m.tech - information technology - jntucek...engineering, kakinada was established in the year 1990....

212
1 Self-Assessment Report (SAR) For Accreditation of Postgraduate Engineering Programme (TIER-I) M.Tech - Information Technology PART-A & PART-B submitted by Department of Computer Science and Engineering J.N.T.U. College of Engineering Kakinada (A), Jawaharlal Nehru Technological University Kakinada Kakinada Andhra Pradesh To NATIONAL BOARD OF ACCREDITATION New Delhi - 110003, India

Upload: others

Post on 20-Mar-2020

4 views

Category:

Documents


1 download

TRANSCRIPT

1

Self-Assessment Report (SAR)

For Accreditation of Postgraduate Engineering

Programme (TIER-I)

M.Tech - Information Technology

PART-A & PART-B

submitted by

Department of Computer Science and Engineering

J.N.T.U. College of Engineering Kakinada (A),

Jawaharlal Nehru Technological University Kakinada

Kakinada Andhra Pradesh

To

NATIONAL BOARD OF ACCREDITATION

New Delhi - 110003, India

2

Contents

Title Page No.

PART- A

1. Institutional Information 05

09 2. Departmental Information

3. Programme Specific Information 14

PART- B

1. Vision, Mission and Programme Educational Objectives 16

2. Programme Outcomes 30

3. Programme Curriculum 60

4. Students’ Performance 117

5. Faculty Contributions 124

6. Facilities and Technical Support 147

7. Teaching-Learning Process 154

8. Governance, Institutional Support and Financial Resources 167

9. Continuous Improvement 188

Declaration 212

3

Self-Assessment Report (SAR)

for

NBA Accreditation of Postgraduate

Engineering Programme

PART-I

INSTITUTIONAL SUMMARY

University College of Engineering Kakinada (A),

Jawaharlal Nehru Technological University Kakinada

Kakinada Andhra Pradesh

National Board of Accreditation

New Delhi, India

2017

4

Part A

Self-Assessment Report (SAR)

5

I. Institutional Information

I.1.Name and address of the institution and affiliating university:

J.N.T. University College of Engineering Kakinada (A)

Jawaharlal Nehru Technological University Kakinada

Pithapuram Road, KAKINADA, East Godavari District

Pin: 533 003, Andhra Pradesh, INDIA

I.2.Name, designation, telephone number, and e-mail address of the contact person for the NBA: Dr. G.V.R. Prasada Raju, Principal Ph: 0884-2300823(O); Fax: 0884- 2386516 Mobile: 09618522555 Email: [email protected]

I.3.History of the institution (including the date of introduction and number of seats of various programmes of study along with the NBA accreditation, if any) in a tabular form:

Year Description Intake 1946 College started with the fallowing programmes (Intake Strength)

1. Civil Engineering 40 2. Mechanical Engineering 40 3. Electrical and Electronics Engineering 40

1958 Telecommunication Engineering 15

1972 Telecommunication Engineering converted into Electronics and 50

Communication Engineering

1975 Intake increased to

1. Civil Engineering 50 2. Mechanical Engineering 50 3. Electrical and Electronics Engineering 50

1987 Additional course started

1. Computer Science and Engineering 15 2002 Intake increased to 50

Computer science and Engineering

S.No. Description Intake Year of Accreditation

Strength Establishment Status

1 Civil Engineering 50 1946 YES

2 Mechanical Engineering 50 1946 YES

3 Electrical and Electronics Engineering 50 1946 YES

4 Electronics and communication 50 1958 YES

Engineering

5 Computer Science and Engineering 50 1988 YES

6 Petrochemical Engineering 50 2009 No

7 Petroleum Engineering 50 2010 No

6

Sl. No. Program Intake Year of Establishment

1. Soil Mechanics & Foundation Engineering 18+7* 1974 – 75

2. Structural Engineering 18+7* 2002 – 03

3. Advanced Electrical Power System 18+7* 2002 – 03

4. High Voltage Engineering 18+7* 1972 – 73

5. CAD/CAM 18+7* 2001 – 02

6. Machine Design 18+7* 1972 – 73

7. Instrumentation & Control Engineering 18+7* 1975 – 76

8. Computer & Communication 18+7* 2005 – 06

9. Computer Science and Engineering (CSE) 18+7* 2002 – 03

10. Information Technology 18+7* 2011 – 12 11. Petroleum (Pipeline) Engineering 18+7* 2014 – 15 * Sponsored category - seats filled by the University

I.4.Ownershipstatus:Govt. (central/state) / trust/ society (Govt./NGO/private)/ Private/ other: State Government

I.5.Mission and Vision of the Institution:

VISION: To be a premier institute of excellence developing highly talented holistic human capital that contributes to the nation through leadership in technology and innovation through engineering education.

MISSION:

• To impart Personnel Skills and Ethical Values for Sustainable Development of the Nation.

• To create Research & Industry oriented centers of excellence in all engineering disciplines.

• To be a renowned IPR generator and repository for innovative technologies. • To develop Research and Industry oriented technical talent. • To benchmark globally the academic & research output.

7

I.6.OrganizationalStructure:

Organizational chart showing the hierarchy of academics and administration is to be included

I.7.Financialstatus: Govt.(central/state)/grants-in-aid/not-for-profit / private self-Financing /other: State Government

I.8.Natureof the trust/society: It’s a Govt. Institute and not under any trust or society.

I.9.External sources of funds:

Name of the external CAY

CAY m1 CAY m2 CAY m3 source

2016-17 2015-16 2014-15 2013-14 ICS 2,12,93,243 70,35,015 57,91,747 67,88,319

I.10. Internally acquired funds:

Name of the CAY CAY m1 CAY m2 CAY m3

internal source

2016-17 2015-16 2014-15 2013-14

Students‘ fee 1,86,04,272 1,95,98,198 1,76,95,346 1,38,89,670

8

I.11. Scholarships or any other financial assistance provided to students

(Instruction: If any scholarship or financial assistance is provided to the students, then the details of such assistance over the last three financial years have to be listed here. Also mention needs to be made of the basis for the award of such scholarship).

Type of scholarship 2016-17 2015-16 2014-15 2013-14

SC 31,01,360 33,48,560 27,75,340 30,84,230

ST 9,80,540 10,42,720 11,67,440 6,99,200

OBC 74,24,980 79,55,680 64,56,140 27,29,500

Minorities 9,22,242 11,72,192 92,887 7,26,195

General 25,08,300 35,04,300 33,80,900 27,29,500

TEQIP-II for PG 98,13,805 41,62,586 59,25,497 36,00,000

TEQIP-II for PhD 35,61,561 41,39,788 37,13,285 12,96,000

I.12Basis/criterion for admission to the institution: GATE, State Level Entrance Examinations PGECET for PG Courses and EAMCET and ECET for UG Programs (Conducted by Andhra Pradesh state Government)

I.13Total number of engineering students:

CAY CAY m1 CAY m2 CAY m3 2016-17 2015-16 2014-15 2013-14

Total no. of boys: 1116 1079 1082 1054 Total no. of girls: 792 795 751 684 Total no. of students: 1908 1874 1833 1738

I.14Total number of employees

(Instruction: Total number of employees, both men and women, has to be listed here.

The data may be categorized in a tabular form as teaching and supporting staff.)

Minimum and maximum number of staff on roll in the engineering institution, during the CAY and the previous CAY (1st July to 30th June):

A. Regular Staff

Items

CAY CAY m1 CAY m2 CAY m3

2016-17 2015-16 2014-15 2013-14

Min Max Min Max Min Max Min Max

Teaching staff in engineering

M 59 65 61 65 63 65 65 65

F 23 24 24 24 24 24 24 24

Teaching staff in science & humanities

M 5 7 6 7 6 7 7 7

F 2 2 2 2 2 2 2 2

Non-teaching Staff

M 98 98 97 97 97 97 97 97

F 18 18 16 16 16 16 16 16

9

• Total Sanctioned Teaching Posts – 118

• Total Sanctioned Non teaching Posts – 243

(Instruction: Staff strength, both teaching and non-teaching, over the last three

academic years has to be listed here.)

B. Contract Staff

II. Departmental information

II.1. Name and address of the department:

Department of CSE, J.N.T.University College of Engineering (Autonomous), JNTU Kakinada, East Godavari Dist, Andhra Pradesh- 533003

II.2.Name, designation, telephone number, and email address of the contact person for the NBA:

Dr. A. Krishna Mohan, Professor& Head, Department of CSE,

J.N.T. University College of Engineering (Autonomous), J.N.T.U. Kakinada, East Godavari Dist, Andhra Pradesh- 533003 Mob: 9640027540, Email:[email protected]

II.3.History of the department including date of introduction and number of seats of various programmes of study along with the NBA accreditation, if any:

Programme Description

UG in CSE. Started with 15 seats in 1988,

Intake increased to 50 in 2002

PG in CSE

Computer Science And

Engineering

Started as CS with 25 seats in 2002

Changed as CSE in 2010

Items

CAY CAY m1 CAY m2 CAY m3

2016-17 2015-16 2014-15 2013-14

Min Max Min Max Min Max Min Max

Teaching staff in engineering

M 29 29 22 22 20 20 29 39

F 28 28 18 18 17 17 24 24

Teaching staff in science & humanities

M 20 20 20 20 23 23 18 21

F 10 10 11 11 10 10 14 14

Non-teaching Staff

M 96 96 95 95 84 84 82 95

F 26 26 27 27 19 19 18 27

10

PG in

Information Technology

Started with 25 seats in 2011

MCA Started with 30 seats in 1996

II.4.Mission and Vision of the Department (The department is required to specify its Mission and Vision).

About the Department of CSE:

The Department of Computer Science and Engineering, J.N.T.University College of

Engineering, Kakinada was established in the year 1990. The PGDCA Program was initiated

in the year 1987 - 1988 and was the first Computer Oriented course to be offered. This

course was initially started in the ECE Department. In the year 1989 - 1990, B.Tech.

Program in Computer Science and Engineering was started and was the second computer-

related program, which was also offered from the ECE Department for that year only.

Later, after the establishment of CSE Department separately in 1990, it continued to offer

the above-mentioned two courses. From 1996, M.C.A. program was started, from 2000-

2001 M.Tech CSE (Daytime) and from 2011 M.Tech IT.

The Academic Programmes for B.Tech., M.Tech. and M.C.A. are being modified

every two/three years to meet the needs of the industry. The Board of Studies in CSE

consists of 2 eminent professors from other universities and 2 well known industrialists

apart from 4 professors within our institute. Thus, our academic programs are more need

based rather than completely theory-oriented.

This department is equipped with the state-of-the-art computer laboratories and

laboratories required to cater to the needs of undergraduate and post graduate

programmes. In addition, active research is conducted in the realms of modeling,

engineering and understanding of software systems related to distributed, cognitive,

security, language engineering, databases, wireless networks, web services, cognitive

informatics and computer ergonomics domains of computing.

The Alumni of this department are occupying high positions in Multi-National

Companies like Microsoft in India and abroad, and software tycoons like TATA

Consultancy Services (TCS), Satyam, and Infotech etc. The department organized

successfully several National seminars, Workshops, and student paper contests. Most of

the students of this department are securing the jobs in reputed National and

International organizations through campus recruitments.

This department is actively involved in modernizing and developing the

laboratories with World Bank project, Technical Education Quality Improvement

Programme. All laboratories, which are useful for undergraduate programme, are

strengthened by procuring necessary equipment to conduct various experiments and

projects. In addition, new laboratories in the area of Software Testing, Internet

Technologies, Programming Languages and Data Engineering are developed to cater to

the needs of existing programmes. However, these facilities are to be augmented further

11

with new equipment to improve the facilities and to offer new post graduate

programmers. In addition, new faculty members (having expertise to teach advanced

subjects) are to be recruited. Building space is to planned and obtained for the new

courses. Library books have to be procured as per the new PG programmes to be offered.

Presently, the faculty of this department has expertise in various advanced fields in the

state-of-the-art technologies.

Vision and Mission of the Department

Vision:

Department of Computer Science and Engineering strives rigorously to impart intellectual environment with global standards that fosters the search for new knowledge in a highly dynamic computing-centric society through research & applied efforts.

Mission:

▪ To provide quality education in both theoretical and applied foundations of computer

science and train the students to solve the real world problems effectively thus enhancing

their potential for high quality careers.

▪ To facilitate the students and faculty to inculcate the research culture to advance the state

art of computer science and integrate research innovations in multi- disciplinary fields.

▪ To equip student / faculty with excellent teaching learning capabilities through advanced

learning tools and technologies.

▪ To produce students with critical thinking and lifelong learning capabilities to apply their

knowledge to uplift the living standards of the society.

▪ To produce students with enriched skill set, professional behavior, strong ethical values

and leadership capabilities so as to work with commitment for the progress of the nation.

12

II.5.List of the programmes/ departments which share human resources and/or the facilities of this department/programme (in %):

(Instruction: The institution needs to mention the different programmes

which share the human resources and facilities with this

department/programme being accredited.)

Name of the Programme & Specialization

Name of the Course (Theory)

Name of the Course (Laboratory)

Resources

Faculty Labs

I B.Tech ( ECE, ME, EEE, Civil, PE, PCE)

C Programming C Programming

√ √

IT Workshop IT Workshop √ √

IV B.Tech EEE Data Base Management Systems

IV B.Tech ECE TCP/IP √

IV B.Tech ECE Operating Systems √

I M.Tech Telecommunications

C++ C++ √

II.6. Total number of students:

UG: 214* P.G: 170

II.7.Minimum and maximum number of staff on roll during the current and three previous Academic years (1st Julyto30th June) in the department:

Items CAY(2015-16) CAY m1(2014-15) CAY m2(2013-14) CAYm3(2012-13)

Min. Max. Min. Max. Min. Max. Min. Max.

Teaching staff in the department

15(R)+ 17(A)

15(R)+ 17(A)

15(R)+ 13(A)

15(R)+ 13(A)

16(R)+ 13(A)

16(R)+ 13(A)

16(R)+ 13(A)

16(R)+ 13(A)

Non-teaching staff

8(R)+ 2(A)

8(R)+ 2(A)

8(R)+ 2(A)

8(R)+ 2(A)

8(R)+ 2(A)

8(R)+ 2(A)

7(R)+ 1(A)

7(R)+ 1(A)

Total 42 38 39 39

Note: R- Regular Staff, A-Ad-Hoc Staff.

13

II.7.1. Summary of budget for the CFY and the actual expenditure incurred in the

CFYm1, CFYm2and CFY3 (for the Department):

Items B

ud

gete

d in

CFY

20

16

-17

Act

ual

Exp

en

ses

in

CFY

20

16

-17

Bu

dge

ted

in C

FYm

1

20

15

-16

Act

ual

Exp

en

ses

in

CFY

m1

2

01

5-1

6

Bu

dge

ted

in C

FYm

2

20

14

-15

Act

ual

Exp

en

ses

in

CFY

m2

2

01

4-1

5

Bu

dge

ted

in C

FYm

3

20

13

-14

Act

ual

Exp

en

ses

in

CFY

m3

2

01

3-1

4

Lab Equipment 600000 590885 1500000 1454560 300000 292600 250000 283275

Lab Equipment (with TEQIP-II)

250000 262500 70000 70854 550000 571598 6000000 6095258

Software (with TEQIP-II)

700000 700000 225000 243260 3000000 3023879

Lab consumable --- --- 150000 137680 200000 209152 200000 192100

Maintenance and spares

--- --- --- --- --- --- --- ---

Training & Travel (with TEQIP-II)

1100000 1127725 800000 822163 900000 940392 850000 862345

Misc. expenses for academic activities

--- --- --- --- --- --- 60000 60000

Total 2650000 2681110 2520000 2485257 2175000 2257002 10360000 10516857

14

III. Programme Specific information

III.1. Name of the Programme

PG in Information Technology

(List name of the programme, as it appears on the graduate’s certificate and transcript, and abbreviation used for the programme.)

II.2. Title of the Degree

(List name of the degree title, as it appears on the graduate’s certificate and transcript, and abbreviation used for the degree.) Masters of Technology: M.Tech

III.3. Name, designation, telephone number, and email address of the Programme coordinator for the NBA:

Dr. MHM Krishna Prasad, Professor, Department of CSE,

J.N.T. University College of Engineering (Autonomous), J.N.T. University Kakinada East Godavari dist, Andhra Pradesh-533003. Mobile: +91-9989337589 Email.: [email protected]

III.4. History of the programme along with the NBA accreditation, if any:

Programme

Description

PG in. M.Tech IT

Started with 25 seats in 2011

First time applying for NBA

III.5.Deficiencies, weaknesses/concerns from previous accreditations:

This is the first accreditation application for PG programme

III.6.Totalnumber of students in the programme: 50(I Year: 25+ II Year 25)

15

III.7.Minimum and maximum number of staff for the current and three previous academic years

(1st July to 30th June) in the programme:

II.8.Summaryof budget for the CFY and the actual expenditure incurred in the

CFYm1, CFYm2 and CFY3 (exclusively for this programme in the department): *Budget expenditure is shared for UG and PG courses of the department

Programme Specific Budget Allocation and Utilization for IT

I.T. Course Budget Allocation and Utilization

Items

Bu

dge

ted

in C

FY

20

16

-17

Act

ual

Exp

en

ses

in C

FY

20

16

-17

Bu

dge

ted

in C

FYm

1

20

15

-16

Act

ual

Exp

en

ses

in

CFY

m1

20

15

-16

Bu

dge

ted

in C

FYm

2

20

14

-15

Act

ual

Exp

en

ses

in

CFY

m2

2

01

4-1

5

Bu

dge

ted

in C

FYm

3

20

13

-14

Act

ual

Exp

en

ses

in

CFY

m3

2

01

3-1

4

Lab Equipment 180000 177265 450000 436368 90000 87780 75000 84982

Lab Equipment (with TEQIP-II)

75000 78750 21000 21256 165000 171479 1800000 1828577

Software (with TEQIP-II)

210000 210000 --- --- 67500 72978 900000 907163

Lab consumable --- --- 45000 41304 60000 62745 60000 57630

Maintenance and spares

--- --- --- --- --- --- --- ---

Training & Travel (with TEQIP-II)

330000 338317 240000 246649 270000 282117 255000 258703

Misc.expenses for academic activities

--- --- --- --- --- --- 18000 18000

Total 795000 804332 756000 745577 652500 677099 3108000 3155055

Items

CAY CAY m1 CAY m2 CAY m3

Min. Max. Min. Max. Min. Max. Min. Max.

Teaching staff with the program

3 6 3 6 3 6 3 6

Non-teaching staff

2 2 2 2 2 2 2 2

16

PART B

1.Vision, Mission and Programme Educational Objectives (75) 1.1.Vision and Mission (5) 1.1.1. State the Vision and Mission of the institute and department(1)

(List and articulate the vision and mission statements of the institute and department)

INSTITUTE

Jawaharlal Nehru Technological University Kakinada is formed in the year 2008. JNTU College of

Engineering Kakinada is one of the constituent colleges of this University playing a significant role

since 1946 in imparting technological education in the state of Andhra Pradesh. It was a constituent

college of Jawaharlal Nehru Technological University, Hyderabad and recently this Institute has been

upgraded as Jawaharlal Nehru Technological University Kakinada. The college won appreciation for

judicious effective utilization of TEQIP-I funds and has been under TEQIP-II.

VISION

To be a premier institute of excellence developing highly talented holistic human capital that

contributes to the nation through leadership in technology and innovation through engineering

education.

MISSION

M1 To impart Personnel Skills and Ethical Values for Sustainable Development of the Nation

M2 To create Research & Industry oriented centers of excellence in all engineering disciplines

M3 To be a renowned IPR generator and repository for innovative technologies

M4 To develop Research and Industry oriented technical talent

M5 To benchmark globally the academic & research output

17

DEPARTMENT The Department of Computer Science & Engineering at University College of Engineering

Kakinada is formally established in 1989.It has NBA accreditation and TEQIP – II grant for promoting

research. The labs are equipped with state of art technology. The faculty is specialized in the areas of

Data Mining, Image Processing, Information Security and Computer Networks. The department aims at

promoting industry oriented research. It has MoU with TCS Ltd, Chicago State University and Loment

Technologies Ltd., USA for joint research collaboration. Department of CSE has NBA accreditation for

UG for 3 years (2016-2019) and M.Tech CSE for 3 years (2017-2020).

VISION

Department of Computer Science and Engineering strives rigorously to create intellectual academic

environment with global standards that fosters the search for new knowledge in a highly dynamic

compute-centric society through applied research.

MISSION

M1 To provide quality education in both theoretical and applied foundations of computer science and train the students to solve the real world problems effectively thus enhancing their potential for high quality careers.

M2 To facilitate the students and faculty to inculcate the research culture to advance the state-of-the art of computer science and integrate research innovations in multi-disciplinary fields.

M3 To equip students and faculty with excellent teaching-learning capabilities through advanced learning tools and technologies.

M4 To produce students with critical thinking and lifelong learning capabilities for applying their knowledge to uplift the living standards of the society.

M5 To produce students with enriched skill set, professional behavior, strong ethical values and leadership capabilities so as to work with commitment for the progress of the nation

1.1.2 Indicate how and where the Vision and Mission are published and disseminated (2)

18

(Describe in which media (e.g. websites, curricula, books, etc.) the vision and mission are published

and how these are disseminated among stakeholders)

Vision and Mission are published by displaying

➢ In the department portal of College web sitewww.jntucek.ac.in

➢ Curriculum and syllabus books

➢ On the notice board of the department.

➢ Display boards in the corridors in the Department.

1.1.3. Mention the process for defining Vision and Mission of the department (2)

(Articulate the process involved in defining the vision and mission of the department from the vision

and mission of the institute.)

Step1: Departmental Academic Committee articulates vision and mission in tune with vision and mission of the institution. Step2: The increased role of Computer Science and engineering in addressing the societal, industrial and research needs is embedded in the articulation of vision and mission of department Step3: The articulated vision and mission statements in step1 and 2 are reviewed and refined by Department Advisory Committee. Step4: Conformity and constituency in vision and mission of the department are examined through step1 and step3

1.2.Programme Educational Objectives (10)

1.2.1. Describe the Programme Educational Objectives (PEOs)(1)

(List and articulate the programme educational objectives of the programme under accreditation)

PEO’s: After completion of PG course students will become

Programme Educational Objectives

PEO 1. To produce IT professionals with in depth knowledge in software design , programming and analytical skills to cater the challenging industrial and societal needs in an effective manner with ethics and human values.

PEO 2. To produce Sustained learner to bring out creative and innovative ideas by addressing the research issues/ to serve as faculty for IT education.

PEO 3. To produce entrepreneurs in IT with good interpersonal and managerial skills to survive in multidisciplinary fields.

1.2.2. State how and where the PEOs are published and disseminated (1)

(Describe in which media (e.g. websites, curricula, books, etc.) The PEOs are published and how these are disseminated to stakeholders)

19

PEOs are published by displaying

➢ In the department portal of College web site www.jntucek.ac.in

➢ Curriculum books

➢ Display boards in the department office, library and laboratories.

➢ Display boards in the corridors in the Department.

1.2.3. List the stakeholders of the programme (1)

(List stakeholders of the programme under consideration for accreditation and articulate their relevance)

Stakeholder Relevance

Students Primary beneficiary of the programme.

Faculty

A key stakeholder in conducting the programme through mentoring the students, revising the curriculum and evaluating students.

Alumni Bridge the gap between institution and industry to promote the industry - institution symbiosis.

Parents Expectations of parents helpthe department to design the programme / realign the approaches to provide better education and employability

Educational and research Institutions

Post Graduates can serve as faculty or researchers with required teaching-learning and research abilities.

Industry as Employer

• Post Graduates can serve as an employee with required skill set.

• Employer satisfaction with students education provides the measure of programme success

Experts from premier Institutions/Universities

To improve quality of the programme

1.2.4. State the process for establishing the PEOs(3)

(Describe the process that periodically documents and demonstrates that the PEOs are based on the needs of

the programme various stakeholders.)

20

S.No. Process Frequency

of

interaction/

Year

Recommendations/Considerations

1 Alumni Interaction 1 To share Real time experience of their

employment

2 Industry

Interaction with

department

1 To get the knowledge of industrial

needs

To adopt upcoming technologies

3 Interaction with

parents

1 To know the aspirations and

expectations.

4 Feedback by

students –subject

wise

2

(1/Semester)

To assess the quality of teaching

methodologies and capabilities of

teacher

5 Exit Feedback

from outgoing

students

1 To assess the programme educational

objectives

To improve the student needs in both

co-curricular/ extracurricular

activities

6 Board of Studies

meetings

Once in two

years

Based on stakeholders feedback to

redesign curriculum by programme

experts

21

1.2.5. Establish consistency of the PEOs with the Mission of the institute (4)

(Describe how the Programme Educational Objectives are consistent with the Mission of the department.)

The picture shows the consistency and qualitative relevance (High, Medium, and Low) of PEOs with mission of institute and mission of the department

Key components From Department Mission PEO 1 PEO 2 PEO 3 M1. To provide quality education in both theoretical and applied foundations of computer science and train the students to solve the real world problems effectively thus enhancing their potential for high quality careers. M2. To facilitate the students and faculty to inculcate the research culture to advance the state-of-the art of computer science and integrate research innovations in multi-disciplinary fields. M3. To equip students and faculty with excellent teaching-learning capabilities through advanced learning tools and technologies. M4. To produce students with critical thinking and lifelong learning capabilities for applying their knowledge to uplift the living standards of the society. M5. To produce students with enriched skill set, professional behavior, strong ethical values and leadership capabilities so as to work with commitment for the progress of the nation

To produce IT

professionals with in

depth knowledge in

software design,

programming and analytical skills to cater

the challenging industrial and societal needs in an

effective manner with

ethics and human values.

To produce Sustained learner to bring out creative and innovative ideas by addressing the research issues/ to serve as faculty for IT education

To produce entrepreneurs in IT with good interpersonal and managerial skills to survive in multidisciplinary fields.

Quality education High Medium

Medium

Research Medium High Low

Teaching-Learning Medium High Medium

Sustained Learning High High

Medium

Social Responsibility with ethics High Medium

High

1.3. Achievement of Programme Educational Objectives (20)

1.3.1. Justify the academic factors involved in achievement of the PEOs (10)

(Describe the broad curricular components that contribute towards the achievement of the Programme Educational Objectives.)

➢ Attainment of PEOs through curricular components as shown in the picture.

• Innovative Curriculum Revision to meet gap between old & revised PEOs and to meet

industrial challenges

• Inclusion of Core subjects to gain the Knowledge of the Programme

• Inclusion of Elective subjects to equip knowledge of recent technologies and research

perspectives.

• Inclusion of project work to make the students to address the real world problems in

core and specific domain with cutting edge technologies.

22

• Inclusion of seminar to enhance self learning and presentation skills.

➢ Attainment of PEOs through other academic factor:

1. From Surveys of stakeholders : By conducting periodical surveys of Alumni, Industry, Students, faculty,

2. Preparation of course file by concerned faculty and provision to students at the time of admission

3. Follow the lesson plan and course schedule by the faculty. 4. Regular updates of Attendance registers indicating the topic taught and the reason

for the class is not being conducted 5. Log files

23

1.3.2. Explain how the administrative system helps in ensuring the achievement of the PEOs (10)

(Describe the committees and their functions, working process and related regulations.)

• Encourage and provide financial support to faculty and students to attend and conduct International/National workshops or seminars or conferences etc.

• Encourage and provide financial support to faculty and students to publish/present papers in technical, peer refereed National and International journals and conferences/seminars.

Academic factors- Curricular Components for the Achievement of PEO

Course Code

Course Title PEO1 PEO2 PEO3 Contribution

Theory High High High

MIT1.1 ADVANCED DATA STRUCTURES

✓ ✓ • For fundamental and advanced knowledge to address the challenging problems in Industry and Society

• To promote research in multi disciplinary fields

MIT1.2 ADVANCED GRAPH THEORY ✓ ✓

MIT1.3 PARALLEL ALGORITHMS ✓ ✓ ✓

MIT1.4 DATA MINING AND KNOWLEDGE DISCOVERY

✓ ✓ ✓

MIT1.5 ADVANCED COMPUTER NETWORKS

✓ ✓ ✓

MIT1.6 DISTRIBUTED PROGRAMMING APPLICATIONS THROUGH JAVA

✓ ✓ ✓

MIT2.1 ADVANCED UNIX PROGRAMMING

✓ ✓

MIT2.2 INFORMATION SECURITY ✓ ✓ ✓

MIT2.3 SOFT COMPUTING ✓ ✓ ✓

Electives High High Moderate

Elective 1 MIT2.4

ADHOC & SENSOR NETWORKS ✓ ✓ ✓ • For research interests and to enhance the knowledge in specific domain

• To promote research in multi disciplinary fields

• To address challenging problems related to industry and society

SEMANTIC WEBSERVICES ✓ ✓ ✓

UML AND DESIGN PATTERNS ✓

Elective 2

MIT2.5

MACHINE LEARNING

✓ ✓ ✓

INFORMATION RETRIEVAL SYSTEM

✓ ✓ ✓

ANIMATION & GAMING ✓ ✓ ✓

Elective 3

MIT 2.6

CLOUD COMPUTING

✓ ✓

IMAGE PROCESSING & PATTERN RECOGNITION

✓ ✓

INFORMATION STORAGE MANAGEMNT

✓ ✓

Practical High High Moderate

MIT1.7 IT LAB I ✓ ✓ ✓ • For Sound Applied foundations rendering solutions with the usage of modern tools and technology

MIT 2.7

IT LAB 2

✓ ✓ ✓

Project Work High High High • To address real world problems with expertise in the state-of-art of Computer science and Information Technology

• To enhance interpersonal skills with human and ethical values

Seminar Moderate High Moderate • To impart professional and presentation skills

24

• Encourage and provide financial support to faculty and students by conducting National and International technical meets.

• Depute faculty to technical teacher training programs.

• Support faculty for industrial visits on deputation for acquiring field knowledge and real time experience.

• To provide financial support for inviting external experts to deliver guest lecturers to students.

• PG students and faculty have been benefited through TEQIP II for attending workshops, short term courses and conferences.

• PG students admitted through PGCET are given scholarship under TEQIP-II

• JNTUK Library has subscribed to various International Journals.

• Faculty and Students can access online journals with institute user name and password.

The following administrative setup is put in place to ensure the attainment of PEOs ▪ Program Coordinator

▪ Course Coordinator

▪ Department Advisory Committee

Program Coordinator

Interacts and maintains liaison with key stake holders, students, faculty, Department Head and employer.

Monitor and reviews the activities of each year in program independently with course coordinators

Schedules program work plan in accordance with specifications of program objectives and outcomes

Oversees daily operations and coordinates activities of program with interrelated activities of other programs, departments or staff to ensure optimum efficiency and compliance with appropriate policies, procedures and specifications given by HOD.

Conducts and interprets various surveys required to assess POs and PEOs Course Coordinator

Coordinates and supervise the faculty teaching the particular course in the module Responsible for assessment of the course objectives and outcomes Recommend and facilitate workshops, faculty development programs, meetings or

conferences to meet the course outcomes Analyzes results of particular course and recommends the Program coordinator and/or

Head of the Department to take appropriate action Liaise with students, faculty, program coordinator and Head of the Department to

determine priorities and policies

Department Advisory Committee (DAC) DAC consists of head of the department, program coordinators, and the representatives

of key stake holders DAC chaired by head of the department, receives the report of the Program Assessment

Committee and monitors the progress of the program

25

DAC on current and future issues related to programs Develops and recommends new or revised program goals and objectives DAC meets at least once in a year to review the programs

1.4. Assessment of the achievement of the Programme Educational Objectives (35)

1.4.1. Indicate tools and processes used in assessment of the achievement of the PEOs (5)

Describe the assessment process that periodically documents and demonstrates the degree to which the Programme Educational Objectives are attained. Also include information on: a) Listing and description of the assessment processes used to gather the data upon which the evaluation of each programme educational objective is based. Examples of data collection processes may include, but are not limited to, employer surveys, graduate surveys, focus groups, industrial advisory committee meetings, or other processes that are relevant and appropriate to the programme. b) The frequency with which these assessment processes are carried out.

The process that is adopted to assess the achievement of the PEOs Tool Process Frequency/Year PEOs

Examinations ( Internal & External)

To evaluate the performance of students regularly. To assess student’s fundamental knowledge and problem solving skills.

4( 2/sem)

PEO1 PEO2

Alumni/ Employer Surveys

To assess the expertise of students in accordance with industrial needs. To assess mapping levels of the program outcomes with industrial and societal needs

1 PEO1 PEO2 PEO3

Assignments, Quizzes and Seminars

To assess the creativeness and innovativeness of the students in tune with research perspectives. To assess the levels of teaching–learning capabilities.

6 (3/sem)

PEO1 PEO2

Presentations and Projects

To assess the leadership qualities and self learning capabilities.

Project: 1 Reviews: 2

PEO2 PEO3

1.4.2. Provide the evidence for the achievement of the PEOs (30)

a) The expected level of attainment for each of the programme educational objectives;

b) Summaries of the results of the evaluation processes and an analysis illustrating the extent to which each of the programme educational objectives is being attained and; c) How the results are documented and maintained.

26

For evidence towards direct Attainment:

• Course Results

• Mapping of POs and PEOs

• Attainment values of PEOs

For evidence towards Indirect Attainment:

Evaluation Process for achievement of PEO's

Expected Level of Attainment Summary of results of the evaluation process

How the results are documented and maintained

PEO1 PEO2 PEO3

Conducting Class work High Moderate Low All courses have been conducted in all semesters

Record of time tables in each semester with the allotted faculty is available

Attendance Records of students High Moderate Low Every class is recorded with the attendance by the concern faculty

Attendance records are available with the academic section

Lesson Plans, Course files High Moderate Moderate Every Courses are delivered as per the lesson plan

Lesson plans are recorded in Attendance Records

Conducting Internal Examinations (Two per Semester for each course)

High Moderate Low

Academic calendar has been designed with class work, Internal and External Examinations

Record of Internal examination answer scripts and marks are maintained with the academic section

Conducting external examinations at the end of the semester

High Moderate Moderate Question papers are prepared with the specified syllabus

Copies of end semester question papers and answer scripts are available with the examination section

Conducting laboratories High High Moderate

Experiments are conducted as per the syllabus given and Lab records are updated weekly

Lab Attendance records are available with the academic section

Conduct internal and external laboratory exams in each semester

High High Moderate Internal and external exams are conducted

Records of internal and external laboratory results of each student along with their registration number are available with the academic section

Conducting Project Reviews three times in the duration of Project by Project Review Committee.

High High Moderate

Review meetings are conducted. Attendance of the students is recorded in the record

Record of attendance and status of the project is available in the department

Conducting Seminars two times during III Semester

Moderate Moderate High

Seminars are conducted by Project Review Committee. Attendance of the students is recorded in the record

Report is available in the department

To nominate some experts from the industry to Board of Studies to tailor the curricula and the syllabi to suit the needs of the industry. Likewise to invite eminent social activists to elicit their views on the societal needs relevant to the current state-of-art of Information Technology

Moderate Moderate High Board of Studies meetings are conducted before the start of academic year.

Record of BOS meetings is available with the academic section

27

• Placement Record

• Higher Studies Record

• Survey Record of Alumni and Industry

• Student Feed back The expected level of attainment for each of the programme educational objectives and Evidence

Type of Assessment

Expected level of attainment of PEOs (rubrics are 1 = Poor , 2 = Average , and 3 = Good )

Evidence LYG (2014-16)

PEO1 PEO2 PEO3

Direct

Examination Results (in percentage)

92 3 2 2

Project Reviews& Evaluations

(In percentage)

92 2 3 3

Indirect

Placements in Industry

(number of students)

11 3 2 2

Placements in Academia

(number of students)

10 3 3 2

Higher Studies Record (number of students)

04 2 2 2

Survey Record of Alumni

(1- Poor, 2-Average, 3- Good, 4 – Very Good,

5- Excellent)

04

3 2 2

Survey Record of Industry/Academia

(1- Poor, 2-Average, 3- Good, 4 – Very Good,

5- Excellent)

03 2 3 2

Graduate Survey (1- Poor, 2-Average, 3- Good, 4 – Very Good,

5- Excellent)

04 3 3 2

Analysis & Summaries of Evaluation Process & Evidence and documented in academic cell of University College of engineering Academic Year No of Students Examination

Results(pass %) Placements in

Industry/ Academia Registered for Higher

Education Project Reviews& Evaluations(% of Students recommended for submission)

LYG(2015-17) 24 91.3 2+placements are ongoing

-- 84

LYGm1 (2014-16)

25 92 21 01 92

LYGm2 (2013-15)

26 96.15 20 01 60

LYGm3 (2012-14)

25+2**

92.59 18 01 89

** Foreign Students

28

1.5. Indicate how the PEOs have been Redefined in the past (5)

(Articulate with rationale how the results of the evaluation of the PEOs have been used to review/redefine the PEOs)

The PEOs are redefined based on the evaluation of attainment of each PEO

• Step1 : Departmental Advisory Committee refines PEOs keeping in view the assessment & evaluation of PEOs and also the inputs of stakeholders(feedback from the alumni, employer, invited distinguished faculty, Industry, academia and market needs )

• Step2: They are also further refined in alignment with current state- of-the art and research trends and exit feedback.

• Step3: The PEOs are reviewed using SWOT analysis.

• Step4: Conformity and consistency in PEOs of the department are examined through step1 and step3.

29

30

2. Programme Outcomes (250)

2.1. Definition and Validation of Course Outcomes and Programme Outcomes (20) 2.1.1. List the Course Outcomes (COs) and Programme Outcomes (POs)(1)

(List the course outcomes of the courses in programme curriculum and programme outcomes of the

programme under accreditation)

Course Outcomes

R13 Course Structure

Course Code

Course Title(Course Category) L P C

MIT1.1 ADVANCED DATA STRUCTURES 4 0 3

MIT1.2 ADVANCED GRAPH THEORY 4 0 3

MIT1.3 PARALLEL ALGORITHMS 4 0 3

MIT1.4 DATA MINING AND KNOWLEDGE DISCOVERY 4 0 3

MIT1.5 ADVANCED COMPUTER NETWORKS 4 0 3

MIT1.6 DISTRIBUTED PROGRAMMING APPLICATIONS THROUGH JAVA 4 0 3

MIT1.7 IT LAB I 0 3 2

Course

Code

Course Title(Course Category) L P C

MIT2.1 ADVANCED UNIX PROGRAMMING 4 0 3

MIT2.2 INFORMATION SECURITY 4 0 3

MIT2.3 SOFT COMPUTING 4 0 3

MIT2.4 Elective 1

ADHOC & SENSOR NETWORKS

SEMANTIC WEBSERVICES

UML AND DESIGN PATTERNS

4 0 3

MIT2.5 Elective 2

MACHINE LEARNING

INFORMATION RETRIEVAL SYSTEM

ANIMATION & GAMING

4 0 3

MIT2.6 Elective 3

CLOUD COMPUTING

IMAGE PROCESSING & PATTERN RECOGNITION

INFORMATION STORAGE MANAGEMNT

4 0 3

MIT2.7 IT LAB 2 0 3 2

III SEMESTER

S.NO. SUBJECT L P C

1 SEMINAR-I 0 0 2

2 PROJECT WORK PART - I 0 0 18

31

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT1.2 ADVANCED GRAPH

THEORY

3 C 40 60

• Course Outcomes (COs):

1. Understand basic concepts in graph theory: coloring, planar graphs.

2. Write precise and accurate mathematical definitions of objects in graph theory

3. Describe and solve some real time problems using concepts of graph theory (e.g., scheduling problems).

4. Use some classical graph algorithms in order to find sub graphs with desirable properties

5. Find maximal flows in networks and give an account of how this method is connected with results of

Menger, Konig and Hall as well as solving certain problems by formulating them in terms of network flows

6. Compute and deduce properties of chromatic numbers and polynomials and identify certain problems as

graph colorings problems

7. .Apply results of Euler, Kuratowski-Wagner and Appel-Haken to deduce properties of (non)planar

graphs

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT1.3 PARALLEL ALGORITHMS 3 C 40 60

• Course Outcomes (COs):

1. Understand fundamental concepts of parallelism- pipeline, Amdahl's law.

2. Know the physical limits of linear approach and solving problems in parallel.

3. How to design & analyze parallel algorithms and implement them with parallel processors.

4. Understand various approaches in parallel sorting and Searching.

5. Gain knowledge on various parallel processor architectures and know how to embed one architecture into

another.

Subject Code

Subject Name Credits Core/Elective Internal marks External marks

MIT 1.1 ADVANCED DATA

STRUCTURES AND

ALGORITHM

3 C 40 60

• Course Outcomes (COs):

1. Ability to write and analyze algorithms for algorithm correctness and efficiency

2. Master a variety of advanced abstract data type (ADT) and data structures and their implementations

3. Master various searching, sorting and hash techniques and be able to apply and solve problems of real life

4. Design and implement variety of data structures including linked lists, binary trees, heaps, graphs and search

trees

5. Ability to compare various search trees and find solutions for IT related problems

IV SEMESTER

S.NO. SUBJECT L P C

1 SEMINAR-II 0 0 2

2 PROJECT WORK PART - II 0 0 18

TOTAL 20

32

Subject Code Subject Name Credits Core/Elective Internal

marks

External marks

MIT1.4 DATA MINING AND

KNOWLEDGE DISCOVERY

3 C 40 60

• Course Outcomes (COs):

1. An ability to understand the basics of types of data, quality of data, suitable measures required to perform data

analysis. (UNIT-I)

2. To understand various classification techniques to perform classification, model building and evaluation (UNIT-

II)

3. Identify the usage of association rule mining techniques on categorical and continuous data (UNIT III)

4. Identify suitable clustering algorithm (apply with open source tools), interpret, evaluate and report the

result(UNIT IV)

5. To understand the need of web mining (UNI-V)

6. Design and implement a data-mining application using synthetic, realistic data sets using open source tools viz.,

Weka

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT1.5 ADVANCED COMPUTER

NETWORKS

3 C 40 60

• Course Outcomes (COs):

Upon the successful completion of the course, students will be able to:

1.The Students will get good knowledge of Network layer functions and routing algorithms

2. The students will know different IP addressing techniques used in internet

3. The students will gains good knowledge about transport layer functions and protocols for data delivery in the

internet

4. The students will gains good knowledge about architecture of DNS, email, www and multimedia

5.The students will get good knowledge about design of Manets and Wireless Sensor networks and their

applications in reality

Subject Code Subject Name Credits Core/Elective Internal

marks

External

marks

MIT1.6 DISTRIBUTED

PROGRAMMING

APPLICATIONS THROUGH

JAVA

3 C 40 60

• Course Outcomes (COs):

The theory should be taught and practical should be carried out in such a manner that students are able to

acquire different learning out comes in cognitive, psychomotor and affective domain to demonstrate following

course outcomes.

1. Build simple distributed applications using Java’s networking capabilities

2. Build concurrent distributed applications using multiple threads

3. Build distributed applications with security enhancements using Java’s security and cryptographic

extensions.

33

4. Develop Java Applet Programming using various techniques

5. Develop applications using Abstract Window Toolkit

6. Update and retrieve the data from the databases using JDBC-ODBC.

7. Develop server side programs using servlets.

8. Develop Java Server Pages applications using JSP Tags

SNO

Subject Name Credits Core/Elective Internal marks External marks

MIT1.7 IT LAB-1 2 C 40 60

• Course Outcomes (COs):

1. Identify classes, objects, members of a class and relationships among them needed for a specific problem.

2. Analyze algorithms performance using A priori analysis and asymptotic notations.

3. Analyze and apply to solve the complex problems using advanced data structures (like arrays, stacks,

queues, linked lists, graphs and trees.

4. Ability to solve the real life problem using different algorithm design techniques

5. Using different data mining tools.

Subject Code Subject Name Credits Core/Elective Internal

marks

External marks

MIT2.1 ADVANCED UNIX

PROGRAMMING

3 C 40 60

• Course Outcomes (COs):

After learning the course, the student will be able to

1. Students will understand the basic set of commands and utilities in Linux/UNIX systems

2. Students will get good knowledge in Linux/UNIX library functions and system calls.

3. Student will gain some knowledge in UNIX administration.

4. Obtain a foundation for an advanced course in operating systems.

5. Understands various socket system calls that are used in network programming.

6. Student is able to develop one to one chat applications using various IPC system calls.

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT 2.2 Information Security 3 C 40 60

• Course Outcomes (COs):

Upon the successful completion of the course, students will be able to:

1. The learner will get good awareness regarding different security threats and countermeasures.

2. The students will know the basic principles of symmetric and asymmetric key cryptography

3. The students will gains good knowledge design and applications of hash algorithms and digital signatures.

4. The students will gains good knowledge at application layer security such as IP security, Web Security, email

Security and Firewalls.

34

Subject Code Subject Name Credits Core/Elective Internal

marks

External marks

MIT2.3 SOFT

COMPUTING

3 C 40 60

• Course Outcomes (COs):

1. Able to apply fuzzy logic and reasoning to handle uncertainty in engineering problems.

2. Make use of genetic algorithms to combinatorial optimization problems

3. Apply artificial intelligence techniques, including search heuristics, knowledge representation, planning

and reasoning.

4. Learn and apply the principles of self adopting and self organizing neuro fuzzy inference systems.

5. Evaluate and compare solutions by various soft computing approaches for a given problem

6. Evaluate and compare solutions by various soft computing approaches for a given problem.

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT2.4 ADHOC AND SENSOR

NETWORKS

3 E 40 60

• Course Outcomes (COs):

Upon completion of the course the student will be able to

1. Describe the principles and characteristics of mobile ad hoc networks (MANETs) and what distinguishes them

from infrastructure-based networks.

2. Describe the principles and characteristics of wireless sensor networks

3. Discuss the challenges in designing MAC, routing and transport protocols for wireless ad-hoc sensor networks.

4. Comprehend the various sensor network Platforms, tools and applications.

5. Describe the issues and challenges in security provisioning and also familiar with the mechanisms for

implementing security and trust mechanisms in MANETs and WSNs.

Subject Code Subject Name Credits Core/Elective Internal

marks

External marks

MIT2.4 SEMANTIC

WEBSERVICES

3 E 40 60

Course Outcomes (COs):

1. Understand the concept structure of the semantic web technology

2. How this technology revolutionizes the World Wide Web and its uses.

3. Understand the concepts of metadata, semantics of knowledge and resource, ontology, and their

descriptions in XML-based syntax and web ontology language (OWL).

4. Describe logic semantics and inference with OWL

5. Use ontology engineering approaches in semantic applications, program semantic applications with Java

API.

Subject Code Subject Name Credits Core/Elective Internal

marks

External

marks

MIT2.4 UML AND DESIGN

PATTERNS

3 E 40 60

35

• Course Outcomes (COs):

1. Design the Structural aspects of the System.

2. Design the Behavioral aspects of the System.

3. Understand and be able to apply incremental/iterative development

4. Understand common design patterns

5. Be able to identify appropriate patterns for design problems

6. Be able to evaluate the quality software source code

7. Be able to refractor badly designed program properly using patterns

Subject Code Subject Name Credits Core/Elective Internal

marks

External marks

MIT 2.5 Machine Learning 3 E 40 60

• Course Outcomes (COs):

By the end of course the student will be able

1. Familiarity with a set of well-known supervised, unsupervised and semi-supervised learning

Algorithms.

2. The ability to implement some basic machine learning algorithms

3. Understanding of how machine learning algorithms are evaluated

4. The ability to comprehend a Machine Learning conference paper (NIPS, ICML)

5. Design own machine learning algorithms

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT2.5 INFORMATION

RETRIEVAL SYSTEMS

3 E 40 60

• Course Outcomes (COs):

1. Understanding the basics of Information retrieval such as precision and recall

2. Understanding the data structures like Inverted Indices, signature files used in Information retrieval systems

3. Understanding the basics of web search

4. Understanding the different techniques for compression of an index including the dictionary and its posting

list

5. Understanding the different components of an Information retrieval system

6. Developing the ability of develop a complete IR system from scratch

7. Understand and implement with various types of string matching algorithms

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT 2.5 ANIMATION & GAMING 3 E 40 60

• Course Outcomes (COs):

1. Learn all aspects of game development from visual storytelling

2. Learn modeling of game development.

3. Learn texturing, lighting, rigging & animation of game development

36

4. Learn audio, user interface & game level design.

5. Basic understanding for the creation of 2D animation through the use of traditional techniques and stop-action

animation. Students create 2D objects and move them in time and space, then render them to video. Topics

include all twelve principles of animation.

