44
B. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH SEMESTER (COMPUTER ENGINEERING) S. No. Subject Code Subject Name L T P Cr. 1. CPE-301 System Analysis and Design 3 1 0 3.5 2. CPE-302 Computer Networks 3 1 0 3.5 3. CPE-303 Database Management System 3 1 0 3.5 4. CPE-304 Algorithm Analysis and Design 3 1 0 3.5 5. CPE - 305 Theory of Computation 3 1 0 3.5 6. CPE - 306 Computer Graphics 3 1 0 3.5 7. CPE-353 Database Management System Lab 0 0 2 1.0 8. CPE-354 Algorithm Analysis and Design Lab 0 0 2 1.0 9. CPE-356 Computer Graphics Lab 0 0 2 1.0 10. STG - 351 Summer Training ** - - - 6.0 Total 1 8 6 6 30 Total Contact Hours = 30 *CPE-353, CPE-354 & CPE-356 are practical papers only. There will not be any theory examination for these papers. ** Summer Training will be of 4 to 6 weeks duration in Industry / In House.

punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

B. TECH. THIRD YEAR COMPUTER ENGINEERING

(Batch 2010)Session (2012-13)

SCHEME OF PAPERS

FIFTH SEMESTER (COMPUTER ENGINEERING)

S. No. Subject Code Subject Name L T P Cr.

1. CPE-301 System Analysis and Design 3 1 0 3.5

2. CPE-302 Computer Networks 3 1 0 3.5

3. CPE-303 Database Management System 3 1 0 3.5

4. CPE-304 Algorithm Analysis and Design 3 1 0 3.5

5. CPE - 305 Theory of Computation 3 1 0 3.5

6. CPE - 306 Computer Graphics 3 1 0 3.5

7. CPE-353 Database Management System Lab 0 0 2 1.0

8. CPE-354 Algorithm Analysis and Design Lab 0 0 2 1.0

9. CPE-356 Computer Graphics Lab 0 0 2 1.0

10. STG - 351 Summer Training ** - - - 6.0

Total 18 6 6 30

Total Contact Hours = 30

*CPE-353, CPE-354 & CPE-356 are practical papers only. There will not be any theory examination for these papers.

** Summer Training will be of 4 to 6 weeks duration in Industry / In House.

Page 2: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 301 SYSTEM ANALYSIS AND DESIGN

L T P Cr. 3 1 0 3.5

Section A

Systems Concepts and Information Systems Environment: Introduction, characteristics of a system, Elements of a system, the system development Life Cycle, Role of a System Analyst.

Section B

System Planning and Initial Investigation, Information Gathering, The Tools of structured analysis, Feasibility Study, Cost/ Benefit Analysis.

Section C

The process and stages of system Design, Input/Output and forms design, File Organization and database design.

Section D

System testing and quality assurances, Implementation and software maintenance, Project Scheduling and software, Security, Disaster/Recovery, and Ethics in system development.

Case study of the following systems (I) Inventory Control(II) Railway Reservation System

(III) University Management System

(IV) Hospital management System

Recommended Books :1. System analysis and design - Elias M.Awad.2. System analysis and design –Perry Edwards3. Analysis and design of information systems – James A.Senn4. System analysis and Design by Elias M. Awad Galgotia Publication Pvt. Limited.

Page 3: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH
Page 4: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE 302 COMPUTER NETWORKS

L T P Cr. 3 1 0 3.5

Section A

Introduction, history and development of computer networks .The OSI Reference Model, The TCP/IP Reference Model

Section B

Physical Layer: Theoretical basis, transmission media, Repeaters, Hubs Data Link Layer: Data link layer Design Issues, elementary data link protocols, sliding window protocols.

Section C

MAC layer: Aloha protocols, local area networks -- Ethernet, Wireless LANS Network layer: routing algorithms, congestion control algorithms, internetworking - bridges and routers. IP Addressing

Section D

Transport layer: Elements of Transport Protocols UDP,TCP. Electronic-mail,WWW , Domain Name System Case Study : Design & Implementation of Local Area Network

Recommended Books :

1 A. S. Tannenbaum. Computer Networks , 3rd Edition, Prentice-Hall. 2 D. E. Comer. Internetworking with TCP-IP: Principles, Protocols and Architecture , Vol I, 2nd Edition,PrenticeHall,1991. 3 D. E. Comer and D. L. Stevens. Internetworking with TCP-IP: Design, Implementation, and Internals , Vol II, Prentice Hall, 1990.

Page 5: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE 303 DATABASE MANAGEMENT SYSTEMS

L T P Cr.

3 1 0 3.5

Section AIntroduction To Database ConceptsDifference between Database and non database system, Data independence, DBMS Architecture, components of a database system, Advantages and disadvantages of Database system, Intended Uses of a DBMS, Data Models, Schemas, and Instances, Database Languages and Interfaces, Classification of Database Management Systems.Data Modeling : Relational Model Concepts, creation of tables, virtual tables and views in SQL, Changing of schema and updation of tables in SQL, Data associations and Data relationships, ER Model; Design, issues, Mapping constraints, keys, ER diagram, weak entity sets, extended ER features, Design of an ER Database schema, Reduction of an ER Schema to tables,

Section BDatabase DesignIntegrity Constraints: Domain constraints, Referential integrity, entity integrity, Specify these constraints in SQL, specification of Additional Constraints as assertions and triggers, functional dependencies, Decomposition, Normalization using FD’s MVD’s and JD’s Domain key normal form, Demoralization, Queries in SQL.

