The Department of Computer Science and Engineering present in First Floor, Sesha Sai Block of the campus is well equipped to cater the needs of classrooms, laboratories, library, and research centres and other facilities.
The Department of Computer Science and Engineering consists of
⦁ 11 Classrooms
⦁ 16 Labs
⦁ A Seminar Hall
⦁ A Department Library
⦁ 6 Research Centers.
Each classroom is well equipped with a
⦁ White board
⦁ LCD projector
The Department of Computer Science and Engineering has an exclusive well-stacked library.
The Library collection consists of
⦁ 300 Text books
⦁ 10 Print Journals
⦁ News papers
⦁ E-Journals and e-books
The Department of Computer Science and Engineering has six research centers to encourage the faculty and students towards research in the area of Networks, Cloud Computing, Big Data Analytics, Machine Learning, and Artificial Intelligence.
Research Centers:
⦁ Microsoft Innovation Center
⦁ Big Data Apex Center of Excellence
⦁ Cloud Computing Center of Excellence
⦁ Center for Artificial Intelligence and Machine Learning
⦁ Center for Data Engineering
⦁ CISCO Networking Academy
The seminar hall is well equipped with a projector and can accommodate 500 members at a time. The seminar hall is used to organize technical seminars, Guest Lectures, webinars, and cultural events.
The Department of Computer Science and Engineering has 16 labs. All these labs are catered with high end systems along with internet facility and configured with latest software.
LABORATORIES
I YEAR II SEMESTER
PROGRAMMING FOR PROBLEM SOLVING LAB
The lab is spread over an area of 154.8 sqm and is well equipped with 63 desktops. The lab is attended by I year B.TECH (CIVIL, ECE, MECH) students in First Semester and I year B.TECH (CSE, EEE, IT) in Second Semester to practice C programming Language.
The objective of programming for problem solving lab is to make students work with an IDE to create edit, compile, run and debug C programs. In the lab, students analyze the steps in program development. The lab imparts basic knowledge of programming fundamentals of C programming language. The lab also imparts the writing skill of a C programming to the students and solving problems. The lab imparts knowledge on concepts like Control Flow, Array, Functions, Pointers, File, and Structures.
HARDWARE:
⦁ 60 HP Desktops
⦁ 11 KVA UPS
⦁ 7 KVA UPS
SOFTWARE:
⦁ Ubuntu 14.04
⦁ gcc compiler
⦁ g++ compiler
LIST OF EXPERIMENTS
Practice sessions:
⦁ Write a simple program that prints the results of all the operators available in C (including pre/ post increment, bitwise and/or/not, etc.). Read required operand values from standard input.
⦁ Write a simple program that converts one given data type to another using auto conversion and casting. Take the values form standard input.
Simple numeric problems:
⦁ Write a program for fiend the max and min from the three numbers.
⦁ Write the program for the simple, compound interest.
⦁ Write program that declares Class awarded for a given percentage of marks, where
mark <40%= Failed, 40% to <60% = Second class, 60% to <70%=First class, >=
70% = Distinction. Read percentage from standard input.
⦁ Write a program that prints a multiplication table for a given number and the number
of rows in the table. For example, for a number 5 and rows = 3, the output should be:
5 x 1 = 5
5 x 2 = 10
5 x 3 = 15
⦁ Write a program that shows the binary equivalent of a given positive number between 0 to 255.
Expression Evaluation:
⦁ A building has 10 floors with a floor height of 3 meters each. A ball is dropped from the top of the building. Find the time taken by the ball to reach each floor. (Use the formula s = ut+(1/2)at^2 where u and a are the initial velocity in m/sec (= 0) and acceleration in m/sec^2 (= 9.8 m/s^2)).
⦁ Write a C program, which takes two integer operands and one operator from the user, performs the operation and then prints the result. (Consider the operators +,-,*, /, % and use Switch Statement)
⦁ Write a program that finds if a given number is a prime number
⦁ Write a C program to find the sum of individual digits of a positive integer and test given number is palindrome.
⦁ A Fibonacci sequence is defined as follows: the first and second terms in the sequence are 0 and 1. Subsequent terms are found by adding the preceding two terms in the sequence. Write a C program to generate the first n terms of the sequence.
⦁ Write a C program to generate all the prime numbers between 1 and n, where n is a value supplied by the user.
⦁ Write a C program to find the roots of a Quadratic equation.
⦁ Write a C program to calculate the following, where x is a fractional value.
1-x/2 +x^2/4-x^3/6
⦁ Write a C program to read in two numbers, x and n, and then compute the sum of this geometric progression: 1+x+x^2+x^3+………….+x^n. For example: if n is 3 and x is 5, then the program computes 1+5+25+125.
Arrays, Functions, Pointers, Files:
⦁ Write a C program to find the minimum, maximum and average in an array of integers.
⦁ Write a functions to compute mean, variance, Standard Deviation, sorting of n elements in single dimension array.
⦁ Write a C program that uses functions to perform the following:
⦁ Addition of Two Matrices
⦁ Multiplication of Two Matrices
⦁ Transpose of a matrix with memory dynamically allocated for the new matrix as row and column counts may not be same.
⦁ Write C programs that use both recursive and non-recursive functions
⦁ To find the factorial of a given integer.
⦁ To find the GCD (greatest common divisor) of two given integers.
⦁ To find x^n
⦁ Write a program for reading elements using pointer into array and display the values using array.
⦁ Write a program for display values reverse order from array using pointer.
⦁ Write a program through pointer variable to sum of n elements from array.
Files:
⦁ Write a C program to display the contents of a file to standard output device.
⦁ Write a C program which copies one file to another, replacing all lowercase characters with their uppercase equivalents.
⦁ Write a C program to count the number of times a character occurs in a text file. The file name and the character are supplied as command line arguments.
⦁ Write a C program that does the following: It should first create a binary file and store 10 integers, where the file name and 10 values are given in the command line. (hint: convert the strings using atoi function) Now the program asks for an index and a value from the user and the value at that index should be changed to the new value in the file. (hint: use fseek function) The program should then read all 10 values and print them back.
⦁ Write a C program to merge two files into a third file (i.e., the contents of the firs t file followed by those of the second are put in the third file).
Strings:
⦁ Write a C program to convert a Roman numeral ranging from I to L to its decimal equivalent.
⦁ Write a C program that converts a number ranging from 1 to 50 to Roman equivalent
⦁ Write a C program that uses functions to perform the following operations:
⦁ To insert a sub-string in to a given main string from a given position.
⦁ To delete n Characters from a given position in a given string.
⦁ Write a C program to determine if the given string is a palindrome or not (Spelled same in both directions with or without a meaning like madam, civic, noon, abcba, etc.)
⦁ Write a C program that displays the position of a character ch in the string S or – 1 if S doesn‘t contain ch.