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT2.6 CLOUD COMPUTING 3 E 40 60

• Course Outcomes (COs):

1. To explain the core concepts of the cloud computing paradigm: how and why this paradigm shift

came about, the characteristics, advantages and challenges brought about by the various models and

services in cloud computing.

2. To apply the fundamental concepts in datacenters to understand the tradeoffs in power, efficiency

and cost by Load balancing approach.

3. To discuss system virtualization and outline its role in enabling the cloud computing system model.

4. To illustrate the fundamental concepts of cloud storage and demonstrate their use in storage

systems such as Amazon S3.

5. Understanding the hardware necessary for cloud computing

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT2.6 IMAGE PROCESSING &

PATTERN RECOGNITION

3 E 40 60

• Course Outcomes (COs):

1. The student will get sound knowledge about pattern recognition.

2. The student can apply unsupervised learning techniques for pattern recognition

3. The student can apply supervised and supervised learning techniques for pattern recognition

4. One can get a clear sound knowledge about representation of digital image in memory and various operations

to get a clear enhanced image

5. The student will become expertise in applying mathematical concepts and techniques in image processing

Subject Code Subject Name Credits Core/Elective Internal

marks

External marks

MIT 2.6 INFORMATION STORAGE

MANAGEMENT

3 E 40 60

• Course Outcomes (COs):

1. Learn storage system and the different storage system models

2. Offer essential new material that explores the advances in existing technologies

3. Emergence of the "Cloud" as well as updates and vital information on new technologies.

4. Learn to make informed decisions across multiple technologies involving SAN, NAS, CAS, IP-SAN,

Backup and Recovery

5. Business Continuity, Security and Virtualization

37

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT 2.7 IT LAB 2 2 C 40 60

• Course Outcomes (COs):

On completion of this course the student should be able to:

1. Identify and use UNIX/Linux utilities to create and manage simple file processing operations, organize

directory structures with appropriate security, and develop shell scripts to perform more complex tasks.

2. Effectively use the UNIX/Linux system to accomplish typical personal, office, technical, and software

development tasks.

3. Effectively use software development tools including libraries, preprocessors, compilers, linkers, and make

files.

4. Comprehend technical documentation, prepare simple readable user documentation and adhere to style

guidelines.

5. Be familiar with the application of the Unified Modeling Language (UML) towards analysis and design.

6. Master the fundamental principles of OO programming.

Programme Outcomes:

PO1: The student shall possess fundamental and advanced knowledge of core discipline such as

networking and security, programming and computing and other IT applications.

PO2. Design and implement web enabled solutions for Information Technology problems with the

usage of different software design paradigms and patterns.

PO3. Develop higher order research skills and innovative ideas to solve unknown problems through

the application of appropriate research methodologies, techniques and tools. .

PO4. Learn and Work in competing open ended environment with modern engineering and IT tools

PO5. Obtain knowledge in cutting edge technologies to contribute positively towards collaborative

multidisciplinary scientific research.

PO6. Acquire leadership skills and project management techniques to manage projects efficiently to

work in teams.

PO7. Present their knowledge and ideas in any technical forum through the effective design of

documents and reports.

PO8. Engage in lifelong learning with commitment to acquire knowledge of contemporary issues to

meet the challenges in career.

PO9. Realize professional and ethical responsibility and act in accordance to social welfare.

PO10. Adopt Self learning abilities so as to educate or to guide others.

38

2.1.2. State how and where the Pos are published and disseminated (1)

(Describe in which media (e.g. websites, curricula, books, etc.) the Pos are published and how these

are disseminated among stakeholders)

POs are published by displaying

➢ In the department portal of Collage web site : www.jntucek.ac.in/cse

➢ Curriculum books

➢ On the flexes in the department.

➢ Display boards in the corridors in the Department.

2.1.3. Indicate processes employed for defining the Pos (3)

(Describe the process that periodically documents and demonstrates that the Pos are defined in

alignment with the graduate attributes prescribed by the NBA.)

➢ The Process employed to define the POs:

Step1: Programme Coordination Committee (Department Staff Committee) articulates P.Os keeping

in view of Graduate Attributes(GAs)and P.E.Os and disseminated to selected alumni, faculty .

Step2: Re-articulating by Department Advisory Committee based on feedback given by alumni,

faculty.

Step3: Conformity and constituency in P.Os are examined through step1 and step2 and finalized

after B.O.S approval and revision.

39

2.1.4. Indicate how the defined Pos are aligned to Graduate Attributes prescribed by the NBA (7)

(Indicate how the Pos defined for the programme are aligned with the Graduate Attributes of the NBA as articulated in accreditation manual.)

POs Graduate Attributes

PO1 Scholarship of Knowledge

PO2 Critical Thinking and Problem Solving

PO3 Research Skills

PO4 Usage of Modern Tools

PO5 Multidisciplinary Work

PO6 Project Management & Finance

PO7 Communication

PO8 Lifelong Learning

PO9 Ethical practices & Social

Responsibilities

PO10 Independent and Reflective learning

2.1.5. Establish the correlation between the Pos and the PEOs (8)

(Explain how the defined Pos of the programme correlate with the PEOs)

Program Educational Objectives

Program Educational Objectives

PEO 1

To produce IT professionals with in depth knowledge in software design, programming and

analytical skills to cater the challenging industrial and societal needs in an effective manner with

ethics and human values

PEO 2 To produce Sustained learner to bring out creative and innovative ideas by addressing the research

issues/ to serve as faculty for IT education.

PEO 3 To produce entrepreneurs in IT with good interpersonal and managerial skills to survive in

multidisciplinary fields.

Program Outcomes (POs)

PO Program Outcomes

1 The student shall possess fundamental and advanced knowledge of core discipline such as

networking and security, programming and computing and other IT applications.

2 Design and implement web enabled solutions for Information Technology problems with the

usage of different software design paradigms and patterns.

3 Develop higher order research skills and innovative ideas to solve unknown problems

through the application of appropriate research methodologies, techniques and tools.

40

Correlation between the Pos and the PEOs:

PEO PROGRAM OUTCOMES

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

PEO 1 3 3 2 3 3 2 2 2 3 2

PEO 2 2 2 3 2 3 2 2 3 2 3

PEO 3 2 - - 2 3 3 3 - - -

Degree of correlation: 2 – Moderate 3 – High

2.2. Attainment of Programme Outcomes (75)

2.2.1. Illustrate how the course outcomes contribute to the Pos (5)

(Provide the correlation between the course outcomes and the programme outcomes.

The strength of the correlation may also be indicated)

Course

Code

Course Title Program Outcomes

P

O

1

PO2 PO

3

P

O

4

P

O

5

PO

6

PO

7

P

O

8

P

O

9

PO

10

MIT1.1 ADVANCED DATA

STRUCTURES √ √ √ √ √ √ √

MIT1.2 ADVANCED GRAPH THEORY √ √ √ √ √ √ √

MIT1.3 PARALLEL ALGORITHMS √ √ √ √ √

MIT1.4 DATA MINING AND

KNOWLEDGE DISCOVERY √ √ √ √ √ √

MIT1.5 ADVANCED COMPUTER

NETWORKS √ √ √ √ √ √ √

4 Learn and Work in competing open ended environment with modern engineering and IT

tools

5 Obtain knowledge in cutting edge technologies to contribute positively towards collaborative

multidisciplinary scientific research.

6 Acquire leadership skills and project management techniques to manage projects efficiently

to work in teams.

7 Present their knowledge and ideas in any technical forum through the effective design of

documents and reports.

8 Engage in lifelong learning with commitment to acquire knowledge of contemporary issues

to meet the challenges in career.

9 Realize professional and ethical responsibility and act in accordance to social welfare.

10 Adopt Self learning abilities so as to educate or to guide others

41

MIT1.6 DISTRIBUTED PROGRAMMING

APPLICATIONS THROUGH

JAVA

√ √ √ √ √ √ √ √

MIT1.7 IT LAB I √ √ √ √ √ √ √ √ √

MIT2.1 ADVANCED UNIX

PROGRAMMING √ √ √ √ √ √ √

MIT2.2 INFORMATION SECURITY

√ √ √ √ √ √

MIT2.3 SOFT COMPUTING

√ √ √ √ √ √

MIT2.4 Elective 1

ADHOC & SENSOR NETWORKS

√ √ √ √ √

SEMANTIC WEBSERVICES

√ √ √ √ √ √ √

UML AND DESIGN PATTERNS √ √ √ √ √ √ √ √

MIT2.5 Elective 2

Machine Learning √ √ √ √ √ √ √

INFORMATION RETRIEVAL

SYSTEM

√ √ √ √ √ √ √ √

ANIMATION & GAMING √ √ √ √ √ √ √

MIT2.6 Elective 3

CLOUD COMPUTING

√ √ √ √ √ √ √ √

IMAGE PROCESSING &

PATTERN RECOGNITION

√ √ √ √ √ √ √

INFORMATION STORAGE

MANAGEMNT √ √ √ √ √ √ √

MIT2.7 IT Lab-2 √ √ √ √ √ √ √ √ √

2.2.2. Explain how modes of delivery of courses help in attainment of the Pos (5)

(Describe the different course delivery methods/modes (e.g. lecture interspersed with discussion,

asynchronous mode of interaction, group discussion, project etc.) used to deliver the courses and justify the

effectiveness of these methods for the attainment of POs. This may be further justified using the in direct

assessment methods such as course-end surveys.)

Modes of Delivery of Course:

42

2.2.3. Indicate how assessment tools used t o assess the impact of delivery of course/course content contribute

towards the attainment of course outcomes/programme outcomes (15)

(Describe different types of course assessment and evaluation methods (both direct and indirect)in practice

Modes of Delivery of

Course

POs Attained Justification

Class room Lectures

PO1, PO2, PO3, PO4,

PO5, PO6, PO7, PO9,

PO10

• To teach students about particular subject.

• To acquire the foundation & applied

knowledge with core expertise.

• Lectures are used to convey critical

information, theories.

• To expose the students with contemporary

issues and the need for life-long learning in the

appropriate context.

• Efficient way to reach large number of

students

Guest lecturers

/Seminars by subject

experts (Still and

Video)

PO2, PO3, PO4, PO5 • To impart students with applied knowledge

and critical thinking

• To develop higher order research skills from

the discussions with experts.

• To learn advanced tools and techniques to

address multidisciplinary issues

Experimentation through

lab sessions

PO2, PO3, PO4, PO7,

PO8, PO9, PO10

• To analyze and solve engineering

problems with sound applied knowledge.

• To learn cutting technologies

• To acquaint leadership qualities while

experimenting with group.

• To adopt self learning capabilities to guide

or educate others.

Seminars

PO3, PO4, PO5,PO7,

PO8, PO9,PO10

• To acquaint the students with research

challenges and analysis.

Projects

PO1, PO2, PO3, PO4,

PO5, PO6, PO7, PO8,

PO9, PO10

• To address complex engineering problems

with core and applied expertise.

• To contribute collaboratively towards

multi disciplinary scientific and research

problem through innovative ideas.

• To present their knowledge in technical

forums and workshops.

• To adopt self learning skills.

• To uplift the societal life standards

through professional and ethical

responsibility.

Assignments

PO2, PO3, PO4, PO5,

PO7,PO8, PO9

• To analyze and solve engineering

problems with sound applied knowledge.

• To relate the subject with real world

problems and its impact on society.

• To adopt self learning and lifelong

learning skills.

Group Discussion

PO4, PO6, PO7, PO8,

PO9

• To work in teams.

• To acquire leadership and management

qualities.

• To present their knowledge before group

of people.

43

and their relevance towards the attainment of POs)

• All the Courses in Programme directly related to one or more POs. Performance in

various courses reflects the extent of achievement of POs.

• Evaluation is conducted by Course teacher throughout the semester. Each Subject

contains 3 main components to evaluate.

Direct Assessment Method

Course assessment

and Evaluation Method PO

1

PO

2

PO

3

PO

4

PO

5

PO

6

PO

7

PO

8

PO

9

PO

10

Relevance

towards the

Attainment of

POs

End Semester Examinations

(Internal-Theory and Labs

√ √ √ √ √ √ √ To test the

core and

applied

knowledge of

the course

twice in

semester to

solve

engineering

problems with

modern

techniques and

tools. End Semester

Examinations(External-

Theory and Labs)

√ √ √ √ √ √ √ To test the core

and applied

knowledge of

the full course at

the end of

semester to

solve

engineering

problems with

modern

Course Work(Evaluated regularly)

•Contains Home assignments, Tutorials

•Problem Solving, Group Discussion, Quizzes

Mid Semester Examinations(Internal Evaluation)

•Conducted twice per semester/ after 7-8 weeks of instruction period

•Evaluated for 40/100 marks( Average of two mid examinations.)

End Semester Examinations( External Evaluation)

•Conducted at the end of semester( 16 -18 weeks of instruction period)

•Evaluated for 60/100.

44

techniques and

tools.

Assignments & Tutorial as

part of Course work

√ √ √ √ √ √ √ To test the

applied

knowledge of

students in

solving the real

world problems(

Home Work &

Self Solving

skills)

Projects & Presentations √ √ √ √ √ √ √ √ √ √ Project reviews

enables students

to learn cutting

edge

technologies

and exhibit their

presentation and

team skills.

Seminar Lectures √ √ √ √ √ √ √ To acquaint the

students with

research

challenges and

analysis.

INDIECT ASSESSMENT

Placements √ √ √ √ √ √ √ √ √ An evidence

for student’s

sound

fundamental

knowledge in

core discipline

and inter

personnel

skills Alumni Surveys √ √ √ √ √ √ √ √ √ √ Record of the

Surveys helps

to improve

course

symbiosis with

industry Graduate Surveys

(Mid and End of the Course)

√ √ √ √ √ √ √ √ √ √ Record of the

Surveys helps to

improve the

Teaching-

Learning

methodologies

and to know the

strengths and

weakness of the

course

Employer Survey √ √ √ √ √ √ √ √ Record of the

Surveys helps to

produce

improved

quality students

for

Industry/Acade

45

mia

Higher Studies √ √ √ √ √ √ √ √ √ An evidence for

student’s

applied

knowledge and

higher order

research skills

in inter/intra

disciplinary

fields

2.2.4 Indicate the extent to which project work/thesis contributes towards attainment of Pos (50)

(Justify how the project works /thesis works carried out as part of the programme curriculum

contribute towards the attainment of the POs.)

➢ The Project Work is spanned for one Year. It also carries credits on par with

theory and practical.

➢ Project Reviews and Seminars also provide platform for attainment of number

of POs.

▪ I-Semester: 6-Theory-Credits:3(per subject), Lab-1(combination of two

Subjects) - Credits:2

▪ II- Semester: 6 Theory -Credits:3(per subject), Lab-2(combination of

three subjects) --Credits:2

▪ III- Semester: Seminar-I(2) and Project Work Part-I(18) - Credits:20

▪ IV- Semester: Seminar-II(2) and Project Work Part –II(18) - Credits:20

Course Credits % of

weight age

Theory 36 45%

Practical 4 5%

Seminar 4 5%

Project Work 36 45%

Total 80 100%

Course Credits-% of Weightage

Theory

Practical

Seminar

Project Work

46

Project Evaluation Process

Review 1: Students has to present their problem statement and literature. PRC will evaluate and recommend suggestions

accordingly

Review 2: Students has to come up with system model and methodology with the usage of modern tools and techniques.

PRC will evaluate and recommend necessary suggestions.

Review3: Students has to demonstrate the working model along with relevant test cases.

PRC will evaluate and recommended for final submission or modification.

M.Tech Information Technology 2014-1016

Final Project Evaluation Internal Evaluation will be based on Average of two project reviews (Each review with maximum

allotment of 50 marks)

External Evaluation The thesis shall be adjudicated by one examiner selected by the University. The Principal of the College shall submit a panel

of 5 examiners, eminent in the field concerned to thesis, with the help of the guide concerned and head of the department.

The Examiner will be provided with internal evaluation report of thesis and will verify the thesis. If the report of the examiner

is favorable, Viva-Voce examination shall be conducted by a board consisting of the Supervisor, Head of the Department and

the examiner who adjudicated the Thesis. The Board shall jointly report the candidate’s work as one of the following:

A. Excellent

B. Good

C. Satisfactory

D. Unsatisfactory

If the report of the Viva-Voce is unsatisfactory, the candidate shall retake the Viva-Voce examination only

after three months. If he fails to get a satisfactory report at the second Viva-Voce examination, the candidate

has to re-register for the project and complete the project within the stipulated time after taking the approval

from the University.

Selects the area of Interest

Performs Literature

Survey and formulates

the problem formally

Implement the

solution with

modern tools and

techniques

Progress is continuously

monitored by supervisor and Project

Review Committee

Final evaluation by external examiner based on

report submitted.

Review 2 Review 3

Review 1

47

J.N.T. University College of Engineering Kakinada (A)

Department of Computer Science and Engineering

Final Project Evaluation Sheet for M.Tech (I.T.) 2014-16 Batch

Roll No. Title Internal Evaluation

External

Evaluation -

Project Grade

14021D2201 Implementation of linear programming

technique for dietician problem using

hadoop map reduce in a bib data

framework.

48 B

14021D2202 Personalized and location aware wed

service recommendation system

implementation

43 B

14021D2203 Color image encryption and decryption

using two stage Radom matrix affine

cipher associated with DWT.

48 B

14021D2204 Un Registered

14021D2205 Novel hash for data communication

based on image steganography and

position based encryption.

47 B

14021D2206 Tunner controller and pulse analysis. 45 B

14021D2207 A framework to find opinion of tweets

with text & emotions using K-means and

Sentiwordnet.

44 B

14021D2208 Privacy preserving public auditing for

multi-level encryption based cloud

storage.

47 B

14021D2209 Fine grained structured learning from

heterogeneous behavior for social

identity linkage

42 B

14021D2210 performance of matrix and graph

computations using data compression

techniques in MPI and HADOOP

47 B

14021D2211 Detection of brain tumor using fast

bounding box and SVM classifier

48 C

14021D2212 Automatic Bug triage data reduction

techniques

43 A

14021D2213 Design for multi-trust-domain network

of internet of things by using blind

folded packet transactions

43 B

14021D2214 secure and lifetime maximization

routing protocol design for wireless

sensor networks

42 A

14021D2215 Un Registered

14021D2216 Enhanced approach for multi keyword

ranked search over encrypted cloud data.

45 C

14021D2217 Efficient segmentation method for brain

tumor

48 B

14021D2218 An effective model for counter attacks

on social networks

47 B

48

14021D2219 Un Registered

14021D2220 Graph based seasonal and trend anomaly

detection thesis

45 B

14021D2221 Image compression and encryption using

CRT and CHAOTIC logistic MAP.

49 B

14021D2222 Enhanced Routing algorithm for best

relay node selection in WSN

44 B

14021D2223 Fast aggregation scheduling in wireless

sensor networks

46 A

14021D2224 Hybrid approach for integrating random

seed distribution with transitory master

key mechanisms in WSN

43 C

14021D2225 Detection and rectification of distorted

fingerprints

48 B

2.3. Evaluation of the attainment of Programme Outcomes (125)

2.3.1. Describe assessment tools and processes used for assessing the attainment of each PO (25)

Describe the assessment process that periodically documents and demonstrates the degree to which the

Programme Outcomes are attained. Also include information on:

a) Listing and description of the assessment processes used to gather the data upon which the evaluation of

each the programme outcome is based. Examples of data collection processes may include, but are not

limited to, specific exam questions, student portfolios, internally developed assessment exams, project

presentations, nationally-normed exams, oral exams, focus groups, industrial advisory committee; b) The frequency with which these assessment processes are carried out.

Frame work for overall attainment of POs:

The tools are classified as Direct and Indirect assessment tools for evaluation of POs.

Direct Assessment Tools: PG Programme is credit based with continuous evaluation system,

conducted by course coordinators throughout the semester

49

The weight distribution of components

• Contains Home assignments, Tutorials

• Problem Solving, Group Discussion, Quizzes

Course Work

(Evaluated regularly)

• Conducted twice per semester/ after 7-8 weeks of instruction period

• Evaluated for 40/100 marks( Average of two mid examinations.)

Mid Semester Examinations

(Internal Evaluation)

• Conducted at the end of semester ( 16 -18 weeks of instruction period)

• Evaluated for 60/100.

End Semester Examinations

(External Evaluation)

• Two seminar presentations conducted for 50 marks during III semester and IV semester (Internal Evaluation only)

Seminars

•Project work is carried out during III and IV semester

•Internal Evuation is done through three reviews by Project Review Committee

•External evaluation (Grades Assignment) by External Examiner

Project Work

Course Assessment

Components and

process

Weightage

in terms of

Marks

Frequency

of

Assessment

Weightage(

%)(in terms

of credits)

POs Attained

Theory(Core

/Elective)

Coursework(Evaluated

regularly)

Contains Home

assignments, Tutorials

Problem Solving,

Group Discussion,

Quizzes

-

Monthly

36

PO1, PO2, PO4,

PO5, PO6, PO7,

PO9, PO10

Mid Semester

Examinations

(Internal Evaluation)

40

(Average of

two Mid

exams)

Twice in

Semester

End Semester

Examinations(External

Evaluation)

60

Once after

Semester

Practical

Sessions

Internal Evaluation

(Weekly)

40 Weekly

4

PO1, PO2, PO3,

PO4, PO5, PO7,

PO8, PO9, PO10 End Semester

Examinations(External

Evaluation)

60 Once after

Semester

50

Indirect Assessment Tools:

• Placement record of the students who placed in either industry or academia

• Feedback surveys of alumni, outgoing students, employers about the

Performance of the programme.

Indirect Assessment Tool Frequency POs Attained

Placement Record Annually PO1, PO2, PO4, PO5, PO6, PO7

Course Outcome Feedback End of Semester PO1, PO2, PO3, PO4, PO5, PO6, PO7, PO8,

PO9, PO10

Exit Student Feedback Annually PO1, PO2, PO3, PO4, PO5, PO6, PO7, PO8,

PO9, PO10

•Students can be placed in industry as IT professional

•Can serve as faculty in affiliated colleges of JNTUK

Placement Record

•Feedback for individual subject with reference to their outcomes

Course Outcome Feedback

•In the last semester feed back for achievement of POs and GAs

Exit Feedback

•Feedback from passed out students with reference to achievement of POs

Alumni Feedback

•Feedback from industries in which students got internships/ placements with reference to

their performance.Employer feedback

Seminars Internal Evaluation periodically- 2

reviews / Sem

4

PO1, PO3, PO4,

PO5, PO6, PO7,

PO8, PO10 End Semester

Examinations(External

Evaluation)

50 Once after

Semester

Project Internal Evaluation Grades

Assignment

A-Excellent

B-Good

C-Satisfactory

D-Not

Satisfactory

periodically- 3

reviews / Sem

36

PO1, PO2, PO3,

PO4, PO5, PO6,

PO7, PO8, PO9,

PO10

End Semester

Examinations(External

Evaluation)

Once after

Semester

51

Alumni Feedback Annually PO1, PO2, PO3, PO4, PO5, PO6, PO7, PO8,

PO9, PO10

Employer Feedback Annually PO1, PO2, PO4, PO5, PO6, PO7, PO8,

PO10

Survey of students going for

Higher Education and Research

Annually PO1, PO2, PO3, PO5, PO6, PO7, PO8, PO9,

PO10

2.3.2. Indicate results of evaluation of each PO (100)

c) The expected level of attainment for each of the programme outcomes;

d) Summaries of the results of the evaluation processes and an analysis illustrating the extent to

which each of the programme outcomes are attained and

e) How the results are documented and maintained.

Direct Assessment

The program outcome assessment plan is set to primarily confirm that the students are achieving the

desired outcomes. It is also used to improve the program and the student learning, based on real evidence.

Assessm

ent

Tools

Expected Level of Attainment of POs Summaries

of the results

of the

evaluation

processes

Analysis for

the expected

level of

Attainment

How the

results are

documente

d and

maintaine

d

P

O

1

P

O

2

P

O

3

P

O

4

P

O

5

P

O

6

P

O

7

P

O

8

P

O

9

P

O

10

Course

Work

(Evaluat

ed

regularl

y)

3 3 2 2 2 2 2 2 3 3 All courses

have been

conducted in

all semesters

and recorded

in

Attendance

Registers

Conducting

course work

regularly

helps the

student to

attain

fundamental

and applied

knowledge

for problem

solving

(Assignment

and

Tutorials)

Record of

time tables

and

attendance

in each

semester is

available in

Academic

Section

Universi

ty

Examina

tions

(Internal

-Theory

and

Labs

3 3 3 3 3 1 1 3 2 3 Internal

exams are

conducted

twice per

semester

with weight

age of 40

marks.

The results

are tabulated

in Results

Helps to

assess the

regularity

and

attainment of

course work

by the

students.

Record of

Internal

examinatio

n (Lab and

theory)

answer

scripts and

marks are

maintained

with the

academic

52

Table I section

Universi

ty

Examina

tions

(Externa

l-Theory

and

Labs)

3 3 3 3 3 1 1 3 2 3 External

exams are

conducted at

the end of

semester

with weight

age of 60

marks.

The results

are tabulated

in Results

Table I

Direct

evidence for

the

attainment of

POs

through

achievement

of Course

Outcome in

accordance

with students

performance

in

examination

Copies of

end

semester

question

papers and

answer

scripts are

available

with the

examinatio

n section

Project

Work

3 3 3 2 3 3 3 3 3 3 Project work

is carried out

by the

students in

III and IV

semester and

Final

evaluation

and Grade

Assignment

is done by

external

examiner

Enables

students to

attain

expertise in

core and

specific

domain with

interpersonal

and project

management

skills

Status of

the project

is

evaluated

by Project

Review

Committee

and record

of

attendance

is available

in the

department

Seminar 3 3 2 2 2 1 3 3 2 3 Seminars on

state-of-art of

the computer

science are

conducted in

III Semester

and is being

evaluated

internally for

50 marks

Enables

students to

acquire and

improve self

learning

capabilities

and

presentation

skills

Seminars

are

evaluated

by Project

Review

Committee

and record

of

attendance

is available

in the

department

Indirect Assessment

The evaluation is based on the surveys conducted to solicit assessments from the program constituents,

such as: graduating or exit students, faculty, alumni and employers. In addition to these, assessments were

carried out based on placement data, the achievements disseminated in media/public forum and the feed

backs from professional bodies.

Assessm

ent

Tools

Expected Level of Attainment of POs Summarie

s of the

results of

the

evaluation

processes

Analysis for

the expected

level of

Attainment

How the

results are

documented

and

maintained P

O

1

P

O

2

P

O

3

P

O

4

P

O

5

P

O

6

P

O

7

P

O

8

P

O

9

P

O

10

Placeme

nts

3 3 2 2 2 2 2 2 3 3 Number

of

Students

Number of

Students

placed is an

Placement

records are

maintained

53

are placed

in various

IT

industries

(TCS,

Wipro,

CapGemin

i, Infosys,

HoneyWel

l, CMC

etc.)

Placement

Record

indirect

evidence for

attainment for

POs

by Training

and

Placement

Cell

Alumni

Survey

3 3 2 2 2 2 2 2 3 3 Conducted

annually

information

about

graduates

perception of

their learning

Survey

reports are

maintained

in the

department

Graduat

e

Surveys

(Mid

and End

of the

Course)

3 3 2 3 3 2 2 2 3 3 Conducted

twice per

semester

Key survey to

assess the

achievement of

desired

outcomes. It

helps to

improve the

program and

student

learning, based

on real

evidence

Survey

reports are

maintained

in the

department

Employ

er

Survey

2 2 1 2 2 2 2 3 2 3 Conducted

annually

Reflects on

students

learning. They

assess opinions

or thoughts

about the

graduates

knowledge or

skills

Survey

reports are

maintained

in the

department

Higher

Studies

3 3 3 2 2 2 3 3 2 3 Conducted

annually

Number of

students

registered for

Higher studies

is an evidence

to assess the

research and

self learning

skills.

Survey

reports are

maintained

in the

department

54

Summaries of the results of the evaluation processes:

Results Table: .

Attainment of POs from Examination results LYG

(2015-17) LY

Gm

1 (2014-16)

LYGm1

(2013-15)

LYGm2 (2012-14)

Approximating the Attainment of Pos from the following

Analysis

9<Number of students with CGPA<10.0 (a) 00 00 00 00

8<Number of students with CGPA<9.0 (b) 01 04 09 10

7<=8 (c) 15 15 14 13

6<=7 (d) 06 05 02 00

5<=6 (e) 01 01 00 00

Total Students Appeared (N) 23 25 25 23

Approximating percentage of Attainment of POs

(( a * 5) + (b * 4 ) + (c *3 ) + (d * 2) + (e * 1) ) * 25 / N 67.39 72 82 72.68

Project work: Year

Evaluation Results Attainment of POs based on

evaluation results

No of Students Appeared

Grade A (Excellent)

Grade B (Good)

Grade C (Satisfactory)

Grade D (Not

Satisfactory)

2015-17

23 Project submission is in the progress

2014-16

23 03 17 03 - Moderate

2013-15

25 03 19 03 - Moderate

2012-14

25 6 14 5 - Moderate

55

Placements Higher Studies Record:

Year Placements in Industry Faculty Engg.

Colleges Higher Studies

Attainment of POs based on

placements and Higher Studies

No of Students

TCS Cap Gemini

Infosys

2015-16 24 2 Placements are in Progress

2014-15 25 10 1 - 10 1 88%

2013-14 26 5 1 - 14 1 81%

2012-13 27 6 - 1 11 1 71%

56

FEEDBACK Forms:

J.N.T.UNIVERSITY COLLEGE OF ENGINEERING, JNTUK,KAKINADA

DEPARTMENT of CSE

Parent’s Feedback Form

.............................................................................................................................................................................

Name& Occupation of Parents:

Name :………………………………………………………………………………..

Name of Student/Ward :…………………………………………………………………………………

Course/semester :…………………………………………………………………….

1. Do you find this institution better than others for your ward? Yes/No.

2. Do you feel facilities in the department are good? Yes/No.

3. Are you satisfied about library facilities in the department? Yes/No.

4. Are you satisfied for cooperation from the administrative staff? Yes/No.

5. Can you make direct communication with teaching staff? Yes/No.

6. Rate the placement related training offered? Good/Satisfactory

7. Rate the learning atmosphere offered by the department Good/Satisfactory

8. Rate the teaching efficiency of the staff members Good/Satisfactory

9. Rate the curriculum and the course content Good/Satisfactory

10. Do you feel that your ward is physically secured in the department? Yes/No

Any other suggestions:

…………………………………………………………………………………………..

…………………………………………………………………………………………..

Signature :

Date :

J.N.T. University College of Engineering, JNTUK,Kakinada

DEPARTMENT of CSE

INDUSTRY FEEDBACK FORM

Name of Contact Person/Industry:

Mobile No & E-Mail:_

_______________________________________________________________________

1. Would you like to be a member of Board of Studies (BOS) to the CSE Department?

Yes/ No

2. Would you like to help in academic/ innovative activities of this Department?

57

Yes/ No

3. Opinion about CSE Department Syllabus: Is this syllabus matching to your industrial requirements?

Yes / No

4. Placement / Training: Would you like to implant training to CSE students?

Yes / No

5. Are you interested in placement of CSE students in your Industry?

Yes / No

6. Are you willing to visit CSE Department for Academic interactions?

Yes / No

7. Rate the effectiveness of the laboratory session

Good/Satisfactory

8. Will you be interested in visiting us again?

Yes / no

9. Your Overall Experience during the recruitment visit to our campus?

Good/Satisfactory

Any other Suggestions:

________________________________________________________________________________________________________________

________________________________________________________________________________________________________________

________________________________________

Signature:

J.N.T.University College of Engineering, JNTUK, Kakinada

DEPARTMENT of CSE

ALUMNI FEEDBACK FORM We shall be thankful to and appreciate you, if you can spare some of your valuable time to fill up this feedback form and give us your

valuable suggestions for further improvement of the Institute. Your valuable inputs will be of great use to improve the quality of our

academic programs and enhance the credibility of the Institute. Hence your feedback on Institute will help us to improve our approach in

Academics.

Name of the Alumni

Degree [√] B.Tech M.Tech MCA

Branch

Passing Year

Dear Alumni,

Please give your overall assessment of our Department academics. Please rate us on following criterion :

1-Unsatisfactory(UN), 2- Satisfactory(S), 3- Fair(F), 4- Good(G), 5- Very Good(VG)

Sr. Details VG G F S UN

1 Environment

2 Infrastructure & Lab facilities

3 Faculty/ Delivery of Course

4 Project Guidance

5 Quality of support material

6 Training & Placement

7 Library

8 Evaluation Procedures

9 Alumni Association/ Network of Old Friends

58

Please suggest any skills you want our Institute should focus on for grooming of students. All of your suggestions are welcome.

Any other suggestions/ comments: ______________________

2.4. Use of evaluation results towards improvement to the programme (30)

2.4.1. Indicate how the results of evaluation used for curricular improvement (5)

(Articulate with rationale the curricular improvement brought in after the review of the attainment to the

POs)

Based on the evaluation and review of the attainment of POs, modification will be attempted in

the programme curriculum aspects such as increase or decrease in the components of theory,

practical, project work, communication skills courses and elective courses.

In addition, attempt will be made to introduce new courses, labs, experiments, exercises for

project work, etc on the basis of external interaction with the industry and academia at seminar or

conference.

2.4.2. Indicate how results of evaluation used for improvement of course delivery and assessment (10)

(Articulate with rationale the curricular delivery and assessment

improvement brought in after the review of the attainment of the POs)

▪ Based on the evaluation of the attainment of POs and along with the results and analysis

of the student feedback about each lecture and course, the methods of course delivery and

59

assessment method will be reviewed.

▪ New methods will be evolved, in consultation with faculty and thus ensuring the

improvement in the course delivery.

▪ The assessment methods will also be reviewed such as increase or decrease in the

assignments, talks, presentations, quizzes, etc.

▪ Novel assessment methods may be evolved once the results of evaluation after few

years/batches are available.

2.4.3. State the process used for revising/redefining the POs (15)

(Articulate with rationale how the results of the evaluation of Pos have been used to review/redefine

the Pos in line with the Graduate Attributes of the NBA.)

This systemic attempt to articulate the POs, mostly with participation of stake holders On

board (faculty and select Alumni from reputed organizations).

However, based on the results of such evaluation and the feedback from the

Exiting graduates, we will examine the relevance of the existing POs and,

If felt necessary, based on the review and supplemented by the needs of

The nation and industry as well, POs can be revised in line with GAs of the NBA.

Programme Curriculum (75)

3.1. Curriculum (15)

60

3.1.1. Describe the Structure of the Curriculum (5)

PG programme is scheduled for 4 semesters in a span of 2 years. During First semester course

work is conducted with 6 subjects and one lab. Each subject is evaluated with Internal (40

marks) and External Examinations (60). Two Internal examinations are conducted in the mid

and end of semesters with weight-age of 40 internal marks. End examinations are conducted for

60 marks. If students pass the subject he will get 3 credits if not he/she has to rewrite the exam.

During second semester along with core and lab three electives are included. During third

semester seminar-I and project work part-I included which carries 2 and 18 credits respectively.

In fourth semester seminar-II, project work part-II included which carries 2 and18 credits

respectively.

Curricular Composition Credits

Theory courses 36

Laboratory courses 4

Seminars 4

Project work 36

R13 Course Structure:

Course

Code

Course Title(Course Category) L P C

MIT2.1 ADVANCED UNIX PROGRAMMING 4 0 3

MIT2.2 INFORMATION SECURITY 4 0 3

MIT2.3 SOFT COMPUTING 4 0 3

MIT2.4 Elective 1

ADHOC & SENSOR NETWORKS

SEMANTIC WEBSERVICES

UML AND DESIGN PATTERNS

4 0 3

MIT2.5 Elective 2 4 0 3

Course

Code

Course Title(Course Category) L P C

MIT1.1 ADVANCED DATA STRUCTURES 4 0 3

MIT1.2 ADVANCED GRAPH THEORY 4 0 3

MIT1.3 PARALLEL ALGORITHMS 4 0 3

MIT1.4 DATA MINING AND KNOWLEDGE DISCOVERY 4 0 3

MIT1.5 ADVANCED COMPUTER NETWORKS 4 0 3

MIT1.6 DISTRIBUTED PROGRAMMING APPLICATIONS

THROUGH JAVA

4 0 3

MIT1.7 IT LAB I 0 3 2

61

MACHINE LEARNING

INFORMATION RETRIEVAL SYSTEM

ANIMATION & GAMING

MIT2.6 Elective 3

CLOUD COMPUTING

IMAGE PROCESSING & PATTERN RECOGNITION

INFORMATION STORAGE MANAGEMNT

4 0 3

MIT2.7 IT LAB 2 0 3 2

III SEMESTER

S.NO. SUBJECT L P C

1 SEMINAR-I 0 0 2

2 PROJECT WORK PART - I 0 0 18

TOTAL 20

IV SEMESTER

S.NO. SUBJECT L P C

1 SEMINAR-II 0 0 2

2 PROJECT WORK PART - II 0 0 18

TOTAL 20

62

3.1.2. Justify how the curricular structure helps for the attainment of the Pos and the PEOs (10)

(Articulate how the curricular structure helps in the attainment of each PO and PEO)

S.NO COURSE PEOs PEOs

JUSTIFICATION

Pos POs

JUSTIFICATION

1

Theory

PEO1- High Fundamental and

advanced knowledge

for problem solving

Industrial Exposure to

the student.

PO1, PO2,

PO4, PO5,

PO9

Strong knowledge of

basics. Awareness of

modern tool and

adopting multi

disciplinary works

PEO2-

Moderate

Student interest in

research perspectives PO3, PO5,

PO10

Development in

Critical thinking

and problem

solving

PEO3-

Moderate

Self learning

capability of student

PO4, PO5,

PO6, PO7

Communication

and handling of

multiple

disciplinary tasks

2 Electives PEO1-

Moderate

Adopting to new

technology and tools

Advancement in

industry technology

PO2,PO3,

PO4,PO5,

PO8,PO9

Increased social

responsibility.

Adopted to

Continuous

learning

PEO2-High Multidisciplinary

research

PO1,PO2,

PO4,PO7

Communication and

handling of multiple

disciplinary tasks

PEO3-High Tools and measures

taken by student in

research.

PO1,

PO4

Strong knowledge

and usage of

modern tools.

3 Seminars PEO1-

Moderate

Updating of

knowledge

Exposes to words

upcoming

technologies

PO3, PO4,

PO5,PO8

Adoptable learning

skills.

Flexibility with

Modern tool and

methodologies

PEO2- High Awareness on

burning technology

PO3, PO5,

PO8,PO10

Independent and

adoptive learning

PEO3- High Material gathering

and presenting

PO5, PO6,

PO7

Use of modern tools

to acquire

knowledge.

4 Project PEO1-

Moderate

Invention of new

technologies

PO1,PO2,

PO4,PO5,

project management

techniques to

63

Meets need of

industrial

expectations.

PO9

manage projects

efficiently

Giving solutions to

the real time

applications

PEO2-

Moderate

Using of advanced

tools

PO3,PO5,

PO8,PO10

Get real time

experience

PEO3- High Enthusiasm to learn

new things

PO5, PO6,

PO7

Adopting Modern

tools

3.2. Indicate interaction with R&D organizations/Industry (40)

(Give the details of R&D organizations and industry involvement in the programme such as

Industry attached laboratories and partial delivery of courses and internship opportunities for students)

The department invites experts from industry for invited lectures that the students and staff attend. The

lectures result in lively discussion thus imparting current state of the art knowledge to students and staff.

➢ MOU - JNTUK & Tata Consultancy Services Ltd. 1st Feb 2010

To offer TCS-Sangam Package of TCS Academic interface programme

➢ MOU - JNTUK &Tejas Networks Ltd. 12th Feb 2010

To establish Center of Excellence in Optical Networking

➢ Draft Agreement - JNTUK &EdCIL (India) Limited 10th May 2010

For arranging admissions and placements for foreign students to pursue study and training in

Indian educational institutions

➢ MOU - JNTUK & Smart Net Working Switzerland 11th Dec 2010

To offer Global study program to promote educational and cultural enrichment and personal

growth

➢ MOU-JNTUK & M/s. Consortium of Institutions of Higher Learning (CIHL)-4th April,2012

➢ MOU-JNTUK & LOMENT Inc. Naperville, Illinois, USA 7th June 2012 on Research and

Development in the area of Mobile Financial Services & Security.

➢ MOU-JNTUK & MNCRC for research and development activities CBIT Hyderabad &JNTUK

to establish and develop “ Marine navigation and Communication Research Centre”, Academic

Exchange and co-operation in Teaching, Training, R&D activities .

64

➢ MOU-JNTUK & Chicago State University USA to offer Ph.D (External Registration) for foreign

nationals/NRIs exclusively for CSE and CS disciplines from 2016-17 academic year onwards

➢ MOU-JNTUK & TRUZIO on 16th March 2017 for Development of an Educational ERP

Software for University and affiliated colleges by utilizing domain knowledge of JNTUK Staff,

technical , functional expertise of qualified manpower of TRUZIO – B.Tech/M.Tech students

will be trained on relevant technologies

A list of some of the lectures held since last two years are given below.

Topic of Lecture

Name of the

Resource

Person

R&D

Organization/

Industry

Date

Participants No of

Partici

pants

Research Oriented

Expert Lecture

Dr. Rakesh

Chandra

Balabantaray

IIT,

Bhubaneswar

30th

December,

2016

UG, PG, Ph.D.

and Faculty

203

Research Oriented

Expert Lecture

Prof. C.

RaghavendraRa

o, Professor,

School of

Mathematics &

Computer

Sciences

University of

Hyderabad

07th

December,

2016

UG, PG, Ph.D

and Faculty

205

Possible Research

Collaboration on

Recent Trends,

Mobile & Cloud

Centric IOT

Dr.

SatishSreerama,

Mobile

Computing

Division

University of

Tartu, Estonia

3rd

December,

2016

UG, PG, Ph.D

and Faculty

200

expert lecture on

"Network Traffic

Classification"

Dr.T.Venkatesh

, ,

IIT Guwahathi 16th

December,

2015

Students &

faculty

102

"Startups and

entrepreneurship

orientation"

Teams from software industry –

Career Analytics

10th

March,

2016

Students &

faculty

98

Research

Possibilities in HPC

and multi-core

computing

Dr. V.C.V.Rao,

Associate

Director HPC-

FTE Goup C-

DAC, Pune

CDAC, Pune 5-6th

October,

2015

Students &

faculty

104

Industry Expert

Lecture during

September, 2015 on

"To Train to work on

Microsoft September,

2015 in 2

sessions.

Students &

faculty

98

65

latest Technology

aiming to enhance

research &

Implementing real

time solutions

Research oriented

expert lecture on

large scale Metric

Learning using

locality sensitive

hashing and

SMARTS

Prof.

KotagiriRama

MohanaRao

University of

Melbourn,

Australia.

14th

September,

2015

Students &

faculty

100

Research oriented

expert lecture on

Digital India Project

Proposals

Prof.C.Raghav

endraRao,

Central

University and

University of

Hyderabad,

Hyderabad.

27.08.2015

Students &

faculty

105

Research oriented

expert lecture the

Big data Analytics

Dr.R.B.V.

Subrahmanyam

NIT, Warangal.

13th

August,

2015

Students &

faculty

98

HPC and Multi core

computing and

Interaction on

National

supercomputing

mission project

Dr. V.C.V.Rao,

Associate

Director HPC-

FTE Goup C-

DAC, Pune

CDAC, Pune 13th July,

2015

Students &

faculty

102

To guide some of

our faculty in

preparing self

assessment reports

for applying

National Board

Accreditation to PG

Courses of the

College/

University

Dr.A.Koteswar

Rao, Prof. of

Information

Technology

Noted person in

guiding NBA

accreditation

process in ESCI

Anna University.

16-17th

March,

2015

Faculty 28

Research

Possibilities in HPC

and multi-Core

computing

V.C.V.Rao,

Associate

Director HPC-

FTE Goup C-

DAC, Pune

CDAC, Pune 2nd

February,

2015

PG Students 78

High performance

Computing

Dr.V.C.V.Rao, CDAC, Pune 22-01-14 UG & PG

Students

197

Expert Lecture on

recent trends in CS

Dr.N.B.

Venkateswarlu,

Former

Faculty,

Bits Pilani 28-01-14 UG & PG

Students

198

66

Privacy, Security,

Authenticity in

Cyberspace

Dr.P.S.

Avadhani

Andhra

University

03-04-14 UG & PG

Students

197

Hadoop Map Reduce Dr.R.B.V.Subra

manyam

NIT, Warangal 15-3-14 UG & PG

students

204

Role of Business

Analytics In

Transforming

Enterprises &

Society

Sri

VenkatN.Peri,

PriceWater

Coopers

04-07-13 UG & PG

Students

298

Recent trends in

Data Analytics

Dr.Dhara

Kishore

Lucent

Technologies

24-12-2013 UG & PG

students

182

Wire-less Sensor

networks

Dr. Garimella

Ram Murthy

Ex Professor,

Purdue

University USA

UG & PG

students

206

Recent trends in

Data Analytics

Dr. M N

Murthy

IISc Bangalore 24-12-

20113

UG & PG

students

180

Trends in

Technology

Mr. Surya

PrakashT

Wipro

Hyderabad

28-11-2012 UG & PG

students

200

How to pursue

project

work/research work

Prof. MM

Naidu

SV University

Tirupati

11-01-2012 UG & PG

students

202

*** IBM has sanctioned to establish Centre of Excellence in Dept. of Computer Science and

Engineering Technology

In addition the students go on summer internships to the industry during the summer vacations after III

year. This internships/training is arranged through the Training and Placement Office (TPO). A list of

some industrial units / companies where the students have gone for internship last year is given below:

In-plant Training

S.No. Company No of Students Period

1 Honey Well 1 M.Tech IT(2012-13)

2 Loment Technology 1 M.Tech IT(2013-14)

3 C-DAC 2 M.Tech IT(2014-15)

4 TRUZIO 1 M.Tech IT(2015-17)

5 TRUZIO 1 M.Tech IT(2016-18 )

67

3.3. Curriculum Development (15)

3.3.1. State the process for designing the programme curriculum (5)

(Describe the process that periodically documents and demonstrate show the programme

curriculum is evolved considering the PEOs and the POs)

The curriculum is designed by the Board of Studies (BoS) of the department after

exhaustive discussion with the teaching faculty. The following points are kept as

guidelines for the entire curriculum design process

Step1: Consideration of existing curriculum of reputed institutes in India &Abroad

and Needs of Society through industry interaction, scientific and research

publications to model AICTE Curriculum

Step2: Department Staff Committee, Department Advisory Committee and

Board Of Studies keeping in view of POs, PEOs and inputs from step1

designs the curriculum with Core, Elective, Practical, Seminar and Project courses

Step3: Re-Design by BOS based on feedback given by Stakeholders.

Step4: Conformity and constituency in Curriculum are examined through step1

to step3 and finalized after BOS approval and revision. The approved curriculum

is send to the College Academic Council for their final endorsement.

68

➢ The faculty in the department is loosely divided into groups. These groups discuss the

portions of the curriculum specifically related to them and come up with

recommendations.

➢ Such recommendations are then discussed in a coordination committee headed by the

Chairman of the department.

➢ The coordinated recommendations are placed in the Board of Studies meeting, which

finally approves the curriculum after adding general and elective courses.

➢ Similar procedure is used for changes in syllabi of various courses. Syllabi changes are

done more often than curricular changes.