Section CQuery processing: in Relation Algebra, Relational Calculus, complex queries in SQL Overview of optimization process: cost based query optimization

Section DTransaction processingTransaction Concept, Transaction state, Implementation of Atomicity, and durability, concurrent execution, serializability, Recoverability.Overview of Backup and recovery processRecovery concepts: categories of recovery algorithms, caching of disk blocks, Write-ahead Logging, Steal/No-steal and Force/No-Force, Checkpoints, Transaction Rollback, Recovery techniques based on Deferred update, and Immediate update, shadow paging, Aries recovery algorithm,

Recommended Books :1. Navathe and Elmasri, Fundamentals of Database Systems, Pearson education2 Prateek Bhatia, Database Management system, Kalyani Publishers3 Korth and Silberschatz Abraham, Database Concepts, McGraw Hall, 1991.4 An introduction to database system by C.J.Date (Addison Welsey, Publishing house) Latest edition.5 john, Oracle 10g SQL, Thomsan6 Bipin Desai, Database System, TMG

Page 6: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE 304 ANALYSIS & DESIGN OF ALGORITHMS

L T P Cr.3 1 0 3.5

Section A

Introduction: Algorithm, analyzing algorithms, stacks, queues, trees, heaps, graphs, hashing.

Divide and Conquer: General method, binary search, finding the maximum and minimum, Merge sort, Quick sort, Strassen’s matrix multiplication.

Section B

Greedy Method : General Method, Knapsack problem, minimum spanning trees, single source shortest paths.

Section C

Dynamic Programming: General Method mult istage graphs, All pairs shortest path, t raveling salesman problem.

Branch & Bound : Branch & bound Method, 0/1 Knapsack problem, Traveling salesman problem .

Section D

Lower Bound Theory : Lower bound technique, Comparison trees for sort ing and searching, some lower bound on parallel computation.

Recommended Books :

1. Fundamentals of Computer Algori thm, Latest edi tion, By Horowitz Sahni, Galgotia Publication.

2. Algori thms, Latest Edit ion, By knuth.3. Design & Analysis of Algori thm, Latest Edit ion, By Goodman, McGraw

hil l Publicat ion.

Page 7: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH
Page 8: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE-305 THEORY OF COMPUTATION

L T P Cr.3 1 0 3.5

Section – A

Sets, Relations and Languages: Sets, Relations and functions, finite and infinite sets, Closures and algorithms, alphabets and languages, finite representations of languages.

Finite Automata: Deterministic finite Automata with Epsilon-transitions, Moore and Mealy Machine, Application of finite automata i.e. text search.

Section – B

Regular Expression and Languages: Regular expression, finite Automata and Regular expression and finite automata: Application of Regular expression: Lexical analysis, Finding pattern in text.

Properties of Regular languages: Pumping lemma for regular languages, application of pumpins lemna, Closure properties of regular languages, Minimization of finite Automata.

Section – C

Context free Grammar and Languages: Context free grammar: Parse Trees, Ambiguity in Grammar and Languages, Application of context free Grammar: Markup Languages, XML and document type Definition.

Properties of Context free languages – Normal forms for context free grammars, The Pumping lemma for context free Languages, Closure properties of context free languages.

Section – D

Pushdown Automata: Pushdown Automata: Deterministic Push down Automata, Equivalence of Push Down automata and Context free Grammar.

Turing Machines: Definition of Turing Machine, Application of Turing Machine in language accepting and computing.

Recommended Books :

1. J.E .Hopcroft, R. Motwani and J.D. Ullmn, “Introduction to Automata Theory, Language and Computation”, Pearson Education Asia, 2nd Edition.

2. B.M. Moret, “The Theory of Computation”, Pearson Education Asia.3. H.R. Lewis and C.H. Papa dimitriou, “Elements of the theory of Computation”, Pearson

Education Asia, 2nd Edition.

Page 9: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE-306 COMPUTER GRAPHICS

L T P Cr.3 1 0 3.5

SECTION AGRAPHICS HARDWARE: Vector and Raster CRTs, Display Controllers and Processors, Graphics Input Devices.TWO-DIMENSIONAL GEOMETRIC TRANSFORMATIONS: Coordinate Systems, Homogenous Coordinates, Basic Transformations: Translation, Scaling, Rotation and other transformations. Composite Transformations.

SECTION BRASTER SCAN CONVERSION ALGORITHMS: Line Drawing Algorithms, Circle Drawing Algorithms, Region filling Algorithms.TWO-DIMENSIONAL VIEWING & CLIPPING: Windowing and Viewing Transformations, Line Clipping algorithms, Polygon Clipping, Curve Clipping and Text clipping.

SECTION C3-D GRAPHICS: Three dimensional object representations: Curves and SurfacesTHREE-DIMENSIONAL GEOMETRIC TRANSFORMATIONS: Basic Transformations: Translation, Scaling, Rotation. Composite transformationsTHREE-DIMENSIONAL VIEWING: Modeling and Coordinate Transformations, Projections: Parallel and Perspective Transformations

SECTION DVISIBLE SURFACE DETECTION: Hidden surface removal algorithms, Illumination Models SHADING: Gouraud Shading, Phong Shading, Interactive Computer Graphic Techniques

Recommended Books :

1. Computer Graphics: By Donald Hearn, M. Pauline Baker2. Principles of Interactive Computer graphics: By W.M. Newman, R.Sproull3. Fundamentals of Interactive Computer Graphics: By J.D. Foley, A. Van Dam4. Computer Graphics Using OPEN GL: By F.S. Hill Jr.

