technology, Software Process Framework, Framework and Umbrella Activities, Process Models, Capability Maturity Model Integration (CMMI). 2.Requirement Analysis (10L) Software Requirement Analysis, Initiating Requirement Engineering Process, Requirement Analysis and Modeling Techniques, Flow Oriented Modeling, Need for SRS, Characteristics and Components of SRS. 3.Software Project Management (8L) Estimation in Project Planning Process, Project Scheduling. 2. Risk Management (8 L) Software Risks, Risk Identification, Risk Projection and Risk Refinement,RMMM Plan. 5.Quality Management (8 L) Quality Concepts, Software Quality Assurance, Software Reviews,Metrics for Process and Projects. 6. Design Engineering (10 L) Design Concepts, Architectural Design Elements, Software Architecture, Data Design at the Architectural Level and Component Level, Mapping of Data Flow into Software Architecture, Modeling Component Level Design. 7. Testing Strategies & Tactics (8 L)

CC-10: Database Management Systems Theory: 60 Lectures Credit: 4 (6L) 1.Introduction Characteristics of database approach, data models, database system architecture and data independence. 2.Entity Relationship (ER) Modeling Entity types, relationships, constraints. (20L) (8L) 3.Relation data model Relational model concepts, relational constraints, relational algebra, SQL queries 4. Database design Mapping ER/EER model to relational database, functional dependencies, Lossless decomposition, Normal forms (upto BCNF). 5. Transaction Processing ACID properties, concurrency control & recovery (15L) (3L) 6. File Structure and Indexing Operations on files, File of Unordered and ordered records, overview of File organizations, Indexing structures for files( Primary index, secondary index, clustering index), Multilevel indexing using B and B+ trees. (8L)

PHP Programming Theory: 15 Lectures Credit: SEC-2 (1 +2 Lab) Introduction to PHP: PHP introduction, inventions and versions, important tools and software requirements (like Web Server, Database, Editors etc.) PHP with other technologies, scope of PHP Basic Syntax, PHP variables and constants Types of data in PHP, Expressions, scopes of a variable (local, global) PHP Operators : Arithmetic, Assignment, Relational, Logical operators, Bitwise, ternary and MOD operator. PHP operator Precedence and associativity (3L) Handling HTML form with PHP: Capturing Form Data GET and POST form methods Dealing with multi value fields Redirecting a form after submission PHP conditional events and Loops: PHP IF Else conditional statements ( Nested IF and Else) Switch case, while,for and Do While Loop Goto, Break,Continue and exit PHP Functions: Function, Need of Function, declaration and calling of a function PHP Function with arguments, Default Arguments in Function Function argument with call by value, call by reference Scope of Function Global and Local String Manipulation and Regular Expression: Creating and accessing String, Searching & Replacing String Formatting, joining and splitting String, String Related Library functions Use and advantage of regular expression over inbuilt function Use of preg_match(), preg_replace(), preg_split() functions in regular expression (2L) (3L) (3L) (2L)

Array: Anatomy of an Array,Creating index based and Associative array,accessing array Looping with Index based array, with associative array using each() and foreach() Some useful Library function (2L) SEC-2: UNIX / Linux Programming (1+2 Labs) Theory: 15 Lectures Credit: 1 Introduction What is linux/unix Operating systems Difference between linux/unix and other operating systems Features and Architecture Various Distributions available in the market Installation, Booting and shutdown process System processes (an overview) External and internal commands Creation of partitions in OS Processes and its creation phases Fork, Exec, wait (5L) User Management and the File System Types of Users, Creating users, Granting rights User management commands File quota and various file systems available File System Management and Layout, File permissions Login process, Managing Disk Quotas Links (hard links, symbolic links) (5L) (5L) Shell introduction and Shell Scripting (6L) What is shell and various type of shell, Various editors present in linux Different modes of operation in vi editor What is shell script, Writing and executing the shell script Shell variable (user defined and system variables) System calls, Using system calls Pipes and Filters Decision making in Shell Scripts (If else, switch), Loops in shell Functions Utility programs (cut, paste, join, tr, uniq utilities) Pattern matching utility (grep) (6L)