69

Programme Curriculum Revisions

R10 R13 R16

Process in updating

programme curriculum

BoS meeting headed by

Dr.EV Prasad

BoS meeting headed by

Dr. L Sumalatha

BoS meeting headed by

Dr A Krishna Mohan

Periodical documents

Available, Revised by

Combined JNT

University

Available, Revised Available, Revised by

Combined JNT

University

BOS Conducted on 07/06/2009 28/01/2014 18/06/2016,

19/06/2016

Resolutions

I Sem 5 Core +

1Elective + 1 lab

II Sem 4core + 2

Elective + 1 Lab

III & Iv Sem Project

+ Seminar

I Sem 6 Core + 1 Lab

II Sem 3 core + 3

Electives(4 subjects in

each elective ) + 1 Lab

III & Iv Sem Project

+ Seminar

I Sem 6 Core + 1 Lab

II Sem 4 core + 2

Electives(3 subjects in

each elective ) + 1 Lab

III Project work part

-I + Seminar -

I+Comprehensive Viva

IV Sem Project work

part -II+ Seminar-II

3.3.2. Illustrate the measures and processes used to improve courses and curriculum (10)

(Articulate the process involved in identifying the requirements for improvement in courses and curriculum and

provides the evidence of continuous improvement of courses and curriculum)

Same procedure, as mentioned above in 3.3.1, is followed for improvement of curriculum and

courses.

➢ The basis for the improvement comes primarily from the international research scenario in

various disciplines of Information Technology.

➢ This input is given by the faculty members, many of whom are involved in high quality research

work.

➢ In addition, the needs of the industry obtained through feedback from discussions held with the

experts from industry and discussion with the employers who come for placement at the Training

and Placements Office is also taken into consideration.

70

3.4. Course Syllabi (5)

(Include in appendix, a syllabus for each course used .Syllabi format should be consistent and

shouldn’t exceed two pages.)

The syllabi format may include:

Department, course number, and title of course

Designation as a required or elective course

Pre-requisites

Contact hours and type of course (lecture, tutorial, seminar, project etc.,)

Course Assessment methods (both continuous and semester-end assessment)

Course outcomes

Topics covered

Text books, and/or reference material

Information Technology Core Subjects

± Electives

as per current needs of the technological development or

industry

Curricular Improvement

Results Analysis +

Surveys +

Subject studied

Steps initiated by Course

Coordinator& Programme

Coordinator

BOS Committee measures

71

Program Educational Objectives

Program Educational Objectives

PEO 1

To produce IT professionals with in depth knowledge in software design, programming and

analytical skills to cater the challenging industrial and

societal needs in an effective manner with ethics and human values

PEO 2 To produce Sustained learner to bring out creative and innovative ideas by addressing the

research issues/ to serve as faculty for IT education.

PEO 3 To produce entrepreneurs in IT with good interpersonal and managerial skills to survive in

multidisciplinary fields.

Program Outcomes (POs)

PO Program Outcomes

1 The student shall possess fundamental and advanced knowledge of core discipline such as

networking and security, programming and computing and other IT applications.

2 Design and implement web enabled solutions for Information Technology problems with the

usage of different software design paradigms and patterns.

3 Develop higher order research skills and innovative ideas to solve unknown problems through

the application of appropriate research methodologies, techniques and tools.

4 Learn and Work in competing open ended environment with modern engineering and IT tools

5 Obtain knowledge in cutting edge technologies to contribute positively towards collaborative

multidisciplinary scientific research.

6 Acquire leadership skills and project management techniques to manage projects efficiently to

work in teams.

7 Present their knowledge and ideas in any technical forum through the effective design of

documents and reports.

8 Engage in lifelong learning with commitment to acquire knowledge of contemporary issues to

meet the challenges in career.

9 Realize professional and ethical responsibility and act in accordance to social welfare.

10 Adopt Self learning abilities so as to educate or to guide others

72

Correlation between the Pos and the PEOs

PEO PROGRAM OUTCOMES

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

PEO 1 3 3 2 3 3 2 2 2 3 2

PEO 2 2 2 3 2 3 2 2 3 2 3

PEO 3 2 - - 2 3 3 3 - - -

Degree of correlation:

2 – Moderate 3 – High R13 Syllabus

Subject

Code

Subject Name Credits Core/Elective Internal marks External

marks

MIT 1.1 ADVANCED DATA

STRUCTURES AND

ALGORITHM

3 C 40 60

Course Description: In this course the student will learn Single Linked, Double Linked Lists, Stacks,

Queues, Searching and Sorting techniques, Trees, Binary trees, representation, traversal, Graphs-

storage, traversal. Dictionaries, ADT for List, Stack, Queue, Hash table representation, Hash functions,

Priority queues, Priority queues using heaps, Search trees , AVL trees, operations of AVL trees, Red-

Black trees, Splay trees, comparison of search trees.

• Syllabus / Text books:

UNIT I:

Introduction to Data Structures, Singly Linked Lists, Doubly Linked Lists, Circular Lists-Algorithms.

Stacks and Queues: Algorithm Implementation using Linked Lists.

UNIT II:

Searching-Linear and Binary, Search Methods, Sorting-Bubble Sort, Selection Sort, Insertion Sort,

Quick Sort, Merge Sort. Trees- Binary trees, Properties, Representation and Traversals (DFT, BFT),

Expression Trees (Infix, prefix, postfix). Graphs-Basic Concepts, Storage structures and Traversals.

UNIT III:

Dictionaries, ADT, The List ADT, Stack ADT, Queue ADT, Hash Table Representation, Hash

Functions, Collision Resolution-Separate Chaining, Open Addressing-Linear Probing, Double

Hashing.

UNIT IV:

Priority queues- Definition, ADT, Realising a Priority Queue Using Heaps, Definition, Insertion,

Deletion .Search Trees- Binary Search Trees, Definition, ADT, Implementation, Operations-

Searching, Insertion, Deletion.

UNIT V:

Search Trees- AVL Trees, Definition, Height of AVL Tree, Operations-, Insertion, Deletion and

Searching.

73

Search Trees- Introduction to Red-Black and Splay Trees, B-Trees, , Height of B-Tree, Insertion,

Deletion and Searching, Comparison of Search Trees.

TEXT BOOKS:

1. Data Structures: A PseudoCode Approach, 2/e, Richard F.Gilberg, BehrouzA.Forouzon,

Cengage.

2. Data Structures, Algorithms and Applications in java, 2/e, SartajSahni, University Press.

REFERENCES BOOKS:

1. Data Structures and Algorithm Analysis, 2/e, Mark Allen Weiss, Pearson.

2. Data Structures and Algorithms, 3/e, Adam Drozdek, Cenage.

3. C and DataStructures: A Snap Shot Oriented Treatise Using Live Engineering Examples,

N.B.Venkateswarulu, E.V.Prasad, S Chand & Co, 2009.

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Introduction to Data Structures, Singly Linked Lists 3

2 Doubly Linked Lists, Circular Lists-Algorithms 3

3 Stacks and Queues: Algorithm Implementation using Linked Lists 3

4 Searching-Linear and Binary Search Methods 2

5 Sorting-Bubble Sort, Selection Sort, Insertion Sort, Quick Sort, Merge Sort 4

6 Trees- Binary trees, Properties, Representation and Traversals

(DFT,BFT),Expression Trees(Infix, prefix, postfix)

3

7 Graphs-Basic Concepts , Storage Structures and Traversals 2

8 Dictionaries, ADT, The List ADT, Stack ADT, Queue ADT 2

9 Hash Table Representation, Hash Functions, Collision Resolution-Separate

Chaining

3

11 Priority queues- Definition, ADT, Realising a Priority Queue Using Heaps 2

12 Insertion, Deletion of Heaps 3

13 Search Trees- Binary Search Trees, Definition, ADT, Implementation 3

14 Operations on Binary Search Trees -Searching, Insertion, Deletion 3

15 Search Trees- AVL Trees, Definition, Height of AVL Tree 3

16 Operations on AVL Trees, Insertion, Deletion and Searching 3

17 Introduction to Red-Black and Splay Trees 3

18 B-Trees, , Height of B-Tree, Insertion 2

19 Deletion and Searching operations 2

20 Comparison of Search Trees 3

Course Outcomes (COs):

1. Ability to write and analyze algorithms for algorithm correctness and efficiency

2. Master a variety of advanced abstract data type (ADT) and data structures and their

Implementation.

3. Master various searching, sorting and hash techniques and be able to apply and solve problems of real

life

4. Design and implement variety of data structures including linked lists, binary trees, heaps, graphs and

search trees

5. Ability to compare various search trees and find solutions for IT related problems

74

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √ √

CO2 √ √

CO3 √ √ √ √ √

CO4 √ √ √ √ √ √

CO5 √ √ √ √ √

Subject

Code

Subject Name Credits Core/Elective Internal marks External marks

MIT1.2 ADVANCED

GRAPH THEORY

3 C 40 60

Course Description: The intension of this course is to introduce the subject of graph theory to computer science students in a

thorough way. While the course will cover all elementary concepts such as coloring, covering, hamiltonicity, planarity,

connectivity and so on, it will also introduce the students to some advanced concepts. The successful student will know the

definitions of relevant vocabulary and various algorithms from graph theory

• Syllabus / Text books:

UNIT I:

Basic Concepts: Graphs and digraphs, incidence and adjacency matrices, isomorphism, the

automorphism group;

Trees: Equivalent definitions of trees and forests, Cayley's formula, the Matrix-Tree theorem,

minimum spanning trees;

UNIT II:

Connectivity: Cut vertices, cut edges, bonds, the cycle space and the bond space, blocks, Menger's

theorem;

Paths and Cycles: Euler tours, Hamilton paths and cycles, theorems of Dirac, Ore, Bondy and

Chvatal, girth, circumference, the Chinese Postman Problem, the Traveling Salesman problem,

diameter and maximum degree, shortest paths;

UNIT III:

Matchings: Berge's Theorem, perfect matchings, Hall's theorem, Tutte's theorem, Konig's theorem,

Petersen's theorem, algorithms for matching and weighted matching (in both bipartitie and general

graphs), factors of graphs (decompositions of the complete graph), Tutte's f-factor theorem;

Extremal problems: Independent sets and covering numbers, Turan's theorem, Ramsey theorems;

UNIT IV:

Colorings: Brooks theorem, the greedy algorithm, the Welsh-Powell bound, critical graphs,

chromatic polynomials, girth and chromatic number, Vizing's theorem;

Graphs on surfaces: Planar graphs, duality, Euler's formula, Kuratowski's theorem, toroidal graphs,

2-cell embeddings, graphs on other surfaces;

UNIT V:

Directed graphs: Tournaments, directed paths and cycles, connectivity and strongly connected

digraphs, branching;

Networks and flows: Flow cuts, max flow min cut theorem, perfect square;

Selected topics: Dominating sets, the reconstruction problem, intersection graphs, perfect graphs,

random graphs.

75

TEXT BOOKS:

1. Douglas B. West, Introduction to Graph Theory, Prentice Hall of India.

2. NarsinghDeo, Graph Theory with Applications to Engineering and Computer Science.

Prentice-Hall.

REFERENCE BOOKS:

1. Frank Harary, Graph Theory, Narosa.

2. R. Ahuja, T. Magnanti, and J. Orlin, Network Flows: Theory, Algorithms, and

Applications, Prentice-Hall.

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Basic Concepts: Graphs and digraphs, incidence and adjacency matrices 3

2 Isomorphism, the automorphism group 2

3 Trees: Equivalent definitions of trees and forests, Cayley's formula 3

4 The Matrix-Tree theorem, minimum spanning trees 2

5 Connectivity: Cut vertices, cut edges, bonds, the cycle space and the bond

space

3

6 Blocks, Menger's theorem, Paths and Cycles: Euler tours 2

7 Hamilton paths and cycles, theorems of Dirac 2

8 Ore, Bondy and Chvatal, girth, circumference, the Chinese Postman Problem 3

9 The Traveling Salesman problem, diameter and maximum degree, shortest

paths

3

10 Matchings: Berge's Theorem, perfect matchings, Hall's theorem, Tutte's

theorem, Konig's theorem

3

11 Petersen's theorem, algorithms for matching and weighted matching, factors

of graphs

3

12 Tutte's f-factor theorem; Extremal problems: Independent sets and covering

numbers,

3

13 Turan's theorem, Ramsey theorems, Colorings: Brooks theorem, 3

14 the greedy algorithm, the Welsh-Powell bound, critical graphs 3

15 Chromatic polynomials, girth and chromatic number, Vizing's theorem 2

16 Graphs on surfaces: Planar graphs, duality, Euler's formula, Kuratowski's

theorem

3

17 Toroidal graphs, 2-cell embeddings, graphs on other surfaces 3

18 Directed graphs: Tournaments, directed paths and cycles, connectivity and

strongly connected digraphs, branching

3

19 Networks and flows: Flow cuts, max flow min cut theorem, perfect square 2

20 Selected topics: Dominating sets, the reconstruction problem 2

21 Intersection graphs, perfect graphs, random graphs 2

Course Outcomes (COs):

8. Understand basic concepts in graph theory: coloring, planar graphs.

9. Write precise and accurate mathematical definitions of objects in graph theory

10. Describe and solve some real time problems using concepts of graph theory (e.g., scheduling

problems).

11. Use some classical graph algorithms in order to find subgraphs with desirable properties

76

12. Find maximal flows in networks and give an account of how this method is connected with

results of Menger, König and Hall as well as solving certain problems by formulating them in

terms of network flows

13. Compute and deduce properties of chromatic numbers and polynomials and identify certain

problems as graph colouring problems

14. Apply results of Euler, Kuratowski-Wagner and Appel-Haken to deduce properties of (non)

planar graphs

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √

CO2 √ √

CO3 √ √ √ √ √ √

CO4 √ √ √

CO5 √ √ √ √ √ √ √

CO6 √ √ √ √ √

CO7 √ √ √ √ √

Subject

Code

Subject Name Credits Core/Elective Internal marks External

marks

MIT1.3 PARALLEL

ALGORITHMS

3 C 40 60

• Course Description: The student will learn How to work on Parallel Programming Platforms,

Principles of Parallel Algorithm Design, Parallelization aspects , Parallel sorting methods,

.Mapping and scheduling aspects of algorithms

• Syllabus / Text books:

UNIT1: Introduction:

Computational demand in various application areas, advent of parallel processing, terminology-

pipelining, Data parallelism and control parallelism-Amdahl’s law. Basic parallel random access

Machine Algorithms– definitions of P, NP and NP-Hard, NP-complete classes of sequential

algorithms-NC–class for parallel algorithms.

UNIT II: Scheduling:

Organizational features of Processor Arrays, Multiprocessors and multi-computers. Mapping and

scheduling aspects of algorithms. Mapping into meshes and hyper cubes-Load balancing-List

scheduling algorithm Coffman-graham scheduling algorithm for parallel processors.

77

UNIT III: Algorithms:

Elementary Parallel algorithms on SIMD and MIMD machines, Analysis of these algorithms. Matrix

Multiplication algorithms on SIMD and MIMD models. Fast Fourier Transform algorithms.

Implementation on Hyper cube architectures. Solving linear file -system of equations, parallelizing

aspects of sequential methods back substitution and Tridiagonal.

UNIT IV: Sorting:

Parallel sorting methods, Odd-even transposition Sorting on processor arrays, Biotonic, merge sort on

shuffle – exchange ID, Arrayprocessor, 2D-Mesh Processor and Hypercube Processor Array. Parallel

Quick-sort on Multiprocessors. Hyper Quick sort on hyper cube multicomputer. Parallel search

operations. Ellis algorithm and Manberandladner’s Algorithms for dictionary operations.

UNIT V: Searching

Parallel algorithms for Graph searching, All Pairs shortest paths and minimum cost spanning tree

Parallelization aspects of combinatorial search algorithm swith focus on Branch and Bound Methods

and Alpha-beta Search methods.

TEXT BOOKS:

1. Parallel computing t heo r y and practice, MichelJ.Quinn

2. Programming Parallel Algorithms, GuyE.Blelloch, Communications of the ACM

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Computational demand in various application areas, advent of parallel

processing

3

2 Terminology-pipelining, Data parallelism and control parallelism-Amdahl ‘s

law

2

3 Basic parallel random access Machine Algorithms-definitions of P 3

4 NP and NP-Hard, NP-complete classes of sequential algorithms-NC–class

for parallel algorithms

3

5 Organizational features of Processor Arrays, Multiprocessors and multi-

computers

2

6 Mapping and scheduling aspects of algorithms. Mapping into meshes and

hyper cubes

3

7 Load balancing-List scheduling algorithm Coffman-graham scheduling

algorithm for parallel processors

3

8 Elementary Parallel algorithms on SIMD and MIMD machines, 3

9 Analysis of Parallel algorithms 2

10 Matrix Multiplication algorithms on SIMD and MIMD models. Fast Fourier

Transform algorithms.

3

11 Implementation on Hyper cube architectures, Solving linear file -system of

equations

3

12 Parallelizing aspects of sequential methods back substitution and Tridiagonal 3

13 Parallel sorting methods, Odd-even transposition Sorting on processor arrays 3

14 Biotonic, merge sort on shuffle - exchangeID,Arrayprocessor,2D-Mesh

processor and Hypercube Processor Array

3

15 Parallel Quick-sort on Multiprocessors. Hyper Quicksort on hypercube

multicomputer

2

16 Parallel search operations. Ellis algorithm and Manberandladner’s Algorithms 3

78

for dictionary operations

17 Parallel algorithms for Graph searching, 3

18 All Pairs shortest paths, Minimum cost spanning tree. 3

19 Parallelization aspects of combinatorial search algorithms with Focus on

Branch and Bound Methods

3

20 Alpha-beta Search methods 2

Course Outcomes (COs):

6. Understand fundamental concepts of parallelism- pipeline, Amdahl's law.

7. Know the physical limits of linear approach and solving problems in parallel.

8. How to design & analyze parallel algorithms and implement them with parallel processors.

9. Understand various approaches in parallel sorting and Searching.

10. Gain knowledge on various parallel processor architectures and know how to embed one

Architecture into another.

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √

CO2 √ √

CO3 √ √ √

CO4 √ √ √ √

CO5 √ √ √ √

Subject

Code

Subject Name Credits Core/Elective Internal marks External marks

MIT1.4 DATA MINING AND

KNOWLEDGE

DISCOVERY

3 C 40 60

• Course Description: This subject provides an introduction to multidisciplinary field of data

mining, the general data features, techniques for data preprocessing, modelling, design

architectures, general implementation of data warehouses and OLAP, the relationship between

data warehousing and other generalization methods, data-cube technology & data cube

computation, market basket analysis with many techniques for frequent item set mining,

classification including decision tree induction, bayes classification, advanced methods for

bayaesian belief networks, the concepts of data clustering includes a different methods of

clustering such as k-means, k-mediods, db scan algorithm, role of data mining in web mining.

• Syllabus / Text books:

Unit 1:

Introduction to Data mining, types of Data, Data Quality, Data Processing, Measures of Similarity

and Dissimilarity, Exploring Data: Data Set, Summary Statistics, Visualization, OLAP and multi

dimensional data analysis.

79

Unit 2: Classification: Basic Concepts, Decision Trees and model evaluation: General approach

for solving a classification problem, Decision Tree induction, Model over fitting: due to presence

of noise, due to lack of representation samples, Evaluating the performance of classifier. Nearest

Neighborhood classifier, Bayesian Classifier, Support vector Machines: Linear SVM, Separable

and Non Separable case.

Unit 3: Association Analysis: Problem Definition, Frequent Item-set generation, rule generation,

compact representation of frequent item sets, FP-Growth Algorithms. Handling Categorical,

Continuous attributes, Concept hierarchy, Sequential, Sub graph patterns

Unit 4: Clustering: Over view, K-means, Agglomerative Hierarchical clustering, DBSCAN,

Cluster evaluation: overview, Unsupervised Cluster Evaluation using cohesion and separation,

using proximity matrix, Scalable Clustering algorithm

Unit 5: Web data mining: Introduction, Web terminology and characteristics, Web content

mining, Web usage mining, web structure mining, Search Engines: Characteristics, Functionality,

Architecture, Ranking of WebPages, Enterprise search

TEXT BOOKS:

1. Introduction to Data Mining: Pang-Ning tan, Michael Steinbach, Vipin Kumar, Addison-

Wesley.

2. Introduction to Data Mining with Case Studies: GK Gupta; Prentice Hall.

REFERENCE BOOKS:

1. Data Mining: Introductory and Advanced Topics, Margaret H Dunham, Pearson, 2008.

2. Fundamentals of data warehouses, 2/e ,Jarke, Lenzerini, Vassiliou, Vassiliadis, Springer.

3. Data Mining Theory and Practice, Soman, Diwakar, Ajay, PHI, 2006.

4. Data Mining, Concepts and Techniques, 2/e, Jiawei Han, MichelineKamber, Elsevier, 2006.

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Introduction to Data mining, types of Data, Data Quality, Data Processing 4

2 Measures of Similarity and Dissimilarity 2

3 Exploring Data: Data Set, Summary Statistics 2

4 Visualization, OLAP and multi dimensional data analysis 3

5 Classification: Basic Concepts, Decision Trees and model evaluation: General

approach for solving a classification problem

4

6 Decision Tree induction, Model over fitting: due to presence of noise, due to

lack of representation samples

2

7 Evaluating the performance of classifier. Nearest Neighborhood classifier,

Bayesian Classifiers

4

8 Support vector Machines: Linear SVM, Separable and Non Separable case 3

9 Association Analysis: Problem Definition, Frequent Item-set generation 3

11 Rule generation, compact representation of frequent item sets, FP-Growth

Algorithms

3

12 Handling Categorical , Continuous attributes, concept hierarchy, Sequential ,

Sub graph patterns

4

80

13 Clustering: Over view, K-means, Agglomerative Hierarchical clustering 4

14 DBSCAN, Cluster evaluation: overview, Unsupervised Cluster Evaluation

using cohesion and separation

3

15 Using proximity matrix, Scalable Clustering algorithm 3

16 Web data mining: Introduction, Web terminology and characteristics 2

17 Web content mining, Web usage mining, web structure mining 3

18 Search Engines :Characteristics, Functionality, Architecture, Ranking of

WebPages, Enterprise search

4

Course Outcomes:

7. An ability to understand the basics of types of data, quality of data, suitable measures required to

perform data analysis. (UNIT-I)

8. To understand various classification techniques to perform classification, model building and

evaluation (UNIT-II)

9. Identify the usage of association rule mining techniques on categorical and continuous data (UNIT

III)

10. Identify suitable clustering algorithm (apply with open source tools), interpret, evaluate and report

the result(UNIT IV)

11. To understand the need of web mining (UNI-V)

12. Design and implement a data-mining application using synthetic, realistic data sets using open

source tools viz., Weka

Mapping between COs and POs:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √

CO2 √ √

CO3 √ √

CO4 √ √ √

CO5 √

CO6 √ √

Subject

Code

Subject Name Credits Core/Elective Internal marks External

marks

MIT1.5 ADVANCED

COMPUTER

NETWORKS

3 C 40 60

• Course Description: The student will learn about the principals and practice of computer

networking, with emphasis on the internet, structure and components of computer network, layer

architectures, physical layer, LAN, conjunction control, quality of service and multicasting.

• Syllabus / Text books:

Unit-I:

81

Network layer: Network Layer design issues: store-and forward packet switching, services

provided transport layers, implementation connection less services, implementation connection

oriented services, comparison of virtual –circuit and datagram subnets.

Routing Algorithm –shortest path routing, flooding, distance vector routing, link state routing,

Hierarchical routing, Broadcast routing, Multicasting routing, routing for mobiles Hosts, routing in

Adhoc networks-

Congestion control algorithms-Load shedding, Congestion control in Data gram Subnet.

Unit-II:

IPV4 Address address space, notations, classful addressing, classless addressing network

addressing translation(NAT) , IPV6 Address structure address space, Internetworking need for

network layer internet as a data gram, internet as connection less network.

IPV4 datagram, Fragmentation, checksum, options.

IPV6 Advantages, packet format, extension Headers, Transition from IPV4 to IPV6

Unit–III:

Process to process delivery: client/server paradigm, multiplexing and demultiplexing,

connectionless versus connection oriented services, reliable versus reliable.

UDP: well known ports for UDP, user data gram, check sum, UDP operation, and uses of UDP

TCP: TCP services, TCP features, segment, A TCP connection, Flow control, error control,

congestion control.

SCTP: SCTP services SCTP features, packet format, An SCTP association, flow control, error

control.

Congestion control: open loop congestion control, closed loop congestion control, Congestion

control in TCP, frame relay,

QUALITY OF SERVICE: flow characteristics, flow classes TECHNIQUES TO IMPROVE

QOS: scheduling, traffic shaping, resource reservation, admission control.

Unit –IV:

Domain name system: The name space, resource records, name servers

E-mail: architecture and services, the user agent, message formats, message transfer, final delivery

Www: architecture overview, static web documents, dynamic web documents, hyper text transfer

protocol, performance elements, the wireless web.

Multimedia: introduction digital a audio , Audio compression, streaming audio, internet radio,

voice over IP, introduction to video, video compression, video on demand, the MBone-the

multicast back bone

Unit –V: Emerging trends Computer Networks:

Mobile Ad hoc networks: applications of Ad hoc networks, challenges and issues in MANETS,

MAC layers issues, routing protocols in MANET, transport layer issues, Ad Hoc networks security.

Wireless sensors networks: WSN functioning, operation system support in sensor devices, WSN

Characteristics, sensor network operation, sensor Architecture: cluster management;

Wireless mesh networks WMN design, Issues in WMNs;

TEXT BOOKS:

1. Data communications and networking 4thedtionBehrouz A Fourzan, TMH

2. Computer networks 4thediton Andrew S Tanenbaum, Pearson

3. Computer networks, Mayank Dave, CENGAGE

REFERENCE BOOKS:

82

1. Computer networks, A system Approach, 5thed, Larry L Peterson and Bruce S Davie,

Elsevier

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Unit-I: Network Layer design issues: store-and forward packet switching,

services provided transport layers.

2

2 Implementation connection oriented services, comparison of virtual –circuit

and datagram subnets.

3

3 shortest path routing, flooding, distance vector routing 2

4 link state routing, Hierarchical routing, Broadcast routing, 2

5 Routing for mobiles Hosts, routing in Adhoc networks.

2

6 Load shedding, Congestion control in Data gram Subnet. 2

7 Unit-I : IPV4address space, notations, classful addressing, classless

addressing network addressing translation(NAT) ,

4

8 IPV6 Address structure address space, Internetworking need for network

layer internet as a data gram, internet as connection less network.

2

9 IPV4 datagram, Fragmentation, checksum, options.

2

10 IPV6 Advantages, packet format, extension Headers, Transition from IPV4 to

IPV6

3

11 Unit–III: Process to process delivery: client/server paradigm, multiplexing

and demultiplexing connectionless versus connection oriented services,

reliable versus reliable.

3

12 UDP: well known ports for UDP, user data gram, check sum, UDP operation,

and uses of UDP

2

13 TCP: TCP services, TCP features, segment, A TCP connection, Flow control,

error control, congestion control.

3

14 SCTP services SCTP features, packet format, An SCTP association, flow

control, error control in TCP, frame relay.

3

15 Congestion control: open loop congestion control, closed loop congestion

control, Congestion control

2

16 Unit–IV: Domain name system: The name space, resource records, name

servers E-mail: architecture and services, the user agent, message formats,

message transfer, final delivery.

4

17 QOS: flow characteristics, flow classes TECHNIQUES TO IMPROVE QOS

scheduling, traffic shaping, resource reservation, admission control.

3

18 Www: architecture overview, static web documents, dynamic web

documents, Hyper text transfer protocol, performance elements, the wireless

web.

4

19 Multimedia: introduction digital a audio , Audio compression, streaming

audio, internet radio, voice over IP,

2

20 introduction to video, video compression, video on demand, the MBone-the

multicast back bone

2

21 Unit–V: applications of Ad hoc networks, challenges and issues in MANETS,

MAC layers issues, routing protocols in MANET, transport layer issues, Ad

Hoc networks security.

2

83

22 WSN functioning, operation system support in sensor devices, WSN

Characteristics, sensor network operation, sensor Architecture: cluster

management.

4

23 Wireless mesh networks WMN design, Issues in WMNs.

2

Course Outcomes:

Upon the successful completion of the course, students will be able to:

1. The Students will get good knowledge of Network layer functions and routing algorithms

2. The students will know different IP addressing techniques used in internet

3. The students will gains good knowledge about transport layer functions and protocols for data

delivery in the internet

4. The students will gains good knowledge about architecture of DNS, email, www and multimedia

5. The students will get good knowledge about design of Manets and Wireless Sensor networks and their

applications in reality

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √

CO2 √ √ √ √ √

CO3 √ √ √ √ √ √

CO4 √ √ √ √ √ √ √

CO5 √ √ √ √ √ √ √

• Syllabus / Text books:

Unit 1: Introduction to distributed programming: Anatomy of a distributed Application,

Requirements for Developing Distributed Applications, What does Java Provide?

Introduction to sockets programming: Sockets and Streams, URLs, URL Connections and Content

Handlers, The Class Loader.

Unit 2: Distributing Objects: Why Distribute Objects?, What’s so Tough About Distributing

Objects?, Features of Distributed Object Systems, Distributed Object Schemes for JAVA,

CORBA, Java RMI, RMI Vs CORBA.

Threads: Thread and Runnable, Making a Thread, Managing Threads at Runtime, Networked

Threads.

Subject

Code

Subject Name Credits Core/Elective Internal marks External marks

MIT1.6 DISTRIBUTED

PROGRAMMING

APPLICATIONS

THROUGH JAVA

3 C 40 60

84

Unit 3: Security: Security Issues and Concerns, The java. Security Package, Identities and Access

Control, Keys: Public, Private and Secret, Digital Signature, Data Encryption, Choosing a

Cryptographic Algorithm

Message-Passing Systems: Messages defined, Why Do we need Messages?, Message Processing,

Fixed Protocols, Adaptable Protocols, Message Passing with Java Events, Using Remote Objects

Databases: An Overview of JDBC, Remote Database Applications, Multi-Database Applications

Unit 4: RMI: The Basic Structure of RMI, The Architecture Diagram Revisited, Implementing the

Basic Objects, The Rest of the Server, The Client Application.

The RMI Registry: Why use a Naming Service? The RMI Registry, The RMI Registry is an RMI

Server, Examining the Registry, Limitations of the RMI Registry, Security Issues

Unit 5: Naming Services: Basic Design, Terminology and Requirements, Requirements for our

Naming Service, Federation and Threading, The Context Interface, The Value Objects, Context

Impl, Switching between Naming Services, The Java Naming and Directory Interface(JNDI).

The RMI Runtime: Reviewing the Mechanics of a Remote Method call, Distributed Garbage

Collection, RMIs Logging Facilities, and Other JVM Parameters.

TEXTBOOKS:

1. Java Distributed Computing , Jim Farley , O’ Reilly

2. Java RMI Designing and Building: The Basics of RMI Applications, by William Grosso,

O’Reilly

3. Java SOA Cook book SOA Implementation Recipes, Tips and Techniques, Eben Hewitt,

O’Reilly, 2009

4. Service Oriented Architecture with Java, MalharBaral, Vincenzo Caselli, Binildas A. Christudas,

Packt

REFERENCES:

1. Distributed Programming with Java, QusayH.Mahnoud, Manning Publisher 2000

2. Java in Distributed Systems: Concurrency, Distribution and Persistence, Marko Boger, 2001.

3. Developing Distributed and E-Commerce Applications, Darrel Ince, 2/e, Addison Wesly, 2004.

4. Java Message Service (O’Reilly Java Series), Richard Monson- Haefel, David Chappell.

5. Sun SL 301 Distributed Programming with Java.

6. Java Tutorial, http://java.sun.com/docs/books/tutorial/index.html.

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Anatomy of a distributed Application, Requirements for Developing

Distributed Applications,

2

2 Sockets and Streams, URLs, URL Connections and Content Handlers, The

Class Loader

3

3 Distributing Objects: Why Distribute Objects? What’s so Tough About

Distributing Objects?

2

4 Features of Distributed Object Systems, Distributed Object Schemes for

JAVA, CORBA, Java RMI, RMI Vs CORBA.

3

5 CORBA, Java RMI, RMI Vs CORBA. 2

6 Thread and Runnable, Making a Thread, Managing Threads at Runtime,

Networked Threads.

2

7 Security: Security Issues and Concerns, The java. Security Package, Identities 3

85

and Access Control

8 Keys: Public, Private and Secret, Digital Signature, 2

9 Data Encryption, Choosing a Cryptographic Algorithm 2

10 Message-Passing Systems: Messages defined, Why Do we need Messages?,

Message Processing,

3

11 Fixed Protocols, Adaptable Protocols, Message Passing with Java Events 2

12 An Overview of JDBC, Remote Database Applications, Multi-Database

Applications

2

13 The RMI Registry: Why use a Naming Service? The RMI Registry, The RMI

Registry is an RMI Server,

4

14 Examining the Registry, Limitations of the RMI Registry, Security Issues 3

15 Naming Services: Basic Design, Terminology and Requirements 2

16 Requirements for our Naming Service, Federation and Threading, 2

17 The Context Interface, The Value Objects, Context Impl, Switching between

Naming Services,

2

18 The Java Naming and Directory Interface (JNDI). 2

19 The RMI Runtime: Reviewing the Mechanics of a Remote Method call 2

20 Distributed Garbage Collection, RMIs Logging Facilities, Other JVM

Parameters.

2

Course outcomes:

The theory should be taught and practical should be carried out in such a manner that students are

able to acquire different learning out comes in cognitive, psychomotor and affective domain to

demonstrate following course outcomes.

1. Build simple distributed applications using Java’s networking capabilities

2. Build concurrent distributed applications using multiple threads

3. Build distributed applications with security enhancements using Java’s security and

cryptographic extensions.

4. Develop Java Applet Programming using various techniques

5. Develop applications using Abstract Window Toolkit

6. Update and retrieve the data from the databases using JDBC-ODBC.

7. Develop server side programs using servlets.

8. Develop Java Server Pages applications using JSP Tags

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √ √

CO2 √ √ √ √

CO3 √ √ √ √ √

CO4 √ √ √ √ √

CO5 √ √ √ √ √ √

CO6 √ √ √ √ √ √ √

CO7 √ √ √ √ √

CO8 √ √ √ √ √

86

SNO

Subject Name Credits Core/Elective Internal marks External marks

MIT1.7 IT LAB-1 2 C 40 60

• Course Description:

Through this course the student is going to learn various programs like establishing client

server application in computer networks and advanced data structures. We are going to learn

about association rules, classification and clustering techniques etc using WEKA tool.

• Syllabus / Text books:

1. Write a c program to implement one to one chat application using sockets?

2. Write a c program to implement redundancy check using CRC?

3. Write a java program to implement simulation of sliding window protocol?

4. Write a java program to get the MAC or Physical address of the system using Address

Resolution Protocol?

5. By using Data mining tool Demonstration of preprocessing on dataset student.arff?

6. By using Data mining tool Demonstration of classification rule process on dataset employee. arff

using j48 algorithm

7. By using Data mining tool Demonstration of Association rule process on dataset test.arff using

apriori algorithm?

8. By using Data mining tool Demonstration of classification rule process on dataset

employee.arff using naïve baye’s algorithm

9. By using Data mining tool Demonstration of clustering rule process on dataset iris.arff using

simple k-means algorithms.

10. To perform various Recursive & Non-Recursive operations on Binary Search Tree

11. To implement BFS & DFS for a Graph

12. To implement Merge & Heap Sort of given elements

13. To perform various operations on AVL trees

14. To implement Krushkal’s algorithm to generate a min-cost spanning tree

15. To implement Prim’s algorithm to generate a min-cost spanning tree

16. To implement functions of Dictionary using Hashing

Lecture Plan:

SNO TOPICS COVERED HOURS

1 To implement one chat application using sockets

And implement redundancy check using CRC

3

2 To implement simulation of sliding window protocol

To perform MAC or Physical address of the system using Address Resolution

Protocol

3

3 Implementation by using Data mining tool Demonstration of preprocessing on 3

87

dataset student.arff

4 Implementation by using Data mining tool Demonstration of classification rule

process on dataset employee.arff using j48 algorithm

3

5 Implementation by using Data mining tool Demonstration of Association rule

process on dataset test.arff using apriori algorithm

3

6 Implementation by using Data mining tool Demonstration of classification rule

process on dataset employee.arff using naïve baye’s algorithm

3

7 Implementation by using Data mining tool Demonstration of clustering rule

process on dataset iris.arff using simple k-means algorithms

3

8 To perform various Recursive & Non-Recursive operations on Binary Search

Tree

3

9 To implement graphs by using BFS and DFS techniques 3

11 Implementing merge and heap sorts for given elements 3

12 Performing various operations in AVL trees 3

13 To implement krushkal’s algorithm to find minimum cost spanning tree 3

14

To implement Prim’s algorithm to find min cost spanning tree 3

15 To implement functions of Dictionaries using hashing 3

Course Outcomes:

1. Identify classes, objects, members of a class and relationships among them neededfor a specific

problem.

2. Analyze algorithms performance using Prior analysis and asymptotic notations.

3. Analyze and apply to solve the complex problems using advanced data structures (likearrays,

stacks, queues, linked lists, graphs and trees.)

4. Ability to solve the real life problem using different algorithm design techniques

5. Using different data mining tools.

Mapping between COs and POs

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √ √ √

CO2 √ √ √ √ √ √ √ √

CO3 √ √ √ √ √ √ √ √

CO4 √ √ √ √ √ √ √ √

CO5 √ √ √ √ √ √ √

Subject Code Subject Name Credits Core/Elective Internal

marks

External

marks

MIT2.1 ADVANCED

UNIX

PROGRAMMING

3 C 40 60

88

• Course Description: This course will develop the programming skills of the student, File access

and attributes, I/O issues, signals, concurrent programming with processes and threads, network

programming, client-server paradigm.

• Syllabus / Text books:

UNIT-I

Introduction to unix-Brief History-What is Unix-Unix Components-Using Unix-Commands in Unix-

Some Basic Commands-Command Substitution-Giving Multiple Commands.

UNIT-II

The File system –The Basics of Files-What’s in a File-Directories and File Names-Permissions-I Nodes-

The Directory Hierarchy, File Attributes and Permissions-The File Command knowing the File Type-

The Chmod Command Changing File Permissions-The Chown Command Changing the Owner of a

File-The Chgrp Command Changing the Group of a File.

UNIT-III

Using the Shell-Command Line Structure-Met characters-Creating New Commands-Command

Arguments and Parameters-Program Output as Arguments-Shell Variables- -More on I/O Redirection-

Looping in Shell Programs.

UNIT-IV

Filters-The Grep Family-Other Filters-The Stream Editor Sed-The AWK Pattern Scanning and

processing Language-Good Files and Good Filters.

UNIT-V

Shell Programming-Shell Variables-The Export Command-The Profile File a Script Run During

Starting-The First Shell Script-The read Command-Positional parameters-The $? Variable knowing the

exit Status-More about the Set Command-The Exit Command-Branching Control Structures-Loop

Control Structures-The Continue and Break Statement-The Expr Command: Performing Integer

Arithmetic-Real Arithmetic in Shell Programs-The here Document(<<)-The Sleep Command-

Debugging Scripts-The Script Command-The Eval Command-The Exec Command. The Process-The

Meaning-Parent and Child Processes-Types of Processes-More about Foreground and Background

processes-Internal and External Commands-Process Creation-The Trap Command-The Stty Command-

The Kill Command-Job Control.

TEXT BOOKS:

1. The Unix programming Environment by Brain W. Kernighan & Rob Pike, Pearson.

2. Introduction to Unix Shell Programming by M.G.Venkateshmurthy, Pearson.

REFERENCE BOOKS:

1. Unix and shell programmingby B.M. Harwani, OXFORD university press.

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Basic Unix Commands and Shell programming. 2

2 File system related system calls. Unix file structure, directories, files and

device system calls and device drivers.

3

3 Library functions, low-level file access and file descriptors, file and directory

maintenance.

3

89

4 File locking-creating lock files, locking regions 3

5 Processes and threads-process structure, starting new process, zombie process. 3

6 fork(), vfork(), exit(),wait(), exec() family of system calls. 2

7 User identification, process timers, Threads, managing system limits.

Managing system limits.

2

8 Inter process communication: pipes, process pipes, parent child process. 2

9 Named pipes-FIFO. 2

11 IPC using semaphores and message queues . 3

12 IPC using shared memory. Applications of IPC. 3

13 Signals: signal functions, reliable signals, interrupted system calls. 2

14 Kill and raise functions, alarm, pause functions. 2

15 abort, system, sleep functions. 2

16 Threads synchronization using mutexes. 2

17 Socket Address structures, byte ordering and manipulation functions. 2

18 Elementary TCP sockets-socket, connect, bind, listen, accept, close functions. 3

19 TCP echo client server programs. 2

20 Socket options-setsockopt, getsockopt system calls, socket options . 2

21 UDP socket functions. 2

22 Use of calls such as gethost by name function. 2

23 Simple client server programs using UDP. 2

23 Implementing a simple ping. 2

24 Simulating DOS attack. 2

Course Outcomes:

After learning the course, the student will be able to

1. Students will understand the basic set of commands and utilities in Linux/UNIX systems

2. Students will get good knowledge in Linux/UNIX library functions and system calls.

3. Student will gain some knowledge in UNIX administration.

4. Obtain a foundation for an advanced course in operating systems.

5. Understands various socket system calls that are used in network programming.

6. Student is able to develop one to one chat applications using various IPC system calls.

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √

CO2 √ √ √

CO3 √ √ √ √ √

CO4 √ √

CO5 √ √

CO6 √ √ √ √ √ √

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT 2.2 Information

Security

3 C 40 60

90

• Course Description: This course addresses various software security problems in a secure and

controlled environment and techniques that could be used to protect the software from security

threats. This course also contains”modus operandi” of adversaries; which could be used for

increasing software dependability.

• Syllabus / Text books:

UNIT I:

Introduction: Security Attacks (Interruption, Interception, Modification and Fabrication), Security

Services (Confidentiality, Authentication ,Integrity, Non-repudiation, access Control and

Availability) and Mechanisms, A model for Internetwork security, Internet Standards and RFCs,

Buffer overflow & format string vulnerabilities, TCP session hijacking, ARP attacks, route table

modification, UDP hijacking, and man-in-the-middle attacks.

UNIT II:

Conventional Encryption:

Conventional Encryption Principles, Conventional encryption algorithms, cipher block modes of

operation, location of encryption devices, key distribution Approaches of Message Authentication,

Secure Hash Functions and HMAC.

UNIT III:

Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and

Euler’s Theorems, the Chinese Remainder theorem, discrete logarithms

Public key: Public key cryptography principles, public key cryptography algorithms, digital

signatures, digital Certificates, Certificate Authority and key management Kerberos,

X.509Directory Authentication Service

UNIT IV:

IP Security: IP Security Overview, IP Security Architecture, Authentication Header,

Encapsulating Security Payload, Combining Security Associations and Key Management

Transport Level Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport

Layer Security (TLS), Secure Electronic Transaction (SET)

Email Privacy: Pretty Good Privacy (PGP) and S/MIME.

UNIT V:

Intrusion Detection: Intruders, Intrusion Detection systems, Password Management.

Malicious Software: Viruses and related threats & Countermeasures.

Fire walls: Firewall Design principles, Trusted Systems.

TEXT BOOKS:

1. Network Security& Cryptography: Principles and Practices, William Stallings, PEA, Sixth

edition.

2. Hack Proofing your Network, Russell, Kaminsky, Forest Puppy, Wiley Dreamtech

REFERENCE BOOKS:

1. Network Security & Cryptography, Bernard Menezes, Cengage,2010

91

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Security Attacks (Interruption, Interception, Modification and Fabrication) 2

2 Security Services: Confidentiality, Authentication, Integrity. 2

3 Non-repudiation, access Control and Availability and Mechanisms. 2

4 A model for Internetwork security, Internet Standards and RFCs, Buffer overflow

& format string vulnerabilities

3

5 TCP session hijacking, ARP attacks, route table modification, UDP hijacking and

man-in-the-middle attacks.

3

6 Conventional Encryption Principles, Conventional encryption algorithms, cipher

block modes of operation

3

7 Location of encryption devices, key distribution Approaches of Message

Authentication, Secure Hash Functions and HMAC

3

8 Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s

Theorems,

4

9 The Chinese Remainder theorem, Discrete logarithms, Public key cryptography

principles.

3

10 Public key cryptography algorithms, digital signatures. 3

11 Digital Certificates, Certificate Authority and key management Kerberos, X.509

Directory Authentication Service

3

12 IP Security Overview, IP Security Architecture, Authentication Header 3

13 Encapsulating Security Payload, Combining Security Associations and Key

Management

3

14 Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer

Security (TLS).

4

15 Secure Electronic Transaction (SET) 3

16 Pretty Good Privacy (PGP) and S/MIME. 2

17 Intruders, Intrusion Detection systems, Password Management 3

18 Viruses and related threats & Countermeasures 3

19 Firewall Design principles, Trusted Systems. 4

Course Outcomes:

Upon the successful completion of the course, students will be able to:

1. The learner will get good awareness regarding different security threats and countermeasures.

2. The students will know the basic principles of symmetric and asymmetric key cryptography

3. The students will gains good knowledge design and applications of hash algorithms and digital

signatures.

4. The students will gains good knowledge at application layer security such as IP security, Web

Security, email Security and Firewalls

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √

92

CO2 √ √ √ √ √

CO3 √ √ √ √ √ √

CO4 √ √ √ √ √ √ √

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT2.3 SOFT

COMPUTING

3 C 40 60

• Course Description: In the course the student will Learn soft computing concepts and techniques

and foster their abilities in designing and implementing soft computing based solutions for real-

world problems.

• Syllabus / Text books:

UNIT I :

FUZZY SET THEORY: Introduction to Neuro – Fuzzy and Soft Computing, Fuzzy Sets, Basic

function and Terminology, Set-theoretic Operations, Member Function Formulation and

Parameterization, Fuzzy Rules and Fuzzy Reasoning, Extension Principle and Fuzzy Relations, Fuzzy

If-Then Rules, Fuzzy Reasoning, Fuzzy Inference Systems, Mamdani Fuzzy Models, Sugeno Fuzzy

Models, Tsukamoto Fuzzy Models, Input Space Partitioning and Fuzzy Modeling.

UNIT II:

OPTIMIZATION: Derivative based Optimization, Descent Methods, and The Method of

Steepest Descent, Classical Newton’s Method, Step Size Determination, Derivative-free Optimization,

Genetic Algorithms, Simulated Annealing, and Random Search – Downhill Simplex Search.

UNIT III:

ARTIFICIAL INTELLIGENCE : Introduction, Knowledge Representation, Reasoning, Issues

and Acquisition: Prepositional and Predicate Calculus Rule Based knowledge Representation Symbolic

Reasoning Under Uncertainty Basic knowledge Representation Issues Knowledge acquisition, Heuristic

Search: Techniques for Heuristic search Heuristic Classification State Space Search: Strategies

Implementation of Graph Search based on Recursion Patent-directed Search Production System and

Learning.

UNIT IV:

NEURO FUZZY MODELING: Adaptive Neuro-Fuzzy Inference Systems, Architecture

Hybrid Learning Algorithm, Learning Methods that Cross-fertilize ANFIS and RBFN Coactive Neuro

Fuzzy Modeling, Framework Neuron Functions for Adaptive Networks Neuro Fuzzy Spectrum.

UNIT V:

APPLICATIONS OF COMPUTATIONAL INTELLIGENCE: Printed Character Recognition, Inverse

Kinematics Problems, Automobile Fuel Efficiency Prediction, Soft Computing for Color Recipe

Prediction.

TEXT BOOKS:

1. J.S.R.Jang, C.T.Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, PHI, 2004, Pearson

Education 2004.

2. N.P.Padhy, “Artificial Intelligence and Intelligent Systems”, Oxford University Press, 2006.

.