⦁ Write a C program to count the lines, words and characters in a given text.
Miscellaneous:
⦁ Write a menu driven C program that allows a user to enter n numbers and then choose between finding the smallest, largest, sum, or average. The menu and all the choices are to be functions. Use a switch statement to determine what action to take. Display an error message if an invalid choice is entered.
⦁ Write a C program to construct a pyramid of numbers as follows:
1
1 2
1 2 3
*
* *
* * *
1
2 3
4 5 6
1
2 2
3 3 3
4 4 4 4
*
* *
* * *
* *
*
Sorting and Searching:
⦁ Write a C program that uses non recursive function to search for a Key value in a given
list of integers using linear search method.
⦁ Write a C program that uses non recursive function to search for a Key value in a
given sorted list of integers using binary search method.
⦁ Write a C program that implements the Bubble sort method to sort a given list of integers in ascending order.
⦁ Write a C program that sorts the given array of integers using selection sort in descending order
⦁ Write a C program that sorts the given array of integers using insertion sort in descending order.
II YEAR I SEMESTER
C++ PROGRAMMING LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 32 desktops. The lab is attended by II year First Semester B.TECH students to practice C++ programming.
The objective of C++ Programming Lab is to introduce Object oriented concepts to the students using C++ programming Language. In the lab, students program simple applications for Student Management System using the techniques of Data abstraction, Data Encapsulation, Inheritance, and Polymorphism.
HARDWARE:
⦁ 30 HP Desktops
⦁ 2 Dell Optiplex 3060 Desktops
⦁ 11 KVA UPS
SOFTWARE:
⦁ TURBO C++
⦁ MS-OFFICE 2007
LIST OF EXPERIMENTS
⦁ Write a C++ Program to display Names, Roll No., and grades of 3 students who have appeared in the examination. Declare the class of name, Roll No. and grade. Create an array of class objects. Read and display the contents of the array.
⦁ Write a C++ program to declare Struct. Initialize and display contents of member variables.
⦁ Write a C++ program to declare a class. Declare pointer to class. Initialize and display the contents of the class member.
⦁ Given that an EMPLOYEE class contains following members: data members: Employee number, Employee name, Basic, DA, IT, Net Salary and print data members.
⦁ Write a C++ program to read the data of N employee and compute Net salary of each employee (DA=52% of Basic and Income Tax (IT) =30% of the gross salary).
⦁ Write a C++ to illustrate the concepts of console I/O operations.
⦁ Write a C++ program to use scope resolution operator. Display the various values of the same variables declared at different scope levels.
⦁ Write a C++ program to allocate memory using new operator.
⦁ Write a C++ program to create multilevel inheritance. (Hint: Classes A1, A2, A3)
⦁ Write a C++ program to create an array of pointers. Invoke functions using array objects.
⦁ Write a C++ program to use pointer for both base and derived classes and call the member function. Use Virtual keyword.
DATA STRUCTURES LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by II year First Semester B.TECH students to program Data Structures.
The objective of Data Structures Lab is to develop the generic skills to design and implement ADTs, Non linear Data structures for a broad-based set of computing problem in various domains. In the lab, students design and evaluate Abstract Data Types, develop programs for Data structures like stacks, queues and linked lists, Non-linear data structures like trees, graphs, and implement searching and sorting algorithms using C programming language.
HARDWARE:
⦁ 30 WIPRO Desktops
⦁ 3 Dell Optiplex 3060 Desktops
⦁ 1 DELTA 11KVA UPS
SOFTWARE:
⦁ g++ compiler
⦁ MS OFFICE
LIST OF EXPERIMENTS
⦁ Write a program that uses functions to perform the following operations on singly linked list.
i)Creation ii) Insertion iii) Deletion iv) Traversal
⦁ Write a program that uses functions to perform the following operations on doubly linked list.
i)Creation ii) Insertion iii) Deletion iv) Traversal
⦁ Write a program that uses functions to perform the following operations on circular linked list.
i)Creation ii) Insertion iii) Deletion iv) Traversal
⦁ Write a program that implement stack (its operations) using
i)Arrays ii) Pointers
⦁ Write a program that implement Queue (its operations) using
i)Arrays ii) Pointers
⦁ Write a program that implements the following sorting methods to sort a given list of integers in ascending order
i)Bubble sort ii) Selection sort iii) Insertion sort
⦁ Write a program that use both recursive and non recursive functions to perform the following searching operations for a Key value in a given list of integers:
i) Linear search ii) Binary search
⦁ Write a program to implement the tree traversal methods.
⦁ Write a program to implement the graph traversal methods.
IT WORKSHOP LAB
The lab is spread over an area of 116.1 sqm and is well equipped with 36 desktops. The lab is attended by II year First Semester B.TECH students to practice IT Workshop.
The objective of IT Workshop is to impart basic computer usage and maintenance skills and to introduce the students to a suite of productivity tools that will aid the students in their day to day activities. The IT Workshop prepares the student to have a hands-on experience in maintaining and troubleshooting a PC by themselves. IT workshop works in a learning-by-doing mode. It concentrates more on hands-on experience for the participants rather theoretical classes. It enables the participant to make the best use of Microsoft Office Suite in their day-to-day requirements and make use of it to improve the standards in the educational environment.
HARDWARE:
⦁ 31 HCL Desktops
⦁ 5 Dell Optiplex 3060 Desktops
⦁ 1 BLADE SERVER
⦁ 1 APC 5KVA UPS
SOFTWARE:
⦁ MS OFFICE
⦁ Latex
LIST OF EXPERIMENTS
PC Hardware
Task 1: Identify the peripherals of a computer, components in a CPU and its functions. Draw the block diagram of the CPU along with the configuration of each peripheral and submit to your instructor.
Task 2: Every student should disassemble and assemble the PC back to working condition. Lab instructors should verify the work and follow it up with a Viva. Also students need to go through the video which shows the process of assembling a PC. A video would be given as part of the course content.
Task 3: Every student should individually install MS windows on the personal computer. Lab instructor should verify the installation and follow it up with a Viva.
Task 4: Every student should install Linux on the computer. This computer should have windows installed. The system should be configured as dual boot with both windows and Linux. Lab instructors should verify the installation and follow it up with a Viva
Task 5: Hardware Troubleshooting: Students have to be given a PC which does not boot due to improper assembly or defective peripherals. They should identify the problem and fix it to get the computer back to working condition. The work done should be verified by the instructor and followed up with a Viva.
Task 6: Software Troubleshooting: Students have to be given a malfunctioning CPU due to system software problems. They should identify the problem and fix it to get the computer back to working condition. The work done should be verified by the instructor and followed up with a Viva.