Page 10: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE-353 DATA BASE MANAGEMENT SYSTEM LAB

L T P Cr.

0 0 2 1.0OBJECTIVE

The students are required to do exercises/projects in database design:

1. creation of tables, virtual tables and views in SQL,

2. Viewing the contents of data dictionary

3. Changing of schema

4. updation of tables in SQL

5. Specification of various constraints in SQL: Integrity Constraints: Domain

constraints, Referential integrity, entity integrity etc

6. specification of Additional Constraints as assertions and triggers

7. query processing in sql,

Page 11: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE 354 ALGORITHM ANALYSIS & DESIGN LAB

L T P Cr.

0 0 2 1.0

Course Contents: 1. Write a program to sort ‘n’ numbers using merge sort. Mention the numbers of comparisons made

by the program.

2. Write a program to sort ‘n’ numbers using quick sort. Mention the numbers of comparisons made by the program.

3. Write a program for stressor's matrix multiplication.

4. Write a program for knapsack problem.

5. Write a program for minimum spanning trees.

6. Write a program for single source shortest paths.

7. Write a program of traveling salesman problem.

8. Write a program for all pairs shortest paths

Page 12: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE-356 COMUPTER GRAPHICS LAB

L T P Cr.

0 0 2 1.0

OBJECTIVE

The students are required to do exercises on various computer graphics algorithms in either C/C++ Language. Implement following using various algorithms:1. Line drawing 2. Line clipping3. circle drawing4. area clipping5. drawing of some 2-D pictures6. 2-D transformations: rotation, translation etc7. Shading8. Line Hidding

Finally design some Ads., Game etc using all the above or built in commands.

Page 13: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

B. TECH. THIRD YEAR COMPUTER ENGINEERING

(Batch 2010)Session (2012-13)

SCHEME OF PAPERSSIXTH SEMESTER (COMPUTER ENGINEERING)

S. No. Subject Code Subject Name L T P Cr.

1. CPE-307 Relational Database Management System 3 1 0 3.5

2. CPE-308 Microprocessor and Assembly Language Programming 3 1 0 3.5

3. CPE-309 Compiler Design 3 1 0 3.5

4. CPE-310 Software Engineering 3 1 0 3.5

5. CPE-357 Relational Database Management System Lab 0 0 2 1.0

6. CPE-358 Microprocessor and Assembly Language Programming

Lab

0 0 2 1.0

7. CPE-359 Compiler Design Lab 0 0 2 1.0

8. Elective-II 3 1 0 3.5

9. Elective-III 3 1 0 3.5

Total 18 6 6 24

Total Contact Hours = 30

ELECTIVE – II FOR SIXTH SEMESTER (COMPUTER ENGINEERING)*

S. No. Subject Code Subject Name L T P Cr.1. CPE-311 Parallel Computing 3 1 0 3.52. CPE-312 Multimedia Systems 3 1 0 3.53. CPE-313 Computer Security 3 1 0 3.54. CPE-314 Software Project Management 3 1 0 3.55. MBA 5011 Foundation of Financial Accounting 3 1 0 3.5

*CHOSSE ANY ONE FROM THE LIST

ELECTIVE – III FOR SIXTH SEMESTER (COMPUTER ENGINEERING)*

S. No. Subject Code Subject Name L T P Cr.1. CPE-315 Internetworking Technologies 3 1 0 3.52. CPE-316 ATM Networks 3 1 0 3.53. CPE-317 Distributed Computing 3 1 0 3.54. CPE-318 Grid Computing 3 1 0 3.55. MBA 5012 Foundation of Managerial Accounting 3 1 0 3.5

*CHOSSE ANY ONE FROM THE LIST

* CPE-357, CPE-358 and CPE-359 are practical papers only. There will not be any theory examination for these papers.

Page 14: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE-307 RELATIONAL DATA BASE MANAGEMENT SYSTEM

L T P Cr.3 1 0 3.5

Section AIntroduction of DBMS Types of DBMS and their advantages and disadvantages, Enhanced-ER (EER) Model Concepts, EER-to-Relational Mapping, Data Abstraction and Knowledge Representation and ontology Concepts, use of UML Diagrams as an aid to database design specification.

Section B Introduction to SQL programming Techniques: DB programming issues and techniques, Embedded SQL, Dynamic SQL, and SQLJ, DB programming with function calls :SQL/CLI and JDBC, DB stored procedures and SQL/PSM. Object-Oriented Databases: Introduction to Object-Oriented Concepts, Object Identity, Object Structure, and Type Constructors.

Section CObject-Oriented Database concepts: Encapsulation of Operations, Methods, and Persistence, Type and Class Hierarchies and Inheritance, Complex Objects, Other OO Concepts, Object database standards, Languages and design, Examples of OODBMSs. Object Relational Support in SQL

Section DDistributed Databases and Client-Server Architecture: Introduction to Distributed DBMS Concepts, Client-Server Architecture Overview, Data Fragmentation, Replication, and Allocation Techniques for Distributed Database Design, Types of Distributed Database Systems and Distributed Databases in oracle.Database protection in RDBMS Database Security : Types of Security, Control Measures, DB security and DBA, Access protection, Discretionary Access Control based on granting and revoking priviledges, Mandatory access control and role based access control. Concurrency control : Two-phase locking and Timestamp ordering techniques .