REFERENCES:

1. Elaine Rich & Kevin Knight, Artificial Intelligence, Second Edition, Tata Mcgraw Hill

93

Publishing Comp., 2006, New Delhi.

2. Timothy J.Ross, “Fuzzy Logic with Engineering Applications”, McGraw-Hill, 1997.

3. Davis E.Goldberg, “Genetic Algorithms: Search, Optimization and Machine Learning”,

Addison Wesley, N.Y., 1989.

4. S. Rajasekaran and G.A.V.Pai, “Neural Networks, Fuzzy Logic and Genetic Algorithms”,

PHI.

5. R.Eberhart, P.Simpson and R.Dobbins, “Computational Intelligence - PC Tools”, AP

Professional, Boston, 1996.

6. AmitKonar, “Artificial Intelligence and Soft Computing Behaviourand Cognitive model of

The human brain”, CRC Press, 2008

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Introduction to neuro-fuzzy and soft computing. 2

2 Fuzzy sets, basic definition and terminology. Set –theoretic operations. 3

3 Member function formulation and parameterization. Fuzzy rules and fuzzy

reasoning.

3

4 Extension principles and fuzzy relations. Fuzzy if-then rules, fuzzy reasoning,

fuzzy inference systems.

3

5 Mandani fuzzy models, sugeno fuzzy models, Tsukamoto fuzzy models. 3

6 Input space portioning and fuzzy modeling. 2

7 Optimization: Derivative based optimization, descent methods, and the method

of steepest descent.

2

8 Classical newton’s method. Step size determination. 3

9 Derivative free optimization. Genetic algorithms. 2

11 Simulated annealing, random search-downhill simplex search. 3

12 Artificial intelligence-introduction, knowledge representation, reasoning, issues

and acquisition.

3

13 Prepositional and predicate calculus, rule based knowledge representation,

symbolic reasoning under uncertainty.

2

14 Heuristic search: techniques for heuristic search and heuristic classification

state space search.

3

15 Graph search based on recursion patent-directed search production system and

learning.

2

16 Neuro fuzzy modeling-adaptive neuro fuzzy inference systems, architecture –

hybrid learning algorithm.

3

17 Learning methods that cross fertilize ANFIS and RBFN. 2

18 Coactive neuro fuzzy modeling, framework neuron functions for adaptive

networks.

3

19 Neuro fuzzy spectrum. 2

20 Application of computational intelligence- printed character recognition. 2

21 Inverse kinematics problems. Automobile fuel efficiency prediction. 2

22 Soft computing for color recipe prediction. 2

Course Outcomes:

1. Able to apply fuzzy logic and reasoning to handle uncertainty in engineering problems.

2. Make use of genetic algorithms to combinatorial optimization problems

94

3. Apply artificial intelligence techniques, including search heuristics, knowledge representation,

planning and reasoning.

4. Learn and apply the principles of self-adopting and self organizing neuro fuzzy inference

systems.

5. Evaluate and compare solutions by various soft computing approaches for a given problem

6. Evaluate and compare solutions by various soft computing approaches for a given problem

Mapping between COs and POs:

CO\PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √

CO2 √ √ √

CO3 √ √ √

CO4 √ √ √

CO5 √ √ √

CO6 √ √

Subject

Code

Subject Name Credits Core/Elective Internal marks External marks

MIT2.4 ADHOC AND

SENSOR

NETWORKS

3 E 40 60

• Course Description: This course covers major aspects of ad hoc and sensor networking, from

design through performance issues to application requirements. It starts with the design issues and

challenges associated with implementations of ad hoc and sensor network applications. This includes

mobility, disconnections, and battery power consumption. The course provides a detailed treatment of

proactive, reactive, and hybrid routing protocols in mobile wireless networks. It also covers the IEEE

802.11 Wireless LAN and Bluetooth standards and discusses their characteristics and operations.

About half of the course time is spent on wireless sensor networks (architecture, design, protocols,

and applications).

• Syllabus / Text books:

UNIT I: Introduction to Ad Hoc Wireless Networks

Cellular and Ad Hoc Wireless Networks, Characteristics of MANETs, Applications of MANETs, Issues

and Challenges of MANETs, Ad Hoc Wireless Internet, MAC protocols for Ad hoc Wireless Networks-

Issues, Design Goals and Classifications of the MAC Protocols

UNIT II: Routing Protocols for Ad Hoc Wireless Networks

Issues in Designing a Routing Protocol, Classifications of Routing Protocols, Topology-based versus

Position-based Approaches, Issues and design goals of a Transport layer protocol, Classification of

Transport layer solutions, TCP over Ad hoc Wireless Networks, Solutions for TCP over Ad Hoc

Wireless Networks, Other Transport layer protocols.

UNIT III: Security protocols for Ad hoc Wireless Networks

95

Security in Ad hoc Wireless Networks, Network Security Requirements, Issues and Challenges in

Security Provisioning, Network Security Attacks, Key Management, Secure Routing in Ad hoc Wireless

Networks, Cooperation in MANETs, Intrusion Detection Systems.

UNIT IV: Basics of Wireless Sensors and Applications

The Mica Mote, Sensing and Communication Range, Design Issues, Energy Consumption, Clustering of

Sensors, Applications, Data Retrieval in Sensor Networks-Classification of WSNs, MAC layer, Routing

layer, Transport layer, High-level application layer support, Adapting to the inherent dynamic nature of

WSNs.

UNIT V: Security in WSNs

Security in WSNs, Key Management in WSNs, Secure Data Aggregation in WSNs, Sensor Network

Hardware-Components of Sensor Mote, Sensor Network Operating Systems–TinyOS, LA-TinyOS,

SOS, RETOS, Imperative Language-nesC, Dataflow style language: TinyGALS, Node-Level

Simulators, NS-2 and its sensor network extension, TOSSIM.

TEXT BOOKS:

1. Ad Hoc Wireless Networks – Architectures and Protocols, C. Siva Ram Murthy, B. S. Murthy,

Pearson Education, 2004

2. Ad Hoc and Sensor Networks – Theory and Applications, Carlos Corderio Dharma P.Aggarwal,

World Scientific Publications / Cambridge University Press, March 2006

3. Wireless Sensor Networks – Principles and Practice, Fei Hu, Xiaojun Cao, An Auerbach book,

CRC Press, Taylor & Francis Group, 2010

REFERENCE BOOKS:

1. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas Guibas,

Elsevier Science imprint, Morgan Kauffman Publishers, 2005, rp2009

2. Wireless Ad hoc Mobile Wireless Networks – Principles, Protocols and Applications, Subir

Kumar Sarkar, et al., Auerbach Publications, Taylor & Francis Group, 2008

3. Ad hoc Networking, Charles E.Perkins, Pearson Education, 2001

4. Wireless Ad hoc Networking, Shih-Lin Wu, Yu-Chee Tseng, Auerbach Publications, Taylor &

Francis Group, 2007

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Cellular and Ad hoc wireless networks, characters of MANETs. 2

2 Applications of MANET’s. Issues and challenges of MANETs. 2

3 Ad hoc wireless internet, MAC protocols for Ad Hoc wireless networks-

issues.

3

4 Design goals and classifications of the MAC protocols. 3

5 Routing protocols Ad hoc Wireless Networks

Issues in designing a routing protocol, classification of routing protocols.

3

6 Topology based versus position based approaches.

Issues and design goals of a transparent layer protocol.

2

7 Classification of transport layer solutions. TCP over Ad hoc wireless

networks.

2

8 Solution for TCP over Ad hoc Wireless networks, Other transport layer

protocols.

3

96

9 Security in Ad hoc wireless networks. Network security requirements. 2

11 Issues and challenges in security provisioning, networking security attacks. 3

12 Key management, secure routing in Ad hoc wireless networks. 3

13 Co operation in MANETs, Intrusion detection systems. 3

14 Basics of wireless sensors and applications- the mica mote, sensing and

communication range.

2

15 Design issues, energy consumption, clustering of sensors, applications. 2

16 Data retrieval in sensor networks- classification of WSNs, MAC layer,

routing layer, transport layer.

4

17 High level application layer support, adapting to the inherent dynamic nature

of WSNs.

2

18 Security in WSNs, key management in WSNs, Secure data Aggregation in

WSNs.

3

19 sensor network hardware –components of sensor mote 2

20 Sensor Network Operating Systems- TinyOS, LA- TinnyOS, SOS, RETOS,

Imperative Language-nesc.

4

21 Dataflow style language- TinyGALS, node-level simulators, NS-2 and its

sensor network extension, TOSSIM.

3

Course outcomes:

Upon completion of the course the student will be able to

1. Describe the principles and characteristics of mobile ad hoc networks (MANETs) and what

distinguishes them from infrastructure-based networks.

2. Describe the principles and characteristics of wireless sensor networks

3. Discuss the challenges in designing MAC, routing and transport protocols for wireless ad-hoc

sensor networks.

4. Comprehend the various sensor network Platforms, tools and applications.

5. Describe the issues and challenges in security provisioning and also familiar with the

mechanisms for implementing security and trust mechanisms in MANETs and WSNs.

Mapping between COs and POs:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √

CO2 √

CO3 √ √ √

CO4 √ √

CO5 √ √ √ √

• Course Description: In this course the student will learn about the Syntax, Structure and Semantics

of web. The student will learn about Metadata, metadata standards, XML+ metadata specification,

RDF and metadata processing. This course introduces techniques that are useful stand-alone and can

Subject

Code

Subject Name Credits Core/Elective Internal marks External marks

MIT2.4 SEMANTIC

WEBSERVICES

3 E 40 60

97

be integrated for building a semantic web. It will cover XML with Document Type Definitions and

Schemas; transformation/inference rules in XSLT, Rule ML, and the W3C rule language RIF;

metadata with RDF (Resource Description Framework); metadata taxonomies with RDF Schema;

description logic and the W3C ontology language OWL 2; as well as integrating these techniques for

ontology/rule-based multi-agent systems.

• Syllabus / Text books:

Unit I: Web Intelligence

Thinking and Intelligent Web Applications, The Information Age ,The World Wide Web, Limitations

of Today’s Web, The Next Generation Web, Machine Intelligence, Artificial Intelligence, Ontology,

Inference engines, Software Agents, Berners-Lee www, Semantic Road Map, Logic on the semantic

Web.

Unit II: Knowledge Representation for the Semantic Web

Ontologies and their role in the semantic web, Ontologies Languages for the Semantic Web –

Resource Description Framework(RDF) / RDF Schema, Ontology Web

Language(OWL),UML,XML/XML Schema.

Unit III: Ontology Engineering

Ontology Engineering, Constructing Ontology, Ontology Development Tools, Ontology Methods,

Ontology Sharing and Merging, Ontology Libraries and Ontology Mapping, Logic, Rule and

Inference Engines.

Unit IV: Semantic Web Applications, Services and Technology

Semantic Web applications and services, Semantic Search, e-learning, Semantic Bioinformatics,

Knowledge Base, XML Based Web Services, Creating an OWL-S Ontology for Web Services,

Semantic Search Technology, Web Search Agents and Semantic Methods,

Unit V:.Social Network Analysis and semantic web

What is social Networks analysis, development of the social networks analysis, Electronic Sources

for Network Analysis – Electronic Discussion networks, Blogs and Online Communities, Web Based

Networks? Building Semantic Web Applications with social network features.

TEXT BOOKS:

1. Thinking on the Web - Berners Lee, Godel and Turing, Wiley interscience, 2008.

2. Social Networks and the Semantic Web , Peter Mika,Springer,2007.

REFERENCE BOOKS:

1. Semantic Web Technologies, Trends and Research in Ontology Based Systems, J.Davies, Rudi

Studer, Paul Warren, JohnWiley&Sons.

2. Semantic Web and Semantic Web Services -Liyang Lu Chapman and Hall/CRCPublishers,

(Taylor & Francis Group)

3. Information Sharing on the semantic Web - HeinerStuckenschmidt;Frank Van Harmelen,

Springer Publications.

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Thinking and Intelligent Web Applications, The Information Age ,The World

Wide Web

3

98

2 Limitations of Today’s Web, The Next Generation Web, Machine

Intelligence,

3

3 Artificial Intelligence, Ontology, Inference engines, Software Agents, 4

4 Berners-Lee www, Semantic Road Map, Logic on the semantic Web. 3

5 Ontologies and their role in the semantic web 2

6 Ontologies Languages for the Semantic Web –Resource Description

Framework(RDF) / RDF Schema

4

7 Ontology Web Language (OWL), UML, XML/XML Schema. 3

8 Ontology Engineering, Constructing Ontology, Ontology Development Tools 2

9 Ontology Methods, Ontology Sharing and Merging 2

10 Ontology Libraries and Ontology Mapping, Logic, Rule and Inference

Engines.

3

11 Semantic Web applications and services, Semantic Search 2

12 e-learning, Semantic Bioinformatics, 3

13 Knowledge Base, XML Based Web Services 3

14 Creating an OWL-S Ontology for Web Services, Semantic Search Technology 4

15 Web Search Agents and Semantic Methods 3

16 What is social Networks analysis, development of the social networks analysis 4

17 Electronic Sources for Network Analysis – Electronic Discussion networks 3

18 Blogs and Online Communities, Web Based Networks 3

19 Building Semantic Web Applications with social network features. 3

Course Outcomes:

1. Understand the concept structure of the semantic web technology

2. How this technology revolutionizes the World Wide Web and its uses.

3. Understand the concepts of metadata, semantics of knowledge and resource, ontology, and their

descriptions in XML-based syntax and web ontology language (OWL).

4. Describe logic semantics and inference with OWL

5. Use ontology engineering approaches in semantic applications, program semantic applications

with Java API.

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √

CO2 √ √ √ √ √

CO3 √ √ √ √

CO4 √ √ √ √ √

CO5 √ √ √ √

• Course Description: The student will learn how to draw the Use case Diagram, Activity Diagrams,

Class Diagrams, Object Diagrams, Sequence Diagrams, Collaboration Diagrams, State Chart

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT2.4 UML AND DESIGN

PATTERNS

3 E 40 60

99

Diagram, Component Diagram, and Deployment Diagram. And also identify recurring design

problems, document possible solutions to these problems through the general arrangement and

composition of objects and classes discuss the advantages and disadvantages of the various solutions

and provide implementation examples. This course will introduce the student to the concept of design

patterns, examine several patterns in detail, apply these patterns to specific problems, and point the

student to design pattern resources.

• Syllabus / Text books

UNIT-I:

Introduction to UML: Importance of modeling, principles of modeling, object oriented modeling,

conceptual model of the UML, Architecture, and Software Development Life Cycle.

UNIT-II:

Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams. Advanced classes,

advanced relationships, Object diagrams: common modeling techniques.

UNIT-III:

Behavioral Modeling: Interactions, Interaction diagrams. Use cases, Use case Diagrams, Activity

Diagrams., Events and signals, state machines, state chart diagrams. Advanced Behavioral Modeling:

Architectural Modeling: Components, Deployment, Component diagrams and Deployment diagrams,

Common modeling techniques for component and deployment diagrams

UNIT-IV:

Introduction: What Is a Design Pattern?, Design Patterns in Smalltalk MVC, Describing Design

Patterns, The Catalog of Design Patterns, Organizing the Catalog, How Design Patterns Solve Design

Problems, How to Select a Design Pattern, How to Use a Design Pattern.

Categories of Design Patterns: Creational Patterns: Abstract Factory, Builder, Factory Method,

Prototype, And Singleton.

UNIT-V:

Structural Patterns: Adapter, Bridge, Composite, Decorator, Façade, Flyweight, Proxy.

Behavioral Patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator, Memento,

Observer, Strategy, Template Method, What to Expect from Design Patterns

TEXT BOOKS:

1. The unified Modeling language user guide by Grady Booch, James Rumbaugh ,Ivar Jacobson,

PEA

2. Design Patterns By Erich Gamma, Pearson Education

REFERENCE BOOK:

Satzinger: Object Oriented Analysis and Design, CENGAGE

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Introduction to UML: Importance of modeling 2

2 Principles of modeling, object oriented modeling, conceptual model of the 4

100

UML, Architecture

3 Software Development Life Cycle. 2

4 Structural Modeling: Classes, Relationships 3

5 Common Mechanisms and diagrams. Advanced classes, advanced

relationships

2

6 Object diagrams: common modeling techniques. 3

7 Behavioral Modeling: Interactions, Interaction diagrams. 4

8 Use cases, Use case Diagrams, Activity Diagrams. Events and signals 3

9 State machines, state chart diagrams. 2

10 Advanced Behavioral Modeling: Architectural Modeling: Components 3

11 Deployment, Component diagrams and Deployment diagrams 2

12 Common modeling techniques for component and deployment diagrams 3

13 Introduction: What Is a Design Pattern?, Design Patterns in Smalltalk MVC,

Describing Design Patterns

4

14 The Catalog of Design Patterns, Organizing the Catalog, How Design

Patterns Solve Design Problems

4

15 How to Select a Design Pattern, How to Use a Design Pattern. 3

16 Categories of Design Patterns: Creational Patterns: Abstract Factory, Builder,

Factory Method, Prototype, And Singleton.

4

17 Structural Patterns: Adapter, Bridge, Composite, Decorator, Façade,

Flyweight, Proxy.

3

18 Behavioral Patterns: Chain of Responsibility, Command, Interpreter, Iterator 3

19 Mediator, Memento, Observer, Strategy 3

20 Template Method, What to Expect from Design Patterns 2

Course Outcomes:

1. Design the Structural aspects of the System.

2. Design the Behavioral aspects of the System.

3. Understand and be able to apply incremental/iterative development

4. Understand common design patterns

5. Be able to identify appropriate patterns for design problems

6. Be able to evaluate the quality software source code

7. Be able to refractor badly designed program properly using patterns

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √

CO2 √ √ √ √ √

CO3 √ √ √ √

CO4 √ √ √ √ √

CO5 √ √ √

CO6 √ √ √ √ √ √

CO7 √ √ √ √

101

• Course Description:

This course provides basic knowledge of artificial intelligence, a deepened technical understanding of

machine learning research and theories, as well as practical experience of the use and design of

machine learning and data mining algorithms for applications and experiments. The course has a

strong focus towards applied IT. The student not only learns how to critically review and compare

different algorithms and methods, but how to plan, design, and implement learning components and

applications and how to conduct machine learning experiments.

• Syllabus / Text books:

UNIT -I:The ingredients of machine learning, Tasks: the problems that can be solved with

machine learning, Models: the output of machine learning, Features, the workhorses of machine

learning. Binary classification and related tasks: Classification, Scoring and ranking, Class

probability estimation

UNIT- II: Beyond binary classification: Handling more than two classes, Regression,

Unsupervised and descriptive learning. Concept learning: The hypothesis space, Paths through

the hypothesis space, beyond conjunctive concepts

UNIT- III: Tree models: Decision trees, Ranking and probability estimation trees, Tree learning

as variance reduction. Rule models: Learning ordered rule lists, Learning unordered rule sets,

Descriptive rule learning, First-order rule learning

UNIT -IV: Linear models: The least-squares method, The perception: a heuristic learning

algorithm for linear classifiers, Support vector machines, obtaining probabilities from linear

classifiers, going beyond linearity with kernel methods. Distance Based Models: Introduction,

Neighbors and exemplars, Nearest Neighbors classification, Distance Based Clustering,

Hierarchical Clustering.

UNIT- V: Probabilistic models: The normal distribution and its geometric interpretations,

Probabilistic models for categorical data, Discriminative learning by optimizing conditional

likelihood Probabilistic models with hidden variables.

Features: Kinds of feature, Feature transformations, Feature construction and selection. Model

ensembles: Bagging and random forests, Boosting

TEXT BOOKS:

1. Machine Learning: The art and science of algorithms that make sense of data, Peter Flach,

Cambridge.

2. Machine Learning, Tom M. Mitchell, MGH.

REFERENCE BOOKS:

1. Understanding Machine Learning: From Theory to Algorithms, ShaiShalev-Shwartz, Shai Ben

David, and Cambridge.

3. Machine Learning in Action, Peter Harington, 2012, Cengage.

Lecture Plan:

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT 2.5 Machine

Learning

3 E 40 60

102

SNO TOPICS COVERED HOURS

1 Introduction: Well-posed learning problems, Designing a learning system 3

2 Perspectives and issues in machine learning. Concept learning and the general

to specific ordering – Introduction

3

3 A concept learning task, Concept learning as search, Find-S: finding a

maximally specific hypothesis

3

4 Version spaces and the candidate elimination algorithm, Remarks on version

spaces and candidate elimination, Inductive bias.

4

5 Introduction, Decision tree representation, Appropriate problems for decision

tree learning

3

6 The basic decision tree learning algorithm, Issues in decision tree learning 2

7 Introduction, Neural network representation, Appropriate problems for neural

network learning

3

8 Perceptions, Multilayer networks and the back propagation algorithm 2

9 Remarks on the back propagation algorithm, An illustrative example face

recognition, advanced topics in artificial neural networks

3

11 Evaluation Hypotheses: Motivation, Estimation hypothesis accuracy, Basics

of sampling theory

2

12 A general approach for deriving confidence intervals, Difference in error of

two hypotheses, Comparing learning algorithms

4

13 Introduction, Bayes theorem, Bayes theorem and concept learning, Maximum

likelihood and least squared error hypotheses

4

14 Maximum likelihood hypotheses for predicting probabilities, Minimum

description length principle, Bayes optimal classifier, Gibs algorithm

4

15 Naïve bayes classifier, An example learning to classify text, Bayesian belief

networks The EM algorithm.

3

16 Introduction, Probability learning an approximately correct hypothesis,

Sample complexity for Finite Hypothesis Space

3

17 Sample Complexity for infinite Hypothesis Spaces -Instance-Based Learning-

Introduction, k -Nearest Neighbor Learning

3

18 Locally Weighted Regression, Radial Basis Functions, Case-Based

Reasoning, Remarks on Lazy and Eager Learning

4

Course Outcomes:

By the end of course the student will be able

1. Familiarity with a set of well-known supervised, unsupervised and semi-supervised learning

algorithms.

2. The ability to implement some basic machine learning algorithms

3. Understanding of how machine learning algorithms are evaluated

4. The ability to comprehend a Machine Learning conference paper (NIPS, ICML)

5. Design own machine learning algorithms

103

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √

CO2 √ √ √ √ √

CO3 √ √ √

CO4 √ √ √ √ √

CO5 √ √ √

Subject

Code

Subject Name Credits Core/Elective Internal

marks

External

marks

MIT2.5 INFORMATION

RETRIEVAL

SYSTEMS

3 E 40 60

• Course Description: Information retrieval plays a major role in processing of huge amounts of data.

The student will learn about representation of data in inverted files and signature files, types of

algorithms like Naive Algorithm, Knutt-Morris-Pratt Algorithm, Boyer-Moore Algorithm, Shift-Or

Algorithm, Karp-Rabin Algorithm searching of strings in a give large text.

• Syllabus / Text books:

Unit I: Introduction to Information storage and retrieval systems:

Domain Analysis of IR systems, IR and other types of Information Systems, IR System Evaluation

Introduction to Data structures and algorithms related to Information Retrieval: Basic

Concepts, Data structures, Algorithms.

Unit II: Inverted Files and Signature Files:

Introduction, Structures used in Inverted Files, Building an Inverted file using a sorted array,

Modifications to the Basic Techniques.

Signature Files: Concepts of Signature files, Compression, Vertical Partitioning, and Horizontal

Partitioning.

Unit III: New Indices for Text, Lexical Analysis and Stop lists:

PAT Trees and PAT Arrays: Introduction, PAT Tree structure, Algorithms on the PAT Trees,

Building PAT Trees as PATRICA Trees, PAT representation as Arrays. Lexical Analysis, Stop

lists.

Unit IV: Stemming Algorithms and Thesaurus Construction:

Types of Stemming algorithms, Experimental Evaluations of Stemming, Stemming to Compress

Inverted Files.

Thesaurus Construction: Features of Thesauri, Thesaurus Construction, Thesaurus construction

from Texts, Merging existing Thesauri.

Unit V: String Searching Algorithms:

Introduction, Preliminaries, the Naive Algorithm, The Knutt-Morris-Pratt Algorithm, The Boyer-

Moore Algorithm, The Shift-Or Algorithm, The Karp-Rabin Algorithm.

104

TEXT BOOKS

1. Modern Information Retrieval, Ricardo Baeza-Yates, Neto, PEA,2007.

2. Information Storage and Retrieval Systems: Theory and Implementation, Kowalski, Gerald,

Mark Academic Press, 2000.

REFERENCE BOOKS

1. Information Retrieval Data Structures and Algorithms , Frakes, Ricardo Baeza-Yates, PEA

2. Information Storage and Retieval, Robert Korfhage, John Wiley & Sons.

3. Introduction to Information Retrieval, Manning, Raghavan, Cambridge University Press.

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Introduction to Information storage and retrieval systems, Domain Analysis of IR

systems.

3

2 IR and other types of Information Systems, IR System Evaluation. 3

3 Introduction to Data structures and algorithms related to Information Retrieval,

Basic Concepts, Data structures, Algorithms.

4

4 Inverted Files and Signature Files, Introduction, Structures used in Inverted Files 3

5 Building an Inverted file using a sorted array, Modifications to the Basic

Techniques.

3

6 Signature Files: Concepts of Signature files, Compression, Vertical Partitioning. 4

7 Horizontal Partitioning, New Indices for Text, Lexical Analysis and Stop lists. 3

8 PAT Trees and PAT Arrays Introduction, PAT Tree structure, Algorithms on the

PAT Trees.

4

9 Building PAT Trees as PATRICA Trees, PAT representation as Arrays. Lexical

Analysis, Stop lists

4

10 Stemming Algorithms and Thesaurus Construction, Types of Stemming

algorithms.

3

11 Experimental Evaluations of Stemming, Stemming to Compress Inverted Files. 4

12 Thesaurus Construction: Features of Thesauri, Thesaurus Construction. 4

13 Thesaurus construction from Texts, Merging existing Thesauri. 3

14 String Searching Algorithms, Introduction, Preliminaries. 3

15 The Naive Algorithm, The Knutt-Morris-Pratt Algorithm. 3

16 The Boyer-Moore Algorithm, The Shift-Or Algorithm, The Karp-Rabin

Algorithm.

4

Course Outcomes:

• Understanding the basics of Information retrieval such as precision and recall

• Understanding the data structures like Inverted Indices, signature files used in Information

retrieval systems

• Understanding the basics of web search

• Understanding the different techniques for compression of an index including the dictionary and

its posting list

• Understanding the different components of an Information retrieval system

105

• Developing the ability of develop a complete IR system from scratch

• Understand and implement with various types of string matching algorithms

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √

CO2 √ √ √ √ √

CO3 √ √ √ √

CO4 √ √ √ √ √

CO5 √ √ √ √

CO6 √ √ √ √ √ √

CO7 √ √ √ √

Subject

Code

Subject Name Credits Core/Elective Internal

marks

External

marks

MIT 2.5 ANIMATION &

GAMING

3 E 40 60

• Course Description : In this course the student will be learn about game programming principles

and techniques for planning and implementing 3D interactive games. In a collaborative fashion,

students are exposed to a structured process that explains how to develop 3D games incorporating

object-oriented programming statements, 3D graphic scripts, character animation, sound, and music.

This course concludes with a final project involving a game prototype that exhibits 3D graphics

programming and animation techniques studied in this course. Emphasis is on problem solving and

collaboration. This course introduces students to fundamental principles of game design and 3D

computer animation. The course explores methods of modeling, rendering, and animating 3D

objects for video games, computer simulations, and virtual worlds. Students use 3D modeling

software to create character animation and 3D environments including rigging, key framing

animation, lighting, camera angles, texture formation, and motion.

• Syllabus / Text books:

UNIT I: What is mean by Animation. Why we need Animation. History of Animation. Uses of

Animation – Types of Animation – Principles of Animation – Some Techniques of Animation –

Animation on the WEB –3DAnimation –Special Effects- Creating Animation.

UNIT II: Creating Animation in Flash: Introduction to Flash Animation. Introduction to Flash–

Working with the Timeline and Frame-based Animation-Working with the Timeline and Tween-

based Animation–Understanding Layers

UNIT-III: Concept Development–Story Developing –Audio & Video–Color Model– Device

Independent Color Model–Gamma and Gamma Correction – Production Budgets -3D Animated

Movies.

106

UNIT –IV: Animation: The Animation Loop, Calculating Frame Rates, Scheduling Tasks at

Alternate Frame Rates, Restoring the Background, Double Buffering, Time – Based Motion,

Scrolling the Background, Parallax, User Gestures, Timed Animations, Animation Best Practices

UNIT –V: A Game Engine , The Game Loop, Loading Images, Multitrack Sound, Keyboard

Events, High Scores, The Game Engine Listing, The Ungame, A Pinball Game

TEXTBOOK:

1. PRINCIPLESOF MULTIMEDIA–RanjanParekh, 2007, TMH. (UnitI, UnitIII )

2. MultimediaTechnologies–AshokBanerji, AnandaMohanGhosh–McGrawHill

Publication.(Unit II:Chapter10)

3. Core HTML5 CANVAS, Graphics, Animation and Game Development, David Geary, PEARSON

(Unit IV, Unit V)

Lecture Plan:

SNO TOPICS COVERED HOURS

1 What is meant by Animation – Why we need Animation 3

2 History of Animation – Uses of Animation 3

3 Types of Animation – Principles of Animation – Some Techniques of

Animation –Animation on the WEB

4

4 3DAnimation –Special Effects- Creating Animation 3

5 Creating Animation in Flash: Introduction to Flash Animation 4

6 Introduction to Flash–Working with the Timeline and Frame-based Animation 3

7 Working with the Timeline and Tween-based Animation–Understanding

Layers

3

8 Concept Development – Story Developing –Audio & Video–Color Model 3

9 Device Independent Color Model – Gamma and Gamma Correction 3

10 Production Budgets -3DAnimatedMovies 4

11 Animation: The Animation Loop, Calculating Frame Rates 3

12 Scheduling Tasks at Alternate Frame Rates 3

13 Restoring the Background, Double Buffering 3

14 Time – Based Motion, Scrolling the Background 2

15 Parallax, User Gestures, Timed Animations, Animation Best Practices 3

16 A Game Engine , The Game Loop, Loading Images 3

17 Multitrack Sound, Keyboard Events, High Scores 3

Course Outcomes:

1. Learn all aspects of game development from visual storytelling

2. Learn modeling of game development.

3. Learn texturing, lighting, rigging & animation of game development

107

4. Learn audio, user interface & game level design.

5. Basic understanding for the creation of 2D animation through the use of traditional

techniques and stop-action animation. Students create 2D objects and move them in time

and space, then render them to video. Topics include all twelve principles of animation.

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √

CO2 √ √ √ √ √

CO3 √ √ √ √

CO4 √ √ √ √ √

CO5 √ √ √ √

Subject

Code

Subject Name Credits Core/Elective Internal

marks

External marks

MIT2.6 CLOUD

COMPUTING

3 E 40 60

• Course Description: The student will learn about the cloud environment, building software

systems and components that scale to millions of users in modern internet, cloud concepts

capabilities across the various cloud service models including IaaS, PaaS, SaaS, and developing

cloud based software applications on top of cloud platforms.

• Syllabus / Text books:

UNIT I:

Introduction: Network centric computing, Network centric content, peer-to –peer systems, cloud

computing delivery models and services, Ethical issues, Vulnerabilities, Major challenges for cloud

computing

Parallel and Distributed Systems: introduction, architecture, distributed systems, communication

protocols, logical clocks, message delivery rules, concurrency, model concurrency with Petri Nets.

UNIT II:

Cloud Infrastructure: At Amazon, The Google Perspective, Microsoft Windows Azure, Open Source

Software Platforms, Cloud storage diversity, Inter cloud, energy use and ecological impact,

responsibility sharing, user experience, Software licensing

Cloud Computing : Applications and Paradigms: Challenges for cloud, existing cloud applications and

new opportunities, architectural styles, workflows, The Zookeeper, The Map Reduce Program model,

HPC on cloud, biological research

108

UNIT III:

Cloud Resource virtualization: Virtualization, layering and virtualization, virtual machine monitors,

virtual machines, virtualization- full and para, performance and security isolation, hardware support for

virtualization, Case Study: Xen, vBlades

Cloud Resource Management and Scheduling: Policies and Mechanisms, Applications of control

theory to task scheduling, Stability of a two-level resource allocation architecture, feedback control

based on dynamic thresholds, coordination, resource bundling, scheduling algorithms, fair queuing, start

time fair queuing, cloud scheduling subject to deadlines, Scheduling Map Reduce applications, Resource

management and dynamic application scaling

UNIT IV:

Storage Systems: Evolution of storage technology, storage models, file systems and database,

distributed file systems, general parallel file systems. Google file system. Apache Hadoop, Big Table,

Megastore (text book 1), Amazon Simple Storage Service(S3) (Text book 2)

Cloud Security: Cloud security risks, security – atop concern for cloud users, privacy and privacy

impact assessment, trust, OS security, Virtual machine security, Security risks

UNIT V:

Cloud Application Development: Amazon Web Services : EC2 – instances, connecting clients,

security rules, launching, usage of S3 in Java, Installing Simple Notification Service on Ubuntu 10.04,

Installing Hadoop on Eclipse, Cloud based simulation of a Distributed trust algorithm, Cloud service for

adaptive data streaming ( Text Book 1)

Google: Google App Engine, Google Web Toolkit (Text Book 2)

Microsoft: Azure Services Platform, Windows live, Exchange Online, Share Point Services, Microsoft

Dynamics CRM (Text Book 2)

TEXT BOOKS:

1. Cloud Computing, Theory and Practice, Dan C Marinescu, MK Elsevier

2. Cloud Computing, A Practical Approach, Anthony T Velte, Toby J Velte, Robert Elsenpeter, TMH

REFERNCE BOOK:

1. Mastering Cloud Computing, Foundations and Application Programming, Raj Kumar Buyya,

Christen vecctiola, S Tammaraiselvi, TMH

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Network centric computing, Network centric content, peer-to –peer systems 3

2 Cloud computing delivery models and services, Ethical issues, Vulnerabilities,

Major challenges for cloud computing

3

3 Parallel and distributed Systems introduction, Architecture, Distributed systems 2

4 Communication protocols, logical clocks, message delivery rules, Concurrency,

model concurrency with Petri Nets.

3

5 Cloud Infrastructure at Amazon, The Google Perspective, Microsoft Windows

Azure

2

6 Open Source Software Platforms, Cloud storage diversity, Intercloud, energy use

and ecological impact

3

7 Responsibility sharing, user experience, Software licensing 2

8 Applications and Paradigms: Challenges for cloud, existing cloud applications and

new opportunities

3

9 Architectural styles, workflows, The Zookeeper, The Map Reduce Program 2

109

model, HPC on cloud, biological research

10 Virtualization, layering and virtualization, virtual machine monitors, virtual

machines, virtualization- full and para

3

11 performance and security isolation, hardware support for virtualization, Case

Study: Xen, vBlades

2

12 Policies and Mechanisms, Applications of control theory to task scheduling,

Stability of a two-level resource allocation architecture,

3

13 feed back control based on dynamic thresholds, coordination, resource bundling,

scheduling algorithms

2

14 fair queuing, start time fair queuing, cloud scheduling subject to deadlines 2

15 Scheduling Map Reduce applications, Resource management and dynamic

application scaling

4

16 Evolution of storage technology, storage models, file systems and database,

distributed file systems

3

17 General parallel file systems. Google file system., Apache Hadoop, Big Table,

Megastore, Amazon Simple Storage Service(S3)

3

18 Cloud security risks, security – atop concern for cloud users, privacy and privacy

impact assessment

3

19 Trust, OS security, Virtual machine security, Security risks, Amazon Web

Services : EC2 – instances, connecting clients, security rules

3

20 launching, usage of S3 in Java, Installing Simple Notification Service on Ubuntu

10.04

2

21 Installing Hadoop on Eclipse, Cloud based simulation of a Distributed trust

algorithm, Cloud service for adaptive data streaming

3

22 Google App Engine, Google Web Toolkit, Azure Services Platform 2

23 Windows live, Exchange Online, Share Point Services, Microsoft Dynamics CRM 2

Course Outcomes:

1. To explain the core concepts of the cloud computing paradigm: how and why this paradigm shift

came about, the characteristics, advantages and challenges brought about by the various models and

services in cloud computing.

2. To apply the fundamental concepts in datacenters to understand the tradeoffs in power,

efficiency and cost by Load balancing approach.

3. To discuss system virtualization and outline its role in enabling the cloud computing system

model.

4. To illustrate the fundamental concepts of cloud storage and demonstrate their use in storage

systems such as Amazon S3.

5. Understanding the hardware necessary for cloud computing

110

Mapping between Cos and POS:

• Course Description: Image processing deals with the processing of image. Through this course the

student will learn about pattern recognition techniques along with image processing techniques,

unsupervised and supervised learning techniques for pattern recognition, image processing techniques

like geometric transformations, edge detection to produce the enhanced image in required format.

• Syllabus / Text books:

UNIT I:

Pattern Recognition: machine perception, pattern recognition example, pattern recognition systems,

the design cycle, learning and adaptation.

Bayesian Decision Theory: Introduction, continuous features- two categories classifications, minimum

error rate classification-zero-one loss function, classifiers, discriminate functions, and decision surfaces.

UNIT II:

Normal density: Univariate and multivariate density, discriminate functions for the normal density-

different cases, Bayes decision theory – discrete features, compound Bayesian decision theory and

context.

Component analyses: Principal component analysis, non-linear component analysis, Low dimensional

representations, and multi dimensional scaling.

UNIT III:

Digitized Image and its properties: Basic concepts, Image Functions, the dirac distribution

and convolution, the Fourier transform, Images as a Stochastic process, Images as linear systems.

Image Digitization: Sampling, Quantization, Color Images.

Digital Image Properties: Metric and topological properties of Digital Images, Histograms, Visual

perception of the Image, Image quality, Noise in Images.

UNIT IV:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √ √

CO2 √ √ √ √

CO3 √ √ √ √ √

CO4 √ √ √ √ √

CO5 √ √ √ √ √ √

Subject

Code

Subject Name Credits Core/Elective Internal

marks

External marks

MIT2.6 IMAGE PROCESSING &

PATTERN

RECOGNITION

3 E 40 60

111

Data Structures for Image Analysis: Levels of Image Data representation, traditional Image Data

Structures- Matrices, Chains, Topological Data Structures, and Relational Structures.

UNIT V:

Image Pre-processing: Pixel brightness transformation – Position dependent brightness correction,

Gray scale transformation. Geometric Transformations -- Pixel co-ordinate transformation, Brightness

interpolation. Local Pre-processing – Image smoothing, Edge-detectors, Zero crossings of the second

deritives, scale in Image processing, canny edge detection, parametric edge models, edges in multi

spectral images, other local pre-processing operators, adaptive neighborhood pre-processing.

Text Books:

1.Image Processing, Analysis and Machine Vision – Milan Sonka, Vaclav Hlavac, Roger Boyle, And

Second Edition – Vikas Publishing House.

2.pattern classification ,Richard o.Duda, peter E.Hart, David G.Stroke, Wiley student edition,2nd

Edition.

3.Digital Image processing, RafealC.Gonzalez, RichardE.Woods, 2ndedition, Pearson Education/ PHI.

Reference:

1. Digital Image Processing And Analysis – Chanda & Majumder

Lecture Plan:

SNO TOPICS COVERED HOURS

1 Pattern Recognition: machine perception, pattern recognition example 2

2 pattern recognition systems, the design cycle, learning and adaptation 2

3 Bayesian Decision Theory: Introduction, continuous features-two categories

classifications, minimum error rate classification-zero-one loss function,

classifiers

2

4 Discriminant functions and decision surfaces.

Normal density: Univariate and multivariate density

3

5 discriminant functions for the normal density-different cases, Bayes decision

theory – discrete features

2

6 Compound Bayesian decision theory and context. 3

7 Un-supervised learning and clustering: Introduction, mixture densities and

identifiability

3

8 Maximum likelihood estimates, application to normal mixtures, K-means

clustering.

3

9 Date description and clustering – similarity measures, criteria function for

clustering

2

10 Component analyses: Principal component analysis, non-linear component

analysis, Low dimensional representations, and multi-dimensional scaling.

3

11 Digitized Image and its properties: Basic concepts, Image Functions, the dirac

distribution and convolution,

2

12 The Fourier transform, Images as a Stochastic process, Images as linear

systems.

2

13 Image Digitization: Sampling, Quantization, Color Images. 2

14 Digital Image Properties: Metric and topological properties of Digital Images,

Histograms, Visual perception of the Image, Image quality, Noise in Images.

3

15 Data Structures for Image Analysis: Levels of Image Data representation,

traditional Image Data Structures- Matrices

3

112

16 Chains, Topological Data Structures, Relational Structures. 2

17 Image Pre-processing: Pixel brightness transformation – Position dependent

brightness correction, Gray scale transformation.

3

18 Geometric Transformations -- Pixel co-ordinate transformation, Brightness

interpolation. Local Pre-processing – Image smoothing, Edge-detectors

3

19 Zero crossings of the second deritives, scale in Image processing, canny edge

detection, parametric edge models,

3

20 Edges in multi spectral images, other local pre-processing operators, adaptive

neighborhood pre-processing.

2

21 Segmentation: Thresholding – Threshold detection methods, optimal

thresholding, multi- spectral thresholding, thresholding in hierarchical data

structures.

3

22 Edge Based Segmentation: Edge image thresholding, Edge relaxation, border

tracing, border detection as graph searching

3

23 Border detection as dynamic programming, Hough transformation, border

detection using border location information, region construction from borders.

3

24 Region Based Segmentation: Region merging, region splitting, splitting and

merging, Watershed segmentation, region growing post processing.

3

Course Outcomes:

1. The student will get sound knowledge about pattern recognition.

2. The student can apply unsupervised learning techniques for pattern recognition

3. The student can apply supervised and supervised learning techniques for pattern recognition

4. One can get a clear sound knowledge about representation of digital image in memory and

various operations to get a clear enhanced image

5. The student will become expertise in applying mathematical concepts and techniques in image

processing

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √

CO2 √ √ √ √ √

CO3 √ √ √ √

CO4 √ √ √ √ √

CO5 √ √ √ √

• Course Description: In this course the student will be learn about the storage technology that will

enable you to make more informed decisions in an increasingly complex IT environment. It builds a

strong understanding of underlying storage technologies and prepares you to learn advanced

Subject

Code

Subject Name Credits Core/Elective Internal marks External marks

MIT

2.6

INFORMATION

STORAGE

MANAGEMENT

3 E 40 60

113

concepts, technologies, and products. challenges and solutions for data storage and data management,

intelligent storage systems, storage networking, backup recovery, and archive, business continuity

and disaster recovery, security and virtualization, and managing and monitoring the storage

infrastructure.

• Syllabus / Text books:

UNIT I: INTRODUCTION TO STORAGE TECHNOLOGY: Concepts of storage networking -

Business applications defined for Storage - Sources of Data and states of data creation - Data center

requirements and evolution - Managing complexity - Storage infrastructure - Evolution of storage -

Information lifecycle management.

UNIT II: STORAGE SYSTEMS ARCHITECTURE: Storage architectures - Peripheral

connectivity- Components and concepts- Magnetic disk storage- Disk systems –Disk arrays- RAID

storage arrays- Magnetic tape storage- Physical vs Logical disk organization - Caching properties and

algorithms - connectivity options - Differences in bus and network architectures.

UNIT III: INTRODUCTION TO NETWORK STORAGE: Putting storage on the Network- The

NAS Hardware- Software architecture- Network connectivity- NAS as a Storage system- NAS

connectivity options- Connectivity protocols- Management principles- Storage Area Networks:

Architecture- Hardware devices- Host bus adaptors- Connectivity - Content Addressable Storage

(CAS) : Elements- Connectivity options- Standards and Management principles - Hybrid storage

solutions overview.

UNIT IV: INTRODUCTION TO INFORMATION AVAILABILITY: Business continuity and

disaster recovery basics: Local business continuity techniques- Remote business continuity

techniques - Storage design and implementations of Business continuity plan- Managing availability-

Disaster recovery principles & techniques.

UNIT V: MANAGING STORAGE VIRTUALIZATION: Managing Availability: Availability

metrics – serviceability - capacity planning - Management tools: overview - information security

virtualization - different virtualization technologies

REFERENCES:

1. Robert Spalding, “Storage Networks: The Complete Reference”, Tata McGraw Hill

Publishing Company, New Delhi, 2003.

2. Gerald J Kowalski and Mark T Mayburk,” Information storage and Retrieval Systems”,

Springer International Edition, New Delhi, 2006.

3. Ulf Troppens, Rainer Erkens and Wolfgang Müller “Storage Networks Explained” Wiley &

Sons, USA, 2004.

4. Marc Farley Osborne, “Building Storage Networks”, Tata McGraw Hill Publishing Company,

New Delhi, 2000.

5. EMC Corporation, “Information Storage and Management: Storing, Managing, and Protecting

Digital Information”, Wiley India, New Delhi, 2009

Course Outcomes:

6. Learn storage system and the different storage system models

7. Offer essential new material that explores the advances in existing technologies

8. Emergence of the "Cloud" as well as updates and vital information on new technologies.

114

9. Learn to make informed decisions across multiple technologies involving SAN, NAS, CAS, IP-

SAN, Backup and Recovery

10. Business Continuity, Security and Virtualization

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √

CO2 √ √ √ √ √

CO3 √ √ √ √

CO4 √ √ √ √ √

CO5 √ √ √ √

Subject Code Subject Name Credits Core/Elective Internal marks External marks

MIT 2.7 ITLAB 2 2 C 40 60

• Course Description:

Through this course the student is going to learn about basics of UNIX operating system and

writing shell programming in UNIX operating system. We can implement algorithms like RSA

to give data security. We can get good domain knowledge about concepts like association,

clustering, classification etc by using WEKA tool.

• Syllabus / Text books:

1. Write a Program to count the number of words and lines supplied at standard input using

UNIX shell programming?

2. Write a shell script to find the factorial of a number entered through keyboard?

3. Write a shell script to find the gross salary given that if the basic salary is less then 1500 then

HRA =10% of basic salary and DA=90% if the basic salary is greater then or equal to 1500

then HRA=500 and DA=98% of basic salary. The employee’s basic salary is the input

through keyboard?

4. Write a shell script to display following information using case statement?

5. Write a shell script to display following information using case statement?

a. List users

b. Show date

c. Display file

d. Change working directory

e. Return to original directory

f. Quit

6. Write a c program to implement one to one chat application using sockets?

7. Write a c program to implement redundancy check using CRC?

115

8. Write a java program to implement simulation of sliding window protocol?

9. Write a java program to get the MAC or Physical address of the system using Address

Resolution Protocol?

10. Write a java program to implement Play Fair Cipher to encrypt and decrypt a given message?

11. Write a java program to demonstrate public-key based asymmetric algorithms for

encryption-based security of information?

12. Write a java program that implement secured Internet Protocol (IP) communications by using

Internet Protocol Security (IPSec)?

13. Write a java program to implement RSA algorithm?

14. Design a Abstract factory design pattern using UML?

15. Design a Builder Design Pattern using UML?

16. Design a Flyweight Design pattern using UML?

17. Design a Proxy Design pattern using UML?

Lecture Plan:

SNO TOPICS COVERED HOURS

1 To implement a Program to count the number of words and lines supplied at

standard input using UNIX shell programming

3

2 To implement shell script to find the factorial of a number entered through

keyboard

To implement shell script to find the gross salary given that if the basic salary is

less than 1500 then HRA =10% of basic salary and DA=90% if the basic salary is

greater than or equal to 1500 then HRA=500 and DA=98% of basic salary. The

employee’s basic salary is the input through keyboard?