Internet & World Wide Web
Task1: Orientation & Connectivity Boot Camp: Students should get connected to their Local Area Network and access the Internet. In the process they configure the TCP/IP setting. Finally students should demonstrate, to the instructor, how to access the websites and email. If there is no internet connectivity preparations need to be made by the instructors to simulate the WWW on the LAN.
Task 2: Web Browsers, Surfing the Web: Students customize their web browsers with the LAN proxy settings, bookmarks, search toolbars and pop up blockers. Also, plug-ins like Macromedia Flash and JRE for applets should be configured.
Task 3: Search Engines & Netiquette: Students should know what search engines are and how to use the search engines. A few topics would be given to the students for which they need to search on Google. This should be demonstrated to the instructors by the student.
Task 4: Cyber Hygiene: Students would be exposed to the various threats on the internet and would be asked to configure their computer to be safe on the internet. They need to first install antivirus software, configure their personal firewall and windows update on their computer. Then they need to customize their browsers to block pop ups, block active x downloads to avoid viruses and/or worms.
LaTeX and WORD
Task 1 – Word Orientation: The mentor needs to give an overview of LaTeX and Microsoft (MS) office 2007/ equivalent (FOSS) tool word: Importance of LaTeX and MS office 2007/ equivalent (FOSS) tool Word as word Processors, Details of the four tasks and features that would be covered in each, Using LaTeX and word – Accessing, overview of toolbars, saving files, Using help and resources, rulers, format painter in word.
Task 2: Using LaTeX and Word to create project certificate. Features to be covered:- Formatting Fonts in word, Drop Cap in word, Applying Text effects, Using Character Spacing, Borders and Colors, Inserting Header and Footer, Using Date and Time option in both LaTeX and Word.
Task 3: Creating project abstract Features to be covered:-Formatting Styles, Inserting table, Bullets and Numbering, Changing Text Direction, Cell alignment, Footnote, Hyperlink, Symbols, Spell Check, Track Changes.
Task 4 : Creating a Newsletter : Features to be covered:- Table of Content, Newspaper columns, Images from files and clipart, Drawing toolbar and Word Art, Formatting Images, Textboxes, Paragraphs and Mail Merge in word.
Excel
Excel Orientation: The mentor needs to tell the importance of MS office 2007/ equivalent (FOSS) tool Excel as a Spreadsheet tool, give the details of the four tasks and features that would be covered in each. Using Excel – Accessing, overview of toolbars, saving excel files, Using help and resources.
Task 1: Creating a Scheduler – Features to be covered: Gridlines, Format Cells, Summation, auto fill, Formatting Text
Task 2 : Calculating GPA – .Features to be covered:- Cell Referencing, Formulae in excel – average, std.deviation, Charts, Renaming and Inserting worksheets, Hyper linking, Count function, LOOKUP/VLOOKUP
Task 3: Performance Analysis – Features to be covered:- Split cells, freeze panes, group and outline, Sorting, Boolean and logical operators, Conditional formatting
.
LaTeX and MS/equivalent (FOSS) tool Power Point
Task 1: Students will be working on basic power point utilities and tools which help them create basic power point presentation. Topic covered during this week includes: – PPT Orientation, Slide Layouts, Inserting Text, Word Art, Formatting Text, Bullets and Numbering, Auto Shapes, Lines and Arrows in both LaTeX and PowerPoint. Students will be given model power point presentation which needs to be replicated (exactly how it’s asked).
Task 2: Second week helps students in making their presentations interactive. Topic covered during this week includes: Hyperlinks, Inserting –Images, Clip Art, Audio, Video, Objects, Tables and Charts.
Task 3: Concentrating on the in and out of Microsoft power point and presentations in LaTeX. Helps them learn best practices in designing and preparing power point presentation. Topic covered during this week includes: – Master Layouts (slide, template, and notes), Types of views (basic, presentation, slide slotter, notes etc), and Inserting – Background, textures, Design Templates, Hidden slides.
II YEAR II SEMESTER
OPERATING SYSTEMS LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by II year Second Semester B.TECH students to program Operating Systems functions.
The Operating Systems lab complements the Operating Systems Course. The objective of the lab is to make the students understand the principles in the design and implementation of operating systems software. In this lab, students implement the concepts of operating systems such as system calls, CPU scheduling, process management, memory management, Inter Process Communication and deadlock handling using C language in Linux environment.
HARDWARE:
⦁ 30 HP PRO 330 MT Desktops
⦁ 1 HP 280 G3 Desktop
⦁ 4 Dell Optiplex 3060 Desktops
⦁ 1 DELTA 6 KVA UPS
⦁ EPSON Projector
SOFTWARE:
⦁ TURBO C
⦁ MS-OFFICE 2007
LIST OF EXPERIMENTS
⦁ Write C programs to simulate the following CPU Scheduling algorithms
a) FCFS b) SJF c) Round Robin d) priority
⦁ Write programs using the I/O system calls of UNIX/LINUX operating system
(open, read, write, close, fcntl, seek, stat, opendir, readdir)
⦁ Write a C program to simulate Bankers Algorithm for Deadlock Avoidance and Prevention.
⦁ Write a C program to implement the Producer – Consumer problem using semaphores using UNIX/LINUX system calls.
⦁ Write C programs to illustrate the following IPC mechanisms
a) Pipes b) FIFOs c) Message Queues d) Shared Memory
⦁ Write C programs to simulate the following memory management techniques
a) Paging b) Segmentation
JAVA PROGRAMMING LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by II year Second Semester B.TECH students to practice JAVA programming.
The objective of JAVA Programming Lab is to develop an in depth understanding of programming in Java. In this lab, students develop the programs for Object Oriented concepts, packages, Interfaces, Strings, Exception Handling, File Handling, I/O Streams, Processes and Threads, Multithreaded applications with synchronization using JAVA programming language. Students also develop Graphical User Interface using applets and swing controls.
HARDWARE:
⦁ 30 HP Desktops
⦁ 2 Dell Optiplex 3060 Desktops
⦁ 11 KVA UPS
SOFTWARE:
⦁ JDK 1.8
⦁ Eclipse
⦁ NetBeans
⦁ MS-OFFICE 2007
LIST OF EXPERIMENTS
⦁ Use Eclipse or Net bean platform and acquaint with the various menus. Create a test project, add a test class, and run it. See how you can use auto suggestions, auto fill. Try code formatter and code refactoring like renaming variables, methods, and classes. Try debug step by step with a small program of about 10 to 15 lines which contains at least one if else condition and a for loop.
⦁ Write a Java program that works as a simple calculator. Use a grid layout to arrange buttons for the digits and for the +, -,*, % operations. Add a text field to display the result. Handle any possible exceptions like divided by zero.
⦁ a) Develop an applet in Java that displays a simple message
b) Develop an applet in Java that receives an integer in one text field, and computes its factorial Value and returns it in another text field, when the button named “Compute” is clicked.