Recommended Books :2. Navathe and Elmasri, Fundamentals of Database Systems, Pearson education3. Prateek Bhatia, Database Management system, Kalyani Publishers4. Korth and Silberschatz Abraham, Database Concepts, McGraw Hall, 1991.5. An introduction to database system by C.J.Date (Addison Welsey,

Publishing house) Latest edi tion.6. Bipin Desai, Database System, TMG

Page 15: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE-308 Microprocessor and Assembly Language Programming

L T P Cr.3 1 0 3.5

Section A

Microprocessor Architecture: Microprocessor Architecture and its Operations, Memory, Input/Output (I/O) Example of a Microcomputer system, interfacing Devices.8085 based Microcomputer systems: 8085 MPU, Example of an 8085 based microcomputer.Instructions and timings: Instruction classification, instruction format, How to write and execute a simple program, Instruction timings and operation status, Overview of the 8085 instruction set.

Section BIntroduction to 8085 basic Instructions: Data transfer (Copy) Instruction, Arithmetic Operations, Logic operations, Branch Operations, Writing Assembly Language Programs, Debugging a program.Programming techniques with additional Instructions: Programming Techniques Looping, Counting and indexing, Additional Data transfer and 16-bit Arithmetic Instruction, arithmetic Operations related to memory, Logic operations: Rotate, compare, Debugging. Counter and Timing Delays: Counters and time delays, hexadecimal counter, 0-9 (Modulo-10) counter. Stack and subroutines: Stack, subroutine, conditional call and return instructions, advanced subroutine concepts.

Section CCode conversions, BCD arithmetic and 16-bit data operations: BCD to binary conversions, binary to BCD conversions, BCD to 7-segment LED code conversions, Binary to ASCII and ASCII to binary code conversions. BCD addition, BCD subtraction, Introduction to advanced instructions and applications, multiplications and subtraction with carry.

Section DInterfacing Peripherals (I/Os and applications): Parallel input/output and interfacing applications, basic interfacing concepts, interfacing output displays, input keyboards, memory-mapped I/O, Interfacing memory. Interrupts: the 8085 interrupts General-purpose programmable peripheral devices: the 8255A programmable peripheral interface, direct memory access (DMA) and 8257 DMA controller, 8259 programmable interrupt controller. Serial I/O and data communication: Basic concepts in serial I/O, software-controlled asynchronous serial I/O. the 8085 serial I/O lines: SOD and SID.

Recommended Books :1. 8085 Microprocessor by Ramesh Gaonkar,2. Microprocessor by B.Ram3. Daniel Tabak, Advanced Microprocessors, McGraw- Hill, Inc., Second Edition 1995.4. Douglas V. Hall, Microprocessors and Interfacing: Programming and Hardware,Tata McGraw Hill Edition, 1986.5. Charles M.Gilmore, Microprocessors: principles and Applications, McGraw Hill

Page 16: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 309 COMPILER DESIGN

L T P Cr.3 1 0 3.5

Section A INTRODUCTION TO COMPILING Compilers – Analysis of the source program – Phases of a compiler – Cousins of the Compiler – Grouping of Phases – Compiler construction tools – Lexical Analysis – Role of Lexical Analyzer – Input Buffering – Specification of Tokens.

Section B SYNTAX ANALYSIS Role of the parser –Writing Grammars –Context-Free Grammars – Top Down parsing – Recursive Descent Parsing – Predictive Parsing – Bottom-up parsing – Shift Reduce Parsing – Operator Precedent Parsing – LR Parsers – SLR Parser – Canonical LR Parser – LALR Parser.

Section CINTERMEDIATE CODE GENERATION Intermediate languages – Declarations – Assignment Statements – Boolean Expressions – Case Statements – Back patching – Procedure calls.

Section DCODE GENERATION Issues in the design of code generator – The target machine – Runtime Storage management – Basic Blocks and Flow Graphs – Next-use Information – A simple Code generator – DAG representation of Basic Blocks – Peephole Optimization.CODE OPTIMIZATION AND RUN TIME ENVIRONMENTS Introduction– Principal Sources of Optimization – Optimization of basic Blocks – Introduction to Global Data Flow Analysis – Runtime Environments – Source Language issues – Storage Organization – Storage Allocation strategies – Access to non-local names – Parameter Passing.

Recommended Books :

1. Alfred Aho, Ravi Sethi, Jeffrey D Ullman, “Compilers Principles, Techniques and Tools”, Pearson Education Asia, 2003.2. Allen I. Holub “Compiler Design in C”, Prentice Hall of India, 2003.3. C. N. Fischer and R. J. LeBlanc, “Crafting a compiler with C”, Benjamin Cummings, 2003.4. J.P. Bennet, “Introduction to Compiler Techniques”, Second Edition, Tata McGraw-Hill, 2003.5. Henk Alblas and Albert Nymeyer, “Practice and Principles of Compiler Building with C”, PHI, 2001.6. Kenneth C. Louden, “Compiler Construction: Principles and Practice”, Thompson Learning, 2003

Page 17: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 310 Software EngineeringL T P

Cr.3 1 0 3.5

Section AIntroduction to Software Engineering : Software Problem, Software Engineering : Approach, Software process, Characteristics of Software Engineering Process, software Development models. Software Requirement Analysis and Specification : Software Requirement Specification, Problem Analysis Requirement Specifications.