3

3 To implement a shell script to display

a. List users

b. Show date

c. Display file

d. Change working directory

e. Return to original directory

f. Quit

3

4 Implementation of one to one chat application using sockets 3

5 Implement redundancy check using CRC 3

6 To perform MAC or Physical address of the system using Address Resolution

Protocol

3

7 To implement java program for play fair cipher to encrypt and decrypt message 3

8 To implement graphs by using BFS and DFS techniques 3

9 Implementing merge and heap sorts for given elements 3

10 Performing various operations in AVL trees 3

11 To implement krushkal’s algorithm to find minimum cost spanning tree 3

12 To implement Prim’s algorithm to find min cost spanning tree 3

13 To implement functions of Dictionaries using hashing 3

Course Outcomes:

On completion of this course the student should be able to:

116

1. Identify and use UNIX/Linux utilities to create and manage simple file processing operations,

organize directory structures with appropriate security, and develop shell scripts to perform more

complex tasks.

2. Effectively use the UNIX/Linux system to accomplish typical personal, office, technical, and

software development tasks.

3. Effectively use software development tools including libraries, preprocessors, compilers, linkers,

and make files.

4. Comprehend technical documentation, prepare simple readable user documentation and adhere to

style guidelines.

5. Be familiar with the application of the Unified Modeling Language (UML) towards analysis and

design.

6. Master the fundamental principles of OO programming.

Mapping between COs and POs:

CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 √ √ √ √ √ √

CO2 √ √ √ √ √ √ √ √

CO3 √ √ √ √ √ √ √ √

CO4 √ √ √ √ √ √ √ √

CO5 √ √ √ √ √ √ √

CO6 √ √ √ √ √ √ √

117

4. Students’ Performance (100)

4.1. Admission intake in the programme (15)

YEAR Sanctioned

Strength of

the

Programme

Number of

Students

Admitted

Percentage

of seats filled

Number of

Students

Admitted

with Valid

GATE

Score/PG

ECET

Percentag

e of

Students

with

Valid

GATE

Score/PG

ECET

M.Tech (I.T.)

CAY (2016-17) 18* 18 100 18 100

CAYm1 (2015-16) 18*+7# 24 96 15+1 66.6

CAY m2(2014-15) 18*+7# 25 100 6+9 60

CAYm3 (2013-14) 18*+7# 25 100 11+7 72

*Strength sanctioned by AICTE #under University Sponsored category

Average percentage of seats filled through approved procedure =99%

Average percentage of students admitted with valid GATE Score/PG entrance of state (I.T.) = 74.65%

YEAR Number of Students

Admitted

API = Academic

Performance Index

= Average CGPA or Average

Marks on a Scale of 10 (Compiled

from the

Graduation Records)

M.Tech(IT)

CAY (2016-17) 18 6.48

CAY m1(2015-16) 24 7.06

CAY m2(2014-15) 25 7.23

CAYm3 (2013-14) 25 7.62

Average API 7.09

Average API = mean of percentage of marks of all successful students/10(ten point CGPA) =7.09

4.1.1Number of seats filled through the admission procedure approved

by the University (5)

Assessment will be based on average percentage of seats filled through

approved procedure and points awarded to be proportionate accordingly.

118

Average percentage of seats filled through approved procedure = 99%

Average percentage of students admitted with valid GATE Score/PG entrance of state (I.T.) = 74.65%

Assessment (I.T.) =74.65/10=7.46

4.1.2 Quality of students as judged from their complete graduation records (5)

Assessment =1.5AverageAPI

= 1.5 7.09

= 10.63

4.1.3 Number of students admitted having a valid GATE score/PG entrance of state (5)

Assessment (I.T.) =10X 74. 65 (out of 100 students)

= 746.5

4.2. Success Rate (20)

Provide data for the past three batches of students

GI = Graduation Index

= (Number of students graduated from the programme) / (Number of students joined the

programme)

M.Tech (IT)

YEAR

Number of students graduated from the programme

Number of students joined the programme

GI

LYG (2014-16)

23

25 0.92

LYG m1(2013-15)

25

25

1.00

LYG m2(2012-14)

23

23

1.00

LYGm3(2011-13)

25

25

1.00

Average GI =0.98

Assessment = 20 x 0.98=19.6

4.3. Academic Performance (20) Academic Performance= 2*API

Where API= Academic Performance Index

=Mean of Cumulative Grade Point Average of all successful

Studentsona10pointCGPASystem

119

OR=Mean of the percentage of marks of all successful students/ 10

Item LYG 2015-17

LYGm1 2014-16

LYGm2

2013-15 LYGm3

2012-14

Approximating the API by the following mid-point analysis

9<Number of students with CGPA<10.0 0 0 0 0

8<Number of students with CGPA<9.0 1 4 9 10

7<=8 15 15 14 13

6<=7 6 5 02 00

5<=6 1 1 00 00

Total 23 25 25 23

Approximating API by Mid-CGPA

Mean of CGPA/Percentage of all the students(API) 7.10 7.35 7.73 7.4

Average API=7.39

Academic Performance=2xAv.API

=2 * 7.39

=14.78

120

4.4. Placement and Higher Studies (20)

Assessment Points=20×(x+3y)/N

Where, x =Number of students placed

y=Number of students admitted for higher studies with

valid qualifying scores/ranks, and

N=Total number of students who were admitted in the batch to

maximum assessment points=20.

M.Tech (I.T.)

Item

LYG(2014-16)

LYGm1(2013-

15)

LYGm2(2012

-14)

Number of admitted students corresponding to LYG(N)

25 26 23

Number of students who obtained jobs as

per the record in the industry/academia (x) 21 20 18

Number of students who opted for higher

studies with valid qualifying scores/ranks(y) 01 01 00

Assessmentpoints20×(x+3y)/N

19.2 17.69 15.65

Average assessment points = 17.51

4.5 Professional Activities (25)

4.5.1Membership in Professional Societies/Chapters and organising engineering events (5)

(Instruction: The institution may provide data for past three years).

• CSI Student chapter is initiated in the year 2017

• IEEE Student membership for PG students is initiated to start in the month of

Jan 2015

• It is proposed to initiate IETE professional activity in the month of March 2015

• Every year in the month of February/March PG/UG students organizes

Technical event ZEIT GIEST in the department with various events like

Technical Paper presentations, Project Expo, Workshop jointly organized with

IIT Delhi, Poster Presentations, Program Debugging and Technical Quiz

4.5.2 Participation and their outcomes in international/national events (5) Instruction: The institution may provide data for past three years).

121

1. M. Ravi Kumar, M.Tech has presented a paper entitled Image Water marking

Scheme Using simplified significant Wavelet Tree Quantization in IEEE

sponsored International Conference on Advanced Computing Technologies (ICACT)

in Annamacharya Institute of Technology and Sciences, RajamPeta, Kadapa.

Date: 10th, 11th Aug 2013

4.5.3. Publication and awards in international/national events (10)

(Instruction: The institution may list the publications mentioned earlier along with the

names of the editors, publishers, etc.).

Awards:

1. M.Tech (I.T.) Students got Internship Award of Cash Rs: 15,000/- per Month

for a period of Ten Months in TCS Pvt.Ltd. named N S K Krishna & N Harish.

2. M.Tech (I.T.) Students got Internship Award of Cash Rs: 10,000/- in Loment

Technologies. IncPvt.Ltd., USA named B Manasa

3. M.Tech (I.T.) Students got Internship Award in DRDO, Hyderabad Division for

their M.Tech Project Work named L Anand, L Ganga Sai Lakshmi

Publications:

S.No Student Name Publication

Title

Journal

Name

Year

1 Sameer Tuladhar Replication of Query Messages in the

unstructured overlays peer to peer

networks

IJERA, Vol

2

Issue 5

Sep-Oct

2013

2 V. Nageena Concurrent Context Free framework for

conceptual similarity problem using

reverse dictionary

IJRITCC

Vol 2, Issue

8

Aug 2014

3 N. Mounica Adaptive Data Aggregation with mobile

Agents and Evolutionary Computing

based clustering in Sparse WSN

IJRITCC

Vol 2, Issue

9

2014

4 K. Sindhu Bit slicing based visual cryptography on

Gray Scale images

IJRITCC

Vol 2, Issue

8

Aug 2014

5 G Sowjanya An integrated Approach for anchor

based localization and energy efficient

secure communication in WSN

IJRITCC

Vol 2 Issue

7

July

2014

6 P Ramya A Framework for improved intrusion

detection and countermeasure selection

in cloud systems

IJRITCC

Vol 2 Issue

7

July

2014

7 P Santhosh A framework for decoupling of routing

and scheduling using shadow queues on

multi commodity networks

IJARCSMS

Vol 2 Issue

8

Aug 2014

8 N. S. V. Srinivas Attack Detection and Classification of

Heterogeneous Wireless Sensors Using

Co-Clustering

IJET Feb-Mar

2012

9 ChiranjeeviPalaparth

i,MahaboobBashaM

A Prototype System using Lexical

Chains for Web Images Retrieval Based

IJCSE

May-12

May-12

122

ula, Satya Krishna

Pepakayala

on Text Description and Visual Features

10 Gowtham Kumar

Lingabathina,

Michael

VijayanandSonga,

PaluriVara Prasad

Light Weight and Secured Mobile

Commerce in Android Environment

JCER Apr-12

11 Jagadeeswararao. E,

Nimakayala S V

Srinivas

Predilection Perspective of Peremptory

Evaluation of Wireless Sensor Networks

with Machine Learning Approach

GJCST -

(USA)

Aug-12

12 R S Hemanth Effective Loss-less Encryption Using

Haar Wavelet Transform

NCCSPS-

2014 PP-

108

ISBN:0974

-6854

Aug 23-

24,2014

13 M S

LavanyaKrishnaveni

Swarm Intelligence Based MANET

Routing Protocol

IJCST

VOL.3

Issue 3

July-Sept

2012

14 K Narendra, M

Pavan Kumar

A Method to Improve Energy Efficiency

by Leader Election and packet

Classification in MANET

IJCST

15 FathimabiShaik Secure Host IP Configuration Protocol

for Mobile Ad Hoc Networks

IJERT

VOL.1

Issue 7

Sep-2012

16 Sowndarya Karri Framework for Phishing Detection in

Email under Heave Using Conceptual

Similarity

IJRITCC

VOL2.

Issue8

Aug-2014

17 K Udaya Ravi Kiran Secure Transmission To Remote

Cooperative Groups With Minimized

Communication Overhead

IJRITCC

VOL2.

Issue8

Aug-2014

18 Sandya Rani Barre Detecting Targeted Malicious Email

Through Mail Client

IJRITCC

VOL2.

Issue8

Aug-2014

19 TejaswiBommi Identifying Misbehaving Nodes in

MANET

IJRITCC

VOL2.

Issue8

Aug-2014

20 M SowmyaTanuja Effective and Efficient Approach for

Detecting Outliers

IJRITCC OCT-2014

21 M Choharika A New Clustering Algorithm for

Comparable Entities from Web

IJRITCC OCT-2014

22 M V S Prabha Reconstructing of Search Results in Web

Search Engine Using Feedback

Activities

IJRITCC OCT-2014

23 G.Soujanya An Integrated Approach for Anchor-

Based Localization and Energy Efficient

Secure Communication in WSNs

IJRITCC JULY-2014

24 Tejaswi Bommi LD: Identifying Misbehaving Nodes in

MANET

IJRITCC AUG-2014

25 M.Sowmya Tanuja Effective And Efficient Approach for

Detecting Outliers

IJRITCC OCT-2014

123

26 Sowndarya Karri Framework for Phishing Detection in

Email under Heave Using Conceptual

Similarity

IJRITCC AUG-2014

27 Naladala Mounika Adaptive Data Aggregation with Mobile

Agents and Evolutionary Computing

based Clustering in Sparse Wireless

Sensor Networks

IJRITCC NOV-2014

28 V.Nageena Concurrent Context-Free Framework for

Conceptual Similarity Problem using

Reverse Dictionary

IJRITCC AUG-2014

29 Sandhya Rani Barre Detecting Targeted Malicious Email

Through Mail Client

IJRITCC AUG-2014

30 Marri Sireesha Enhanced Routing Algorithm for Best

Relay Node Selection In WSN

IJCST OCT-DEC

2016

31 R Subrahmanya

Hemanth

Effective Loss-less Encryption Using

Haar Wavelet Transform,PP-108, Aug-

2014

NCCSPS

Aug 2014

32 P. Sri Hari ECC Base point Generation using

Finger print for Authentication and

Message Encryption and Decryption

Using ECC

IARJSET Vol

4,Issue 8,

Aug 2017

4.5.4 Entrepreneurship initiatives and innovations (5)

(Instruction: The institution may specify the efforts and achievements.)

1. Entrepreneurship Awareness Programme organised by Centre for Entrepreneurship

development, JNTUK Kakinada on 5th and 6th March 2014

2. A Program “International Institute of Entrepreneurship Development (I2E) “by

APSSDC and Northeastern University Boston, US. Organised by Directorate

EDC&SDC, JNTUK on 18th August 2017.

3. Maker’s Space is established in Incubation Center.

124

5 Faculty Contributions (200)

List of Faculty Members: Exclusively for the Programme/Shared with other Programmes

Name of the

faculty

member

Qualification

, university,

and year of

graduation

Designation and date of joining the

institution

Distribution

of teaching

load (%)

Number of

research

publications

in journals

and

conferences

since joining

IPRs R&D and

consulta

ncy work

with

amount

Holding

an

incubatio

n unit

Interacti

on with

outside

world 1st Year

UG

PG

Prof. J.V.R. Murthy

Ph. D, JNTU 2005

Professor 100 0 12 1.2 Cr. 10

Prof. K.V. Ramana

Ph. D Rayalaseema University 2012

Professor 100 0 6 08

Prof CH. Satyanarayana

Ph. D JNTU 2007

Professor -- 100 15 5.3 Cr. 08

Prof. L. Sumalatha

Ph. D JNTUK 2013

Professor 50 50 13 08

Prof. MHM Krishna Prasad

Ph. D JNTU 2009

Professor 50 50 17 1.2 Cr. 10

Prof. A. Krishna Mohan

Ph. D JNTUK 2015

Professor 100 6 05

Prof. K. Sahadevaiah

Ph. D JNTUH 2014

Professor 100 0 8 02

Prof.ASN Chakravarthy

Ph.D ANU 2011

Professor 0 100 23 08

Dr D. Haritha Ph. D JNTUK 2013

Associate Professor

40 60 8 03

Dr O. Srinivasa Rao

Ph. D JNTUK 2012

Associate Professor

40 60 14 03

Dr N. Ramakrishnaiah

M. Tech. Ph.D., 2016

Associate Professor

50 50 4 02

S. Chandra Sekhar

M. Tech VIT

Assistant Professor

50 50 0 02

125

SSSN Usha Devi N

M. Tech, JNTUK 2010

Assistant Professor

50 50 5 02

E. Suneetha M. Tech JNTUH 2010

Assistant Professor

30 70 5 02

Karuna Arava M. Tech JNTUK 2010

Assistant Professor

100 0 4 02

Ch. Ratna Kumari

M. Tech, HCU, 2009.

Assistant Professor

50 50 5 02

(Instruction: The institution may complete this table for the calculation of the student-

teacher ratio (STR).Teaching loads of the faculty member contributing to only

undergraduate programme (2nd, 3rd, and 4th year) are considered to calculate the STR.)

5.1 Student­Teacher Ratio (STR)(20) U1 = Number of Students in UG 2ndYear U2 = Number of Students in UG 3rdYear U3 = Number of Students in UG 4thYear P1 = Number of Students in PG 1stYear P2 = Number of Students in PG 2ndYear

N1 = Total Number of Faculty Members in the Parent Department S=Number of Students in the Parent Department

= U1 + U2 + U3 + P1 + P2 Student Teacher Ratio (STR) = S / N1

Assessment = [20 x 13 /STR], subject to maximum of 20. Year U1 U2 U3 P1 P2 S F

(N1)

STR Assessment

CAY

(2016-17)

55 53 56 41 49 254 21 12.09 21.50

CAYm1

(2015-16)

53 56 56 49 50 264 21 12.57 20.68

CAYm2(2014-

15)

56 56 57 50 52 271 21 12.90 20.15

CAYm3

(2013-14) 56 57 52 52 50 267

20

13.35 19.47

Average Assessment = 20.45

5.2 Faculty strength in PG programme (20)

X = Number of faculty members with Ph.D available for PG Programme

126

Y= Number of faculty members with Ph.D. / M.Tech. / M.E available for PG Programme

Assessment will be done on the basis of the number of faculty members with Ph.D. /M.Tech. /M.E., available for the PG programme. [Minimum number suggested: 4]

Year X Y Assessment

CAY(2016-17) 2 2 20

CAYm1 (2015-16) 2 2 20

CAY m2 (2014-15) 2 2 20

CAY m3 (2013-14) 2 2 20

Assessment = 20 x [X/Y]

Average Assessment = 20

5.3 Faculty Qualifications (30)

Assessment = 4×FQI

where, FQI = Faculty qualification index

= (10x+6y+4z0)/N2

such that, x+ y +z0≤ N2; and z0≤ z

where, x = Number of faculty members with PhD

Y = Number of faculty members with ME/M.Tech

Z = Number of faculty members with BE / B.Tech / MSc.

x y z N2 ( Total) FQI Assessment

CAYm3(2013-14) 7 13 0 20 7.40 29.6

CAYm2(2014-15) 8 13 0 21 7.52 30.08

CAYm1(2015-16) 11 19 0 30 7.46 29.86

CAY(2016-17) 11 19 0 30 7.46 29.86

Average assessment 29.85

127

5.4 Faculty Competencies correlation to Programme Curriculum (15) (Indicate the faculty competencies (specialization, research publication, course developments etc.) to correlate the programme curriculum)

Faculty Name

Specialization

Course Developments

2013-14

2014-2015

2015-2016

2016-17

No of Courses Develop

ed

Course

Prof. J.V.R Murthy

Data Mining and Data Warehousing

5

3

5

2

3

Data Mining and Data Warehousing, DBMS,

Prof. K.V.Ramana

Neural Networks

0

2

3

0

3

Operating Systems,

Computer Networks, Computer

Organization and

Architectures

Prof CH. Satyanarayana

Image Processing

2

5

5

5

2

Image Processing,

Pattern Recognition

Prof. L. Sumalatha

Image Processing

3

1

1

5

3

Machine Learning,

Cloud Computing, Security in

WSNs Prof. MHMKrishna Prasad

Data Mining and Data Warehousing

4

9

8

2

2

Computer Networks,

Data Mining and Data

Warehousing Prof. A. Krishna Mohan

Data Mining and Data Warehousing

0

8

0

1

2

Web Technologies,

Distributed java

programming Prof. K. Sahadevaiah

Computer Networks

2

3

2

0

2

Network security, Ad-hoc & Sensor

Networks Prof.ASN Chakravarthy

Network Security &Cryptograohy

7

3

11

0

1

Forensics

Dr D. Haritha Image Processing

1

3

3

0

3

Advanced UNIX

Programming, Advanced

Data Structures,

Image Processing

Dr O. SrinivasaRao Computer Networks & Network Security

0

3

2

5

2

Computer Networks, Network security

Dr.N.Ramakrishna Computer Networks

1

3

4

0

2

Ad-hoc & Sensor

128

iah Networks Distributed

java programming

S.Chandra Sekhar Computer Networks

0

0

0

0

1

Mobile Computing

SSSN Usha Devi N Automata

Theory

3

3

0

0

1 Object

Oriented Analysis &

Design E. Suneetha Data

Analytics with

Machine Learning

3

3

1

0

1

Compiler Design

KarunaArava Cloud Computing

1

0

1

1

1

Advanced Unix

Programming RatnaKumari Ch Security in

Cloud Computing

3

2

1

0

1

Advanced Data

Structures

5.5 Faculty as participants/resource persons in faculty development/training activities (15)

(Instruction: A faculty member scores maximum five points for a participation/resource person.) Participant/resource person in two week faculty development programme: 5 points Participant/resource person in one week faculty development programme: 3 Points

Name of the faculty

Max. 5 per faculty

CAY m3 CAY m2 CAY m1 CAY

Prof. J.V.R Murthy 5 5 5 5

Prof. K.V. Ramana 5 5 5 5

Prof. Ch. Sathyanarayan 5 5 3 5

Prof. L. Sumalatha 5 5 5 5

Prof. M.H.M Krishna Prasad 5 5 5 5

Prof. A. Krishna Mohan 5 5 5 5

Prof. K. Sahadevaiah 5 3 5 3

Prof.ASN Chakravarthy 5 5 5 5

Dr. D. Haritha 3 5 5 5

Dr. O. Srinivasa Rao 5 3 5 5

Dr. N. Ramakrishnaiah 3 5 5 5

S. Chandra Sekhar 3 3 3 3

SSSN Usha Devi N

5 5 3 5

129

5.6 Faculty Retention (15)

Assessment = 3×RPI/N Where RPI = Retention point index

= Points assigned to all faculty members

Where points assigned to a faculty member=1point for each year of experience at

the institute but not exceeding5.

Item CAYm3 CAYm2 CAYm1 CAY

Number of faculty members with experience of less than l year (x0)

--- -- -- --

Number of faculty members with 1 to 2 years experience (x1)

--- --- --- ---

Number of faculty members with 2 to 3 years experience (x2)

--- --- --- ---

Number of faculty members with 3 to 4 years experience (x3)

1 --- --- ---

Number of faculty members with 4 to 5 years experience (x4)

1 1 --- ---

Number of faculty members with more than 5 years experience (x5)

14 14 15 15

N 16 15 15 15

Karuna Arava 3 5 3 5

E. Suneetha 3 5 5 5

Ch. Ratna Kumari

3 5 -- --

Sum 68 74 72 74

N(Number of faculty

positions required for

an STR= no of faculty/13)

20 20 20 20

Assessment=3×Sum/N 10.2 11.1 10.8 11.1

Average Assessment=11

130

RPI=x1+2x2+3x3+4x4+5x5 77 74 75 75

Assessment 14.43 14.8 15 15

Average assessment 14.80

5.7 Faculty Research Publications (FRP)(30) Assessment of FRP =6× (Sum of the research publication points scored by each faculty member)/N

(Instruction: A faculty member scores maximum five research publication points depending upon the quality of

the research papers and books published in the past three years.)

The research papers considered are those (i) which can be located on Internet and/or are included in hard-copy

volumes/proceedings, published by reputed publishers, and (ii) the faculty member’s affiliation, in the

published papers/books, is of the current institution.

Include a list of all such publications and IPRs along with details of DOI, publisher, month/year, etc.

Name of the faculty (contributing to FRP)

FIP Points

CAY m3 (2013-14)

CAYm2

(2014-15)

CAYm1

(2015-2016)

CAY

(2016-2017)

Prof. J.V.R. Murthy

4 1 3 2

Prof. K.V. Ramana

- 1 2 -

Prof. Ch. Satyanarayana 2 2 2 5

Prof. L. Sumalatha

3 - 2 5

Prof. MHM Krishna Prasad

3 2 4 5

Prof. A. Krishna Mohan 0 - 3 3

Prof. K. Sahadevaiah

2 - 3 -

Prof. ASN Chakravarthy 5 5 5 5

Dr. D. Haritha 2 - 3 -

Dr. O. SrinivasaRao 0 2 3 5

Dr. N. Ramakrishnaiah 1 - 3 5

S Chandra Shekar -- -- -- -

SSSN Usha Devi N

3 4 3 3

A. Karuna

3 3 1 3

E. Suneetha

2 3 1 -

Ratna Kumari Challa

2 2 2 -

Sum 32 25 40 41

131

N(Number of

faculty positions

required for an STR

of 13)

20 20 20 20

Assessment of FRP=6 ×Sum/N 9.6 7.5 12 12.3

Average Assessment=10.35

Prof. J. V. R. Murthy

1) Sirisha Velampalli &V.R. Murthy Jonnalagedda “Minimum Description Length (MDL) based Graph Analytics”,

International Conference on Computational Intelligence & Informatics (ICCII-2016) (IACC- 2016), May 28-30, 2016, Springer, JNTUH, India. [Springer AISC Series]

2) Sirisha Velampalli & V.R. Murthy Jonnalagedda "Analytics through statistics for computer science curriculum” A.P. Science Congress, Sri Venkateswara University, Tirupati, January, 2016

3) Sirisha Velampalli & V.R. Murthy Jonnalagedda "Frequent Sub Graph Mining Algorithms: Framework, Analysis, Comparisons", 3rd International Conference on Computer and Communication Technologies"(IC3T-2016) [Springer AISC Series]

4) D. Rajeswara Rao & Dr. JVR Murthy "An Extensive Investigation on Coronary Heart Disease using Various

Neuro Computational Models", Global Journal of Computer Science and Technology: E ,Network, Web &

Security ,Volume 16 Issue 5 Version 1.0 Year 2016

5) D. Rajeswara Rao& Dr. JVR Murthy "Comparative Analysis: Heart Diagnosis Classification using Bp-LVQ

Neural Network Models for Analog and Digital Data" Global Journal of Computer Science and Technology: E

,Network, Web & Security ,Volume 16 Issue 5 Version 1.0 Year 2016

6) Sirisha Velampalli & V.R. Murthy Jonnalagedda “Intelligent Computing for Skill-set Analytics in a Big Data

Framework-A Practical Approach”, First International Conference on Intelligent Computing and Communication 2016 (ICIC2 2016), 18-19 February, 2016. University of Kalyani, West Bengal, India [ springer AISC Series]

7) Sirisha Velampalli & V.R. Murthy Jonnalagedda "Analytics for Course Management in Computer Science Curriculum-A Novel Visualization and Summarization Approach" 7th International Conference on Technology for Education T4E 2015, December 10-12, 2015 at NIT warangal [Indexed in IEEE Explore]

8) Dr. J. V. R. Murthy, AnuradhaYarlagadda, M.H.M. Krishna Prasad, 2014. Particle Swarm Optimized Optimal

Threshold Value Selection for Clustering based on Correlation Fractal Dimension. Applied Mathematics. 1615-

1622.

9) Dr. J. V. R. Murthy, P.Srinivasa Rao, Dr. K. Thammi Reddy, Feb 2013. A Novel and Efficient Method for Protecting

Internet Usage from Unauthorized Access Using Map Reduce. International Journal of Information Technology

and Computer Science. 49-55.

10) Dr. J. V. R. Murthy, M. Bhanu Sridhar, Y. Srinivas, Jul-Dec 2012. Software Reuse in Medical Database - A

Comparison of the Application of Clustering Techniques and Mixture Models. Journal of Software Engineering

and Technology.

11) Dr. J. V. R. Murthy, M. Bhanu Sridhar, Y. Srinivas, Nov 2012. Software Reuse in Medical Database for Cardiac

Patients using Mixture Models. International Journal of Computer Applications .12 to 19.

132

12) Dr. J. V. R. Murthy, Srinivasa Rao Dammavalam, Seetha Maddala, Jul 2012. Iterative Image Fusion Using Fuzzy

Logic with Applications. AISC, Springer. 145-152.

13) Dr. J. V. R. Murthy, M. Bhanu Sridhar, Y. Srinivas, Jun 2012. Software Reuse in Cardiology Related Medical

Database Using Clustering Techniques. Journal of Software Engineering and Applications. 682-686.

14) Dr. J. V. R. Murthy, Srinivasa Rao Dammavalam, Seetha Maddala, Apr 2012. Comparison of Fuzzy and Neuro

Fuzzy Image Fusion Techniques and its Applications. International Journal of Computer Applications. 31-37.

15) Dr. J. V. R. Murthy, M. D. R. Mounica Sree, Mar 2012. DenTrac: A Density based Trajectory Clustering Tool.

International Journal of Computer Applications. 17-21.

16) Dr. J. V. R. Murthy, Srinivasa Rao Dammavalam, Seetha Maddala, Feb 2012. Quality assessment of pixel-level

image fusion using fuzzy logic. International Journal on Soft Computing. 13 to 25.

Prof. K. V. Ramana

1) Dr. K.V. Ramana, Jagadeeswara Rao.E, Nimmakayala S.V.Srinivas, August 2012. Predilection Perspective of

Peremptory Evaluation of Wireless Sensor Networks with Machine Learning Approach. Global Journal of

Computer Science and Technology Network, Web & Security (GJCST) (USA). Volume (12), Issue (10). 56-59.

2) Dr. K.V. Ramana, Chiranjeevi Palaparthi, Mahaboob BashaMula, Satya Krishna Pepakayala, May 2012. A

Prototype System using Lexical Chains for Web Images Retrieval Based on Text Description and Visual Features.

International Journal on Computer Science and Engineering (IJCSE). Vol. 4 No. 05. 846-852.

3) Dr. K.V. Ramana, Gowtham Kumar Lingabathina, Michael Vijayanand Songa, Paluri Vara Prasad, April 2012. Light

Weight and Secured Mobile Commerce in Android Environment. Journal of Current Engineering Research

(JCER). Volume (2), Issue (2). 56-59.

4) Dr. K.V. Ramana, N.V.S. Srinivas, February- March 2012. Attack Detection and Classification of Heterogeneous

Wireless Sensors Using Co-Clustering. International Journal of Engineering and Technology (IJET). Volume 4 No

1. 11 - 14.

5) Dr. K.V. Ramana, Raghu K.Korrapati, K.S.S. Praveen, Bh.V. Naveen, October 2011. Performance of Various

Mobile IP Protocols and Security Considerations. International Journal of Computer Networks (IJCN). Volume

(3), Issue (4). 222-238.

6) Dr. K.V. Ramana, Raghu K.Korrapati, N. Pattabhi Ram, K. Syam Kumari, October 2011. Traffic Control System by

Incorporating Message Forwarding Approach. International Journal of Computer Networks (IJCN). Volume (3),

Issue (4). 209-221.

7) Dr. K.V. Ramana, Raghu K.Korrapati, N. Praveen Kumar, D. Prakash, August 2011. Efficient Traducer Tracing

System Using Traffic Volume Information. International Journal of Advanced Computer Science and

Applications, (IJACSA). Volume (1), Issue (2). 40-49.

8) Dr. K.V. Ramana, Raghu K.Korrapati, S. Hemanth, N. Praveen Kumar, February 2011. Replica Placement in

Unstable Radio Links. International Journal of Computer Networks (IJCN). Volume (2), Issue (6). 227-239.

9) Dr. K.V. Ramana, Raghu K.Korrapati, July 2010. Neural Network Based Classification and Diagnosis of Brain

Hemorrhages. International Journal of Artificial Intelligence and Expert System (IJAE). Volume (1), Issue (2). 7 -

25.

Prof. L. Sumalatha

1) Prof. L. Sumalatha, IEEE International Conference on Science, Technology, Engineering and Management

(ICSTEM’17).

2) Prof. L. Sumalatha, A. Mallikarjuna Reddy, V.V. Krishna,”Facial Recognition Based on Straight Angle Fuzzy

Texture Unit Matrix” IEEE International Conference on Big Data Analytics and Computational Intelligence 2017.

3) Prof. L. Sumalatha, Obulesh.A, V.Vijay Kumar, “Region Based Image Retrieval Using Ranking Concept of Local

Binary Pattern”, IEEE International Conference on Big Data Analytics and Computational Intelligence 2017.

133

4) Prof. L. Sumalatha, P. Uma Shankar, B. Sujatha, “Rough set based Decision Rule generation to find behavioural

patterns of customers” Sadhana(Springer), 2016,ppl-7.DOI 10.1007/s12046-016-0528-1.SCI,SCOPUS indexed.

5) Prof. L. Sumalatha, P. Uma Shankar, “Fuzzy Random Decision Tree (FRDT) Framework for Privacy Preserving

DataMining”, IEEE Technical sponsored SAI Computing Conference, London 2016.

6) Prof. L. Sumalatha, K.Devi Priya,”Novel Hash Based Key Generation for Stream Cipher in Cloud” 3rd International

Computer and Communication Technologies (IC3T), Springer LNSS, Nov 2016.

7) Prof. L. Sumalatha, B.Sujatha, February 2013. A New Approach for Recognition of Mosaic Textures by LBP based

on RGB Model. Signal & Image Processing: An International Journal (SIPIJ). Vol.4, No.1. 65-73.

8) Prof. L. Sumalatha, V. Venkata Krishna, Sushma Thotakura, February 2013. Reversible Watermarking for Image

Authentication using IWT. International Journal of Signal Processing, Image Processing and Pattern Recognition.

Vol. 6, No. 1. 145-156.

9) Prof. L. Sumalatha, B.Sujatha, February 2013. Global and Local Linear Significant Binary Pattern for a Robust and

Rotational Invariant Classification. National Conference on Emerging Trends in Information Technology

(NCETIT).

10) Prof. L. Sumalatha, V. Venkata Krishna,M. Ravi Kumar, 2013. A Robust Image Watermarking Scheme Using

Simplified Significant Wavelet Tree Quantization. IEEE Sponsored International Conference on Advanced

Computing Technologies (ICACT 2013).

11) Prof. L. Sumalatha, B. Sujatha, P. Sreekanth, 2013.A Novel Boundary Approach for Shape Representation and

Classification. IEEE International Conference on Computing, Communications, and Network Technologies.

12) Prof. L. Sumalatha, G. Rosline Nesa Kumari,V. Vijaya Kumar, September 2012. A Simple Block Based Content

Watermarking Scheme for Image Authentication and Tamper Detection. International Journal of Soft

Computing and Engineering (IJSCE). Vol-2, Issue-4. 113-117.

13) Prof. L. Sumalatha, V. Venkata Krishna, V. Vijaya Kumar, September 2012. Local Content Based Image

Authentication for Tamper Localization. International Journal of Image, Graphics and Signal Processing. Vol. 9.

30-36.

14) Prof. L. Sumalatha, G. Rosline Nesa Kumari, S.Maruthu Perumal, August 2012. A Simple Texture based Image

Watermarking for Authentication. Artificial Intelligence Applications of Image Processing (National Seminar).

15) Prof. L. Sumalatha, V. Venkata Krishna, A Vinay Babu, July 2012. Image Content Authentication based on

Wavelet Edge Features. International Journal of Computer Applications. Vol. 49 - No. 23. 24-29.

16) Prof. L. Sumalatha, G. Rosline Nesa Kumari,V. Vijaya Kumar, June 2012. Fuzzy Based Chaotic and Logistic

Method for Digital Watermarking Systems. International Journal of Scientific & Engineering Research. Vol. 3,

Issue 6. 1- 6.

17) Prof. L. Sumalatha, G.Rosline Nesa kumari, V. Venkata Krishna, March 2012. Block based Watermarking for

Image Authentication using Statistic Approach. International Conference on Recent Advances in Computer

Sciences. 736-740.

18) Prof. L. Sumalatha, S.Maruthu Perumal, V. Vijaya Kumar, 2012. Image Watermarking Based on Simplified

Wavelet Tree Quantization. International Journal of Computer Science and Information Security. Vol. 10, No. 2.

64-70.

19) Prof. L. Sumalatha, S.Maruthu Perumal, V. Venkata Krishna, 2010. Digital Image Authentication Based on

Threshold Values. 1st International Conference on Emerging Trends in Signal Processing and VLSI Design.

20) Prof. L. Sumalatha, G.Rosline Nesa Kumari, B. Vijaya Kumar,2009.Secure and Robust Digital Water marking on

Grey Level Images,IJAST,Vol.11,pp:1-8,2009.

Prof. M.H.M. Krishna Prasad 1) Dr. M.H.M. Krishna Prasad, Community detection in large scale social networks-2017. 2) Dr. M.H.M. Krishna Prasad, Mining overlapping communities in real world networks based on extended

modularity gain.-2017.

134

3) Dr. M.H.M. Krishna Prasad, Dr. J.V.R Murthy, Anuradha Yarlagadda, 2014. Particle Swarm Optimized Optimal

Threshold Value Selection for Clustering based on Correlation Fractal Dimension. Applied Mathematics. 1615-

1622.

4) Dr. M.H.M. Krishna Prasad, P. Srinivasa Rao, K. Thammi Reddy, 2014. A Novel Approach for Identification of

Hadoop Cloud Temporal Patterns Using Map Reduce. I.J. Information Technology and Computer Science. 37-42.

5) Dr. M.H.M. Krishna Prasad, Srinivasa Rao Dammavalam, Seetha Maddala, 2013. Iterative Image Fusion Using

Fuzzy Logic with Applications. Advances in Computing and Information Technology. 145-152.

6) Dr. M.H.M. Krishna Prasad, Srinivasa Rao Dammavalam, Seetha Maddala, February 2012. Quality Assessment of

Pixel-Level Image Fusion Using Fuzzy Logic. International Journal on Soft Computing (IJSC). 13-25.

7) Dr. M.H.M. Krishna Prasad, K. VijayaBabu, O. Srinivasa Rao, February 2012. SECURED TREE BASED KEY

MANAGEMENT IN WIRELESSBROADCAST SERVICES. International Journal of Engineering Science and

Technology (IJEST). 523-529.

8) Dr. M.H.M. Krishna Prasad, M. Bhanu Sridhar, Y. Srinivas, 2012. Software Reuse in Cardiology Related Medical

Database Using K-Means Clustering Technique. Journal of Software Engineering and Applications. 682-686.

9) Dr. M.H.M. Krishna Prasad, Kartheek Srungaram, 2012. Enhanced Cluster Based Routing Protocol for MANETS.

Advances in Computer Science and Information Technology, Networks and Communications. 346-352.

10) Dr. M.H.M. Krishna Prasad, G. Netaji, 2012. Fractal Based Approach for Indexing and Querying Heterogeneous

Data Streams. International Journal on Advanced Computer Theory and Engineering (IJACTE). 84-88.

11) Dr. M.H.M. Krishna Prasad, T. Kameswara Prasad, O. SrinivasaRao, 2012. Exploration of Meaningful Information

from Educational Data Using Clustering and Sequential Pattern Miner. International Journal on Advanced

Computer Theory and Engineering (IJACTE). 29-34.

Prof. A. Krishna Mohan

1) A. Krishna Mohan, J. Satyanarayana, MHM Krishna Prasad. July - Sept. 2012. International Journal of Computer

Science & Technology. Vol. 3, ISSue 3. 425-429.

2) A. Krishna Mohan, Harika Yelisala, A.Suekha, MHM Krishna Prasad. July - Sept. 2012. FCIR Tree – A novel

method to build for Handling Geographic Document. International Journal of Computer Science & Technology.

Vol. 3, Issue 3. 197-201.

3) A. Krishna Mohan, V.V. Narasimha Rao, MHM Krishna Prasad, June 2012. A Novel Fuzzy Based Clustering

Algorithm for Text Classification. International Journal of Computer Applications. Volume 47(No.8) 33-39.

4) A. Krishna Mohan, Harika Yelisala, MHM Krishna Prasad, May-Jun 2012. IR Tree - An Adept Index for Handling

Geographic Document Searching. International Journal of Engineering Research and Applications (IJERA). Vol. 2,

Issue 3. 1433-1438.

5) A. Krishna Mohan, Surekha Alokam, MHM Krishna Prasad, May-Jun 2012. An Efficient Decision Tree for

Uncertain Data. International Journal of Engineering Research and Applications (IJERA). Vol. 2, Issue 3. 1401-

1405.

6) A. Krishna Mohan, Hari Krishna Gurram, Shanmukha Rao Kummari, 2011. Distance Sort. International Journal of

Experimental Algorithms (IJEA). Vol. 2, Issue 2. 42-47.

Prof. K. Sahadevaiah

1) Kuncha Sahadevaiah, Nagendla Ramakrishnaiah and P.V.G.D. Prasad Reddy,An Empirical Study of a

Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks,Springer International Publishing

Switzerland 2016 , First International Conference On Information and Communication Technology for Intelligent

Systems: Volume 2,Smart Innovation, Systems and Technologies 51

2) Nagendla Ramakrishnaiah, Pakanati Chenna Reddy and Kuncha Sahadevaiah,Performance Analysis of Dynamic

Addressing Scheme with DSR, DSDV and ZRP Routing Protocols in Wireless Ad Hoc Networks

135

©Springer International Publishing Switzerland 2016,First International Conference On Information and

Technology for Intelligent Systems: Volume 1,Smart Innovation, Systems and Technologies 50

3) K. Sahadevaiah, N.RamaKrishnaiah, Prasad Reddy P.V.G.D,IPv6 address auto-configuration protocol for mobile

Ad Hoc Networks1877-0509©2015 .3rd International Conference on Recent Trends in computing 2015(ICRTC-

2015)

DR. ASN CHAKRAVARTHY

1) “Utilization of SC-FDMA and OFDMA Based Uplink and Downlink Resources in LTE-A Network

Assisted Device To Device Communication for Effective”, ARPN Journal of Engineering and

Applied Sciences, VOL. 12, NO. 5 MARCH 2017.

2) “Evolution of Higher Education in India: Ancient to Golden Era”, University News: Association of

Indian Universities, Volume 55 N0. 05, January 30-Febraruary 05 2017.

3) “Optical Character Recognition Technique Algorithms, Journal of Theoretical and Applied Information

Technology”, 20th January 2016. Vol.83. No.2, p.p275-282.

4) “A Study on Developing Groundwater Information System (GWIS) for Sustainable Management of

Groundwater Resources-A Case Study from Visakhapatnam Urban Region “, International Journal of Science

and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 2185-2190.

5) “ Variable Modulation Schemes for AWGN Channel based Device to Device Communication, Indian Journal of

Science and Technology” , Vol 9(20), May 2016, pp.1-6.

6) “Design of WSN based Water Quality Monitoring System in a Mining District, International Journal of Science

and Research (IJSR)”, Volume 5 Issue 6, June 2016, pp.1183-1188.

7) “Providing A Secure Group Communication by Using a Novel Key Transfer Protocol and by Generating Multiple

Session Keys “, International Journal of Advance Research in Science and Engineering (IJARSE), Volume 5 Issue

10, October 2016, pp.36-45.

8) “Survey on Android Forensic Tools and Methodologies”, International Journal of Computer Applications (0975

– 8887) Volume 154 – No.8, November 2016.

9) “International Journal of Computer Applications (0975 – 8887) Volume 154 – No.8, November 2016 “,

International Journal of Electrical and Computer Engineering (IJECE), Volume 6, No 6: December 2016, pp.

2962~2970.

10) “Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions”, International

Journal of Computer Applications (0975 – 8887), Volume 112 – No. 9, February 2015.

11) “Analysis of Canonical Character Segmentation Technique for Ancient Telugu Text Documents”, Journal of

Theoretical and Applied Information Technology, 20th December 2015. Vol.82. No.2, pp. 311-320.

12) “Performance Evaluation Of Quantitative Metrics on Ancient Text Documents Using MIGT”, Journal of

Theoretical and Applied Information Technology, 31st December 2015. Vol.82. No.3 pp. 360-365.

13) “Gesture Recognition Technology to Annihilate Burglaries amid ATM Transactions “, International Research

Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 08 | Dec-2015, pp. 2293-2297.

14) “Prevention of Fire Accidents In Villages Using Wireless Sensor Networks “, International Journal of Computer

Science and Information Technologies (IJCSIT), Vol. 5 (3), 2014, pp. 3968-3971.

Dr. D. Haritha 1) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, 2013. Studies on Face recognition system using DCT

coefficients under Logarithm domain and LBP. International Journal of Research and Reviews in Applicable

Mathematics & Computer Science. Vol. 3(1). 44-57.

2) Dr. D. Haritha, S V H H L Narasimham Nallamilli, Saritha Hepsibha P, Oct 2012. Deterministic Evaluation of

Wireless Sensor Network using GRID and RANDOM Development Knowledge. International Journal of

Knowledge Engineering and Research. Vol 1 Issue 1. 1 to 5.

136

3) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, Sep-2012. Performance evaluation on the effect of

combining DCT and LBP on face recognition system. International Journal of Modern Education and Computer

Science. Vol. 4 (11). 21-32.

4) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, Sep-2012. Face Recognition System Using Doubly

Truncated Multivariate Gaussian Mixture Model and DCT Coefficients Under Logarithm Domain. International

Journal of Image, Graphics and Signal Processing. Vol. 4 (10). 8 to 17.

5) Dr. D. Haritha, Nakka Sindhuri, Sep 2012. Time Series Classification and Prediction using Kernal Estimates.

International Journal of Computer Science and technology. Vol. 3, Issue 3. 731-734.

6) Dr. D. Haritha, K. V Durga Devi, Jul 2012. Business Analysis frameworks for actionable knowledge discovery.

International Journal of Advanced and Innovative Research. Volume 1, Issue 2. 1 to 6.

7) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, Mar-2012. Face Recognition Algorithm Based on

Doubly Truncated Gaussian Mixture Model Using Hierarchical Clustering Algorithm. International Journal of

Computer Science Issues. Vol. 9, Issue 2, No 1. 388-395.

8) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, Feb 2012. Face Recognition Algorithm based on

Doubly Truncated Gaussian Mixture Model using DCT Coefficients. International Journal of Computer

Applications. Volume 39– No.9. 23-28.

Dr. O. Srinivasa Rao

1) Dr. O. Srinivasa Rao, Authorship Attribution on Imbalanced English Editorial Corpora, IJCA, UGC Approved

Journal (0975-8887) Volume 169-No.1,July 2017

2) Dr. O. Srinivasa Rao, Labeling Document Clusters with Thematic Phrases, IARJSET Vol 4,Issue 7,July 2017(UGC

Approved Journal)

3) Dr. O. Srinivasa Rao, Authorship Attribution using Unsupervised Clustering Algorithms on English C50 News

Articles ,IARJSET Vol 4,Issue 7,July 2017(UGC Approved Journal)

4) Dr. O. Srinivasa Rao, Performance Evaluation of Unsupervised algorithms on Morpheme based authorship

Clustering, IARJSET Vol 4, Issue 8, August 2017.

5) Dr. O. Srinivasa Rao, ECC Base point Generation using Finger print for Authentication and Message Encryption

and Decryption Using ECC, IARJSET Vol 4,Issue 8,August 2017, (UGC Approved Journal)

6) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, Nov 2011. Huffman compression technique in the context of ECC for

enhancing the security and effective utilization of channel Bandwidth for Large Text. International Journal of

Computer Applications. Special Issue. 45-54.

7) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, Oct 2011. Huffman compression technique in the context of ECC for

enhancing the security and effective utilization of channel Bandwidth for Images. International Journal of

Science and Advanced Technology .Volume 1 (No 8). 13-23.

8) Dr. O. Srinivasa Rao, Satya Venkatesh Kadali, Dr MHM Krishna Prasad. Sep-Oct 2011. A Routing-Driven Public-

Key Cryptosystem Based Key Management Scheme for a Sensor Network. International Journal of Computer

Trends and Technology. Special Issue. 11 to 14.

9) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, Sept 2011. Comparative study of Arithmetic and Huffman

Compression techniques for enhancing security and effective bandwidth utilization in the context of ECC for

Text. International Journal of Computer Applications. Volume 29(No.6). 44-60.

10) Dr. O. Srinivasa Rao, N.Sandhya rani, Dr MHM Krishna Prasad. Sep 2011. Efficient implementation of Data

aggregation in WSNs by Mobile Agent paradigm. International Journal on Computer Science and Engineering.

Vol. 3 (No. 9). 3254-3258.

11) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, Jan 2011. Comparative Study of Arithmetic and Huffman Data

Compression Techniques for Koblitz Curve Cryptography. International Journal of Computer Applications.

Volume 14(No.5). 45-49.

137

12) Dr. O. Srinivasa Rao, S.Rama Subba Reddy, Dr MHM Krishna Prasad, 2011. Hybrid Broadcast Routing with

Dynamic Security Considerations. International Journal of Computer Science and Information Technologies. Vol.

2 (5). 2091-2094.

13) Dr. O. Srinivasa Rao, B. Govardhan Singh, Dr MHM Krishna Prasad, 2011. Effectively Utilizing the Unused

Bandwidth. Advances in Computational Sciences and Technology. Vol. 4(No. 4). 379-387.

14) Dr. O. Srinivasa Rao, Madhu Babu Mogali, Dr MHM Krishna Prasad, 2011. Stateless Multi Hop Optimization in

Mobile Ad Hoc Networks. International Journal of Computer Trends and Technology. volume2 Issue2. 75-78.

15) Dr. O. Srinivasa Rao, B. Pruthvi raj, Dr MHM Krishna Prasad, 2011. Mitigating Congestion Aware routing

Protocol in Wireless Sensor Network. International Journal of Computer Trends and Technology. volume2

Issue1. 42-47.