⦁ Write a Java program that creates a user interface to perform integer divisions. The user enters two numbers in the text fields, Num1 and Num2. The division of Num1 and Num 2 is displayed in the Result field when the Divide button is clicked. If Num1 or Num2 were not an integer, the program would throw a Number Format Exception. If Num2 were Zero, the program would throw an Arithmetic Exception. Display the exception in a message dialog box.
⦁ Write a Java program that implements a multi-thread application that has three threads. First thread generates random integer every 1 second and if the value is even, second thread computes the square of the number and prints. If the value is odd, the third thread will print the value of cube of the number.
⦁ Write a Java program for the following:
Create a doubly linked list of elements.
Delete a given element from the above list.
Display the contents of the list after deletion.
⦁ Write a Java program that simulates a traffic light. The program lets the user select one of three lights: red, yellow, or green with radio buttons. On selecting a button, an appropriate message with “Stop” or “Ready” or “Go” should appear above the buttons in selected color. Initially, there is no message shown.
⦁ Write a Java program to create an abstract class named Shape that contains two integers and an empty method named print Area (). Provide three classes named Rectangle, Triangle, and Circle such that each one of the classes extends the class Shape. Each one of the classes contains only the method print Area () that prints the area of the given shape.
⦁ Suppose that a table named Table.txt is stored in a text file. The first line in the file is the header, and the remaining lines correspond to rows in the table. The elements are separated by commas. Write a java program to display the table using Labels in Grid Layout.
⦁ Write a Java program that handles all mouse events and shows the event name at the center of the window when a mouse event is fired (Use Adapter classes).
⦁ Write a Java program that loads names and phone numbers from a text file where the data is organized as one line per record and each field in a record are separated by a tab (\t). It takes a name or phone number as input and prints the corresponding other value from the hash table
(hint: use hash tables).
⦁ Write a Java program that correctly implements the producer – consumer problem using the concept of inter thread communication.
⦁ Write a Java program to list all the files in a directory including the files present in all its subdirectories.
⦁ Write a Java program that implements Quick sort algorithm for sorting a list of names in ascending order
⦁ Write a Java program that implements Bubble sort algorithm for sorting in descending order and also shows the number of interchanges occurred for the given set of integers.
DATABASE MANAGEMENT SYSTEMS LAB
The lab is spread over an area of 116.1 sqm and is well equipped with 32 desktops. The lab is attended by II year Second Semester B.TECH students to practice Database Management Systems Functions.
The objective of Database Management Systems lab is to develop the ability to design, implement and manipulate databases as well as to build Database management systems. In the lab, students practice DDL and DML commands, triggers, procedures, cursors using Oracle and MYSQL software.
HARDWARE:
⦁ 30 DELL-390 Desktops
⦁ 1 Dell Optiplex 3060 Desktop
⦁ 1 BLADE SERVER
⦁ 1 DELTA 7 KVA UPS
SOFTWARE:
⦁ MS OFFICE
⦁ MYSQL
⦁ Oracle 11 G
LIST OF EXPERIMENTS
⦁ Concept design with E-R Model
⦁ Relational Model
⦁ Normalization
⦁ Practicing DDL commands
⦁ Practicing DML commands
⦁ Querying (using ANY, ALL, IN, Exists, NOT EXISTS, UNION, INTERSECT, Constraints etc.)
⦁ Queries using Aggregate functions, GROUP BY, HAVING and Creation and dropping of Views.
⦁ Triggers (Creation of insert trigger, delete trigger, update trigger)
⦁ Procedures
⦁ Usage of Cursors
III YEAR I SEMESTER
COMPUTER NETWORKS LAB
The lab is spread over an area of 116.1 sqm and is well equipped with 33 desktops. The lab is attended by III year First Semester B.TECH students to practice and program Computer Networks.
The objective of Computer Networks lab is to learn basic concepts of computer networking and acquire practical working of protocols with the emphasis on TCP/IP. In the lab, students program in C and JAVA language to implement error detection and error correction codes, congestion control algorithms, routing algorithms. This lab makes students familiar to the working environment of WireShark, a network protocol analyzer and NS2 Simulator.
HARDWARE:
⦁ 30 HP 280 G3 Desktops
⦁ 3 Dell Optiplex 3060 Desktops
⦁ 6 KVA DELTA UPS
SOFTWARE:
⦁ Turbo C
⦁ JDK 1.8
⦁ Eclipse
⦁ NetBeans
⦁ NS2
⦁ Wireshark
LIST OF EXPERIMENTS
⦁ Implement the data link layer framing methods such as character, character-stuffing and bit stuffing.
⦁ Write a program to compute CRC code for the polynomials CRC-12, CRC-16 and CRC CCIP
⦁ Develop a simple data link layer that performs the flow control using the sliding window protocol, and loss recovery using the Go-Back-N mechanism.
⦁ Implement Dijsktra’s algorithm to compute the shortest path through a network.
⦁ Take an example subnet of hosts and obtain a broadcast tree for the subnet.
⦁ Implement distance vector routing algorithm for obtaining routing tables at each node.
⦁ Implement data encryption and data decryption.
⦁ Write a program for congestion control using Leaky bucket algorithm.
⦁ Write a program for frame sorting technique used in buffers.
Wireshark
⦁ Packet Capture Using Wire shark
⦁ Starting Wire shark
⦁ Viewing Captured Traffic
⦁ Analysis and Statistics & Filters.
⦁ How to run Nmap scan
⦁ Operating System Detection using Nmap
⦁ Do the following using NS2 Simulator
⦁ NS2 Simulator-Introduction
⦁ Simulate to Find the Number of Packets Dropped
⦁ Simulate to Find the Number of Packets Dropped by TCP/UDP
⦁ Simulate to Find the Number of Packets Dropped due to Congestion
⦁ Simulate to Compare Data Rate& Throughput.
⦁ Simulate to Plot Congestion for Different Source/Destination
⦁ Simulate to Determine the Performance with respect to Transmission of Packets
WEB TECHNOLOGIES LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by III year First Semester B.TECH students to practice Web Technologies.
The Web Technologies Lab is intended to make the student develop web applications using the language of the web “HyperText Markup Language” (HTML) , “ Cascading Style Sheets” (CSS) for adding styles to the web pages, Javascript to create and control dynamic web pages. This lab will also expose students to understand the difference between client side scripting languages, programming, and server side scripting languages. In this lab students also learn to convert static web pages into dynamic and interactive web pages using HyperText Preprocessor (PHP), Servlets, Java Server Pages (JSP).
HARDWARE:
⦁ 30 HP 280 G3 Desktops
⦁ 3 Dell Optiplex3060 Desktops
⦁ 11 KVA DELTA UPS
SOFTWARE:
⦁ JDK 1.8
⦁ APACHE 2
⦁ APACHE TOMCAT 7
⦁ PHP
⦁ ORACLE 11G
⦁ MYSQL
⦁ MS-OFFICE 2007
LIST OF EXPERIMENTS
⦁ Write a PHP script to print prime numbers between 1-50.