Section BSoftware Project Planning : Cost estimation, cost estimation models, Project scheduling, Software Configuration management, Team Structure, Risk Management.

Section C Function oriented design L Design principles, Coupling Cohesion, Structured Design Methodologies Object Oriented Design : OOAD, Classes and objects, inheritance and polymorphism, design notation and specification

Section D CODINGTop Down, bottom up approaches, structured programming, information hiding programming style, documentation, TESTING :Testing Fundamentals, White box testing, Black box testing, Functional testing boundary value testing, cause effect, graphing.

Recommended Books :1 Soft Engineeing Approach, By R. S Pressman2. Software Engineering,SOMMERVILLE Pearson Education3 An Integrated Approach to software Engineering. PANKAJ JALOTE

Page 18: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE-357 Relational Database Management System (Lab)

L T P Cr.

0 0 2 1.0

OBJECTIVE

The students are required to do exercises/projects in database design , pl/sql, normalization of tables, creation of forms, creation of reports , query handling etc using a front end and a backend database software.

Object Relational Support in SQL

Page 19: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 358 Microprocessor and Assembly Language Programming (Lab)

L T P Cr.

0 0 2 1.0

List of Practical's

1. Introduction to 8085 kit.2. Writing a few assembly language utility programs for logical, arithmetic,

shift operations, code conversion and delay routines.3. Writing assembly language programs for interfacing of following chips with

8085:a. Programmable peripheral interface, 8255b. Programmable interval timer, 8253c. Programmable keyboard/display interface, 8279d. DMA Controller, 8257e. Programmable Interrupt Controller, 8259

4. Interfacing of analog to digital converters with 80855. Interfacing of digital to analog converters with 8085

Page 20: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH
Page 21: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE-359 Compiler Design Lab

L T P Cr.

0 0 2 1.0

OBJECTIVE

The students are required to do exercises/projects on design of Lexical analyzer, Loader, Linker and Compiler design.

Page 22: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 311 Parallel Computing

L T P Cr.

3 1 0 3.5

Section-AOverview of Parallel Processing and Pipelining ProcessingNecessity of high performance, Constraints of conventional architecture, Parallelism in uniprocessor system, Evolution of parallel processors, future trends, Architectural Classification, Applications of parallel processing, Classification of Computers on the basis of instructions, memory access and grain size.

Section-BInstruction level Parallelism and Thread Level Parallelism, Explicitly Parallel Instruction Computing (EPIC) Architecture, Case study of Intel Itanium ProcessorPrinciples of scalable performance: Performance Metrics and Measures, Speedup Performance Laws PRAM algorithms of suffix summation, parallel reduction tree and list ranking

Section-CVector and Array Processor Basic vector architecture, Issues in Vector Processing, Vector performance modeling, vectorizers and optimizers, Case study: Cray Arch. SIMD Computer Organization Masking and Data network mechanism, Inter PE Communication, Interconnection networks of SIMD, Static V s Dynamic network, cube hyper cube and Mesh Interconnection network.Parallel Algorithms For Array Processors

Section-DMultiprocessor ArchitectureLoosely and Tightly coupled multiprocessors, Processor characteristics of multiprocessors, Inter Processor communication network, Time shared bus, Crossbar switch, Multiport Memory Model, Memory contention and arbitration techniques, Cache coherency and bus snooping, Massively Parallel Processors (MPP), COW's and NOW's Cluster and Network of Work Stations), Chip Multiprocessing (CMP), Case Study of IBM Power4 Processor.Inter Processor Communication and Synchronization

Recommended Books :1. V.Rajaraman, L Sivaram Murthy, "Parallel Computers", PID.2. William Stallings, "Computer Organization and Architecture, Designing for performance" Prentice Hall, Sixth edition3. Kai Hwang, Scalable Parallel Computing4. Harrold Stone, High performance computer Architectures5. Richard Y. Kain , Advanced Computer Architecture6. Parallel Computing in C and OpenMPI , M. J. Quinn, McGraw-Hill (2004) ISBN 00728225627. Parallel Processing with Communicating Process Architecture, I East, UCL Press (1995).8. Designing and Building Parallel Programs, I Foster, Addison Wesley (1996) ISBN 0201575949

Page 23: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 312 Multimedia Systems

L T P Cr.