16) Dr. O. Srinivasa Rao, G Satish, Dr MHM Krishna Prasad, 2011. Analyzing CSMA and TDMA scheduling in wireless

sensor networks. Advances in Computational Sciences and Technology. Vol. 4 (No.4). 367-378.

17) Dr. O. Srinivasa Rao, 2011.Associative Classification techniques for predicting e-banking phishing website.

International Journal of Computer Trends and Technology. volume2 Issue2. 124-127.

18) Dr. O. Srinivasa Rao, 2011. Integration of Bin Rank and Hub Rank by executing Hub Rank on MSGs of Bin Rank

generates. International Journal of Computer Trends and Technology. volume2 Issue2. 157-160.

19) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, 2010. Efficient mapping methods of Elliptic Curve Crypto Systems.

International Journal of Engineering Science and Technology. Vol. 2(8). 3651-3656.

Dr N. Ramakrishnaiah

1) Nagendla Ramakrishnaiah, Sirigiri Konda Reddy,Performance Analysis of Matrix and Graph Computations using

Data Compression Techniques In MPI and Hadoop Map Reduce in Big Data Framework

IEEE International conference on Smart Technologies and Management for Computing, Communication,

Controls, Energy and Materials (ICSTM) 2-4 August 2017.

2) Kuncha Sahadevaiah, Nagendla Ramakrishnaiah and P.V.G.D. Prasad Reddy,An Empirical Study of a

Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks,Springer International Publishing

Switzerland 2016 , First International Conference On Information and Communication Technology for Intelligent

Systems: Volume 2,Smart Innovation, Systems and Technologies 51

3) Nagendla Ramakrishnaiah, Pakanati Chenna Reddy and Kuncha Sahadevaiah,Performance Analysis of Dynamic

Addressing Scheme with DSR, DSDV and ZRP Routing Protocols in Wireless Ad Hoc Networks

©Springer International Publishing Switzerland 2016,First International Conference On Information and

Technology for Intelligent Systems: Volume 1,Smart Innovation, Systems and Technologies 50

4) Nagendla Ramakrishnaiah, Pakanati Chenna Reddy,Tree Based Variable Length Address Auto Configuration

Protocol For Mobile Ad Hoc Networks,2nd International Conference on Advances in Computing Communication

& Automation (ICACCA) 30th Sep – 1st 2016.

5) K. Sahadevaiah, N.RamaKrishnaiah, Prasad Reddy P.V.G.D,IPv6 address auto-configuration protocol for mobile

Ad Hoc Networks1877-0509©2015 .3rd International Conference on Recent Trends in computing 2015(ICRTC-

2015)

6) N. RamaKrishnaiah, P.Chenna Reddy,A Review Of Addressing Protocols in Mobile Ad-hoc Networks

International Journal of Computer Applications (0975-8887 ) Volume 132-No.9, December 2015

138

7) N. RamaKrishnaiah, P.Chenna Reddy,An Addressing Mechanism for Network Partitioning and Merging in

Wireless Ad Hoc Networks,International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10,

Number 17(2015) pp 37992-37996

SSSN Usha Devi N

1) Cellular Automata and its Application in Bioinformatics: A Review in Global Percepective on Artificial Intellegence , Volume 2,Issue 2,pp 16-22.

2) A Fast Multiple attractor Cellular Automata with Modified Clonal Classifier Promoter Region Prediction in Eukaryotes in Journal of Bioinformatics and Intelligent Control,Volume 3,pp 123-127.

3) Cellular Automata in Splice Site Prediction,in MOJ Proteomics & Bioinformatics ,Volume 1,issue 2. 4) A Fast Multiple attractor Cellular Automata with Modified Clonal Classifier for Coding Region Prediction in

Human Genome, Journal of Bioinformatics and Intelligent Control,Volume 3,issue 2.pp 128-133. 5) International Conference on Advances in Intelligent Systems and Computing ,Paper titled PRMACA:A Promoter

Region Identification Using Multiple Attractor Cellular Automata, International Publications Springer 6) SSSN Usha Devi Nedunuri, Pokkuluri.KiranSree, Inampudi Ramesh Babu, September 2013. PSMACA: An

Automated Protein Structure Predicyion using MACA(Multiple Attractor Cellular Automata). Journal of Bioinformatics and Intelligent Control (JBIC). Volume 2 Number 3. 211-215.

7) SSSN Usha Devi Nedunuri, Pokkuluri.KiranSree, Inampudi Ramesh Babu, September 2013. Multiple Attractor

Cellular Automata (MACA) for addressing Major problems in Bioinformatics. Review of Bioinformatics and

Biometrics (RBB).Volume 2 Issue 3. 70-76.

8) SSSN Usha Devi Nedunuri, Pokkuluri.KiranSree, Inampudi Ramesh Babu, December 2012. FELFCNCA: Fast &

Efficient Log File Compression Using Non Cellular Automata Classifier. International Journal on

Communications. Volume 1 Issue 1. 7 – 11.

9) SSSN Usha Devi Nedunuri, Prof. L. Sumalatha, May- June 2010, Fast and Effective heart attack prediction system

using Non Linear Cellular Automata. International Journal of Computer Engineering and Technology (IJCET).

Volume 1 Number 1. 196-206.

A. KARUNA

1) A. Karuna, V.Navya Sree, B. Sarath Chandra, July- August 2012. A new Algorithm for Training task graphs on

mixed systems. International Journal of Research in Engineering Science & Technology (IJREST). Vol.-1, Iss.-1. 11

– 15.

SUNEETHA ELURI

1) Published paper “Anonymi,iin “IEEE international Conference on Science , Technology and Management” in

Attended and published paper on “Sentiment Analysis of Stock Prediction Using machine Learning” in

International conference on emerging trends in engineering and technology on 30th Aug-2015 at

Vishakhapatnam.

2) “Efficient Data Dissemination and Privacy Preservation using Trajectory Prediction in VANETs” published in

International Journal of Innovative Science, Engineering and technology, Volume 2 Issue 8, August 2015.

3) “Analysis of Public Health Concern using Two-Step Sentiment Classification “ Published in International Journal

of Engineering Research & Technology Volume 4, Issue 9, September 2015.

4) “Sentiment Analysis for Frontier Security issues using Phrase Patterns “Published in International Journal of

Engineering Research & Technology Volume 4, Issue 9 September 2015.

139

5) Suneetha Eluri, G Sowjanya “An integrated Approach for anchor based localization and energy efficient secure

communication in WSN” in IJRITCC Vol2, Issue 7 July-2014

6) Suneetha Eluri, P Ramya “A framework for improved Intrusion detection and Countermeasure Selection in

Cloud systems” in IJRITCC Vol2, Issue 7 July-2014

7) Suneetha Eluri, P Santhosh “A framework for decoupling of Routing and Scheduling using Shadow Queues on

Multi Commodity Networks”, IJARCSMS , Vol 2 Issue 8 Aug 2014

RATNA KUMARI CHALLA

1) Ratna Kumari Challa, SRINIVAS RAO KANUSU, October 2013. Adaption of Cloud Computing in Education and

Learning. International Journal of Advanced Research in Computer and Communication Engineering. Vol. 2,

Issue 10. 4160-4163.

2) Ratna Kumari Challa, n. Mounica “Adaptive Data Aggregation with mobile Agents and Evolutionary Computing

based clustering in Sparse WSN” IJRITCC Vol2, Issue 9 ,2014

3) Ratna Kumari Challa,K. Sindhu “Bit slicing based visual cryptography on Gray Scale images” IJRITCC Vol2, Issue

8 , Aug 2014

4) Ratna Kumari Challa, V. Nageena “Concurrent Context Free framework for conceptual similarity problem using

reverse dictionary” IJRITCC Vol2, Issue 8 , Aug 2014

5.8 F a c u l t y Intellectual Property Rights (FIPR)(10)

Assessment of FIPR=2× (Sum of the FIPR points scored by each faculty member)/N

(Instruction: A faculty member scores a maximum of five FIPR points. FIPR

includes awarded national/international p a t e n t s , design, and copyrights.)

Name of faculty member(contributing to FIPR)

FIPR points(max.5 per faculty member)

CAYm2 CAYm1 CAY

Prof. Ch. Satyanarayana The patent examination is in final stage Dr. D. Haritha The patent examination is in final stage

Sum

N

Assessment of FIPR=2×Sum/N

Average assessment

5.9 Funded R&D Projects and Consultancy (FRDC) Work (30)

Instruction: A faculty member scores maximum 5 points, depending upon the amount.)A Suggested scheme is given below for a minimum amount of

140

Rs.1lakh: Five points for funding by national agency,

Four points for funding by state agency/ private sector

Two points for funding by the sponsoring trust/society. Assessment of R&D and consultancy projects=6×(Sum of FRDC by each faculty member)//N

Name of faculty member (contributing to FPPC) FRDC points (max.5 per)

CAYm1

m3(2013-14)

CAY

m2(2014-15)

CAYm1

(2015-16)

CAY

(2016-17)

Dr. JVR Murthy -- 5 5 5

Dr.MHM Krishna Prasad -- 5 5 5

Dr. Ch. Satyanarayana 5 5 5 5

Sum 5 15 15 15

N 20 20 20 20

Assessment of FRDC=6×Sum/N 1.5 4.5 4.5 4.5

Average=3.75

➢ Prof Ch. Satyanarayana as Co-Principal Investigator for the project Creation of facilities for

translator research in type-2 Diabetes Mellitus (DM) funded by Department of Science and

Technology (DST), Govt. of India under IRHPA scheme

Cost of Project Rs. 5,31,21,600/- for 5 years started on 01/03/2011 ➢ Prof. JVR Murthy as Principal Investigator and Prof MHM Krishna Prasad as co- Investigator

for project Obama-Simgh Initiative on “ Promoting University Industrial Cooperation

Creativity Diversity and Entrepreneurship in Computer Science” Funded by Ministry of

Human resources and Development, Govt. Of India, for an amount of approx. Rs. 1.2 Crores.

➢ Prof. JVR Murthy developed Janamithri Software for AP Police.

➢ Prof. JVR Murthy developed File Monitoring System for East Godavari Collecterate, AP.

➢ Prof. JVR Murthy developed Grievance monitoring System for RDO, EastGodavari as part of

ISO Certification

➢ Prof. JVR Murthy developed Randomized Transfer System for Constables of AP Police

➢ Prof. JVR Murthy developed and delivered R& D Project “Centralized Meta Data warehouse

” in collaboration with BI division of TCS Hyderabad which is currently implemented by

British Telecom

141

5.10 Faculty Interaction with Outside World (15)

FIP=Faculty interaction points

Assessment=3× (Sum of FIP by each faculty member)/N

(Instruction: A faculty member gets a maximum of five interaction points,

depending upon the type of institution or R&D laboratory or industry, as follows)

Five points for interaction with a reputed institution abroad, institution of eminence in India, or national research laboratories,

Three points for interaction with institution/industry (not covered earlier).

Points to be awarded, for those activities, which result in joint efforts in publication of books/research paper, pursuing externally funded R&D/ consultancy projects and/or development of semester-long course/teaching modules.

List of Faculty Interactions with outside world:

Prof. J.V.R Murthy

1) Dr. J.V.R Murthy, 19th December 2014. Expert talk on Big Data Analytics. Workshop on “Big

Data Analytics” at Andhra University, Vizag.

2) Dr. J.V.R Murthy, 22nd November 2014. As CSE Board of Studies Member. Adikavi Nannayya

University, Rajahmundry.

3) Dr. J.V.R Murthy, 13th November 2014. Expert talk on Big Data Analytics. UGC Academic Staff

College, Hyderabad.

4) Dr. J.V.R Murthy, 31st July 2014. As an Advisory Member to Help TTD in Queue line

Monitoring System.

5) Dr. J.V.R Murthy, 10th July 2014. Inauguration of CSI chapter and Keynote Speaker on Big

Data Analytics. Swarnandhra Engineering College, Narsapuram.

6) Dr. J.V.R Murthy, 26th May 2014. As a Board of Studies Member for CSE Department. V R

Siddhartha Engineering College, Vijayawada.

7) Dr. J.V.R Murthy, 28th March 2014. As a Keynote Address. Workshop on “Big Data Analytics”

at UCEV, JNTUK.

8) Dr. J.V.R Murthy, 20th March 2014. As a Keynote Speaker. National Level Workshop on

“Pattern Recognition & its Applications” at UCEV, JNTUK.

9) Dr. J.V.R Murthy, 08th January 2014. As a Chief Guest & Resource Person. At National seminar

on “Frontiers in Machine Learning” at AITAM Tekkali.

10) Dr. J.V.R Murthy, 13th December 2013. As a Jury Committee member to select Awardees for

“Awards for Excellence in IT”. Computer Society of India.

142

11) Dr. J.V.R Murthy, Still. As Advisory Board member. Software Technology Park of India.

12) Dr. J.V.R Murthy, Still. As Advisory Board member. AP Police CCTN Team.

13) Dr. J.V.R Murthy, As a Visiting Faculty and preparing the proposal for Obama Singh Initiatives

Grant in Collaboration with Chicago State University. Dr. J.V.R Murthy Acted as an Advisor to

the Chicago State University data centre. And he delivered a lecture on “Database

Normalization” in CSU.

Prof. Ch. Satyanarayana

1) Dr. Ch. Satyanarayana, 27th& 28th December 2014. As an Advisory Committee Member for

International Conference on Health & Disease.

Prof. L. Sumalatha 1) Dr. L. Sumalatha, 28th& 29th June 2013. Resource Person for Two days Workshop on

MATLAB, at Chaitanya Institute of Technology, Rajahmundry.

2) Dr. L. Sumalatha, 25th& 26th September 2012. Resource Person for Two days Workshop

on “How to Teach C”, at Chaitanya Institute of Technology, Rajahmundry.

3) Dr. L. Sumalatha, 15th& 17th March 2013. Resource Person for Two days Workshop on

“Android”, at Chaitanya Institute of Technology, Rajahmundry.

4) Dr. L. Sumalatha, 29th December 2012. As a Member for BOG in BVCITS.

5) Dr. L. Sumalatha, 2010. As a Resource Person for AICTE Sponsored Staff Device

Programme on Network Security & Applications, at AITAM, Tekkali.

6) Dr. L. Sumalatha, September 2010. As a Session Chairperson for TRACS 2010, A National

Conference on Technology & Resource Advances in Computer Science at Aditya

Institutions.

7) Dr. L. Sumalatha, As Chief Guest for International Conference.

8) Dr. L. Sumalatha, As a Session chair for an IEEE sponsored Conference at JNTUV.

9) Dr. L. Sumalatha, 27th& 28th December 2014. As a Advisory Committee Member for

International Conference on Health & Disease.

10) Dr. L. Sumalatha, 27th -31st January 2015, Invited as a Resource person for 1 week

Workshop on Research Challenges & Issues in Big Data & Cloud Computing at JNTUV.

11) Dr. L. Sumalatha, 28th& 29th March 2015. Invited as a Session Chair for National

Conference on Emerging Technology in Computer Science organized by JNTUV under

UGC 12th Plan.

12) Dr. L. Sumalatha, November 2014. As a Reviewer for Kuwait Journal of Science.

13) Dr. L. Sumalatha,As a Key Note Speaker for Information Security Day on 16th Dec 2016 in

Eastern Offshore Asset,ONGC Kakinada.

14) Dr. L. Sumalatha,As a Resource Person for Smart Electric Power Grid with Emphasis on

Embedded Systems and Cyber Security during 21st-25th February 2017

Prof. M.H.M. Krishna Prasad

143

1) 18th and 19th Feb 2017, participated in BoS meeting (Dept of IT) in Pragathi Engineering

College, Surampalem, East Godavari (dt)

2) 22nd Feb 2017, Participated for TEQIP-III Selection Process at National Project Implementation Unit (NPIU), Delhi

3) 27th and 28th Jan 2017, Participated in CII Summit at Vishakhapatna 4) 12th March 2017, expert committee member in JNTUK Ratification process

5) 13th and 14th March 2017, as an expert member in the ratification process, K. L. University ,

Vaddeswaram, Vijayawada

6) 20th to 24th March 2017, London, UK for paper presentation in ICC 2017 and meeting with

Prof Guo Yi-Ki, Director, HPC division, Imperial College, London, UK

7) 1st April 2017, participated in BoS meeting as a Subject Expert, Dept of MCA, VR SEC,

Vijayawada

8) 13th and 14th April 2017, participated in TEQIP-II Post Procurement Review, at NPIU, Delhi

9) Dr. M.H.M. Krishna Prasad, 20th May 2017,as a BOS Member (University Nominee), Vignan

Institute of Technology, Visakhapatnam

10) Dr. M.H.M. Krishna Prasad, 14th and 15thMarch 2017, as an expert committee member in

selection of Faculty & Staff in Computer Science and Engineering Department, GEC

11) Dr. M.H.M. Krishna Prasad, Resource person “Parallel Computing” on 19.2.2016 Organized by

E &ICT Academy, Dept of CSE, NITW

12) Dr. M.H.M. Krishna Prasad, 27th Sept. 2014. Chief guest and key note speaker on Recent

Trends in Data Mining, INCEPTRA2K14, Idle College, Kakinada.

13) Dr. M.H.M. Krishna Prasad, 11th to 13th Sept. 2014. Session chair in IEEE Sponsored WOCN-

2014, organized by KLU.

14) Dr. M.H.M. Krishna Prasad, 21st Sep 2014. AFRC Observer duty for counseling PGECET-AC

admissions at Avanthi PG College, VSKP.

15) Dr. M.H.M. Krishna Prasad, 19th Oct 2014. Guest Lecture on Big Data Analytics. Prakasam

Engineering College, Kandukur.

16) Dr. M.H.M. Krishna Prasad, 11th Aug 2014. A.P attended the Observer duty for conducting

EAMCET-AC. Admission and Fee Regulatory Committee (AFRC), Higher Education, Nove

College of Engineering VZA on Ref: Lr.No.11/AFRC-RA/SW.III-2014-15

17) Dr. M.H.M. Krishna Prasad,Feb 2012 to Sep 2013. Subject Expert in BOS, Sri Vishnu

Engineering College for Women, Bhimavaram

18) Dr. M.H.M. Krishna Prasad, 22nd February, 2013. Chief guest and key note speaker on Recent

Trends in Data Bases, International Seminar on Security and Software Engineering, DIET,

Ankapalli.

19) Dr. M.H.M. Krishna Prasad, June 5, 2014. Doctoral committee Member to consider the thesis

titled “Investigations on Formal Concept Analysis in the Fuzzy Setting” proposed to be

submitted by Mr. Prem Kumar Singh. Dept of CSE, VIT, Vellore.

20) Dr. M.H.M. Krishna Prasad, 9th Nov 2013. Doctoral committee Member, to consider the

thesis proposal of Ms. Preethi G, Dept of CSE, VIT, Vellore.

21) Dr. M.H.M. Krishna Prasad,9th Nov 2013. As a Doctoral committee Member participated in

the comprehensive viva voce examination of Mr. Saravana Kumar,Dept of CSE, VIT, Vellore.

144

22) Dr. M.H.M. Krishna Prasad, 15th Feb 2012. Guest Lecture (Key Note), ignITiCSE, One-day

National Student Technical Symposium, SISTAM, Srikakulam.

23) Dr. M.H.M. Krishna Prasad, Guest Lecture (Key Note), National Workshop on Statistical

Computing. GMRIT.

24) Dr. M.H.M. Krishna Prasad, AFRC Observer conducting PGECET-AC at Nova College of

Engineering VZA.

Prof. ASN Chakravarthy

1) Chaired a Technical Session at "IEEE International Conference on Soft Computing & Network Security (ICSNS-2015) held during 25th -27th February 2015 organized by SNS College of Technology Coimbatore in association with “KYUNGPOOK National University, South Korea.

2) Delivered a Guest lecturer at GVR&S College of Engineering & Technology, Guntur on the eve of Engineers day held on 15th September 2015.

3) Delivered a Guest lecture on “MOOCs – the power of disruptive innovation”, at a state level 3-Day workshop on “Teaching enabled Teaching Learning in Higher Education institutions”, held during 6th -8th October 2015 at Pithapur Rajah’s Government College, Kakinada.

4) Given a Welcome Address and Chaired a Technical Session at the 4th World Conference on Applied Sciences, Engineering and Technology (WCSET-2015) is going to be organized jointly by the Basha Research Corporation, Singapore and Graduate School of Science and Technology, Kumamoto University, Japan during 24th -26th October 2015 at Kumamoto University.

5) Delivered a Keynote and Chaired a Session at “The International Conference on Cryptography and Security” (ICCS 2015) organized by ASDF, during 26th -27th November 2015, Kuala Lumpur, Malaysia.

6) Delivered a Keynote and Chaired a Session at The International Conference on Human Machine Interaction (ICHMI 2015)” organized by ASDF, during 26th -27th November 2015, Kuala Lumpur, Malaysia.

7) Chaired a Technical Session at International Conference on. Computation Intelligence and Soft Computing organized by the Institute of Bioinformatics and Computational Biology (IBCB), held during 19th – 20th December 2015 at Palm Beach Hotel, Visakhapatnam.

8) Delivered a speech on Cloud, Big Data Security issues and conducted hands on session on Digital Forensic tools at a Three day faculty development Programme on Big Data Analytics & Computer Forensics(03-04-2016), held during 02nd-04th May 2016, organized by Dept. of CSE, Dhanekula Institute of Engineering & Technology, Vijayawada, India.

9) Delivered a guest lecture on "Cloud, Big Data Security issues & Digital Forensics"(15-07-2016) at a one week faculty development program on Recent Trends in Cloud Computing & Big Data Analytics held during 11th -16th July 2016, organized by Dept. of CSE, Malla Reddy Engineering College(A), Secunderabad, India.

145

10) Delivered a guest lecture on "Standardization of Higher Education &Online Learning &

MOOCs in Education" (21-07-2016), at a “Refresher course in Educational Technology “held during 11th- 31st July 2016 organized by UGC Human Resource Development and Andhra University, Visakhapatnam, India.

11) Delivered an expert lecture on “Reforms in Higher Education, MOOCs, Learning Management System/MOODLE and Education Technology Tools” on 30th July, 2016 at SVU College of Engineering, SV University, Tirupati, India.

12) Delivered an expert lecture on "Research opportunities in Computer Network and Security", in a three day workshop on " Fundamentals of Computer Networking", organized by the department of CSE during 16th -18th September' 2016 at RGUKT Nuzvid.

13) Delivered an expert lecture on Software Engineering, Networks and Cash less Transactions at SasiSasi Institute of Technology & Engineering, Kadakatla, Tadepalligudem , on 10th December 2016.

14) Delivered an expert lecture on "IOT& Security" at GVR & S College of Engineering & Technology, Guntur on 23rd December 2016.

15) Delivered an expert lecture on "IOT& Security" in a two day national workshop on “Revolution of internet of things and its applications” in A.M Reddy Memorial college of Engineering and Technology, on 24th December 2016, is sponsored by Science and Engineering Research Board (SERB) New Delhi.

16) Delivered an expert lecture on Digital Ethics & Cyber Security in a" Two Days Seminar on Ethics and Human Values in Engineering" on 6th January 2017, RVR&JC College of Engineering GUNTUR.

17) Delivered an invited talk on "Massive Open Online Courses" on 06th February 2017 at SreeVidyanikethan Engineering College, Tirupati.

18) Delivered an expert lecture on " Security in Smart Grid, IOT & Cyber Space " at one week

Interdisciplinary workshop on "Smart Electric Power Grid with Emphasis on Embedded

Systems and Cyber Security" 0n 23rd February 2017.

19) Delivered an online expert lecture on Technology in Education (Ed-Tech Tools) to Andhra University on 14-07-2017.

146

Dr. D. Haritha 1) Dr. D. Haritha, 2013. Chairperson for IPCV International Conference (WORLD COMP’ 13) at

Los Vegas, USA.

2) Dr. D. Haritha, As a Reviewer for IET journal.

SSSN Usha Devi N

1) SSSN Usha Devi N, as Judge for ABHYASA 2k17 ,Technical Paper Presentation contest on14th

march 2017.

Suneetha E 1) Suneetha E, as Resource Person for Two Week Orientation Programme on Physical Director

of affiliated colleges of JNTUK organized by Directorate of Faculty Development, JNTUK,

Kakinada, August 2014.

RatnaKumari Ch 1) Ratnakumari Ch, As Resource Person for Two Week Orientation Programme on Physical

Director of affiliated colleges of JNTUK organized by Directorate of Faculty Development,

JNTUK, Kakinada, August 2014.

147

6 Facilities and Technical Support (75)

Description of classrooms, faculty rooms, seminar, and conference halls :( Entriesin the

following table are sampler entries)

Room description

Usage Shared/

exclusive

Capacity Roomsequipped withPC,

Internet,Book rack, meeting

space,etc.

6 Lecturer Halls

Classroom for

UG

Exclusive

30 to 60 Black Board, class room furniture and LCD Projector with Screen ( in 3 class rooms)

Hall 5

Hall 6

M.Tech IT

M.Tech CSE

Exclusive 60 Black Board, LCD Projector with Screen, PC with Internet connection and class room furniture

Tutorial rooms ------------- Shared 30 to 60 Black Board, LCD Projector with Screen and class room furniture

No. of Meeting rooms

01 Shared 30 Furniture with PCs, printer, Xerox machine, Alma rah, rack, Plasma Digital panel and board.

No.of Faculty rooms

13 Exclusive 2 Furniture, PC with internet connection, Printer, Alma rah and rack

6.1 Classrooms in the Department (15)

6.1.1 Adequate number of rooms for lectures (core/electives), seminars, tutorials, etc., for the programme (5)

(Instruction: Assessment based on the information provided in the precedingtable.)

Number of rooms for lectures (core/electives), tutorials--------08 ➢ Adequate number of Class rooms, Faculty rooms along with e-class room is available in

the Department.

➢ Seminar hall is available for the Department on shared basis with university; and also

the e-class room is utilized for conducting seminars, guest lecturers in the Department.

148

6.1.2 Teaching aids---multimedia projectors, etc. (5)

Multimedia projectors-----10

➢ All Class rooms are equipped with Black boards.

➢ LCD projectors are provided in 6 class rooms to deliver Power Point presentations, e-

class notes, demos and etc.

➢ Display charts are provided in some places to explain the basic principles of Information

Technology.

➢ Display charts of list of practical conducted in laboratories are provided.

6.1.3 Acoustics, class room size, conditions of chairs/benches, air circulation, lighting, exits, ambience, and such other entities/facilities (5)

(Instruction: Assessment based on the provided in the preceding table and the inspection there of.)

▪ Acoustics---------- Yes ▪ Classroom size----6x72 Sqm , 2x48 Sqm ▪ Air circulation----- Abundant ▪ Lighting------------ Abundant ▪ Conditions of chairs/benches------Excellent

• All class room are well equipped with windows for air circulation, also there are

provisions for natural and sufficient artificial lighting

• Sufficient number of fans and tube lights are provided for better air circulation and

ventilation.

• All class rooms are provided teacher table, student benches for comfortable seating.

• All class rooms are having three seated furniture with sufficient number of benches to

accommodate all the students as per the requirement. Each class room is provided with

entry and exit.

• The class rooms are adequate in size to enable excellent audible environment.

• The provided Glass Board is clearly visible from all corners of the class room.

• Good academic ambience is maintained in the classes and in the vicinity of the

department.

6.2 Faculty Rooms in the Department (15)

6.2.1 Availability of individual faculty rooms (5)

149

(Instruction: Assessment based on the information provided in the preceding table.)

• Faculty Rooms------------13 • White/black board-------- 02 • Computer------------------15 PCs with internet connections and Printers • All Professors and Associate Professors are provided with Personal Laptops

➢ The department is having one HOD room and 13 Faculty rooms.

➢ The HOD Room is equipped with necessary IT Infrastructure viz., smart board,

projector, computer with internet etc., to capture and deliver e-content

➢ All regular faculty members have individual rooms with necessary IT Infrastructure

(computer with internet, printer, scanner etc.,)to support academic and research

activities.

➢ All ad-hoc faculty members have shared rooms; those accommodated with sufficient

furniture, PCs with printer and internet connections.

6.2.2 Room equipped with white/black board, computer, Internet, and such other amenities/facilities (5)

(Instruction: Assessment based on the information provided in the preceding table)

• white/black board --------- 8

• computers ---------Yes

• Internet ---------Yes

➢ All class rooms are equipped with board; moreover four class rooms are having

projectors, screens and PCs with internet connection facility.

➢ All computers available in the department are having internet facility.

➢ The computer labs available in the department are having Internet/Intranet/USB Drive +

printer facility.

➢ The department is having well notice boards, intercom connection and dustbin.

➢ Ladies waiting room is available for girls students with furniture

6.2.3 Usage of room for counseling/discussion with students (5)

(Instruction: Assessment based on the information provided in the preceding table and the inspection there of.)

➢ In addition to the faculty rooms, Class room, seminar hall are used for

discussion and counseling the students.

150

➢ E-class room is provided to share the ideas of students and Faculty as and when

required.

6.3 Laboratories in the Department to meet the programme curriculum requirements and the POs

(30) The following table is required for the subsequent criteria.

Laboratory

description in the

curriculum

Exclusive use

/shared

Space, number

of students

Number of

experiments

Quality of

instruments

Laboratory

manuals

Programming Language

Laboratory Shared with UG 120(Sqm), 54 16-25 High End

Yes, Available in the

Laboratories

Data Engineering Laboratory

shared 120(Sqm),50 16-25 High End Yes, Available

in the Laboratories

Advanced Computing Laboratory

PG (CSE & IT) 120(Sqm),60 16-25 High End Yes, Available

in the Laboratories

6.3.1 Adequate, well-equipped laboratories to meet the curriculum requirements and the POs

(10)

(Instruction: Assessment based on the information provided in the preceding table.)

To inculcate the interest in analyzing and developing experiments to make their Academics cope up with industry needs; the following programming facilities are available in

Laboratories

• C (Scientific Programming)

• C++ (Object Oriented Programming)

• COBOL (Mainframe)

• NS2 (Network Simulator)

• WEKA Tool (Design Aspect)

• JAVA (Scientific Object Oriented)

• ORACLE10g (Database)

• Rational Rose

• ANEKA Cloud computing

• Wireless Toolkit

• Android Framework for Mobile Apps Simulations

151

• All other Curriculum related application Software

Operating Systems

• Windows 7

• Windows XP

• LINUX Antivirus

• Symantec

Servers

• Application Servers: 03

• Database Servers: 03

• Network Servers : 03

• Workstations equipped with GPU cards (CUDA SERVER):02 (Intel core i7 -3820CPU 3.60GHz, 500 GB HDD, 32 GB RAM, 64 bit OS)

6.3.2Availability of computing facilities in the department (5)

(Instruction: Assessment based on the information provided in the preceding table.) Computing facilities in the department-----

• 200 High end Personal Computers

• Workstations equipped with GPU cards (CUDA SERVER)

• IBM DUAL XEON Processor Server with 320 GB HD, 4GB RAM WINDOWS 2003/Red Hat Linux OS

• IBM P520 SERVER with 2 x 1.5 GHz CPUs,4GB Memory, 4 x 146 GB HD,DVD ROM, AIX OS

• Red Hat Linux Server

• Windows 2003 Server

• IBM INTEL CORE i3 Processor Server with 500 GB HD, 16 GB RAM WINDOWS 2008.

6.3.3 Availability of research facilities to conduct project works/thesis work (5)

(Articulate the facilities provided to carry out the project works/thesis). ➢ In the lab 25 systems are dedicated to carry out the project work (to access journals)

and Students can utilize the lab at any time.

Number of Servers

• IBM DUAL XEON Processor Server with 320 GB HD, 4GB RAM WINDOWS 2003/Red Hat Linux OS

• IBM P520 SERVER with 2 x 1.5 GHz CPUs,4GB Memory, 4 x 146 GB HD,DVD ROM,AIX OS

• Red Hat Linux Server

• Windows 2003 Server

• IBM INTEL CORE i3 Processor Server with 500 GB HD, 16 GB RAM WINDOWS 2008.

152

Number of Clients

• IBM—100(P IV,3GHz Processor, 1GB RAM, 80GB HD CD Drive)

• Wipro—35(P IV, 2.6 GHz Processor ,512 MB RAM ,80GB HD)

• HP—10(P IV, 3GHz Processor, 512MB RAM, 80GB HD)

• DELL-60(I 3,3.40GHz Processor, 4GB RAM,500GB HD)

Power Back-Up Provision (with solar)

• 65KVA Generator

• 20 KVA UPS – 2; 10 KVA UPA –2; 2 KVA UPS – 1; 6 KVA UPS – 1

Number of Peripherals ----- 17

• HP Laser Jet 2420n network Printers - 3

• HP Laser Jet 1020n Printer - 4

• HP Laser Jet 1020n Printer - 10 6.3.4 Availability of laboratories with technical support within and beyond working hours(5)

(Instruction: Assessment based on the information provided in the preceding table.)

• We provide extra Lab our for students to practice the experiments before examinations

• If Lab Session are not sufficient the total number of experiments, extra are labs conducted beyond the working hours

• To carry out programming based assignments, the students can avail the laboratory facilities beyond the working ours

6.3.5 Equipment to run experiments and their maintenance, numberof students per

experimental setup, size of the laboratories, over all ambience, etc.(5)

(Instruction: Assessment based on the information provided in the preceding table.)

➢ Labs are equipped with sufficient number of systems, so that each student can work

on individual system

➢ One faculty is assigned as Lab In-charge for each laboratory

➢ Each Lab is maintained by one Technical and one non technical staff

➢ Every week Lab is maintained and upgraded by the technical staff in co-ordination

with Lab In-charge

➢ Before commencement of laboratory course in each semester, the system are

installed with all required software’s/tools

➢ List of experiments are displayed in each lab

➢ Dedicated Server cabin is maintained in Lab

➢ Minimum of Four Air conditioners are provided in each lab

Computing facilities in the Laboratories-------165 (54+50+60).

153

6.4 Technical Man power Support in the Department (15)

Name of the

technical staff

Designation

Pay-scale

Exclusive/

shared

work

Date of joining

Qualification Other technical

skills gain

d

Responsibility

At Joining

Now

A. VenkatRao

Computer operator

23,600 Shared 05/07/85 B.sc PGDCA

MBA Systems

MCSACCNA Systems Administrations

T. Vijay Kumar

Artisan 17,209 Shared 16/07/08 Diploma B.Tech APCDCA Systems Administrations

PS.Prakash System Administrator

Out Sourcing Staff

Shared 1/7/2004 Diploma ECE

BCA ---- Systems Administrations

K.Lovaraju Babu

Computer OPerator

Out Sourcing staff

Shared 07/07/2017

MCA MCA PGDCA Systems Administrations

6.4.1 Availability of adequate and qualified technical supporting staff or programme-specific laboratories (10)

(Instruction: Assessment based on the information provided in the preceding table.)

➢ One faculty is assigned as Lab In-charge for each laboratory

➢ Well qualified Technical staff is assigned to each laboratory

➢ Labs are maintained by one Technical and one non technical staff

➢ Every week Lab is maintained and upgraded by the technical staff in co-ordination

with Lab In-charge

➢ Before commencement of laboratory course in each semester, the system are

installed with all required software’s/tools by the technical staff in coordination with

Lab In-charge

6.4.2 Incentives, skill-upgrade, and professional advancement (5)

(Instruction: Assessment based on the information provided in the preceding table.)

Technical staff attended the following workshops for professional advancement

• LINUX ADMINSTRATOR,

• PC HARDWARE AND TROUBLE SHOOTING,

• CCNA, and

• MCSA

154

7 Teaching-Learning Process (75)

7.1 Evaluation process: coursework (25)

7.1.1 Evaluation Process–Class test/mid-term test schedules and procedures for systematic evaluation, internal assessments.

(Assessment is based upon the efficacy of the evaluation process being followed. Relevant data may be

inserted here.)

• The performance of the candidate in each semester shall be evaluated subject-wise, a

maximum of 100 marks for theory and 100 marks for Laboratory, on the basis of Internal

Evaluation and End Semester Examination.

• For the theory subjects, 60 marks shall be awarded based on the performance in the End

Semester Examination, 40 marks shall be awarded based on the Internal Evaluation. The

internal evaluation shall be made based on the average of the marks secured in the two Mid

Term-Examinations conducted, one in the middle of the Semester and the other

immediately after the completion of instruction.

• The external examination shall be conducted for duration of 180 minutes with 5 questions to

be answered out of 8 questions. For practical subjects. 60 marks shall be awarded based on

the performance in the End Semester Examinations, 40 marks shall be awarded based on the

day-to-day performance in Laboratory as Internal Marks.

• Laboratory external examination for M.Tech courses must be conducted with two

Examiners, one of them being Laboratory Class Teacher as internal examiner and external

examiner shall be appointed by the Head of the Department.

• The internal examination shall be conducted for duration of 120 minutes with 4 questions to

be answered out of 4 questions without any choice. For practical subjects, 40 internal marks

Mid 1 Marks (Theory) (Max 40)

Mid 2 Marks (Theory) (Max 40)

Average of two mid exams (Theory) (Max 40)

End Exam Marks (Theory) (Max 60)

Total (Theory) (Max 100)

Lab Internal Marks (Max 40)

Lab End Exam Marks (Max 60)

Total Lab Marks (Max100)

155

shall be awarded based on the day-to-day performance and internal exam conducted at the

end of semester.

• Pass Criteria: A candidate shall pass if he secures a minimum of 40% of external marks in

theory and 50% of external marks in the lab Examination, and should secure a minimum

aggregate of 50% of the total marks.

• Re-registration criteria: A candidate shall be given one chance to re-register for each subject

provided the internal marks secured by a candidate are less than 50% and he has failed in

the end examination. At a given time a candidate is permitted to re-register for a maximum

of two subjects in addition to the subjects of regular semester subjects.

• Project work evaluation: A candidate is allowed to submit the thesis based on the

recommendations of the project review committee (PRC) and on completion of all subjects

at the end of 4thsemester. Head of the Department shall submit a panel of 5 examiners,

eminent in that field in consultation with the concerned internal guide and the thesis shall

be adjudicated by external examiner appointed by the Principal. The external viva voce

examination is conducted by external examiner and grades are awarded.

Assessment=

7.1.2 Seminar and Presentation Evaluation (10)

• There will be two seminar presentations during 3rdand 4thSemesters. For seminar, a student

under the supervision of a faculty member, shall collect the literature on a topic and critically

review the literature and submit it to the Department in a report form and shall make an oral

presentation before the Departmental Committee.

• The Departmental Committee consists of Head of the Department, supervisor and two other

senior faculty members of the department. For Seminar there will be only internal evaluation

of 50 marks. A candidate has to secure a minimum of 50% to be declared successful.

7.1.3 Performance and Feedback [3]

Assessment is based upon effective implementation of the following activities:

O Post-semester feedback to students on their performance

O Extra care for poor performers

156

O Comparison of mid and end semester performance

Relevant data may be inserted here

• The performance of each candidate after every semester is evaluated and the feedback is

given to each student. If any student has backlogs in a semester.

• The remedial classes will be conducted for them in the evening hours without disturbing the

normal working hours. The feedback given to the students helps them to improve in their

weak areas in the coming semesters.

7.1.4 Mechanism for addressing evaluation related grievances [2]

• All the grievances related to evaluation are sorted by a committee appointed by the

Principal.

• The constitution of the committee is as follows

Vice-Principal - Chairman

HOD - Member

Subject expert - Member

Officer In-charge of Exams - Convener

7.2 Evaluation Process: Project Work/THESIS (25)

Details of Thesis Allocation, Evaluation and Presentation:

DEPARTMENT OF CSE

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, KAKINADA

M.Tech (IT) 2014-16 batch project details

S.No Regd. No. Student Name Supervisor

Name Title of

Dissertation External Examiner

Thesis Presentation

Date

1 14021D2201 A MuraliSankar Smt A Karuna

Implementation of linear

programming technique for

dietician problem using handoop map reduce in a bib

data framework.

Dr. V SrinivasaRao, Professor of CSE

VR Siddardha Engineering College,

Vijayawada

15/12/2016

2 14021D2202 Swathi K Dr. A Krishna

Mohan

Personalized and location aware

wed service recommendation

system implementation

Dr. M. Kamala Kumari, Associate Professor,

AKNU Rajhmundry.

15/12/2016

157

3 14021D2203 K Saraswathi Dr. O

SrinivasaRao

Color image encryption and

decryption using two stage radom

matrix affine cipher associated

with DWT.

Dr. S

PallamsettyHaritha, Professor of CSE and SE UCE, Andhra University

Visakapatnam

10/12/2016

4 14021D2204 D Jagadeswararao Dr. A Krishna

Mohan

Fine grained secure

distributed Deduplicatiokn systems with

improved reliability

Dr. Naga Jagadeesh Professor of CSE, KLCU University

Vijayawada.

15/12/2016

5 14021D2205 K Raju Sir S Chandra

Sekhar

A novel hash for data

communication based on image steganography

and postion based

encryption.

Dr. S PallamsettyHaritha,

Professor of CSE and SE UCE, Andhra University

Visakapatnam

10/12/2016

6 14021D2206 V Ramakrishna Dr. O

SrinivasaRao

Tunner controller and pulse analysis.

Dr. S PallamsettyHaritha,

Professor of CSE and SE UCE, Andhra University

Visakapatnam

10/12/2016

7 14021D2207 K Sushma Dr.LSumalatha

A framework to find opinion of

tweets with text & emotions using

K-means and Sentiwordent.

Dr. D Rajya Lakshmi Professor,Dept. of CSE

JNTU College of Engineering

Vijayanagram

11/12/2016

8 14021D2208 KuncheSireesha Smt A Karuna

Privacy preserving public

auditing for multi-level

encryption based cloud storage.

Dr. V SrinivasaRao, Professor of CSE

VR Siddardha Engineering College,

Vijayawada

15/12/2016

9 14021D2209 C V S N Ravi Teja Dr A Krishna

Mohan

Fine grained structured

learning from heterogeneous

behavior for social identity

linkage

Dr. M. Kamala Kumari, Associate Professor,

AKNU Rajhmundry.

15/12/2016

10 14021D2210 S Konda Reddy Dr. N

Ramakrishnaiah

perfomance of matrix and graph

computations using data

compression techniques in

MPI and HADOOP

Dr. A Prasad Professor of CSE

VikramaSimhapuri University

Nellore

18/12/2016

11 14021D2211 S Prathyusha Dr. D Haritha

Detection of brain tumur

using fast bounding box

and SVM classifier

Dr. D Rajya Lakshmi Professor,Dept. of CSE

JNTU College of Engineering

Vijayanagram

11/12/2016

12 14021D2212 D Lakshmi gayatri Smt SSS N Usha

Devi N

Automatic Bug triage data reduction

Dr. M. Kamala Kumari, Associate Professor,

AKNU 15/12/2016

158

techniques Rajhmundry.

13 14021D2213 J GeethaMaounika Dr. N

Ramakrishnaiah

Design for multi-trust-domain network of

internet of things by using blind folded packet transactions

Dr. A Prasad Professor of CSE

VikramaSimhapuri University

Nellore

17/12/2016

14 14021D2214 M Sravani Dr. A Krishna

Mohan

secure and lifetime

maximization routing protocol

design for wireless sensor

networks

Dr. R RajeswaraRao, Professor & Head of CSE

University College of Engineering

Vizianagaram

18/12/2016

15 14021D2215 K Ramanji Reddy Not registered

16 14021D2216 S Surya Sreekanth Smt A Karuna

Enchanced approach for

multi keyword ranked search

over encrypted cloud data.

Dr. V SrinivasaRao, Professor of CSE

VR Siddardha Engineering College,

Vijayawada

15/12/2016

17 14021D2217 GollapalliHima Dr. D Haritha

Efficient segmentation

method for brain tumor

Dr. Naga Jagadeesh Professor of CSE, KLCU University

Vijayawada

15/12/2016

18 14021D2218 C Bhavana Smt E Suneetha

An effective model for

counter attacks on social networks

Dr. Naga Jagadeesh Professor of CSE, KLCU University

Vijayawada.

15/12/2016

19 14021D2219 Ch Priyankaraju Not registered

20 14021D2220 S Kiran Kumar Dr. JVR Murthy

Graph based seasonal and

trend anomaly detection thesis

Dr. Rakesh Chandra Balabantaray

Associate Professor, Dept. Of CSE

IIT Bhubaneswar, GothpatnaBhubaneswa,

Oriss-751003

24/12/2016

21 14021D2221 A

SontoshaRupaVani Dr. O

SrinivasaRao

Image compression and encryption using

CRT and CHAOTIC logistic

MAP.

Dr. S PallamsettyHaritha,

Professor of CSE and SE UCE, Andhra University

Visakapatnam

10/12/2016

22 14021D2222 MarriSireesha Smt SSS N Usha

Devi N

Enhanced Routing

algorithm for best relay node

selection in WSN

Dr. M. Kamala Kumari, Associate Professor,

AKNU Rajhmundry.

15/12/2016

23 14021D2223 S Lalitha Dr. K

Sahadevaiah

Fast aggregation scheduling in

wireless sensor networks

Dr. R RajeswaraRao, Professor & Head of CSE

University College of Engineering

Vizianagaram

18/12/2016

24 14021D2224 P Anusha Dr. N

Ramakrishnaiah

Hybrid approach for integrating random seed

Dr. A Prasad Professor of CSE

VikramaSimhapuri 17/12/2016

159

distribution with transitory master key mechanisms

in WSN

University Nellore

25 14021D2225 R B V Chowdary Dr. Ch

Satyanarayana

Detection and rectification of

distorted fingerprints

Dr. S Pallamsetty Professor of CSE and SE UCE, Andhra University

Visakapatnam

29/12/2016

7.2.1 Allocation of Students to Eligible Faculty Members (supervisors) [10]

➢ The students are having flexibility to choose the supervisor.

➢ The faculty who are having P.G qualification are eligible as project supervisors

➢ The faculty member has to accept for supervision of the project for specific number of PG

students depending upon the total strength of students available in that academic year

Assessment=

7.2.2 Constitution of Evaluation Committee with at least One External Member [10]

➢ For the evaluation of a project, a project review Committee (PRC) was constituted with Head

of the Department and two other senior faculty members in the department.

➢ Registration of Project Work: A candidate is permitted to register for the project work after

satisfying the attendance requirement of all the subjects, both theory and practical.

➢ A candidate is permitted to submit Project Thesis only after successful completion of theory

and practical course with the approval of PRC not earlier than 40 weeks from the date of

registration of the project work.

➢ Head of the Department shall submit a panel of 5 examiners, eminent in that field in

consultation with the concerned internal guide and the thesis shall be adjudicated by

external examiner appointed by the Principal. The external viva voce examination is

conducted by external examiner and grades are awarded.

Name & address of the supervisor

Name & address of the External Examiner

Name of the Internal Examiner

Date of the Viva-Voce Examination

Report of the viva – voce examination

160

A – Excellent, B – Good, C – Satisfactory, D – Unsatisfactory**

** The candidate is recommended for re-submission with necessary modifications suggested by the examiners, if candidate is awarded D grade,

Assessment=

7.2.3 Schedule Showing Thesis Presentation at least twice during the semester [5]

➢ The work on the project shall be initiated at the beginning of the II year and the duration of

the project is two semesters.

➢ A candidate is permitted to submit Project Thesis only after successful completion of theory

and practical course with the approval of PRC not earlier than 40 weeks from the date of

registration of the project work.

➢ The students are permitted to present their thesis work two times during III and IV

semesters before the project review committee. At the end of the thesis work it is

evaluated by the internal and external examiners.

Assessment=

7.3 TEACHING EVALUATION AND FEEDBACK SYSTEM [10]

7.3.1 Guidelines for Student Feedback System[3]

Students Feedback on the teacher and the subject is based on the following criteria

on scale of 20 points for each criterion and 100 points for all the criteria.

1. Depth of knowledge in the subject and clarity of expression

2. Syllabus coverage and utilization of class time

3. Judgment of Student Merit

4. Accessibility to student for discussion of subject outside the class room

5. Helping the students for their personality development

Based on these criteria the performance of the faculty is measured for the effective

course delivery.