⦁ PHP script to
⦁ Find the length of a string.
⦁ Count no of words in a string.
⦁ Reverse a string.
⦁ Search for a specific string.
⦁ Write a PHP script to merge two arrays and sort them as numbers, in descending order.
⦁ Write a PHP script that reads data from one file and write into another file.
⦁ Develop static pages (using Only HTML) of an online book store. The pages should resemble: www.amazon.com. The website should consist of the following pages.
⦁ Home page
⦁ Registration and user Login
⦁ User Profile Page
⦁ Books catalog
⦁ Shopping Cart
⦁ Payment By credit card
⦁ Order Conformation
⦁ Validate the Registration, user login, user profile and payment by credit card pages using JavaScript.
⦁ Create and save an XML document on the server, which contains 10 users information. Write a program, which takes User Id as an input and returns the user details by taking the user information from the XML document.
⦁ Install TOMCAT web server. Convert the static web pages of assignments 2 into dynamic webpages using servlets and cookies.
Hint: Users information (user id, password, credit card number) would be stored in web.xml. Each user should have a separate Shopping Cart.
⦁ Redo the previous task using JSP by converting the static web pages of assignments 2 into dynamic web pages. Create a database with user information and books information. The books catalogue should be dynamically loaded from the database. Follow the MVC architecture while doing the website.
SOFTWARE ENGINEERING LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 34 desktops. The lab is attended by III year First Semester B.TECH students to practice and program Software Engineering.
The objective of Software Engineering Lab is to make the students acquire the software development skills through various stages of software life cycle. Students will also be able to ensure the quality of software through software development with various protocol based environment. In this lab, students will be able to generate test cases for software testing. Students will also be able to handle software development models through rational method. IBM Rational Rose Enterprise Edition software is used to serve the objectives.
HARDWARE:
⦁ 30 HP 280 G3 Desktops
⦁ 3 Dell Optiplex3060 Desktops
⦁ 1 WIPRO Desktop
⦁ 6 KVA UPS
⦁ 1 EPSON Projector
SOFTWARE:
⦁ JDK 1.8
⦁ MS-OFFICE 2007
⦁ IBM RATIONAL SEED PROGRAM(Licensed)
⦁ IBM RATIONAL SOFTWARE ARCHITECT (Licensed)
⦁ IBM RATIONAL FUNCTIONAL TESTER (Licensed)
⦁ IBM RATIONAL QUALITY MANAGER
⦁ SELENIUM
LIST OF EXPERIMENTS
Do the following 8 exercises for any two projects given in the list of sample projects or any other projects:
⦁ Development of problem statement.
⦁ Preparation of Software Requirement Specification Document, Design Documents and Testing
⦁ Phase related documents.
⦁ Preparation of Software Configuration Management and Risk Management related documents.
⦁ Study and usage of any Design phase CASE tool.
⦁ Performing the Design by using any Design phase CASE tools.
⦁ Develop test cases for unit testing and integration testing.
⦁ Develop test cases for various white box and black box testing techniques.
Sample Projects:
⦁ Passport automation System
⦁ Book Bank
⦁ Online Exam Registration
⦁ Stock Maintenance System
⦁ Online course reservation system
⦁ E-ticketing
⦁ Software Personnel Management System
⦁ Credit Card Processing
⦁ E-book management System.
⦁ Recruitment system
DESIGN AND ANALYSIS OF ALGORITHMS LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by III year First Semester B.TECH students to practice and program Design and Analysis of Algorithms.
The objective of Design and analysis of algorithms Lab is to make students program to design an algorithm to a real world problem and to analyze the running time of algorithms. In the lab, students program in JAVA programming language to implement Divide and Conquer, Greedy Method, Graph traversals, Dynamic Programming, Backtracking techniques.
HARDWARE:
⦁ 29 DEL OPTILEX 390 Desktops
⦁ 1 LENOVO Desktop
⦁ 3 Dell Optiplex3060 Desktops,
⦁ 11 KVA UPS
⦁ 1 Hitachi Projector
SOFTWARE:
⦁ JDK 1.8
⦁ Eclipse
⦁ NetBeans
LIST OF EXPERIMENTS:
⦁ Write a java program to implement Quick sort algorithm for sorting a list of integers
in ascending order
⦁ Write a java program to implement Merge sort algorithm for sorting a list of integers
in ascending order.
⦁ i)Write a java program to implement the dfs algorithm for a graph.
ii) Write a. java program to implement the bfs algorithm for a graph.
⦁ Write a java programs to implement backtracking algorithm for the N-queens problem.
⦁ Write a java program to implement the backtracking algorithm for the sum of subsets
problem.
⦁ Write a java program to implement the backtracking algorithm for the Hamiltonian
Circuits problem.
⦁ Write a java program to implement greedy algorithm for job sequencing with
deadlines.
⦁ Write a java program to implement Dijkstra’s algorithm for the Single source shortest
path problem.
⦁ Write a java program that implements Prim’s algorithm to generate minimum cost
spanning tree.
⦁ Write a java program that implements Kruskal’s algorithm to generate minimum cost spanning tree
⦁ Write a java program to implement Floyd’s algorithm for the all pairs shortest path
problem.
⦁ Write a java program to implement Dynamic Programming algorithm for the 0/1
Knapsack problem.
⦁ Write a java program to implement Dynamic Programming algorithm for the Optimal Binary Search Tree Problem.
R PROGRAMMING LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by III year First Semester B.TECH students to practice Data Analytics using R programming language.
The objective of R programming lab is to introduce R programming language and R Studio to students. In the lab, students practice basic R programs and import, review, summarize datasets in R. Students will also explore datasets to create testable hypotheses and identify appropriate statistical tests.
HARDWARE:
⦁ 29 DEL OPTILEX 390 Desktops
⦁ 1 LENOVO Desktop
⦁ 3 Dell Optiplex3060 Desktops,
⦁ 11 KVA UPS
⦁ 1 Hitachi Projector
SOFTWARE:
⦁ R
⦁ R Studio
LIST OF EXPERIMENTS:
⦁ Write an R-Program to print Hello World.
⦁ Write an R-Program to take input from user.
⦁ Write an R-Program to demonstrate working with operators (Arithmetic, Relational, Logical, Assignment operators).
⦁ Write an R Program to Check if a Number is Odd or Even
⦁ Write an R Program to check if the given Number is a Prime Number
⦁ Write an R Program to Find the Factorial of a Number
⦁ Write an R Program to Find the Factors of a Number
⦁ Write an R Program to Find the Fibonacci sequence Using Recursive Function
⦁ Write an R Program to Make a Simple Calculator
⦁ Write an R Program to Find L.C.M of two numbers
⦁ Write an R Program to create a Vector and to access elements in a Vector
⦁ Write an R Program to create a Matrix and access rows and columns using functions colnames() and rownames() .