3 1 0 3.5Section-AIntroduction [Definition, Evolution, Multimedia presentation and production, Characteristics of a multimedia presentation, Components and Structure, Hardware and Software Specifications, Digitization concepts, Application domains]; ]; Text [Introduction, Types of text, ASCII codes, Unicode standards, Font, Insertion of text, OCR, File formats]; Image and Graphics [Introduction, Image types, Color and color models, Scanner, Digital camera, Interface standards, Specification of digital images, Color management systems, Device independent color models, Gamma and gamma correction, Image processing steps and software, File formats, Image output on monitor and printer];Section – BAudio [Introduction, Nature of sound waves, Musical sound and noise, Tone and note, Psycho-acoustics and decibels, Microphone, Amplifier, Speakers, Digital audio specifications, Synthesizers, Musical Instrument Digital Interface (MIDI), Sound card, Audio processing steps and software, File formats]; Video [Introduction, Video frames and frame rate, Analog video camera, Video signal formats, Television broadcasting standards, Digital video, Digital video standards, PC Video, Video processing steps and software, File formats.Section_CCompression [Introduction, CODEC, Types of compression, Types of redundancies, Lossless compression techniques, Lossy compression techniques, Run length encoding, Huffman coding, Arithmetic coding, Lempel-Ziv-Welsh coding, Differential pulse code modulation, GIF standard, JPEG standard, MPEG-1, MPEG-2, MPEG-4, MPEG-7].Section-DAnimation: types, techniques, key frame animation, utility, morphing.Virtual Reality concepts.Application of M/M intelligent M/M System. Desktop VR; reality OS; Distributed virtual environment system; Virtual environmen6t. displays and orientation tracking; Visually coupled system requirements; Intelligent VR . software systems . Application of environments in various fields, such as medical, entertainment, manufacturing, business, education.

Recommended Books :1. Prabhat K Andleigh, Kiran Thakrar, "Multimedia System Design", Prentice Hall, 19962. Ralf Steinmetz, Klara Nahrstedt, "Multimedia Computing, Communications and

Applications", Prentice Hall, 1995 3. Nalin Sharda, "Multimedia Information Networking", Prentice Hall, 1999, ISBN :

0132587734 4. T.Vaughan; Multimedia; Making it work, Tata McGraw Hill Publishing Company Limited,

New Delhi.5. S.J.Gibbs; Multimedia Programming: objects, environments & Frameworks,Dionysios C.

Tsichritzis, University of Geneva, GMD,Bonn.J.Jeffcoate,6. Multimedia in Practice: Technology & Applications, Prentice Hall of7. Elsom Cook – “Principles of Interactive Multimedia” – McGraw Hill8. Ranjan Parekh, “Principle of Multimedia", Tata McGraw Hill, New Delhi, 2006. ISBN: 0-07-

058833-3

Page 24: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 313 Computer Security

L T P Cr.

3 1 0 3.5

Section A Computer Security: Basic Components: Confidentiality, Integrity, Availability, Threats, Policy and Mechanism, access Control Matrix Model Assurance. Information and Network Security Policies: Security Policy, Confidentiality Policies, Integrity Policies.

Section B

Basic Cryptography: What is Cryptography? Classical Cryptography, Public Key Cryptography. Authentication: Authentication Basic, Passwords Attacking a Password System, countering Password Guessing, Random Selection of Passwords, Challenge Response, Biometric,

Section C

Key Management: Cryptographic Key Infrastructures, Certificate Signature chains, X.509: Certification Signature chains, PGP Certificate Signature chains. Design Principles. Access Control Mechanisms : Access Control Lists : Abbreviations of Access Control Lists, creation and Maintenance of Access Control Lists, Revocation of Rights, Capabilities : Implementation of Capabilities, Copying and amplifying Capabilities, Revocation of Rights, Limits of Capabilities, Comparison with Access Control Lists.

Section D

Assurance and Trust. Building Secure and Trusted Systems. Goals of Formal Evaluation : Deciding to Evaluate, Historical Perspective of Evaluation Methodologies, TCSEC :1983-1999, FIPS 140:1994 - Present, The Common Criteria : 1998 - Present, Malicious Logic. Computer Viruses, Computer Worms. Intrusion Detection : Principles, Basic Intrusion Detection, Models, Architecture, Network Security : Introduction, Policy Development, Network Organization, Firewalls and Proxies,

Recommended Books :1. Introduction to Computer Security, Matt Bishop Sathyanarayana S. Venkatramanayya, PEARSON Education 2. Fundamentals of Computer Security, Pieprzy K, Hardjono Sebery, Springer International Edition.

Page 25: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 314 Software Project Management

L T P Cr.

3 1 0 3.5Section AIntroduction to software Project Management : Introduction, Why is software project management? What is a Project? Software projects versus other types of project. Contract management and technical project management. activities covered by software project management. Plans, methods and methodologies, Some ways of categorizing software projects, What is management? Introduction to step Wise Project Planning. Programme management and project evaluation : Introduction, programme management, Managing the allocation of resources within programmes, strategic programme management, Creating a Programme, Aids to programme management, Benefits management, Evaluation of individual projects, Cost-benefit analysis, Cash flow forecasting

Section BSelection of an appropriate project approach : Introduction, Choosing technologies, Technical Plan contents list, Choice of process models, the waterfall model, The V-Process model, The spiral model, Software prototyping, Software effort estimation : Introduction, Where are estimates done? Problems with over - and under estimates, The basis for software estimating. Activity Planning : Introduction, The objectives of activity planning, When to plan, project schedules, project and activates, Sequencing and scheduling activities, Network planning mode.

Section CRisk management : Introduction, Risk, Categories of risk, A framework for dealing with risk, risk identification Risk assessment, Risk planning Risk management, Evaluating risks to the schedule applying the PERT technique, Monte Carlo simulation Critical chain concepts. Resource Allocation : Introduction, The nature of resources, identifying resources requirement, Scheduling resources, Creating critical paths, Counting the cost. being specific, Monitoring and control : Introduction, the ISO 12207 approach to the acquisition and supply of software, the supply process, stages in contract placement, Typical terms of a contract.