Assessment=

7.3.2 Analysis of Feedback by HOD and the Faculty [2]

161

• The automated feedback is taken through online before the commencement of the end

theory examination and these feedback forms are preserved in the software. This

feedback is taken by the examination section under the supervision of Vice-Principal

and the chairman of feedback committee of the College. The feedback is analyses and

evaluated by the software and the reports are generated automatically. A committee is

constituted for managing automated feedback system. The members of the feedback

committee are as follows:

Dr. B.Balakrishna, Professor & Vice-Principal, Chairman

DrP.Dakshina Murthy, Professor & HOD in Physics, Member

DrV.V.SubbaRao, Professor & Head of Mech. Engineering, Member

DrV.Ravindranath, Professor & Head of Maths and SS Dept., Convener

7.3.3 Corrective Measures and Implementation Followed [5]

The result of the feedback analysis is communicated to the respective departments

and to the concerned faculty, so as to enable them to know their weakness in the course

delivery and the subject knowledge. Based on the feedback analysis one of the faculty may

secure best teacher award. The award of best teacher is given to encourage the teaching

staff for ensuring effective course delivery. However the faculty with weak performance is

advised to improvise their subject knowledge and delivery skills. After the performance

appraisal, staff members are encouraged to attend faculty development courses,

workshops, refresher courses and training programmes.

Assessment=

7.4 Self learning beyond syllabus and outreach activities [15]

7.4.1 Scope for self-learning (5)

(Instruction: The institution needs to specify the scope for self learning /learning beyond syllabus and

creation of facilities for self learning / learning beyond syllabus.)

Mode of Learning Facilities/Means

Self-learning The students are assigned to practice the usage of software tools from the user manuals in order to

162

carry project works. The students are given assignments, tutorials which will prompt them to learn on their own. Active learning and collaborative learning processes are encouraged in the class room.

Learning beyond syllabus The students are given seminar and project

works such that they acquire knowledge in the

areas which are beyond the syllabus

7.4.2 Generation of self-learning facilities, and availability of materials for learning beyond syllabus (5)

• The Department is generating self learning facilities through various modes. The various

models are:

Web based learning:

• Internet offers new possibilities to structure, represent, adapt and integrate various learning

content and materials. Based on it, we are providing digital library facility to all the students

in which internet connection is available.

• All course material is available on intra-net. By watching the NPTEL videos on internet, the

student is able to learn beyond syllabus.

• In addition to digital library, a library in which hundreds of volumes of books are present is

available. The nook and corner of every topic is available through the library. All the video

lectures are present in CD form for referring at any moment.

Class room presentations:

• We allow students to prepare and present topics from curriculum. There are LCD projectors

for presentations in the class rooms. Not only the technical aspects but also non technical

topics are also presented.

Symposiums:

• The Department is organizing several symposiums and quiz contests. Students are motivated

to participate in inter-college events like paper presentations and project exhibitions etc.

Several workshops are being organized in order to develop the soft skills of the student. All

these facilities contribute for the student to learn beyond syllabus.

163

7.4.3 Career Guidance, Training, Placement, and Entrepreneurship Cell (5) VISION

Equipping the students with relevant and conceptualized professional skills and guiding them

towards a bright future and career all around the world with the values of – Sincerity, Hard Work

and Justice.

MISSION To achieve 100% placement for students through dedication, attitude and complete

involvement in training the students to meet the expectations of the industry is our mission.

GOALS & OBJECTIVES GOALS

➢ To enhance the employability skills among the students to meet out the corporate

expectations.

➢ To improve the industry – institute relationships

➢ To place all the students in the prospective IT and Core Companies.

➢ To enhance the student’s interest towards the entrepreneurship and business

strategies.

OBJECTIVES ➢ To provide world class training for the students through continuous training module

➢ To approach top multi-national companies for arranging the campus recruitment

➢ To counsel the students to improve their career exposure across the global.

➢ To produce the most competitive engineers to fit in all scenario of the job mar

The Training and Placement Office of this college provides career guidance and all the

assistance for the students in order to achieve their career goals. The unit takes right steps in

identifying the demands of the current industry and prepares students towards this need. Adequate

emphasis is given for soft skill development complementing the regular academic programmes.

Training and Placement Cell arranges and coordinates various programmes that aim at

moulding the students so as to meet the industry expectations in career building and in turn bring

laurels to the parent institution. The Training and Placement Cell, guided by a set of rules and

principles, strives to maintain good relationship with industries. Preparing the recruitment schedule

for the year, inviting corporations for pre-placement talks on the campus followed by final

placements, and overseeing the process to its end, is the responsibility of the Training and

164

Placement Cell. The Cell endeavours to carry out successfully all the processes methodically

throughout the year.

Aptitude tests and group discussions are conducted at regular intervals to enable the

students to improve their performance in competitive exams. The Placement Officer who is assisted

by Coordinator student representatives from all the departments heads this unit. Job oriented

courses and special training programmes are regularly conducted. The UCEK (A) also welcomes

guest lectures, visiting faculty members for training students and faculty members too.

At JNTUCEK, we foster a climate where collaboration with industry thrives, generating both

breakthrough discoveries and the science and technology that can support continuous innovation

and growth. With a perfect track record of very productive relationships with corporations of all

sizes, from start-ups to mature, successful enterprises, our institutions provide the students with

education, research and connections to world class faculty and corporate.

The Training and Placement Office of the Institute centrally handles campus placement of

the graduating students and Post graduates of our campus. The Office provides complete support to

the visiting companies at every stage of placement process. The Office is well equipped with

infrastructure in Terms of Testing halls, Conference Hall for Presentations, Pre-Placement Talks,

Written Tests, Interviews and Group Discussions are made as per the requirement of the visiting

companies.

Training:

To meet the rapid changes in technology placement office conducts Value Added Courses

which the students learn beyond their syllabus for the students. The other unique feature of the

training programme is the need analysis done among the students and based on their need they are

exposed to various training programmes. The effectiveness of the training programme is analysed by

the feedback collected from each and every student.

The Training is provided to the final year students with the support of TEQIP II and the

details are as follows:

1. Communication training, Soft Skill training and Engineering training.

2. Technical Training -C and C++, Oracle, Embedded systems, Java .

3. IV year students – The Office arranges Campus Recruitment Training for students in

industries for 3-4 weeks at the beginning of 7th Semester.

165

4. The Office arranges Company Specific Training Programme before four/three day’s

commencement of the recruitment.

Placement Activities:

The institute is having full-fledged Placement Office, which monitors the employment

opportunities and arrange campus interviews for the final year students.

➢ Our Campus recruitment program starts by the beginning of the Pre-Final semester.

➢ The On Campus recruitment program keeps continuing till the end of their final semester.

➢ Offer support for our students by arranging Off-Campus Interviews also.

Recruitment Process:

The placement office liaises with the industry and corporate offices which conducts their

recruitment activity with the colleges. A good number of reputed companies have conducted

campus recruitment in our college and many more have expressed their desire to come for

assessment as per their norms.

The T&P Office focuses on:

➢ Functioning as a guide for students with creative ideas which can be transformed into

successful companies.

➢ Providing Mentorship through individuals for students launching their start-ups.

Industry Institute Interaction:

The Training & Placement Office firmly believes in 'Industry Institute Interaction'. In order to

accomplish 'Industry-Institute Interaction' it organizes technical talks and national seminars to

provide a platform for the budding engineers to interact with professionals from various industries.

It encourages visits to the industries by the college students. It arranges for industrial problems to

be worked on by students as part of their projects. It also takes suggestions from members of

industry regarding designing/changing of curriculum. The college is in the process of signing MOUs

with many industrial organizations and industrial chambers.

India’s best corporate are where our Alumni are presently working. Other than this, we are

hopeful of further improving our placement opportunities, activities and avenues in the near future

while working in association with our powerful Alumni.

166

The following workshops towards career guidance have been organized by the T&P Office for

the benefit of the final year and pre-final year’s students.

Sl. No.

Date Name of Career Guidance Activity Resource Person/Organization

1 31/01/2014 Career guidance and placements: orientation program for pre final year students

Placement Office

2 01/06/14 Software project management TCS , Hyderabad

3 07/12/14 Employability skills and technology expectations

Mr. M.S. Subrahmanyam, TCS, Hyderabad

4 07/09/14 employability opportunities for engineering students in armed forces

Placement Office

5 08/05/14 Innovation ,change Management & Leadership

Placement Office

6 17/08/2014 Effective communication and impact on career

Dr V.N.Rao& Dr KSS.Rao, City Counselling, Bangalore

7 27/08/2014 Employability and technology trends Mr. P. Vivek TCS, Hyderabad

8 12/08/14 Higher education and career opportunities in USA and Europe

Prof.Nikhil Gupta, Newyork Universities, USA /Sri A.K.Mitra, Ex Vicepresident, Force motors

9 04/03/16 MD connect with Accenture ArunkumarRanganaini – MD Accenture

10 19/03/16 Accenture Alumni Connect Anija Robert Campus Recruitment Team

11 26/07/16

and 27/07/16

Faculty Development Program to EEE, ECE and CSE Faculty on Technologies

Tata Consultancy Services

12 08/08/2016 and

09/08/2016 Power of Habits and Harnessing Mind Power

Placement Office

13 11/03/2017 and

12/03/2017 Workshop on Sales Force Platform

Placement Office

14 01/04/2017 Workshop to TCS UG Selected Candidates TCS and Placement Office

15 08/08/2017

To 10/08/2017 FDP on TC’s Remote Internships

TCS, Incubation Centre JNTUK and Placement Office

16 18/08/2017 workshop on Entrepreneurship Development

APSSDC, Northeastern University at Boston, EDC&SDC of JNTUK

167

8. Governance, Institutional support and financial resources (75) 8.1. Campus Infrastructure and Facility (5)

8.1.1. Maintenance of academic infrastructure and facilities (2)

(Instruction: Specify distinct feature)

Table 8.1: Academic Infrastructure & Facilities Maintenance details Ambience, Green cover

Infrastructure facility Maintenance Description

Land Built up Area Exclusive

for the Institution

Land : 110 acres

Build-up floor space: Sqm.

Cleanliness is maintained by the outsourced people

Maintained at the institute level

Classrooms Well-furnished class rooms are cleaned by out sourced sweepers

every day

Seminar Halls Seminar hall (equipped with PA systems and LCD) of the department

is maintained by departmental – in charge faculty & Technician at

regular intervals

Tutorial Rooms Tutorial rooms are cleaned every day and maintained by faculty in

charge.

Laboratories A faculty in charge and a laboratory technician looks after the

maintenance of each laboratory. They put together propose the

budget for the required consumables, new equipment, repairs and

calibration if required

Equipment In addition to the centralized department level stock registers (for

Non-consumables and Consumables) technicians maintain the

logbook for equipment of the laboratory. They prepare the preventive

maintenance schedules under the guidance of faculty-in-charge and

carry out regular maintenance as per the schedules.

Computers A programmer/ Technician and a faculty in-charge of each computer

laboratory are responsible for maintenance of systems and software.

Programmer carryout maintenance of each computer at regular

intervals and record in the logbook. Faculty in charge prepares

necessary budget and submit to HOD.

Main Library All the books are accessioned accordingly by the serial number of

accession number and classified subject wise and shelved in the

rack according to call numbers regularly.

Dept. Libraries Faculty members of departments can borrow books from Dept.

Library, and students in their free time can make use of the books

available in the Dept. Library. One Faculty member is made in-

charge of the Dept. Library.

Internet /Intranet Internet related matters are maintained by a team offaculty, systems

administrator and programmers in computer science department.

They maintain the daily band width, usage, band width allocation,

sharing etc.

Electricity Maintenance Engineer, Two technicians and one attendees look after

the maintenance of electricity.

Water A number of bore-wells available to meetrequirements of garden and

toilets. It caters needs of Staff & Students, Buildings etc.

The college is spreadover110.0acres of land surrounded by greenery of the fertile lands. The college evinces interest in

ambience management, Landscaping, environmental preservation including water harvesting without losing the

professional touch.

Maintenance: One supervisor and 12 gardeners maintain the Green cover. Built-up space:

• College Buildings are constructed in the form of different blocks covering an instructional area

168

of21841.36sq.m and administrative area of 1888.20sq.m. • All the Engineering Departments are located in separate & wide blocks. • The campus is surrounded by a compound wall separating the college from the surrounding

environment. All the buildings are well connected by wide internal roads so that the central facilities are accessible to all the members of faculty and students.

Maintenance: DE, AE and supervisors, site engineers and work inspectors take care the Engineering section and

perform repairs and maintenance job.

Following are some of the highlights of the ambience management and landscaping

• Multi-color plantation highlighting the verdure with nominal inscription • Adorning the statue of the benefactor of the college with a bio-necklace. • The towering emeralds on the main road Clasping green at the faculty parking lot Green

carpet on the quadrangle. • Sponsored sports complex having alumni sponsored multi-functional gymnasium, play

courts, sports facilities, running track spanning over 15+ acres • Rows of ‘natural oxygen’ pots all over the college • In order to create eco-friendly atmosphere, lawns are developed and maintained

around different blocks • Underground pipelines interconnect the sprinklers for watering plants, Lawns etc.

Ambience of the work places

• EachandeveryDepartmenthassufficientnumberofclassroomsandlaboratoriesthat are fully ventilated and provided with necessary concealed electrical wiring and electrical items like fans, lights, computer systems with internet connectivity etc.

• Faculty members are provided with separate staff rooms with all the necessary facilities (Like internet facility, intercom)

• Proper maintenance of Classroom infrastructure

Environmental Preservation

Following items present the efforts related to environmental preservation

• With a missionary zeal related to social forestry, around 200 well-grown trees are spread over the entire area of the campus.

• For continuing next-gen greenery, the college is nursing about 1000 plants • Thus, the college administration is keen on the environmental protection

and preservation, and to take up measures to reduce soil erosion and land degradation.

Cleanliness

• Cleanliness is maintained on the campus by disposing all the waste material on a daily basis with the help of sufficient man-power. Waste water is drained out by the well- maintained side canals.

• All the Bio degradable waste such as dry leaves twigs and paper are collected on a daily basis, and made into good compost which again is added to the soil to maintain soil fertility.

• Each block is provided with toilets in each of the floors for boys, girls and faculty separately. All the toilets are cleaned everyday

• Besides the regular cleaning process, the environmental protection in the college is maintained by some activities like plant atoning which the students (Student activity center (SAC)) and also participate as a part of NSS Programs.

169

Canteen Yes

Number of Canteen(s) 02

Area 125 sq. m

Daily Usage More than 200+

Maintenance: One Sergeant with the help of 100 maintenance workers (attendees, weepers, scavengers etc.)

performs the maintenance job.

Water Harvesting

• In order to facilitate the water harvesting, the college has taken a few measures like absorption pit method and percolation pit method.

• There is enough open space and mud paths to harvest the rain waters • There is enough extent of plantation to reduce evaporative loss and soil

erosion.

8.1.2 Hostel (boys and girls), transportation facility, and canteen(1)

• College is having four boys’ hostels and three girl hostels’ (viz., Nalanda, Narendra, Nagarjuna, Nagavali hostels etc.,) having 172 rooms for boys and 144 rooms for girls.

• A total of 1350 students are staying in hostels (700 boys and 648 girls students) Table 8.2: Hostel Details

Hostels No of Rooms No of students Accommodated

Hostel for Boys 220 700

Hostel for Girls 208 648

Transport

JNTUCEK (A) is located in the heart of the city and easily accessible. Maximum percentage of students will stay in

hostels and day scholars others will utilize the public transportation system.

Canteen facility is available for students, faculty and staff on subsidized rates in the campus.

Table8.3: Canteen Details

8.1.3 Electricity, power backup ,telecom facility, drinking water, and security(2)

(Instruction: Specify the details of installed capacity, quality, availability, etc.)

A. Electricity and Power back-up:

One of the regular teaching faculties of the EEE department will act as the Project Engineer and supported by

one AE and supervisors/electricians staff. The college has wide spread arrangements for power connections with

a substation (maintained by APEPDCL), control panel and decentralized power panels. Panels and Distributions

boxes are available at Individual Departments. Generator backup is available, as shown in the table. The campus

is partly (>70%) having underground cabling system.

S.No Department Generator capacity

1 Principal Office 63 kva

2 Guest House 63 kva

3 Civil/HSS Dept. 63 kva

4 CSE/ECE 63 kva

5 EEE/Library/ME 140 kva

6 Ladies Hostel 40kva

7 Alumni Auditorium/placement office 63 kva

170

8 Sports Complex 140kva

9 Hostels

Tenders are floated for procuring 120kva

generator for hostels

10 PC/PCE

Tenders are floated for procuring 120kva

generator

B. Telecom facility:

• The college has created facilities for smooth and fast communication involving different kinds of phone connections in tune with the requirements

• Landline telephones are available in the Chambers of the Principal, Vice-Principal, and Steno to the principal, office of the Principal, Training and Placement Cell and in Autonomous (confidential) section.

• Intercom facility is extended to the functionaries in the Office of the principal, chambers of Heads of Departments, Department Offices, select laboratories, Main entrance and other importance units of the college.

The college has the following kinds of telephone connections

Landline connections with STD facility (BSNL) 59

FAX 1

Mobile Phones 25

Intercom Phone connections 51

C. Drinking water

The college has two (2000lph and 3000lph) capacity water purifying units with Reverse Osmosis

process. It supplies purified water to college, hostels and other places (as shown in the table).

S.No Supply Bodies No of (20lit) cans

1 Hostels 90

2 Staff Quarters 60

3 College 20

4 Departments 40

5 General 40

Equipment available with the plant

S.No Name of the Equipment Cost of the item

1. Reverse Osmosis Water Plant (2000lph) 8.00 Lakhs

2 Reverse Osmosis Water Plant (3000lph) (for hostels) 9.00 Lakhs

Table 8.5: Water Plant Equipment details

D. Security Measures of the college:

Infrastructural:

• All the buildings are constructed taking proper care with the required iron gates and windows.

• All the buildings have two or more entrances/ exits which are managed based on the need.

• All the classrooms, laboratories, offices, libraries and all the places of work are properly locked without prejudice to the balance of secrecy and transparency.

Human Resource oriented:

• The college has a three-tier security system supported by specialized security personnel (served through an authorized man power agency) with 27 security

171

persons. • In-house mechanism- there are3 watchmen for principal office and 10Watchmen

(one for each department during night shifts) who work on three shifts • The college hired the services of a reputable security agency in Kakinada through

which 27 Security personnel work in the college. • The annual financial commitment on the college is about Rs.21 lakhs (app) for both

the items put together.

8.2. Organization, Governance, and Transparency (10) 8.2.1. Governing body, administrative setup, and functions of various bodies (2)

(Instruction: List the governing, senate, and all other academic and administrative bodies; their memberships,

functions, and responsibilities; frequency of the meetings; and attendance therein, in a tabular form. A

few sample minutes of the meetings and action taken reports should be annexed.)

Organization and Governance

To enhance the good governance the college has a well-marked administrative setup conforming to the norms of

the AICTE and the UGC.

Figure 8.1: Internal Organization Structure

The following statutory committees are functioning in the college to look after the

administrative and academic procedures as per the norms stipulated by the University Grants

Commission.

.

Statutory

Committees

Number of

Members

Functions & Responsibilities Frequency of

Meetings Attendance

2016

Meetings

Governing

Council

10 Academic,

Administrative &approvals

related to faculty, staff

&students.

Four times in a

year

80%

Academic 22 Scrutinizing and Approval Once in a 95%

172

Council

Proposals with or without

modifications of BOS with

regard to Academic Regulations,

Curriculum, Syllabus etc.,

year

Board of

Studies

HOD, All Faculty

of the department

& Five outside

experts from CFIs

(IITs/NITs)

Industry.

Preparation of Academic

Regulations, Curricula, Syllabi

etc.,

Once in a

year 95%

Governing Council: The Governing Council (BoG) of UCEK is constituted by the JNTUK,

Kakinada, as per the UGC’s norms. University is the deciding authority and Principal is the

Member Secretary with twelve members, including UGC nominee, University nominee, State

govt. nominee, eminent people from different industries and members invited by the

Principal from senior faculties of the College. The Council usually meets four times a year to

discuss various policy matters. The main objective is to ensure that the students and the staff

have trust and confidence in the good governance of the College. It is also to see that all

those involved in the governance fulfill their responsibilities and accountabilities effectively.

Sri. M. T. Krishna Babu I.A.S., Chairman of Visakhapatnam Port Trust (formerly Prof. M. R.

Madhav (Retd., IIT Kanpur) is presently the Chairman of the Governing Council. All the

minutes of the governing council meetings are uploaded in UCEK website

(http://jntucek.ac.in/teqip.php).

College Academic Committee: The College Academic Committee (CAC) is the apex body of

academics and essentially responsible for the framing, regulating, organizing and sustaining

the standards of teaching, research, and examination of the College. CAC consists of

University nominees, eminent people from industries, Heads of the Departments, Senior

Professors of respective departments, nominated teachers and so on. Principal is the

Chairman of the CAC. The Committee reviews all academic matters and the related

administrative issues, too.

The Principal/Head of the Institution: JNTUCEK is headed by the Principal and mainly

concentrates on academic (with the help of vice-principal) and administrative activities. He is

the strategic figure, accountable to the Governing Council. He is held answerable to the

University in matters of administration. He is the reviewing authority of the functioning of

the various academic departments, teaching and non-teaching. Above all, the Principal is the

custodian of the College’s discipline among the students, monitor of the research, convener

173

of various programmes held in the College and so on. Besides, the Principal implements

TEQIP Programme, by directing its components viz., Finance, the Academic, the Procurement

and Mentoring Committees. In particular his duties and responsibilities lie in:

a. Planning policy matters concerning administration as well as academics

b. Managing the College as per the norms of the University in particular and the UGC in

general

c. Overseeing the fair conducting of examinations, semester wise, and timely declaration of

the results on completion of evaluation with promotion of successful students

d. Ensuring the management of financial resources and maintenance of proper accounting

as per the University norms.

e. Co-coordinating the industry-institute interaction along with Research and Development

activities

f. Maintain the quality management system

g. Participating in the regional and national level policy planning meetings.

h. Every Funded project has a coordinator who is totally responsible along with his or her

team for the project. Principal wields the financial power.

i. On the whole, the members of faculty and non-teaching staff of the college believe in the

dignity of labor, and all the functions of the college are meticulously planned, properly

coordinated and perfectly executed.

j. All the monetary transactions (both the receipts and payments) are processed

through a Nationalized bank.

Vice-Principal: The Vice-Principal plays multiple and responsible roles. His chief responsibility is to officiate as the Principal in the latter’s absence. Among several responsibilities, the following are the most significant: Academic Responsibilities:

• Assist the Principal in finalization of prospectus, syllabi, academic calendar, registration,

examination and classroom arrangement for proper teaching.

• Responsible for conducting the mid semester, end semester or any other component of

examinations and assisted by two Officers In-charge of Exams (OIEs) for this purpose.

• Responsible for maintenance of up-to-date academic records of students.

• Assist the Principal in the organization of academic committee meetings and all matters

related with it.

• Assist and provide any necessary liaison with other academic organizations.

• Assist the Principal for issue of certificates and other student related activities.

• Help the Principal in the formulation of new courses, in finalizing the Registration of

Students, in conducting the Academic Council Meeting etc.

• Preside over the curricular and co-curricular activities cell or wings.

Administrative Responsibilities:

174

• Assist the Principal in preparing the institutional planning, in deciding the academic

calendars, in fixing the work schedules, in deciding upon the examination and evaluation

of each course and so on.

• Associates with the Principal in recruiting and training of the various faculties.

• Collaborates with the Principal in supervising the financial matters such as scholarships

for the students of reserved categories, grants-in-aid for developmental activities from

government and non-government agencies, maintaining proper accounts and records

and so on.

• Assist the Principal in attending to the grievances of both the staff and the students.

• Plays the role of the liaison officer between the parents and the institution, between the

Principal and the staff and between the teaching staff and students.

Heads of the Department: The Head of Department is usually the senior Professor the department. Provides

leadership in both under graduate (B. Tech) and post graduate (M. Tech) courses in the relevant field of

specialization.

• Heads of the Department are responsible for the academic and administrative

management of the department.

• They take active part in research guidance and teaching-learning processes; they guide

the assistant and associate professors and approve their teaching plans.

• Participates in not only the curriculum designing, but also developing new programmes

and projects

• They play vital roles in policy planning, monitoring the evaluation and promotional

activities at both the individual departmental and institutional levels.

• Besides catering to the needs of students by means of counseling and interaction at the

department, they also hold interactions with industry and society.

• They provide consultancy services not only to the students but also to the industrial

clientele.

• The faculty and students are involved in several activities in addition to academic

assignments. The sense of involvement makes them develop a sense of belonging for the

institution.

In addition to the committees or bodies presented above, the college has the following

Non-statutory committee

1. Examinations committee

2. Grievance appeal committee

3. Student affairs and welfare committee

4. Academic audit committee

5. College Development Planning and Evaluation committee

6. Co-curricular & Extra-curricular activities committee

7. Games and sports committee

8. Counseling Coordination Committee(Anti Raging Committee)

175

9. Academic Results Monitoring committee (College Academic Committee)

10. Purchase committees

The said committees have been functioning in the college in order to facilitate the successful functioning of autonomy. Each of the committees has been conducting its meetings the minutes of which have been ratified in the governing body meetings from time to time.

The Disciplinary committees have been constituted on a dynamic basis both for academic

and for general discipline. Principal constitutes the committees whenever the situation demands.

In addition to the above, Anti Ragging Committees are formed with staff of the college with specific

schedules and locations (department premises, hostel premises, canteen and library premises and overall college

premises) in the college especially during the initial months of academic session for the I year students of B.Tech and

other programmes.

Implementation of TEQIP:

UCEK (A) has participated in TEQIP-I, TEQIP-II, and currently participating in TEQIP-III.

JNTUCEK got TEQIP-III under subcomponent 1.3 (Twinning arrangements for participating institutions and

ATUs) as a Mentor institute and mentee institute is College of Engineering and Technology, Bhubaneswar.

8.2.2. Defined rules, procedures, recruitment, and promotional policies, etc. (2) (Instruction: List the published rules,

policies, and procedures; year of publications; and state the extent of awareness among the employees/students. Also

comment on its availability on Internet, etc.) As the college is the government college follows norms recommended by the UGC/AICTE and state govt.

norms (e.g., G.O.Ms.No.14), and also faculty recruitments and CAS promotions are taken care by the

University with the necessary permissions from the Governor/MDC/EC under the supervision of governor’s

and UGC nominee.

• Recruitment of faculty and staff for regular appointment is done by the JNTUK staff selection committee headed by the Vice chancellor

• All the newly recruited staff is made awareof these rules through orientation programmes. These are also made available on the college website.

8.2.3. Decentralization in working including delegation of financial power and grievance redress system (3)

(Instruction: List the names of the faculty members who areAdministrators/decision m a k e r s for various

responsibilities. Specify the mechanism and composition of grievance redresses system, including faculty

association, staff-union, if any.)

• As the college is the constituent college of JNTUK, follows the University norms.

• The principal is given the power to spend Rs.1,00,000/- (for procuring non-consumables) and Rs. 25,000/- for procuring consumables/maintenance

• Heads of departments are permitted to spend Rs. 5,000/-. The account is periodically reviewed by the principal.

• Based on the grievance, Grievance redresser committees are constituted to address the grievances.

• Principal constitutes separate committees based on the requirements. Based on the recommendations of the individual committees Principal takes action.

Administrators/ Decision makers:

- Head of the Institution : Principal

- Heads of Academic sections : Vice Principal

176

The following members of faculty have been assigned with administrative responsibilities.

Table 8.6: List of faulty with administrative responsibilities

S.No Name of the member of

faculty Designation

Additional / Administrative

responsibilities

Civil Engineering Dept

1 Dr.GVR.

Prasada Raju Professor of CE Principal, JNTUCEK

2 Dr. K. Ramu Professor of CE Head, Civil Engineering

3 Dr. V. Ravindra Professor of CE Chief Engineer, JNTUK

EEE Dept

4 Dr. V.V.N. Murthy Professor Head, EEE Dept.

5 Sri. M. Ravindra Babu Asst., Professor Project Engineer & NSS Program

Officer, UCEK

ME Dept.,

8 Dr. B. Balakishna Professor of ME Vice Principal (Academics)

9 Sri. M. Kumara swamy Assoc., Professor Head, Mechanical Engineering

10 Dr. K. Meera Saheb Professor ME Head, PE & PCE Dept.,

12 Sri. K. Krishna Bhaskar Asst., Professor Officer in-charge of Examinations

13 Dr D Linga Raju Asst., Professor Associate NCC Officer

14 Sri. V. Jaya Prasad Asst., Professor Deputy Warden

15 Sri. K. Prasad Asst., Professor Deputy Warden

ECE Dept.,

16 Dr. A. M. Prasad Professor of ECE Vice Principal (Administration)

17 Dr K. Padma Priya Professor of ECE Head, ECE

18 Dr. B. Leela Kumari Asst., Professor Officer In-charge of Examinations

19 Smt. A. Rajani Asst., Professor Officer In-charge of Examinations

20 Dr. R. Madhu Asst., Professor Officer, In-charge of Hostels

21 Sri. K. Rajasekhar Asst., Professor Deputy Warden

22 Smt. K. Ramadevi Asst., Professor Deputy Warden

177

23 Smt. P. Pushpa Latha Asst., Professor Deputy Warden

Dept., of CSE

24 Dr A. Krishna Mohan Professor of CSE Head, CSE Dept.,

Coordinator, RGYK Project and Cultural

25 Dr L. Sumalatha Professor of CSE Coordinator, APSSDC

26 Dr. M.H.M. Krishna Prasad Professor of CSE Coordinator, TEQIP-III

27 Sri. S. Chandra Sekhar Asst., Professor Training & Placement officer

28 Smt. E. Suneetha Asst., Professor Deputy Warden

29 Smt A. Karuna Asst., Professor Coordinator, JNTUCEK Website

Mathematics Dept.,

30 Dr. V. Ravindranath Professor Head, Dept. of Mathematics

31 Dr G.V.S.R. Deekshitulu Professor Coordinator, Helpline Center

Physics Dept.,

31 Dr. G. Padmaja Rani Professor

Head, Dept., of Physics

Chemistry Dept.,

33 Dr. S. Satya Veni Assistant Professor

HOD, Dept., of Chemistry

Grievance Redressal Committee

The Grievance redressal committee is intended to undertake the processes of attending to

the grievances put forward by the students and staff. It focuses on setting proper facilitation

procedures for settling the issues in a cordial atmosphere. The committee is expected to initiate

proper or appropriate enquiry or investigative mechanism within 24hours from the receipt of the

complaint in written form duly signed by complainant(s). The committee is expected to

meticulously adhere to the standard arbitration procedures of the college and those of AP

education act 1982, A prohibition of ragging act 1997, AP service rules corrected up to 01-04-

2008, Industrial disputes act 1947(Section-9C Chapter IIB), the administrative tribunal act1985,

negotiable instruments act 1881, Societies registration act 1860 and all other such enactments of

the Government of Andhra Pradesh and Government of India from time to time.

Scope of the operations:

The committee shall take into consideration all the redresses criteria and rules and

regulations of the college, University and government of Andhra Pradesh both in admitting the

complaint and in conducting the enquiry. The committee is expected to commence its

operations by constituting a special committee in case of need.

The observations, findings, suggestions and recommendations are merely

recommendatory in nature and do not carry any legal binding for the college to follow or

implement. The committee is expected to submit the minutes of its meetings along with

observations, suggestions, if any, and resolutions to the respective statutory committees for

178

further processing the same at the deliberations. The chairman and the members of the

committee shall undertake all the operations in coordination with the Heads of the

departments and administrative office.

Composition of the committee:

• A senior member of the faculty is appointed as Chairman/Chairperson by the Principal

• Members are the faculty are nominated by the Principal

• The chairman is expected to undertake all prime duties of the committee, namely convening the meetings, recording minutes, recording special observations and suggestions, if any, processing the data and obtaining ratification of the minutes, resolutions, observations, taking necessary steps for tabling the said documents for ratification by the statutory bodies etc.

Basic functions of the committee:

The following items fall under the purview of the committee. The committee is expected to

extend its co-operation to the members of faculty and staff appointed or drafted for specific

tasks from time to time like other members of faculty including heads of departments or non-

teaching staff appointed or drafted by the Principal for taking up a special enquiry related to

any complaint, controller of examinations and other personnel drafted by the principal in case

of an examination oriented grievance etc. The activities are classified in two categories

planning, monitoring & execution.

Planning Activity:

• Preparing the grievance redresses procedures from time to time and notifying the tenets to the staff and students.

• Studying and compiling the relevant enactments of the Government of AP and Government of India.

Monitoring and Execution

• Receiving appeals from the students and staff.

• Identifying the gravity of the appeal.

• Ascertaining the legal implications of the appeal.

• Ascertaining whether it falls under the purview of a non-statutory committee or not.

• Classification of appeals into academic, administrative and discipline-oriented.

• Constitution of a separate committee in case of need.

• Ascertaining the provisions of the committee.

• The committee may meet within 24 hours from the time of commencement of its operation and decide over the course of enquiry.

• Ascertaining the individuals to be involved in the enquiry.

• Categorizing the individuals enquired - Prime accused, second accused, connivers, Witnesses etc. based on the item if it is related to an act of indiscipline.

• Recording the depositions with time and date.

• Submission of the report after deliberations among the members of the committee

• Based on the report, the action taken can be finalized. The disciplinary action is finalized since the item falls under the jurisdiction of the Principal except in such circumstances which warrant the intervention of the statutory bodies namely Governing Body, Finance committee, Academic council, boards of studies and ultimately the University administration.

• In case of an academic appeal, constituting a house-committee and subsequently the

179

committee with experts from other institutions, and finally referring the reports of the committee to the academic council

• If it is an administrative appeal, an in-house committee has to be constituted the report of which shall be sent to the university administration for further action.

Meeting Schedule and Process of convening a meeting:

The chairman is expected to issue a circular with the schedule and agenda one week in advance. However the

chairman reserves the right to conduct any emergency session under certain circumstances that can be deemed to be an

emergency situation. If it is not possible for the chairman to convene a meeting because of any academic or

administrative reasons, one of the senior members of the committee can take up the responsibility of convening the

meeting with the prior approval of the Principal. Tentative schedule of the meetings during an academic year has to be

drawn by the chairman.

Quorum and other standard tenets:

• An Attendance of 2/3rd of the committee is considered as the quorum for any of the meetings.

• The committee may prepare a draft plan for items presented supra for further processing by the relevant bodies.

• If any member comes up with an innovative proposal, he/she may be advised to prepare a full-stretch document of the project put forward with projected financial commitment with relevant documents failing which such open suggestions can deferred to the next meeting by requesting the members to be more focused in their approach.

• The deliberations are strictly confidential and shall be confined to in-house circulation, and if any member is found leaking the information to external agencies, the matter shall be reported for correctional administration.

8.2.4. Transparency and availability of correct/ unambiguous information (3) (Instruction: Availability and

dissemination of information through the Internet. Information provisioning in accordance with Right to

Information Act, 2005).

Transparency:

In order to ensure transparency, the college takes the following measures.

Academic and Administrative Transparency:

• All internal Professors of the department concern together with external members from reputed academic institutes and industries are the members of the Board of studies headed by HOD.

• All the issues are discussed in the meetings of the Heads of Departments, which are held periodically the minutes of which are circulated to all the departments.

• The decisions taken and the issues discussed in meetings of the Heads of Departments are informed to the faculty in the department level meetings

• Every important information is published in the college website (www.jntucek.ac.in)

• All the decisions taken by the Statutory bodies pertaining to particular items are informed to all the staff/faculty

• All the important pieces of information are sent to the faculty, staff and students

• There are Notice Boards in all the Blocks through which information is made available to the staff and students and circulars related to students are sent to the class rooms/laboratories.

• Academic calendars, examinations schedules, results and all the important items are placed on the College website

• The Mandatory Disclosure is presented on the website including the academic regulations and syllabus.

• All the information about the college is made crystal clear through the college web-

180

site.

• Every parent can get information about his/her ward’s attendance and performance through internet.

• The college has arranged web mail facility to the entire faculty with individual Ids for faster and more accurate information.

8.3. Budget Allocation, Utilization, and Public Accounting (10)

Summary of current financial year’s budget and the actual expenditures incurred (exclusively for the institution) for

three previous financial years.

Table 8.7: Budget Report

F.Y

Bu

dg

eted

in

CF

Y

20

16-1

7

Act

ua

l E

xp

ense

s

in C

FY

20

16-1

7

Bu

dg

eted

in

CF

Ym

1

20

15-1

6

Act

ua

l E

xp

ense

s

in

CF

Ym

1

20

15

-

16

Bu

dg

eted

in

CF

Ym

2

20

14-1

5

Act

ua

l E

xp

ense

s

in

CF

Ym

2

20

14

-

15

Items

Infrastructural

Built up 4300000 4369721 18000000 18066600 40000000 42939589

Library 210000 208627 3000000 2989324 2100000 2101737

Laboratory

Equipment 6000000 5909333 13250000 13261763 12500000 12927701

Laboratory

Equipment (with

TEQIP-II)

2800000 27724754 7500000 7522673 6000000 6089659

Laboratory

Consumables 100000 97852 90000 85384 150000 166195

Teaching & Non-

Teaching Salaries 197000000 197660660 184900000 184910692 172000000 171939037

TEQIP-II Salaries 1100000 1081880 859200 859200 859200 849772

R&D (with

TEQIP-II) 2300000 2261790 650000 638484 175000 174706

Training and

Travel 80000 80570 250000 245151 250000 246124

Training and

Travel (with

TEQIP-II)

7200000 7174059 3500000 3149254 4000000 3921918

Total 221090000 246569246 231999200 231728525 238034200 241356438

8.3.1. Adequacy of budget allocation (4)

(Instruction: Here the institution needs to justify that the budget allocated over the years was

adequate.)

University timely provides the financial support for meeting the requirements of students and faculty, e.g., recently

University has issued Laptops for Professors and Associate Professors to enhance the research activity and usage of e-

content.

The yearly budget is prepared according to the needs and requirements of the departments taking into consideration

of annual intake of students, laboratory & infrastructure developments and also including students, faculty & staff

requirements and promotions and latest technologies etc.

In general, proposal along with estimates will be prepared by each department and reviewed in HODs meeting

along with the Principal and submitted to the concern authority, e.g., Registrar/University.

After deliberations formal proposal made altered in departments and forwarded to Principal for preparing

updated/consolidated proposal at college level and submitted to the University.

8.3.2. Utilization of allocated funds (5)

181

(Instruction: Here the institution needs to state how the budget was utilized during the last three

years.)

Table 8.8: Fund Utilization report

Utilization of allocated funds 2016-17 2015-16 2014-15 2013-14

101.17% 98.62% 103.08% 88.19%

8.3.3. Availability of the audited statements on institute’s Website (1)

(Instruction: Here the institution needs to state whether the audited statements are available on its

Website.)

2014–15 NO Yes URL:http://jntucek.ac.in/office.php

2015–16 NO Yes URL:http://jntucek.ac.in/office.php

2016–17 NO Yes Auditing is over, need to get the statements.

Table 8.9: Details of Audited Statements

8.4. Program Specific Budget Allocation, Utilization (10)

Summary of budget for the CFY and the actual expenditures incurred in the CFYm1and

CFYm2 (exclusively for this program in the department):

Table 8.10: Program Budget Details

Items

Bu

dg

eted

in

CF

Y

20

16-1

7

Act

ual

Ex

pen

ses

in C

FY

20

16-1

7

Bu

dg

eted

in

CF

Y m

1

20

15-1

6

Act

ual

Ex

pen

ses

in C

FY

m1

20

15

-16

Bu

dg

eted

in

CF

Ym

2

20

14-1

5

Act

ual

Ex

pen

ses

in

CF

Ym

2

2

014

-15

Bu

dg

eted

in

CF

Ym

3

20

13-1

4

Act

ual

Ex

pen

ses

in

CF

Ym

3

2

01

3-1

4

Lab Equipment 180000 177265 450000 436368 90000 87780 75000 84982

Lab Equipment

(with TEQIP-II) 75000 78750 21000 21256 165000 171479 1800000 1828577

Software (with

TEQIP-II) 210000 210000 --- --- 67500 72978 900000 907163

Lab consumables --- --- 45000 41304 60000 62745 60000 57630

Training & Travel

(with TEQIP-II) 330000 338317 240000 246649 270000 282117 255000 258703

Misc. expenses for

academic activities --- --- --- --- --- --- 18000 18000

Total 795000 804332 756000 745577 652500 677099 3108000 3155055

8.4.1. Adequacy of budget allocation (3)

(Instruction: Here the institution needs to justify that the budget allocated over the years was

adequate.)

The budget is progressively increased to meet the new facilities for equipment, replacement of

outdated equipment and new labs due to revision in syllabi.

182

8.4.2 Budget allocation for Research facilities (4)

(Instruction: Articulate the provisions in the budget to carry out the research by post graduate students)

Provided stipend of Rs.8000/- per month for Students who got admission in PG Program through

PGECET (State wide Entrance Test) under TQIP-II

Students were supported financially to publish papers, to attend conferences and workshops and to

buy supporting hardware to carry out the Projects under TEQIP-II.

No specific budget allocated but as and when it is requested by the students amount will be sanctioned

under TEQIP-II.

Under TEQIP-II Advanced Computing Laboratory with GPU cards established in the department for

UG and PG students

8.4.3. Utilization of allocated funds (3) (Instruction: Here the institution needs to state how the budget was utilized during the last three

years.)

Table8.11: Fund Utilizations report

8.

5.

Li

brary (25)

8.5.1. Library space and ambience, timings and usage, availability of a qualified librarian and other

staff, library automation, online access, networking, etc. (5)

(Instruction: Provide information on the following items)

Carpet area of library (in m2) Reading space (in m2) Number of seats in reading space Number of users

(issue book) per day Number of users (reading space) per day Timings: During working day, weekend, and

vacation Number of library staff

Number of library staff with degree in Library Management Computerization for search,

indexing, issue/return records bar coding used Library services on Internet/Intranet INDEST or

other similar membership

Archives

Table 8.12: Details of Library

Carpet area of library (in sq. meters) 120

Reading space (in sq. meters) 95

Number of seats in reading space 100

Number of users (issue book) per day 250

Number of users (reading space) per day 100

Timings: During working day 8.00 AM 8.00 PM

Weekend 9.00 AM 4.00 PM

Vacation 9.00 AM 4.00 PM

Number of library staff 9

Number of library staff with degree in Library 3

Year Budgeted Expenses Utilization of

funds

Budgeted in CFY (2016-

2017) 795000 804332 100%

Budgeted in CFY (2015-

2016) 756000 745577 98.62%

Budgeted in CFY (2014-

2015) 652500 677099 100%

Budgeted in CFY1 (2013-

2014) 3033000 3155055 100%

183

Management Computerization for search, indexing, issue/return records

Bar coding used YES

Ambience: The library has good ventilation with both sides’ windows and to provide sufficient ventilation on

the top required number of lights and fans are fitted. We are maintaining SC, ST Book Bank Scheme separately

and separate technical Section is available for classification and cataloguing. We have Separate Digital Library

fore-resources. The books are arranged according to subject classification and arranged in the library in

systematic manner. We have a separate Newspaper section. We are conduction user orientation programme for

fresh students every year. Separate reference sections for textbooks are also available in the library.

Library services on Internet/Intranet INDEST or other similar membership Archives: YES;

8.5.2. Titles and volumes per title (4)

Number of titles 2525 Number of volumes 2705

Table 8.13: Details of Titles and Volumes in Library

A.Y Number of New

Titles Added

Number of New Editions

Added

Number of New Volumes

Added

2013-14 203 203 473

2014-15 90 65 155

2015-16 205 55 352

8.5.3. Scholarly journal subscription specific to the programme (8) Table 8.14: Scholarly journal subscription details

Details CAY CAYm1 CAYm2 CAYm3

2016-17 2015-16 2014-15 2013-14

Science

As soft

copy 103 103 103 103

As hard

copy -- -- -- --

Engg and

Tech

As soft

copy 150 140 135 200

As hard

copy 45 -- -- --

8.5.4. Digital Library (3)

Availability of digital library contents:

If available, then mention number of courses, number of books, etc. Availability of an exclusive server:

Availability over Intranet/Internet: Availability of exclusive space/room: Number of users per day:

Digital Library (3)

Table 8.15: Digital Library Details

Availability of digital library contents: YES

If available, then mention number of courses, 5100

Number of e-books, etc. 1181

Availability of an exclusive server: YES

Availability over Intranet/Internet: YES

Availability of exclusive space/room: YES

Number of users per day: 250

1.5.5. Library expenditure on books, magazines/journals, and miscellaneous contents (5)

Year

Expenditure (in Rs.)

Comments,

if any Book

Magazines/journals

(for hard copy

subscription)

Magazines/journals

(for soft copy

subscription)

Misc.

Contents. Rs

2013 - 14 1636966 NIL 784742 NIL Available in

Central Library

184

2014 - 15 356611 NIL 1399827 NIL Available in

Central Library

2015 - 16 318982 NIL 1651975 NIL Available in

Central library

2016-17 173228 535750 2319290 NIL

Books are

Available in

Dept library

8.6 Incubation facility (5)

(Instruction: Specify the details of incubation facility in terms of capacity, utilization terms and conditions, usage

by students

Innovative Research Center (IRC) established with all centralized research facilities, to support students and

inculcate industry oriented and innovative research on 24X7 bases in the college campus.

8.6. Internet (5)

(Instruction: The institute may report the availability of Internet In the campus and its quality ofservice.

Table 8.17: Internet Facility Details

Name of the Internet provider BSNL, Railtel

Available bandwidth 20 mbps (1:1) and 15mbps shared

Access speed Very Good

Availability in an exclusive lab for Internet use? Yes

Availability in most computing labs? Yes

Availability in departments and other units? Yes

Availability in faculty rooms? Yes

Institute’s own Email facility to faculty/students Yes

Security/privacy to e-mail/Internet users:

Yes- The college has an IT policy which provides

guidelines for usage of IT infrastructure and

addresses security & privacy issues of users.

8.7. Safety Norms and Checks (5)

8.7.1. Checks for wiring and electrical installations for leakage and earthlings (1)

As the some of the buildings are constructed six decades back, they are having metal conduit wiring. They are

replaced by PVC conduit concealed/surface wiring in almost all major places due to ageing and deteriorated

conditions. However all the newly constructed buildings PVC conduit concealed wiring is only preferred. The

wiring for lighting equipment and power equipment has been segmented and the protective distribution boards

are provided. The distribution boxes contain Isolators, MCB’s and ELCB’s for proper protection of short

circuits and earth leakage. These are provided in sufficient number in every floor of the multi stair building and

laboratories along with proper earthen. The sufficient numbers of earth pits are also provided for various

buildings and laboratories to protect equipment’s. Separate earth pits are erected for lighting equipment, power

equipment and laboratory equipment in every department.

The electrical maintenance section verifies various electrical installations, electric wiring and the status &

working conditions of the protective equipment’s. The staff of this section was repaired/replaced failed

electrical gadgets as and when required. They will maintain curing, rusting, junk clearance at joints, replacing

metallic links and etc at each earth pits. They will assure continuity test for proper earth connection.

In laboratories fire extinguishers are provided for emergency clearing of any electrical fire accidents.

8.7.2. Safety of civil structure (1)

The University has a separate directorate (Infrastructure Development), headed by a Professor of CE as

the Chief Engineer, and takes all precautions including soil and material testing, load testing, seismic

185

analysis etc., before constructing a building. The following measures get meticulously executed before,

during and after construction.

Processes of Construction

• University is having full-time engineers to support work on the construction.

• The plans are developed and taken care directorate.

• The site is inspected and necessary fortification gets done.

• The soil testing, environmental precautions will take care by the department.

• Necessary approvals are obtained by relevant government bodies

• All the norms laid down by the law-enforcing authorities are adhered to.