⦁ Write an R Program to create a Matrix using cbind() and rbind() functions.
⦁ Write an R Program to create a Matrix from a Vector using dim() function.
⦁ Write an R Program to create a List and modify its components.
⦁ Write an R Program to create a Data Frame.
⦁ Write an R Program to access a Data Frame like a List.
⦁ Write an R Program to access a Data Frame like a Matrix.
⦁ Write an R Program to create a Factor.
⦁ Write an R Program to Access and Modify Components of a Factor.
⦁ Write an R Program to create an S3 Class and S3 Objects.
⦁ Write an R Program to write a own generic function in S3 Class.
⦁ Write an R Program to create an S4 Class and S4 Objects.
⦁ Write an R Program to write a own generic function in S4 Class.
⦁ Write an R Program to create Reference Class and modify its Methods.
III YEAR II SEMESTER
MACHINE LEARNING LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by III year B.TECH Second Semester students to practice and program Machine Learning.
The objective of Machine Learning Lab is to make students understand the implementation procedures for the machine learning algorithms. In the lab, students design python programs for machine learning algorithms. In the lab, students identify and apply machine leaning algorithms to solve real world problems.
HARDWARE:
⦁ 30 HP 280 G3 Desktops
⦁ 3 Dell Optiplex3060 Desktops
⦁ 11 KVA DELTA UPS
SOFTWARE:
⦁ ORACLE 11G
⦁ MYSQL
⦁ MS-OFFICE 2007
⦁ PYTHON
⦁ ANACONDA
LIST OF EXPERIMENTS
⦁ The probability that it is Friday and that a student is absent is 3 %. Since there are 5 school days in a week, the probability that it is Friday is 20 %. What is theprobability that a student is absent given that today is Friday? Apply Baye’s rule in python to get the result. (Ans: 15%)
⦁ Extract the data from database using python
⦁ Implement k-nearest neighbours classification using python
⦁ Given the following data, which specify classifications for nine combinations of VAR1 and VAR2 predict a classification for a case where VAR1=0.906 and VAR2=0.606, using the result of kmeans clustering with 3 means (i.e., 3 centroids)
VAR1 VAR2 CLASS
1.713 1.586 0
0.180 1.786 1
0.353 1.240 1
0.940 1.566 0
1.486 0.759 1
1.266 1.106 0
1.540 0.419 1
0.459 1.799 1
0.773 0.186 1
The following training examples map descriptions of individuals onto high, medium and low credit-worthiness.
medium skiing design single twenties no -> highRisk
high golf trading married forties yes -> lowRisk
low speedway transport married thirties yes -> medRisk
medium football banking single thirties yes -> lowRisk
high flying media married fifties yes -> highRisk
low football security single twenties no -> medRisk
medium golf media single thirties yes -> medRisk
medium golf transport married forties yes -> lowRisk
high skiing banking single thirties yes -> highRisk
low golf unemployed married forties yes -> highRisk
Input attributes are (from left to right) income, recreation, job, status, age-group, home-owner. Find the unconditional probability of `golf’ and the conditional probability of `single’ given `medRisk’ in the dataset?
⦁ Implement linear regression using python.
⦁ Implement Naïve Bayes theorem to classify the English text.
⦁ Implement an algorithm to demonstrate the significance of genetic algorithm.
⦁ Implement the finite words classification system using Back-propagation algorithm
COMPILER DESIGN LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by III year Second Semester B.TECH students to program and practice Compiler Design.
The objective of the Compiler Design Lab is to understand and implement the principles, techniques, and also available tools used in compiler construction process. This will enable the students to work in the development phase of new computer languages in industry.
HARDWARE:
⦁ 30 WIPRO Desktops
⦁ 3 Dell Optiplex 3060 Desktops
⦁ 1 DELTA 11KVA UPS
SOFTWARE:
⦁ g++ compiler
⦁ YACC compiler
⦁ MS OFFICE
LIST OF EXPERIMENTS
⦁ Write a LEX Program to scan reserved word & Identifiers of C Language
⦁ Implement Predictive Parsing algorithm
⦁ Write a C program to generate three address codes.
⦁ Implement SLR(1) Parsing algorithm
⦁ Design LALR bottom up parser for the given language
<program> ::= <block>
<block> ::= { <variabledefinition> <slist> }
| { <slist> }
<variabledefinition> ::= int <vardeflist> ;
<vardeflist> ::= <vardec> | <vardec> , <vardeflist>
<vardec> ::= <identifier> | <identifier> [ <constant> ]
<slist> ::= <statement> | <statement> ; <slist>
<statement> ::= <assignment> | <ifstatement> | <whilestatement>
| <block> | <printstatement> | <empty>
<assignment> ::= <identifier> = <expression>
| <identifier> [ <expression> ] = <expression>
<ifstatement> ::= if <bexpression> then <slist> else <slist> endif
| if <bexpression> then <slist> endif
<whilestatement> ::= while <bexpression> do <slist> enddo
<printstatement> ::= print ( <expression> )
<expression> ::= <expression> <addingop> <term> | <term> | <addingop> <term>
<bexpression> ::= <expression> <relop> <expression>
<relop> ::= < | <= | == | >= | > | !=
<addingop> ::= + | –
<term> ::= <term> <multop> <factor> | <factor>
<multop> ::= * | /
<factor> ::= <constant> | <identifier> | <identifier> [ <expression>]
| ( <expression> )
<constant> ::= <digit> | <digit> <constant>
<identifier> ::= <identifier> <letterordigit> | <letter>
<letterordigit> ::= <letter> | <digit>
<letter> ::= a|b|c|d|e|f|g|h|i|j|k|l|m|n|o|p|q|r|s|t|u|v|w|x|y|z
<digit> ::= 0|1|2|3|4|5|6|7|8|9
<empty> has the obvious meaning
Comments (zero or more characters enclosed between the standard C/Java-style comment brackets
/*…*/) can be inserted. The language has rudimentary support for 1-dimensional arrays. The
declaration int a[3] declares an array of three elements, referenced as a[0], a[1] and a[2]. Note
also that you should worry about the scoping of names.
A simple program written in this language is:
{ int a[3],t1,t2;
t1=2;
a[0]=1; a[1]=2; a[t1]=3;
t2=-(a[2]+t1*6)/(a[2]-t1);
if t2>5 then
print(t2);
else {
int t3;
t3=99;
t2=-25;
print(-t1+t2*t3); /* this is a comment
on 2 lines */
}
endif
}
NETWROK PROGRAMMING LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by III year Second Semester B.TECH students to practice Network Programming.