Section DManaging people and organizing teams: Introduction, understanding behavior, organization behavior : a background, selecting the right person for the job, motivation, the Oldham - Hackman job characteristics model, working in groups, becoming a team, Software quality: Introduction, The place of software quality in project planning, the importance of software quality, defining software quality, ISO 9126, practical software quality measures, product versus process quality management, Small project : Introduction, some problems with student projects, content of a project plan

Recommended Books :

1. Tom Demarco, Controlling Software Project Management, Measurement, Prentice Hall, New Jersey.2. Tom Glib, Finzi Susannah, Principles of Software Engineering Management, Addison Wesley, England.3. Bob Hughes and Mike Cotterell; Software Project Management, third edition, Tata McGraw Hill Publishing Company Ltd., New Delhi.4. Pankaj Jalote; Software Project Management in Practice, Pearson Education Asia.5. Watts S. Humphrey; Winning with Software ? An Executive Strategy, Pearson Education Asia.

Page 26: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

MBA 5011 FOUNDATIONS OF FINANCIAL ACCOUNTING

L T P Credits 3 1 0 3.5

Introduction to Financial Accounting. Financial Statements: Balance Sheet, Income Statement,

Statement of cash flows. Mechanics of Accounting: Transaction Analysis, Journal Entries, Trial

of Balance. Completing the Accounting Cycle: Accrual Accounting, Adjusting Entries, Preparing

Financial Statements. Ensuring the Integrity of Financial Information: Problems, Safeguards.

Selling a Product or a Service: Revenue Recognition, Cash Collection, Accounts Receivable.

Inventories: Nature of Inventories, Valuation Methods.

Recommended Books:1. Khan and Jain, Financial Management, Tata McGraw-Hill Publishing Co. Ltd., New Delhi,

4th Edition.

2. Robert Anthony, David F. Hawkins and Kenneth A. Merchant, Accounting-Text and Cases,

Tata McGraw-Hill Publishing Co. Ltd., New Delhi, 12th Edition, 2007.

Page 27: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 315 Internetworking Technology 

L T P Cr.

3 1 0 3.5

 Section A Internetworking concept and Architectural model, Networking Technologies- application & upper layers, physical & data link layers network layer & path determination, router basics: Types, configuration & operation

 Section B  TCP/IP, IP Addressing, Routing Architecture ,IP routing configuration, Multi protocol routing, IP Subnets, IP routing protocols: OSPF, RIP, BGP, IP forwarding, classless inter domain routing, traffic management with access lists,Next Generation IPv6. Section CTransport protocols: TCP, basic behavior, versions of TCP, UDP, link layer technologies: ARP, RARP, Ethernet , HDLC, LAP-B. Modems, CSU/DSU, B.35 and G.7.3 interfaces, ISDN, L2TP, New services over internet. Introduction to WAN connection, configuration of X.25, configuration of frame-relay Section D New services over the Internet : VOIP, Fax over IP,VOATM, VOFR, RTP/RTCP, SIP, H.323.Virtual private network, IP-multicast, QOS architectures in the Internet, IntServ, DiffServ, Core Stateless fare Queing. Client Server Model of Interaction , The socket interface , DHCP , DNS ,Telnet , Network Management(SNMP) , Internet Security and Firewall Design – IPSec and SSL.

Recommended Books : 

1.     W R Stevens, “ TCP/IP Illustrated- Volume 1- The Protocols, Pearson Edition Asis Education,

2.     Duglas Comer, “Internetworking withTCP/IP Volume 1 – Principles, protocols and architecture, Prentice Hall, 4th Edition 2000

3.     Internetworking Technologies handbook, 2nd edition, 1999, Cisco Press4.     Introduction to CISCO router configuration; 1998, Cisco Press

Page 28: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 316 ATM Networks

L T P Cr.

3 1 0 3.5

Section A :Brief History of B-ISDN and ATM. ATM Based services and applications - B-ISDN services according to ITU, Existing ATM Network services. Principles and building blocks of B-ISDN - B-ISDN principles, Asynchronous transfer mode. B-ISDN network concept - Networking Techniques - Network layering, Switching of virtual channels and virtual paths, Applications of virtual channel/path connections. Traffic management aspects - Overview of functions, ATM Traffic parameters and transfer capabilities, Services classes and quality of service,

Section B :B-ISDN user-network interfaces and protocols - B-ISDN protocol reference model - General aspects Layered architecture, relationship between the B-ISDN PRM and the OSI reference model, B-ISDN PRM description, Layer Functions, Relationship between OAM functions and the B-ISDN PRM. General aspects of the user-network interface - Transfer mode, Bit rates Interface structure. ATM Layer - Cell structure, Cell Header, ATM Layer connections. ATM adaptations Layer - ALL type 0, ALL type 1, ALL type 2, ALL type 3/4, ALL type 5,

Section C: Operation and maintenance of the B-ISDN UNI: Implementation issues - Physical layer, ATM Layer. Traffic management: Traffic control procedures and their impact on resource management. Mechanisms to achieve a specified QoS - Use of virtual paths, Connections admission control, Usage parameter control and network parameter control, Priority control, Traffic shaping. The Internet and ATM : IP over ATM - Encapsulation, addressing and routing, Address resolution, Next hop resolution protocol - How does the next hop resolution protocol work?, SVC establishment. Multicast and broadcast support for IP and ATM - Multicast address resolution server operations. IP Version 6 over ATM.. IP switching, Tag switching, Carrier scale internetworking - IP switching, tag switching, Carrier scale internetworking.

Section D :Interworking with other networks and services: Interworking principles, Circuit emulation service (CES). Local are networks and metropolitan area networks: ATM local area networks, Local Area network emulation - The basic LANE principles, the building blocks, advantages and disadvantages of LANE, overview of LANE version 2. Multiprotocol over ATM - The basic principles, Principles of data flow, MPOA control flows. ATM switching - Switching elements - Matrix-type switching elements, Central memory switching element, Bus type switching element, Ring- type switching element, Performance aspect, Technological aspects, Single stage networks, Multi - stage networks, Cell header processing in switch fabrics, Multicast functionality. Switches and corss connects - Generic system structure, System building blocks.

Recommended Books :1. ATM Network: 3rd Edition, Rain Handel, Handel & Schroder

Page 29: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 317 DISTRIBUTED COMPUTING

L T P Cr.

3 1 0 3.5

Section AIntroduction: Motivation, objectives, characterization & classification of distributed systems. Distributed system architecture. Hardware & software issues, Communication: Layered protocols, Client server protocols, RPC, group communication. Coordination, synchronization & consistency: Logical clocks, Physical clocks, mutual exclusion, election algorithms, atomic broadcast, sequential consistency transaction distributed consensus, Threads: Thread synchronization, implementation issues, and threads vs. RPC.

Section BModels of distributed computing: Client - Server Architectures : Challenges, Design, Methodology, Intranets and Groupware. Group models and peer to peer: Groups for service replication/ reliability, groups for parallelism / performance, client/ server vs. peer-to-peer, multicast.

Section CDistributed file system: Security, Naming/ location transparency, R/W semantics, cache coherence, replication. Load Balancing Distributed shared memory.Distributed multimedia system: Introduction, characteristics, and resource management stream adaptation

Section DFault tolerant distributed systems: Introduction, dependability, faults vs. errors vs. failure, space time and value redundancy, fault tolerant architecture, failure detection algorithms, partitioning, FT consensus. Security techniques, cryptographic algorithms, authentication and access control.

Recommended Books :1) Distributed systems, concepts and design, 3rd Edition, Addison Wesley by

George Colouris, Jean Dollimore and Tim Kinder berg. 2) Distributed system, 2nd Edition, Addison Wesley by Sape Mull ender. 3) Distributed Computing, Principles and applications, M.L.Liu, Pearson Education

Page 30: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

CPE - 318 Grid ComputingL T P

Cr.3 1 0 3.5

Section AOverview and Motivation: The history and evolution of Grid computing, Basic concepts of Grid computing and Requirements. Large scale problem solving using Grid computing, Problems, trends and directions.

Section BGrid Architectures and Technologies: Nature of Grid architecture, Components of Grid, Layered Grid Architecture: Key Components: Grid Resource Allocation Management (GRAM)Grid FTP protocol, Grid Resource Information Service (GRIS). Resource infrastructure, Open Grid Services Architecture (OGSA), Globus Toolkit and Web Services

Section CGrid Computing Environments, Resource allocation, sharing and discovery. Peer-to-peer systems: Purpose, definition, characteristics, Types of P2P systems.

Section DSecurity issues in Grid environment. Introduction to GSI Grid Applications, New Biology and the Grid, Data Intensive Grids applications for high-energy physics, Semantic Grid

Recommended Books :1 Bart Jacob, Michael Brown, Kentarofukui, Nihar Trivedi – Introduction to Grid Computing

(IBM Red Book) 20052 Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar – Introduction to Parallel

Computing (Pearson Edu), 2004 II Ed.3 V. Rajaraman, C. Siva Ram Murthy – Parallel Computers – Architecture and Programming

(PHI) 20004 Joshy Joseph & Craig Fellenstein, “Grid Computing”, Pearson/PHI PTR-2003.

Page 31: punjabiuniversity.ac.inpunjabiuniversity.ac.in/syllabi/Old Syllabi [For... · Web viewB. TECH. THIRD YEAR COMPUTER ENGINEERING (Batch 2010) Session (2012-13) SCHEME OF PAPERS FIFTH

MBA 5012 FOUNDATIONS OF MANAGERIAL ACCOUNTING

L T P Credits 3 1 0 3.5

Management Accounting and Cost Concepts. Investing Activities: Nature of Long-Lived Assets, Depreciation methods. Long-term Liabilities. Equity Financing: Nature of equities, Accounting for Equities, Retained Earnings. Investments in Debt and Equity Securities: Trading Securities, Available-for-sale Securities, Held-to-maturity securities. Statement of Cash Flows: Purpose, Classification. Financial Statement Analysis: Ratios, Common-Size Financial Statements. Activity-Based Costing. Cost Behavior and Decisions using C-V-P analysis: Importance of C-V-P, Analysis of Mixed costs, Methods of C-V-P analysis. Capital Investment Decisions: Nondiscounted Capital Budgeting Techniques, Discounted Capital Budgeting Techniques.

Recommended Books:1. Charles T. Horngren, George Foster and Srikant M. Datra, Cost Accounting: A Managerial

Emphasis, Prentice-Hall of India, New Delhi, 12th Edition.

2. Charles T. Horngren, Introduction to Management Accounting, Prentice-Hall of India, New

Delhi, 12th Edition, 2007.