The objective of Network Programming Lab is to introduce Network related commands and configuration files in Linux Operating System. In the lab, students practice network programming using Linux system calls and analyze network traffic using network monitoring tools like WireShark.
HARDWARE:
⦁ 23 DELL OPTILEX 380 Desktops
⦁ 1 LENOVO 500 Desktop
⦁ 9 Dell Optiplex 3060 Desktops
⦁ 1 DELTA 7KVA UPS
SOFTWARE:
⦁ g++ compiler
⦁ NS2 Simulator
⦁ WireShark
LIST OF EXPERIMENTS
⦁ Implement programs for Inter Process Communication using PIPE, Message Queue and Shared Memory.
⦁ Write a programme to create an integer variable using shared memory concept and increment the variable simultaneously by two processes. Use semaphores to avoid race conditions.
⦁ Design TCP iterative Client and server application to reverse the given input sentence
⦁ Design TCP iterative Client and server application to reverse the given input sentence
⦁ Design TCP client and server application to transfer file
⦁ Design a TCP concurrent server to convert a given text into upper case using multiplexing system call “select”
⦁ Design a TCP concurrent server to echo given set of sentences using poll functions
⦁ Design UDP Client and server application to reverse the given input sentence
⦁ Design UDP Client server to transfer a file
⦁ Design using poll client server application to multiplex TCP and UDP requests for converting a given text into upper case.
⦁ Design a RPC application to add and subtract a given pair of integers
SCRIPTING LANGUAGES LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 33 desktops. The lab is attended by III year Second Semester B.TECH students to practice Scripting Languages.
The objective of Scripting Languages lab is to make the students understand the difference between programming language and scripting language. In the lab, students practice simple programs using scripting languages like Ruby, Perl, and TCL. Students also develop web based projects using Ruby, Perl and TCL.
HARDWARE:
⦁ 23 DELL OPTILEX 380 Desktops
⦁ 1 LENOVO 500 Desktop
⦁ 9 Dell Optiplex 3060 Desktops
⦁ 1 DELTA 7KVA UPS
SOFTWARE:
⦁ g++ compiler
⦁ Python3 (Open Source)
⦁ Ruby
LIST OF EXPERIMENTS
⦁ Write a Ruby script to create a new string which is n copies of a given string where n is a nonnegative integer
⦁ Write a Ruby script which accept the radius of a circle from the user and compute the parameter and area.
⦁ Write a Ruby script which accept the user’s first and last name and print them in reverse order with a space between them
⦁ Write a Ruby script to accept a filename from the user print the extension of that
⦁ Write a Ruby script to find the greatest of three numbers
⦁ Write a Ruby script to print odd numbers from 10 to 1
⦁ Write a Ruby scirpt to check two integers and return true if one of them is 20 otherwise return their sum
⦁ Write a Ruby script to check two temperatures and return true if one is less than 0 and the other is greater than 100
⦁ Write a Ruby script to print the elements of a given array
⦁ Write a Ruby program to retrieve the total marks where subject name and marks of a student stored in a hash
⦁ Write a TCL script to find the factorial of a number
⦁ Write a TCL script that multiplies the numbers from 1 to 10
⦁ Write a TCL script for Sorting a list using a comparison function
⦁ Write a TCL script to (i)create a list (ii )append elements to the list (iii)Traverse the list (iv)Concatenate the list
⦁ Write a TCL script to comparing the file modified times.
⦁ Write a TCL script to Copy a file and translate to native format.
⦁ a)Write a Perl script to find the largest number among three numbers.
b) Write a Perl script to print the multiplication tables from 1-10 using subroutines.
⦁ Write a Perl program to implement the following list of manipulating functions
a)Shift b)Unshift c) Push
⦁ a) Write a Perl script to substitute a word, with another word in a string.
b) Write a Perl script to validate IP address and email address.
⦁ Write a Perl script to print the file in reverse order using command line arguments
CRYPTOGRAPHY AND NETWORK SECURITY LAB
The lab is spread over an area of 116.1 sqm and is well equipped with 33 desktops. The lab is attended by III year Second Semester B.TECH students to program and practice Cryptography and Network Security.
The objective of the lab is to provide practical exposure to students on cryptography. In this lab, students implement cryptographic algorithms using C and Java programming language. The lab provides practical approach to encryption techniques, Message Authentication codes, symmetric and asymmetric key algorithms for cryptography.
HARDWARE:
⦁ 30 HP 280 G3 Desktops
⦁ 3 Dell Optiplex 3060 Desktop
⦁ 6 KVA DELTA UPS
SOFTWARE:
⦁ Turbo C
⦁ JDK 1.8
⦁ Eclipse
⦁ NetBeans
LIST OF EXPERIMENTS
⦁ Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program should XOR each character in this string with 0 and displays the result.
⦁ Write a C program that contains a string (char pointer) with a value ‘Hello world’. The program should AND or and XOR each character in this string with 127 and display the result.
⦁ Write a Java program to perform encryption and decryption using the following algorithms
⦁ Ceaser cipher
⦁ Substitution cipher
⦁ Hill Cipher
⦁ Write a C/JAVA program to implement the DES algorithm logic.
⦁ Write a C/JAVA program to implement the Blowfish algorithm logic.
⦁ Write a C/JAVA program to implement the Rijndael algorithm logic.
⦁ Write the RC4 logic in Java Using Java cryptography; encrypt the text “Hello world” using Blowfish. Create your own key using Java key tool.
⦁ Write a Java program to implement RSA algorithm.
⦁ Implement the Diffie-Hellman Key Exchange mechanism using HTML and JavaScript.
⦁ Calculate the message digest of a text using the SHA-1 algorithm in JAVA.
⦁ Calculate the message digest of a text using the MD5 algorithm in JAVA.
IV YEAR I SEMESTER
DATA MINING LAB
The lab is spread over an area of 116.1 sqm and is well equipped with 31 desktops. The lab is attended IV year First Semester B.TECH students to program Data Mining techniques.
The objective of Data Mining Lab is to give practical exposure to students on data mining techniques on real world datasets. In the lab students, visualize and analyze the attributes of the dataset, apply data pre-processing techniques and apply data mining algorithms related to association mining, classification, clustering based on the data mining problem and analyze the performance of the algorithm using WEKA, a data mining tool.
HARDWARE:
⦁ 30 DELL-390 Desktops
⦁ 1 Dell Optiplex 3060 Desktop
⦁ 1 BLADE SERVER
⦁ 1 DELTA 7 KVA UPS
SOFTWARE:
⦁ PENTAHO DATA INTEGRATION TOOL
⦁ R
⦁ R STUDIO
⦁ WEKA
⦁ MS OFFICE
⦁ MYSQL
⦁ Oracle 11 G
LIST OF EXPERIMENTS
Task 1: Credit Risk Assessment
Description: The business of banks is making loans. Assessing the credit worthiness of an applicant is of crucial importance. You have to develop a system to help a loan officer decide whether the credit of a customer is good, or bad. A bank’s business rules regarding loans must consider two opposing factors. On the one hand, a bank wants to make as many loans as possible. Interest on these loans is the banks profit source. On the other hand, a bank cannot afford to make too many bad loans. Too many bad loans could lead to the collapse of the bank. The bank’s loan policy must involve a compromise: not too strict, and not too lenient. To do the assignment, you first and foremost need some knowledge about the world of credit. You can acquire such knowledge in a number of ways.
⦁ Knowledge Engineering. Find a loan officer who is willing to talk. Interview her and try to represent her knowledge in the form of production rules.
⦁ Books. Find some training manuals for loan officers or perhaps a suitable textbook on finance. Translate this knowledge from text form to production rule form. 3. Common sense. Imagine yourself as a loan officer and make up reasonable rules which can be used to judge the credit worthiness of a loan applicant.
⦁ Case histories. Find records of actual cases where competent loan officers correctly judged when, and when not to, approve a loan application.
The German Credit Data: Actual historical credit data is not always easy to come by because of confidentiality rules. Here is one such dataset, consisting of 1000 actual cases collected in Germany. Credit dataset (original) Excel spreadsheet version of the German credit data. In spite of the fact that the data is German, you should probably make use of it for this assignment. (Unless you really can consult a real loan officer!) A few notes on the German dataset
⦁ DM stands for Deutsche Mark, the unit of currency, worth about 90 cents Canadian (but looks and acts like a quarter).
⦁ owns_telephone. German phone rates are much higher than in Canada so fewer people own telephones.
⦁ foreign_worker. There are millions of these in Germany (many from Turkey). It is very hard to get German citizenship if you were not born of German parents.
⦁ There are 20 attributes used in judging a loan applicant. The goal is to classify the applicant into one of two categories, good or bad.
PYTHON PROGRAMMING LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 32 desktops. The lab is attended by I year First Semester and IV year First Semester B.TECH students to practice Python Programming.
The objective of Python Programming lab is to introduce core programming basics and program design with functions, Object-Oriented Programming, in-depth data and information processing techniques and high-performance programs designed to strengthen the practical expertise.
HARDWARE:
⦁ 30 DEL OPTILEX 390 Desktops
⦁ 2 Dell Optiplex 3060 Desktops
⦁ 6 KVA UPS
SOFTWARE:
⦁ PYTHON3 (OPEN SOURCE)
⦁ PYTHON (IDE)
⦁ Anaconda
⦁ Jupyter Notebook
⦁ MYSQL
⦁ MSOFFICE
LIST OF EXPERIMENTS
⦁ Write a program to demonstrate different number data types in Python.
⦁ Write a program to perform different Arithmetic Operations on numbers in Python.
⦁ Write a program to create, concatenate and print a string and accessing sub-string from a given string.
⦁ Write a python script to print the current date in the following format “Sun May 29 02:26:23 IST 2017”
⦁ Write a program to create, append, and remove lists in python.
⦁ Write a program to demonstrate working with tuples in python.
⦁ Write a program to demonstrate working with dictionaries in python.
⦁ Write a python program to find largest of three numbers.
⦁ Write a Python program to convert temperatures to and from Celsius, Fahrenheit. [Formula : c/5 = f-32/9 ]
⦁ Write a Python program to construct the following pattern, using a nested for loop
*
* *
* * *
* * * *
* * * * *
* * * * * *
⦁ Write a Python script that prints prime numbers less than 20.
⦁ Write a python program to find factorial of a number using Recursion.
⦁ Write a program that accepts the lengths of three sides of a triangle as inputs. The
⦁ program output should indicate whether or not the triangle is a right triangle (Recall from the Pythagorean Theorem that in a right triangle, the square of one side equals the sum of the squares of the other two sides).
⦁ Write a python program to define a module to find Fibonacci Numbers and import the module to another program.
⦁ Write a python program to define a module and import a specific function in that module to another program.
⦁ Write a script named copyfile.py. This script should prompt the user for the names of two text files. The contents of the first file should be input and written to the second file.
⦁ Write a program that inputs a text file. The program should print all of the unique words in the file in alphabetical order.
⦁ Write a Python class to convert an integer to a roman numeral.
⦁ Write a Python class to implement pow(x, n)
⦁ Write a Python class to reverse a string word by word.
ANDROID APPLICATION DEVELOPMENT LAB
The lab is spread over an area of 77.4 sqm and is well equipped with 34 desktops. The lab is attended by IV year First Semester B.TECH students to practice Android Application Development.
The objective of the lab is to make students learn the fundamentals of developing Android Applications, from project creation to installation on a physical device. In this lab, students make use of Android Studio to develop an android application. In this lab, students develop user interface applications, URL related android applications.
HARDWARE:
⦁ 30 HP 280 G3 Desktops
⦁ 3 Dell Optiplex3060 Desktops
⦁ 1 WIPRO Desktop
⦁ 6 KVA UPS
⦁ 1 EPSON Projector
SOFTWARE:
⦁ JDK 1.8
⦁ ANDROID STUDIO
⦁ MS-OFFICE 2007
LIST OF EXPERIMENTS
⦁ a)Create an Android application that shows Hello + name of the user and run it on an emulator.
b) Create an application that takes the name from a text box and shows hello message along with the name entered in text box, when the user clicks the OK button.
⦁ Create a screen that has input boxes for User Name, Password, Address, Gender (radio buttons for male and female), Age (numeric), Date of Birth (Date Picket), State (Spinner) and a Submit button. On clicking the submit button, print all the data below the Submit Button. Use
⦁ Linear Layout , Relative Layout and
⦁ Grid Layout or Table Layout.
⦁ Develop an application that shows names as a list and on selecting a name it should show the details of the candidate on the next screen with a “Back” button. If the screen is rotated to landscape mode (width greater than height), then the screen should show list on left fragment and details on right fragment instead of second screen with back button. Use Fragment transactions and Rotation event listener.
⦁ Develop an application that uses a menu with 3 options for dialing a number, opening a website and to send an SMS. On selecting an option, the appropriate action should be invoked using intents.
⦁ Develop an application that inserts some notifications into Notification area and whenever a notification is inserted, it should show a toast with details of the notification.
⦁ Create an application that uses a text file to store user names and passwords (tab separated fields and one record per line). When the user submits a login name and password through a screen, the details should be verified with the text file data and if they match, show a dialog saying that login is successful. Otherwise, show the dialog with Login Failed message.
⦁ Create a user registration application that stores the user details in a database table.
⦁ Create a database and a user table where the details of login names and passwords are stored. Insert some names and passwords initially. Now the login details entered by the user should be verified with the database and an appropriate dialog should be shown to the user.