• Stability tests are carried out on in-house facilities.

Safety management of civil structures

• The college accords prime importance to safety of the constructions.

• The flooring is monitored on a periodic basis and whenever there is need it is

repaired.

• The ceiling is monitored and care is taken in order to see that there would not be

rashes.

• Window frames are checked and painted whenever there is a need.

• Buildings are white washed on a periodic basis.

• Doors are protected from white ants and painted on a periodic basis.

• Roofs of the buildings are maintained and steps are taken to prevent seepage.

• Proper drainage system is provided to prevent water logging.

• The Department of Civil Engineering maintains all these activities.

8.7.3. Handling of hazardous chemicals and such other activities (2) (Instruction: The institution may

provide evidences that it is taking enough measures for the safety of the civil structures, fire, electrical

installations, wiring, and safety of handling and disposal of hazardous substances. Moreover, the

institution needs to show the effectiveness of the measures that it has developed to accomplish these

tasks.)

The college takes all the care regarding the chemicals or other materials which may turnout be hazardous in

nature

• One of the places where chemicals are largely used is the Chemistry Laboratory. The

chemicals are given in diluted form to the students at the time of experiments

• In addition to diluting the chemicals teachers and supporting staff warn about the

possible dangers of mishandling or careless handling of those chemicals.

• Exhaust fans and fuming cupboard are arranged in the chemistry Laboratory in order

to remove gasses and odorous chemicals from the Laboratory.

• In the Physics laboratory also, specific care is taken in order not get the students and

staff exposed to the LAZER beamer.

The following care is taken in work shop and in other labs

• Students are required to wear uniform/apron and shoes in order to protect them

from welding spark heat etc. Also, they will use black glass shield to protect their eyes

from ultraviolet rays liberated in the arc welding sparks.

• All the welding cables are properly insulated in order to avoid electric shock to the

186

students and insulation tape is widely fixed around cuts to the electrical wires, if any.

• All the tools have been periodically sharpened to have proper cutting at moderate

effort and the clamping of the work pieces has been done properly.

• Mains are switched off when electrical connections are in progress. Fuse wire is

provided in the circuit in order to eliminate burning of entire circuit, in the case of

over loads.

• Since scissors and G.I.Sheet, chisels have sharp edges; students are given instructions

that they should handle them properly in order to avoid cuts.

• All the rotating Hattie machines, milling machines, drilling machines are covered with

proper guards to avoid accidents when the operator is dealing with the change of belt

on the pulleys, etc.

• Petrol, Diesel and lubricants are kept in proper tins by sealing them with caps.

• Match sticks are not allowed to light in fuel lab to avoid explosion and fire accidents.

• Students are instructed to maintain minimum one meter distance from rotating

members like fly wheels, fans, pulleys of the I.C. Engines’.

• Exhaust manifold and silencer pipe are insulated properly to avoid injuries to the

students and staff.

• Exhaust gasses are left far away to avoid air pollution in the lab.

• Students have to wear hand glouse, masks for nose etc. While working with the

chemicals and proper ventilation is provided for the composite Laboratory.

• Freon gas leakage is arrested by using proper seals at the pipe joints and guards&

meshes are provided for safety.

8.8. Counseling and Emergency Medical Care and First-aid (5)

Availability of counseling facility Arrangement for emergency medical care Availability of first-aid unit

(Instruction: The institution needs to report the availability of the facilities discussed here.)

Availability of counseling facility:

The college has a multi layered Counseling mechanism.

General Counseling and Mentorship:

With the help of University, college has appointed two counselors (one for boys hostel and one for girls

hostel) to perform group counseling as well as individual counseling.

Behavioral Counseling:

The college invites experts in the field and arranges Lectures and orientation programmes to offer

training in several aspects related to organize and fruitful human behavior.

Qualifications of Counselors and Mechanisms Adopted:

• The members of faculty of the college who are Post graduates and above Guest

counselors are eminent or recognized trainers.

• General counseling goes on a regular basis and whenever there is any need a special

counseling is conducted. Records are maintained by the respective teacher counselors.

• Professional Ethics course for students: Since thought structuring is a core principle in

personality development, a course on Professional Ethics has been made mandatory

for all the students

• Life skills, Soft skills and up bringing one’s life: For this the courses in communication

skills have specifically been designed in order that the students acquire a thorough

187

understanding regarding the patterns of social and professional behaviors

Arrangement for emergency medical care

• The College has a hospital with Govt. medical officer, three nurses and other staff.

• Govt. medical officer is under deputation from Dist. Medical and Health Dept.

• As per OP register, on an average 7300 persons (staff/students) utilize the hospital.

• In general, at least 20 members (student/staff) per day and 650 members

(student/staff) per month utilize the hospital

• There is an availability of first Aid kit in the hospital

• Monthly expenditure of the hospital is Rs. 80,000/- to Rs. 90,000/- (drugs including

blankets and towels)

• Even though the hospital is located within the college campus, college is having an

Ambulance

188

9. Continuous Improvement (75)

This criterion essentially evaluates the improvement of the different indices that have already been discussed in earlier sections.

From 9.1 to 9.5 the assessment calculation can be done as follows.

If a, b, c are improvements in percentage during three successive years, assessment

can be calculated as

Assessment = (b-a)/ (100-min (b, a)) +(c-b)/ (100-min(c, b))

9.1 Improvement in Success Index of Students (5)

From4. 2

Items

L YG

LYGm1

L YGm2

LYGm3

Assessment

Success index 0.92 1 1 1 Success Index for last three years is 98%

9.2 Improvement in Academic Performance Index of Students (5)

From4. 3

Items LYG

(c) LYG1

(b) LYGm2

(a) Assessment

API 7.10 7.35 7.73 -0.229

Assessment = [(73.5 – 77.3) / (100 – 73.5)] +[ ( 71 – 73.5)/(100 – 71 )] =-0.229

9.3 Improvement in Student Teacher Ratio (5)

From5. 1

Items CAY

(C) CAYm1

(b) CAYm2

(a) Assessment

STR 12.09 12.57 12.90 -0.0091

Assessment = (12.57 –12.90)/ (100 – 12.57) + (12.09 – 12.57)/ (100 – 12.09)

= -0.0091

189

9.4 Enhancement of Faculty Qualification Index (5)

From5. 3

Items CAY

(C) CAYm1

(b) CAYm2

(a) Assessment

FQI 7.46 7.46 7.52 -0.00064

Assessment = (7.46– 7.52) / (100 -7.46) + (7.46-7.46)/ (100 – 7.46) =-0.00064

9.5 I m p r o v e m e n t in Faculty Research Publications, R&D Work, Consultancy and Testing Work (10)

From 5.7 and 5.9

Items LYG LYGm1 LYGm2 Assessment

FRP 8.1 11.1 5.7 0.025

FRDC

9.6 Continuing Education (10)

In this criterion, the institution needs to specify the contributory efforts made by the faculty members

by developing the course/laboratory modules, conducting short-term courses/workshops, etc., for

continuing education during the last three years.

Conducted workshops in the Department of CSE

Module description

Any

other

contribu

tory

institute/

industry

Developed/

organized by Duration Resource

persons Target audience

Usage and

citation,

etc.

One day workshop

on

“Microprocessors”

JNTUK association with Pearson Education

Smt.D.Neelima

29/4/2012 Prof .LylaB.Das Students & faculty

address and share the research issues.

190

One day workshop on “Outcome based Engineering Education”

JNTUK Dr.L.Sumalatha

05/02/2013

Prof P.G.Sastry Students & faculty

Can work in competing and open ended working environment.

One day workshop on “Big Data Analytics and Cloud Computing”

JNTUK Dr.L.Sumalatha 29/06/2013

Mr.Radhakrishna, Mr.Dakshina Murthy, Mr.Kishore

Students & faculty

To analyze and interpret data to lay a foundation for solving complex problems.

One day workshop on “Recent Trends in Data Analytics”

JNTUK Dr.M.H.M. Krishna Prasad

24/12/2013

Prof. M.N.Murthy, Dr.DharaKishore

Students & faculty

To analyze and interpret data to lay a foundation for solving complex problems.

One day workshop on “Software Project Management”

JNTUK Smt.A.Karuna 06/01/2014

Mr.Srinivasa Vivekanandha

Students & faculty

Can acquire leadership and communication skills and project management technologies to work in a team

Two day Workshop on “ Pattern recognition and Machine learning”

JNTUK E.Suneetha 23/08/2014, 24/08/2014

Dr. VCV Rao, Dr. CR rao, Dr.Arun Agarwal, Dr. Krishna Reddy

Students & faculty

To acquire basic concepts and research percespectives in Machine learning

Two day Workshop on “ Research Perspectives in Cloud Computing”

JNTUK A.Karuna 12/07/2014 13/07/2014

Prof Raj Kumar

Buyya,

Dr. K. Chandra

Sekaran,

Dr. K. Sudheer

Reddy,

Sri.

K.

Raghavendran,

Students & faculty

Useful to address and share the research issues in Cloud Computing

191

One Day Workshop on “ Wireless Sensor Networks”

JNTUK Dr. O. SrinivasaRao 6/9/2014 Dr. Pallam Setty

Sri. Garimella

Rammurthy

Students & faculty

Useful to address and share the research issues in Wireless Sensor Network

Two Day WorkShop on “Cuda Programming for High Performance Computing”

JNTUK Dr. MHM Krishna Prasad

Expert from

NVIDIA Students & faculty

Useful to model the real world problems to address and share the research issues in Cuda Programming

One day WorkShop on “Agile Software and Cloud computing”

JNTUK Dr. JVR Murthy 8/8/2014 Sri. NM Butta Students & faculty

Useful to model the real world problems to address and share the research issues in Agile Software and Cloud computing

One day Workshop on “Image Processing and Pattern Recognition”

JNTUK Dr.D.Haritha 17/4/2014 Dr. Prathap

Reddy,

Dr. VijayaKumar

Dr.

K SrinivasaRao

Students & faculty

Useful to model the real world problems to address and share the research issues in Image Processing and Pattern Recognition

Two day workshop

on “Research

Conducted

Perspectives in

Cloud Computing

(RPCC-14)”

JNTUK Dr.L.Sumalatha 12-7-2014

to

23-8-2014

From Industry and Academy

Students & faculty

Awareness on research challenges in cloud computing

192

Conducted Two day

Workshop on

“Pattern

Recognition and

machine

learning(PRML)”

JNTUK Dr.L.Sumalatha 22-8-2014

to

23-8-2014

From Industry

and Academy Students & faculty

Discussion on machine learning solution in pattern recognition

guest lecture on "Research Possibilities in HPC and multi-Core computing"

JNTUK Dr.MHM Krishna Prasad

2nd February, 2015

Dr.V.C.V.Rao,

Associate

Director HPC-

FTE Goup C-

DAC, Pune

University

Campus and

formerly visiting

Prof. of

University of

Minnesota,

Minneapolis.

Students & faculty

Useful to model the real world problems to address and share the research issues in multi-Core computing

Expert lecture on "To guide some of our faculty in preparing self assessment reports for applying National Board Accreditation to PG Courses of the College/ University"

JNTUK Dr.MHM Krishna Prasad

16-17th March, 2015

Dr.A.Koteswara

Rao, Prof. of

Information

Technology,

Noted person in

guiding NBA

accreditation

process in ESCI

Anna University.

faculty Useful to model the accreditation

Guest Lecture on "HPC and Multi core computing and Interaction on National supercomputing mission project"

JNTUK Dr.MHM Krishna Prasad

13th July, 2015

Dr.VCV.Rao, Head of Division, High perf. Comp. Frontier Technologies exploration grouop C-DAC, Pune University.

Students & faculty

Useful to model the real world problems to address and share the research issues in supercomputing mission project

193

Guest Lecture on " Research oriented expert lecture the Big data Analytics"

JNTUK Dr.MHM Krishna Prasad

13th August, 2015

Dr.R.B.V.Subrahmanyam, NIT, Warangal.

Students & faculty

Useful to model the real world problems to address and share the research issues in Big data Analytics

Guest Lecture on "Research oriented expert lecture on Digital India Project Proposals"

JNTUK Dr.MHM.Krishna Prasad

27.08.2015

Prof.C.Raghavendra Rao, Central University and University of Hyderabad, Hyderabad.

Students & faculty

Useful to model the real world problems to address and share the research issues in Digital India Project Proposals

guest lecture on "Research oriented expert lecture on large scale Metric Learning using locality sensitive hashing and SMARTS"

JNTUK Dr.MHM Krishna Prasad

14th September, 2015

Prof. Rama Mohana Rao, University of Melbourn, Australia.

Students & faculty

Useful to model the real world problems to address and share the research issues in locality sensitive hashing and SMARTS

Industry Expert Lecture during September, 2015 on "To Train to work on latest Technology aiming to enhance research & Implementing real time solutions on cloud"

JNTUK Smt.Ratna Kumari Challa

In the month of September, 2015 in 2 sessions.

Microsoft Students & faculty

Useful to model the real world problems to address and share the research issues in cloud computing

194

guest lecture on "Research Possibilities in HPC and multi-core computing"

JNTUK Dr.MHM Krishna Prasad

5-6th October, 2015

Dr.VCV.Rao, Head of division, High Perf. Comp. Frontier Technologies exploration group C-DAC, Pune University.

Students & faculty

Useful to model the real world problems to address and share the research issues in multi-core computing

expert lecture on "Network Traffic Classification"

JNTUK Dr.MHM Krishna Prasad

16th December, 2015

Dr.T.Venkatesh, IIT Guwahathi, and expert in the field of "Performance analysis of high speed communication networks".

Students & faculty

Useful to model the real world problems to address and share the research issues in Network Traffic Classification

1-Day workshop on "Startups and entrepreneurship orientation"

JNTUK Dr.JVR.Murthy & Dr.MHM Krishna Prasad

10th March, 2016

Teams from software industry

Students & faculty

Useful to model the real world problems to address and share the issues in Startups and entrepreneurship orientation

TEQIP-II meeting on 13th Screening Committee Meeting and SPFU Inspection Team Visiting

JNTUK Dr. MHM Krishna Prasad

14th April, 2016

TEQIP-II Team

faculty Awareness on SPFU Inspection

1 Week Research Oriented Workshop on "Cloud+/GPU Computing"

JNTUK Dr. MHM Krishna Prasad

8-12th August, 2016

Dr. Raj Kumar Buyya, Dr. V.C.V. Rao, Dr. N.B. Venkateswarlu and other experts in the area Cloud and GPU Computing

Students & faculty

Useful to model the real world problems to address and share the research issues in Cloud+/GPU Computing

195

1-Day workshop on "Research Concepts and Incubating ideas on Internet of Things"

JNTUK Dr. MHM Krishna Prasad

3rd August, 2016

Mr. N.S.S. Sai Baba, Dr. E. Sreenivas Reddy, Mr. Krishna Kumar Thiagarajan, Mr. Basanta Patro

Students & faculty

Useful to model the real world problems to address and share the research issues in IOT

Expert Lecture on "Possible Research Collaboration on Recent Trends, Mobile & Cloud Centric IOT

JNTUK Dr. MHM Krishna Prasad

3rd December, 2016

Dr. Satish Sreerama, Mobile Computing Division, University of Tartu, Estonia

UG, PG, Ph.D and Faculty

Useful to model the real world problems to address and share the research issues Recent Trends, Mobile & Cloud Centric IOT

Expert Lecture on "Research Oriented Expert Lecture"

JNTUK Dr. MHM Krishna Prasad

07th December, 2016

Prof. C. Raghavendra Rao, Professor, School of Mathematics & Computer Sciences, University of Hyderabad

UG, PG, Ph.D and Faculty

Useful to model the real world problems to address and share the research issues

Expert Lecture on "Research Oriented Expert Lecture"

JNTUK Dr. MHM Krishna Prasad

30th December, 2016

Dr. Rakesh Chandra Balabantaray, IIT, Bhubaneswar

UG, PG, Ph.D. and Faculty

Useful to model the real world problems to address and share the research issues

5 Day Short Term Course on “Smart Electric Power Grid with Emphasis on Embedded Systems and Cyber Security”

JNTUK Smt. E. Suneetha

21 – 25th February, 2017

From Industry and Academy

Students & faculty

Useful to model the real world problems to address and share the research issues in Cyber Security

196

1-Day Workshop on “Agile Development Methodologies”

JNTUK Dr. J.V.R. Murthy & Sri. S. Chandra Sekhar

15th March, 2017

Dr. N.M. Bhatta, IIM-Indore

Students & faculty

Useful to model the real world problems to address and share the research issues in Agile Development Methodologies

1-Day Workshop on “Internet of Things. - A Research Perspective”

JNTUK Dr. O. Srinivasa Rao & Sri. S. Chandra Sekhar

18th March, 2017

Dr. Pallam Setty, Professor in AU.

Students & faculty

Useful to model the real world problems to address and share the research issues in IOT

Delivered an online expert lecture on Technology in Education (Ed-Tech Tools)

Andhra University

14-07-2017

Dr.A.S.N Chakravarthy

Students & faculty

Awareness on Ed-Tech Tools

One day Student Workshop on “International Institute of Entrepreneurship development(I2E)”

JNTUK Dr. L.Sumalatha 8-08-2017 From Industry Students Entrepreneurship initiatives

Two day national Level Awareness Program on “Establishing Incubation-Innovation Centres”

JNTUK Dr. J.V.R. Murthy

15th -16th June 2017

From Industry Administrators and faculty

Awareness on Establishing Incubation center and its prominence

One day workshop on “Empowering Teaching Excellence Through E-Learning Platforms”

JNTUK Dr.A.S.N .Chakravarthy

8th July 2017

From Industry and Academy

Faculty Awareness on E-Learning tools

197

Faculty attended workshops, Short term courses, training programs Module description Any

other

contribu

tory

institute

/

industry

Developed/

organized by

Duration Attended

persons

Target

audience

Usage and citation,

etc.

Two day workshop on

“Wireless Sensor

Networks Applications

for Environemental

Monitoring”

JNTUK

Andhra

University

Visakhapatna

m

25th

&26th

March

2013

S.Chandra

Sekhar

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field.

Three day workshop

on “Research

Methodology”

JNTUK Society for

Educational

&

Entrepreneurs

hip, Chennai

27th -29th

Jan 2014

A. Krishna

Mohan

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field.

“Incorporatiojn of

Pedagogy in

Engineering

Education”

JNTUK IISC

Bangalore

3rd t-7th

Feb 2014

Dr.M.H.M.

Krishna

Prasad

Faculty/S

tudents/

Research

Scholars

Useful to model the real

world problems to

address and share the

research issues.

“Networking Routers

and Firewalls”

JNTUK Octel

Institute of

Technology

Bangalore

18th -28th

Dec 2013

A.Venata Rao

Technical staff

Can flourish

professionally both in

academics and IT field.

“Creativity and

Innovation

Management in

Research”

DST

sponsore

d

Program

ESCI

Campus,

Hyderabad

11th–15th

Nov 2013

Ch.Ratna

Kumari

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field.

“Professional

Development and

Educational

Leadership”

JNTUK IIT

Kharagpur

9th-11th

May 2013

K.Sahadevaia

h

Faculty/S

tudents/

Research

Scholars

Can acquire leadership

and communication

skills and project

management

technologies to work in

a team “Predictive Analytics” JNTUK IIT

Hyderabad

17th-21st

July 2013

Dr.M.H.M.

Krishna

Prasad

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field.

“Multivariate Data

Analytics”

JNTUK IIT

Kharagpur

2nd -8th

June 2013

Dr.M.H.M.

Krishna

Prasad

Faculty/S

tudents/

Research

Scholars

Useful to model the real

world problems to

address and share the

research issues.

“Ïntroduction to

Research”

JNTUK IIT Indore 6th &7th

July 2013

N.Ramakrishn

aiah

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field. “Ïntroduction to

Research”

JNTUK IIT Indore 6th &7th

July 2013

S.Chandra

Sekar

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field.

“Öracle 10 G

Database:

Development using

SQL &PLSQL

JNTUK ÏIT Kanpur 29th-31st

Aug 2013

Dr.M.H.M.

Krishna

Prasad

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field.

“Advanced Wireless &

Mobile Network

Technologies”

JNTUK NIT

Warangal

3rd-7th

Oct 2013

N.Ramakrishn

aiah

Faculty/S

tudents/

Research

Scholars

To share their

knowledge and

express/present their

idea in any technical

forum to educate or

guide others. “Intelligent

Informatics”

JNTUK IIT Kanpur 15th-19th

July 2013

K.Sahadevaia

h

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field.

198

“Wireless Sensor

Networks”

JNTUK IIT Kanpur “22nd-

24th July

2013

K.Sahadevaia

h

Faculty/S

tudents/

Research

Scholars

To share their

knowledge and

express/present their

idea in any technical

forum to educate or

guide others.

“Information Security” JNTUK PSG College

of

Technology,

Coimbatore,

TamilNadu

4th-10th

Nov 2013

A.Karuna &

E.Suneetha

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field.

“Foundations of

Predictive Analytics”

JNTUK IIT,

Hyderabad

25th-29th

Dec 2013

SSSN Usha

Devi

Faculty/S

tudents/

Research

Scholars

Can flourish

professionally both in

academics and IT field.

“Advanced Wireless &

Mobile Network

Technologies”

JNTUK NIT

Warangal

3rd -7th

Oct 2013

S.Chandra

Sekar

Faculty/S

tudents/

Research

Scholars

To share their

knowledge and

express/present their

idea in any technical

forum to educate or

guide others.

“Financial

Management aspects

as per the world bank

guidelines”

JNTUK Osmania

University,

Hyderabad

8th & 9th

march

2013

Dr.M.H.M.

Krishna

Prasad

Faculty/S

tudents/

Research

Scholars

To realize professional

and ethical

responsibility and act in

accordance to social

welfare. “National Cyber

Safety and Security

Standards Summit”

JNTUK Dept of

Electronics,

Govt of India,

CHENNAI

27th&

28th April

2013

Dr.O.Srinivas

a Rao

Faculty/S

tudents/

Research

Scholars

To realize professional

and ethical

responsibility and act in

accordance to social

welfare.

Faculty attending

international training

& study networking

tour for starting joint

MS Programme

JNTUK United States

of America

20-28th

Oct 2013

Prof. J.V.R.

Murthy

Faculty/S

tudents/

Research

Scholars

For starting joint MS

program& collaboration

with local industries in

USA

Faculty attending 5

day workshop

JNTUK IIT

Hyderabad

17-21st

July 2013

Sri A. Krishna

Mohan

Faculty/S

tudents/

Research

Scholars

Training on Data

Analytics

Faculty attending 3

day workshop

JNTUK ‘GLOBAL

BIG DATA’

Conference

2-4th

Aug.

2013

Prof. J.V.R.

Murthy

Faculty/S

tudents/

Research

Scholars

Projecting ideas an

discussion on Big data

Faculty on deputation

to attend MDT

program

JNTUK Commissione

r of Technical

Education

A.P Hyd.

2-3rd

Sept 2013

Dr.

L..Sumalatha

Faculty/S

tudents/

Research

Scholars

Management

development prog. For

Directors/Principals/Seni

or Faculty

Faculty training prog.

to attend 5 FSIT Tech.

Skills

JNTUK NASSCOM

MASTER

training FSIT

Tech. Skills

21-28th

Oct 2013

Smt.

D.Neelima,

Faculty/S

tudents/

Research

Scholars

Training the faculty in

Tech. Skills

Faculty attending

workshop

JNTUK NPIU

Bangalore

24-26th

Sept.

2013

Dr. M.H.M.

Krishna

Prasad

Faculty/S

tudents/

Research

Scholars

Faculty development

program

Faculty attending

International

Conference at Las

Vegas,USA

JNTUK Las Vegas,

USA,

International

Conference

on

“INFORMA

TION AND

KNOWLED

GE

ENGINEERI

NG”

22-25th

July 2013

Dr. D. Haritha Faculty/S

tudents/

Research

Scholars

To participate in

International Conference

on “Face Recognition

System on doubly

truncated Multi Variate

Gaussian Mixture

Model” Faculty attending

workshop at IIT

Hyderabad

JNTUK IIT

Hyderabad

17-21st

July 2013

Sri A. Krishna

Mohan

Faculty/S

tudents/

Research

Scholars

To cover fundamental

topics in predictive

analytics using excel

miner

199

Invited talk on “ROLE

OF BUSINESS

ANALYTICS IN

TRAINING

ENTERPRISES AND

SOCIETY”

JNTUK JNTUK CSE

Dept

4th July

2013

Staff and

students of

CSE Dept

Faculty/S

tudents/

Research

Scholars

To understand the role

of business analytics in

the society

Faculty attending

workshop on

“OUTCOME BASED

ACCREDIATION

PROCESS &

PARAMETERS”

JNTUK Organised by

NBA at

Jaipur

18th-19th

Feb 2013

Dr. J.V.R.

Murthy

Faculty/S

tudents/

Research

Scholars

Accreditation Practices.

Workshop by NBA

nodal canter, for

training resource

person on

“OUTCOME BASED

ACCREDITATION”

JNTUK Registrar,

JNTUK

29th

APRIL

2013

Dr. MHM

Krishna

prasad

Faculty/S

tudents/

Research

Scholars

Accreditation Practices.

Staff attending 28th

Indian Engineering

congress IE-ITR

session

“INNOVATIVE

TEACHING

RESEARCH

LEARNING &

ACCREDITATION

PRACTICES”

JNTUK Indian

Engineering

congress IE-

ITR, at hotel

Leela palace,

Chennai

20th -

22nd

DEC

DR. J.V.R .

Murthy

Faculty Accreditation Practices.

Participated in

Training Resource

Persons on “Outcome

Based Accreditation-

Phase I” workshop

JNTUK JNTUK 29-4-2013 Dr.L.Sumalat

ha

Faculty Accreditation Practices.

Attended Advanced

Faculty Training

Program “Think

Parallel: Parallel

Programming for

Engineers

&Scientists”

JNTUK CDAC,

Bangalore

10-20

June 2013

Dr.L.Sumalat

ha

Faculty To practice parallel

programming

Guest Lecturer in

computer Science

&Engineering

Department

JNTUK Computer

Science &

Engineering

Department,

JNTUK

(Dr.MHM.Kr

ishna Prasad)

18th JAN

2014

Dr. V.C.V

Rao, Assoc.

Director, HPC

Frontier Tech

Exploration

group, PUNE

Students To know latest tools &

technology in computer

Science & Engineering

Department

200

2nd international conference on "Computing for sustainable Global development" research paper "1D:714 A survey on community detection algorithms in large scale real world networks".

JNTUK IEEE, Delhi, Bharathi Vidyapeeth, New Delhi.

11-13th March, 2015

Mr.Ch.S.Rao_13022P0504

Research

Scholars

To gain in depth

knowledge of Research

on Computing for

sustainable Global

development

Electrical, Computer and Communication Technologies (IEEE ICE CCT-2015) Conference .

JNTUK SVS College of Engineering, Coimbatore.

5-7th March, 2015

Ms.Ch.Ratna Kumari Assistant Professor

Faculty/S

tudents/

Research

Scholars

To gain in depth

knowledge of Research

on Electrical, Computer

and Communication

Elsevier 3rd International conference on "Recent trends in computing"

JNTUK SRM University, Ghaziabad, Uttar Pradesh.

12-13th March, 2015

Dr.K.Sahadevaiah

Faculty/S

tudents/

Research

Scholars

To gain knowledge of

Research on Recent

trends in computing

2nd International conference on Computer & Communication Technologies-IC3T.2015".

JNTUK Hyderabad

24-26th July, 2015

Dr.MHM.Krishna Prasad

Faculty/S

tudents/

Research

Scholars

To gain knowledge of

Research on Computer

& Communication

2nd International conference on "Computer & Communication Technologies (IC3T-2015)"

JNTUK CMR, Technical Campus, Hyderabad

24-26th July, 2015

Mr.Ch.S.Rao_13022P0504 Ph.D Student

Faculty/S

tudents/

Research

Scholars

To expose learners in

online question

answering systems

Short term course "Wireless Network Protocols & Algorithms and their MATLAB stimulations".

JNTUK Indian School of Mines, Dhanbad, Jharkhand

8-12th June, 2015

Dr.K. Sahadevaiah

Faculty/S

tudents/

Research

Scholars

To learn various

Wireless Network

Protocols through

MATLAB stimulations

5-Day workshop at Udaipur

JNTUK Udaipur, Rajasthan

8-13th June, 2015

Dr.A.Krishna Mohan

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning

2-Day workshop on "BIG DATA ANALYTICS"

JNTUK National Association of Software & Service Companies, Hyderabad

25-26th June, 2015

Dr.J.V.R. Murthy

Faculty/S

tudents/

Research

Scholars

Research Learning &

Gives new research

problems BIG DATA

ANALYTICS

4th International conference on Advances in computing, Communications and Informatics (ICACCI-2015).

JNTUK SCMS, Kochi

10-13th August, 2015

Smt.SSSN. Usha Devi

Faculty/S

tudents/

Research

Scholars

Gives new research

problems in computing,

Communications and

Informatics

201

Short term course on “INTERNET OF THINGS: CONVERGENCE OF SENSING: CLOUD AND BIG DATA NETWORKING".

JNTUK Indian Institute of Technology, Kharagpur.

13-26th July, 2015

Dr.MHM. Krishna Prasad

Faculty/S

tudents/

Research

Scholars

To find real time

problem relevant to IOT.

Workshop titled "DATA SCIENCE AND BIG DATA ANALYTICS (DSBDA-2015)".

JNTUK Centre for Development of Advanced computing, Bangalore supported by IEEE & CSI SIG-BDA.

5-7th August, 2015

Mr.Ch.S.Rao_13022P0504

Faculty/S

tudents/

Research

Scholars

To expose Research

Learning

14th Batch Training on "MANAGEMENT CAPACITY ENHANCEMENT FOR THE ADMINISTRATORS OF TEQIP-II INSTITUTIONS"

JNTUK Indian Institute of Technology, Luck now(Noida Campus)

27-31st July, 2015

Dr.MHM Krishna Prasad

Faculty/S

tudents/

Research

Scholars

To enhance

MANAGEMENT

CAPACITY.

3-Day workshop on "DATA SCIENCE & BIG DATA ANALYTICS (DSBDA-15)".

JNTUK Centre for Development of Advanced computing(C-DAC), Bangalore.

5-7th August, 2015

Dr.A Krishna Mohan

Faculty/S

tudents/

Research

Scholars

Gives training to expose

Data Science & Big

Data Analytics

11Days Faculty Development Programme on "DATA BASE MANAGEMENT SYSTEMS"

JNTUK National Institute of Technology, Warangal.

17-27th August, 2015

Mr.B. Suraj Aravind

Faculty/S

tudents/

Research

Scholars

Train people through

Hands-on experience on

Data Base Management

Systems.

1-Day workshop "Curricular/Content development plan related to Analytics Subjects"

JNTUK Andhra Pradesh State Skill development corporation and National Association of Software and service Cos., Hyderabad

3rd September, 2015

Dr.MHM Krishna Prasad

Faculty/S

tudents/

Research

Scholars

Development plan

related to Analytics

Subjects

International Training programme PlUM Training at Singapore

JNTUK National University of Singapore, Singapore.

28th September-2nd October, 2015

TEQIP-II Coordinator

Faculty/S

tudents/

Research

Scholars

Gives training to

expertise research.

202

2-Day workshop on "Security Issues in wireless networks & Hands on training using opnet"

JNTUK Sri Ramakrishna College, Coimbatore.

16-17th October, 2015

Sri.S. Chandra Sekhar

Faculty/S

tudents/

Research

Scholars

It helps to learn Security

Issues in wireless

networks & Hands on

training

International Conference on Information and Communication Technology for intelligent systems(ICTIS-2015).

JNTUK Springer International conference at VICT Ahmedabad, Gujarat.

28-29th November, 2015

Dr.K. Sahadevaiah

Faculty/S

tudents/

Research

Scholars

Gives research

experience on real world

problems

International Conference on Information and Communication Technology for intelligent systems (ICTIS-2015).

JNTUK Springer International conference at VICT Ahmadabad, Gujarat.

28-29th November, 2015

Mr.N. Ramakrishnaiah

Faculty/S

tudents/

Research

Scholars

Gives research

experience on real world

problems

Curricular/Content development plan related to Data Analytics.

JNTUK Andhra Pradesh State Skill development corporation and National Association of software and service cos.

14th November, 2015

Dr.MHM Krishna Prasad

Faculty/S

tudents/

Research

Scholars

To development plan

related to Data Analytics

A Review of Addressing Protocols in Mobile Ad-Hoc Networks

JNTUK

December,2015

Mr.N. Ramakrishnaiah

Faculty/S

tudents/

Research

Scholars

To learning various

addressing protocols

used in Mobile ad-hoc

networks

An Addressing Mechanism for Network Partitioning and Merging In Wireless Ad hoc Netwoks

JNTUK 2015 Mr.N. RamaKrishnaiah

Faculty/S

tudents/

Research

Scholars

Discussion on

addressing mechanisms

for network partitioning

and merging in wireless

sensor ad-hoc networks

IPV6 address auto-Configuration protocol for mobile Ad Hoc Networks

JNTUK 2015 Mr.N. RamaKrishnaiah

Faculty/S

tudents/

Research

Scholars

Discussion on auto

configuration protocol

for mobile ad-hoc

networks

"7th International conference on "Technology for education T4E-2015"

JNTUK National Institute of Technology, Warangal, Telangana.

10-12th December, 2015

Ms.V.Sireesha_13022P0512 Ph.D student

Faculty/S

tudents/

Research

Scholars

Gives experience of

conference on

Technology for

education

Training on "Intellectual Property Rights(IPR) conducted by "Engineering Staff College of India, Hyderabad"

JNTUK Sri Venkateswara University, College of Engg. Tirupati.

18-20th November, 2015

Mr.K.Raghuram Assistant Professor

Faculty/S

tudents/

Research

Scholars

To train people

effectively

In Intellectual Property

Rights(IPR)

203

Training programme on “Non-Teaching and Administrative staff" conducted by Engineering Staff College of India, Hyderabad.

JNTUK UCEK-JNTUK Kakinada

25-27th November, 2015

Sri.N.S.R.Murthy Mechanic/SK

Non-

Teaching

and

Administ

rative

staff

To train people

effectively

For good goverence

Training program on "Data Analytics" to the Engineering Faculty" conducted by National Association of Software and services companies (NASSCOM).

JNTUK C.R.Rao Institute Campus, Hyderabad

7-11th December, 2015

Dr.A. Krishna Mohan

Faculty/S

tudents/

Research

Scholars

To train people

effectively

In Data Analytics

Training program on "Data Analytics" to the Engineering Faculty" conducted by National Association of Software and services companies (NASSCOM).

JNTUK C.R.Rao Institute Campus, Hyderabad

7-11th December, 2015

Dr.MHM Krishna Prasad

Faculty/S

tudents/

Research

Scholars

To train people

effectively

In Data Analytics

10 Days program on "Machine learning and Soft Computing".

JNTUK National Institute of Technology, Warangal.

28th Dec, 2015 to 9th Jan, 2016

Mr.K.Raghuram Assistant Professor

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning to

identify new real-time

applications

"5th International Conference on Information Computer Application"-(ICICA-2016)

JNTUK Knowledge-Discovery Laboratory, University of Melbourne, Melbourne, Australia.

18-19th January, 2016 and his visiting period

Dr.MHM Krishna Prasad

Faculty/S

tudents/

Research

Scholars

Expose different

algorithm techniques

Big Data Using Map

Reduce

"3rd International conference on computing for sustainable Global Development (INDIACOM-2016)"

JNTUK Bharathi Vidyapeeth, New Delhi.

16-18th March, 2016

Mr.Ch.S.Rao Ph.D _13022P0504

Faculty/S

tudents/

Research

Scholars

Explore different

algorithms techniques

Finding Research groups

3-Day workshop on "Quality Initiatives in Technical & Higher educational Institutions (In compliance with NBA & NAAC Accreditations).

JNTUK Engineering Staff College of India, Hyderabad.

23-25th February, 2016

Mr.S.Chandra Sekhar

Faculty/S

tudents/

Research

Scholars

Accreditation Practices.

International conference on Computational Intelligence and Informatics (ICC11-2016)

JNTUK JNTUH, Hyderabad

28-30th May, 2016

Ms.V.Sireesha 13022O0512, Ph.D Student

Faculty/S

tudents/

Research

Scholars

Gives experience of

conference on

Computational

Intelligence and

Informatics

204

TEQIP-II meeting on "Focused Group Discussion"

JNTUK BRKR Bhavan, Tank Bund Road, Hyderabad.

30th April, 2016

TEQIP-II Coordinator

Faculty/S

tudents/

Research

Scholars

Meeting on Focused

Group Discussion

5-Day Certificate Course on "Advanced Business Analytics using R as part of Executive Educations in Business Analytics and Predictions"

JNTUK IIT, Hyderabad

6-10th July, 2016

Ms. Eluri Suneetha

Faculty/S

tudents/

Research

Scholars

Certificate Course on

Advanced Business

Analytics using R.

Training of NASSCOM

JNTUK Nagarjuna University, Guntur

6-10th July, 2016

Dr. Krishna Mohan

Faculty/S

tudents/

Research

Scholars

Gives Training of NASSCOM & Research Learning

experience.

2-Day International Conference on "Electronics and Communication Engineering - 2016 (ICE CE - 2016)"

JNTUK UCEV, JNTUK, Vijayanagaram

29-30th July, 2016

Dr. O. Srinivasa Rao

Faculty/S

tudents/

Research

Scholars

Gives experience on

Conference on

Electronics and

Communication

Engineering

An Empirical Study of a Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks

JNTUK Springer International Publishing, Switzerland

2016 Mr.N. RamaKrishnaiah

Faculty/S

tudents/

Research

Scholars

Discussion on various

cryptographic schemes

Tree Based Variable Length Address Auto configuration Protocol For Mobile Ad Hoc Networks

JNTUK IEEE 2016 Mr.N. RamaKrishnaiah

Faculty/S

tudents/

Research

Scholars

Getting knowledge on

auto configuration

protocols for mobile ad-

hoc networks

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Ms. D. Jyothi 14021D0505, PG Student

Faculty/S

tudents/

Research

Scholars

Get Expertise through

Hands-on-Training on

Network Simulator

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Ms. G. Bhavya 14021D0507, PG Student

Faculty/S

tudents/

Research

Scholars

Get Expertise through

Hands-on-Training on

Network Simulator.

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Mr. I. Devaraju 14021D0508, PG Student

Faculty/S

tudents/

Research

Scholars

Get Expertise through

Hands-on-Training on

Network Simulator

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Ms. M. Anuradha 14021D0509, PG Student

Faculty/S

tudents/

Research

Scholars

Get Expertise through

Hands-on-Training on

Network Simulator

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Mr. Ch. Sai Kumar 14021D0510, PG Student

Faculty/S

tudents/

Research

Scholars

Get Expertise through

Hands-on-Training on

Network Simulator

205

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Mr. P. Koteswara Rao 14021D0517, PG Student

Faculty/S

tudents/

Research

Scholars

To Expertise through

Hands-on-Training on

Network Simulator

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Ms. K. Saraswathi 14021D2203, PG Student

Faculty/S

tudents/

Research

Scholars

To Expertise through

Hands-on-Training on

Network Simulator

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Ms. J. Geetha Mounica 14021D2213, PG Student

Faculty/S

tudents/

Research

Scholars

To Expertise through

Hands-on-Training on

Network Simulator

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Mr. S. Kiran Kumar 14021D2220, PG Student

Faculty/S

tudents/

Research

Scholars

Get Expertise through

Hands-on-Training on

Network Simulator

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Ms. A.S. Rupa Vani 14021D2221, PG Student

Faculty/S

tudents/

Research

Scholars

To Expertise through

Hands-on-Training on

Network Simulator

3 Day workshop on "Hands-on-Training on Network Simulator"

JNTUK Kongu Engineering College, Chennai

5-7th August, 2016

Ms. S. Lalitha 14021D2223, PG Student

Faculty/S

tudents/

Research

Scholars

To Expertise through

Hands-on-Training on

Network Simulator

IEEE 2nd International Conference on "Advances in Computing Communication & Automation (ICACCA 2016)"

JNTUK MJP Rohilkhand University, Bareilly, UP

30th September- 1st October, 2016

Sri. N. Ramakrishnaiah

Faculty/S

tudents/

Research

Scholars

Research Learning in

configuration protocol

for MANETS.

5-Day Workshop on "Web Development using PHP and MYSQL"

JNTUK Engineering Staff College of India, Hyderabad

26-30th September, 2016

Dr. A. Krishna Mohan

Faculty/S

tudents/

Research

Scholars

Gives Hands on

experience in Web

Development using

PHP.

A workshop on Good Governance

JNTUK India Habitat Centre, New Delhi

30th August, 2016

TEQIP-II Coordinator

Faculty/S

tudents/

Research

Scholars

To know about Good Governance.

42nd International Conference on "Very Large Data Bases (VLDB-2016)"

JNTUK VLDB, New Delhi

5-9th September, 2016

Dr. MHM. Krishna Prasad

Faculty/S

tudents/

Research

Scholars

Identify new real time

applications in Very

Large Data Bases

5-Day Short Term Course on "Applied Machine Learning"

JNTUK IIT, Kharagpur

12-16th September, 2016

Ms. NSSSN Usha Devi

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning &

Hands on experience

Applied Machine

Learning 24th World Congress on "Engineering and Computer Science (WCECS 2016)

JNTUK San Francisco, USA

19-21st October, 2016

Dr. A. Krishna Mohan

Faculty/S

tudents/

Research

Scholars

Skill-Set Estimate using

HDFS, Mapreduce and

R

Workshop on "Lab Management & Maintenance for Lab Technicians"

JNTUK UCEK, JNTUK

19-23rd September, 2016

Sri. T. Vijay Kumar Technical Staff

Faculty/S

tudents/

Research

Scholars

To familiar about

Management &

Maintenance for Lab

Technicians.

206

Management Development Program for "Improved Research & Development and Industry Institute Interaction"

JNTUK Administrative staff college of India, Hyderabad.

19-23rd September, 2016

Dr. A. Krishna Mohan

Faculty/S

tudents/

Research

Scholars

Motivate towards

research Learning and

interaction with

industries

6-day Short Term Course on "Internet of Things using Arduino and Raspberry Pi"

JNTUK Shri Vishnu Engineering Collge for Women, Bhimavaram.

17-22nd October, 2016

Ms. PSV. Sunayana 15021D0523, PG Student

Faculty/S

tudents/

Research

Scholars

Gives Hands on

experience

Internet of Things using

Arduino and Raspberry

Pi

6-day Short Term Course on "Internet of Things using Arduino and Raspberry Pi"

JNTUK Shri Vishnu Engineering Collge for Women, Bhimavaram.

17-22nd October, 2016

Ms. PS. Sowjanya 15021D0526, PG Student

Faculty/S

tudents/

Research

Scholars

Gives Hands on

experience

Internet of Things using

Arduino and Raspberry

Pi

3rd International Conference on "Computer & Communication Technologies" IC3T 2016

JNTUK MIC College of Technology, Vijayawada

5-6th November, 2016

Ms. V. Sireesha 13022P0512, PhD Student

Faculty/S

tudents/

Research

Scholars

Research Learning in

Computer &

Communication

Technologies

Digital India Initiatives: Effective Utilization of Cloud Technology, Big Data & e-Governance

JNTUK Engineering Staff College of India, Information Technology Division

25-28th October, 2016

Dr. L. Sumalatha

Faculty/S

tudents/

Research

Scholars

Initiatives of e-Governance Of cloud technology

3 day Workshop on "Internet of Things"

JNTUK Gayatri Vidya Parishad College of Engineering, Visakhapatnam

21-23rd October, 2016

Mr. B. Suraj Aravind Assistant Professor ( C )

Faculty/S

tudents/

Research

Scholars

Research Learning with

real world applications

in Internet of Things

Professional Development Programme on "Big Data Analytics using Hadoop & R Tool"

JNTUK Engineering Staff College of India, Information Technology Division at Ooty, Tamilnadu

21-24th November, 2016

Dr. L. Sumalatha

Faculty/S

tudents/

Research

Scholars

Innovative teaching

,Learn new tools and R

language

Faculty Development Programme on "Big Data Analytics using Hadoop & R Tool"

JNTUK Engineering Staff College of India, Information Technology Division at Ooty, Tamilnadu

21-24th November, 2016

Dr. A. Krishna Mohan

Faculty/S

tudents/

Research

Scholars

Innovative teaching

,Learn new tools and R

language

Professional Development Program on Digital India Initiatives: Effective Utilization of Cloud Technology Big Date & E governance

JNTUK 25-28 OCT 2016

Dr.L.Sumalatha

Faculty/S

tudents/

Research

Scholars

To know the applicability of Big data for E governance

207

Professional Development Program on Big Data Analytics Using Hadoop and R Tool

JNTUK 21-24 Nov 2016

Dr.L.Sumalatha

Faculty/S

tudents/

Research

Scholars

To get trained on tools

for Big data

International Conference on "Internet of Things Data and Cloud Computing (ICC-2017)"

JNTUK Churchill College, University of Cambridge, UK

22-23rd March, 2017

Dr. MHM. Krishna Prasad

Faculty/S

tudents/

Research

Scholars

Motivate towards

research in Internet of

Things Data and Cloud

Computing

6 Day Faculty Development Programme on "Data Science and Big Data Analysis"

JNTUK NIT, Warangal at Audisankara College of Engineering & Technology, Gudur

25-30th November, 2016

Ms. N. Mounika, 15021D0514 P.G Student

Faculty/S

tudents/

Research

Scholars

To know real world

Research problems in

Data Science and Big

Data Analysis

6 Day Faculty Development Programme on "Data Science and Big Data Analysis"

JNTUK NIT, Warangal at Audisankara College of Engineering & Technology, Gudur

25-30th November, 2016

Ms. AHBN. Radhika, 15021D0502 P.G Student

Faculty To know real world

Research problems in

Data Science and Big

Data Analysis

5-Day Workshop on “Deep Learning and Applications”

JNTUK IIT Kanpur

12-16th January, 2017

Ms. NSSSN Usha Devi

Faculty/S

tudents/

Research

Scholars

To learn different

algorithm and

applications towards

research.

2nd International Conference on “Sustainable Computing Techniques in Engineering, Management and Sciences” (SCESM-2017)

JNTUK Jain Engineering College, Belgaum, near Goa

27-28th January, 2017

Mr. Ch.S.Rao, 13022P0504 Ph.D. Student

Faculty/S

tudents/

Research

Scholars

To familiar about

conferences, Research

Learning

2nd International Conference on “Sustainable Computing Techniques in Engineering, Management and Sciences” (SCESM-2017)

JNTUK Jain Engineering College, Belgaum, near Goa

27-28th January, 2017

Dr. MHM. Krishna Prasad

Faculty/S

tudents/

Research

Scholars

To secure Graph

Computations based on

Graph Partitioning

Techniques.

Faculty Development Program on “Data Science and Big Data Analytics”

JNTUK Sri Vasavi Engineering College, Tadepalligudem and NIT, Warangal at Tadepalligudem

20-25th January, 2017

Dr. O. Srinivasa Rao

Faculty/S

tudents/

Research

Scholars

To know about Research

Learning in Data

Science and Big Data

Analytics

Performance Analysis of Matrix and Graph Computations using Data Compression Techniques in MPI and Hadoop MapReduce in Big Data Framework

JNTUK IEEE 2017 Mr.N. RamaKrishnaiah

Faculty/S

tudents/

Research

Scholars

Training on Hadoop,

Data compression

techniques

208

International Conference on Smart Technology and management for computing, communication, controls, Energy and Materials

JNTUK ICSTM 2017 Mr.N. RamaKrishnaiah

Faculty/S

tudents/

Research

Scholars

Projecting ideas an

discussion on smart

technology

Faculty Development Program on “Data Science and Big Data Analytics”

JNTUK Sri Vasavi Engineering College, Tadepalligudem and NIT, Warangal at Tadepalligudem

20-25th January, 2017

Sri. S. Chandra Sekhar

Faculty/S

tudents/

Research

Scholars

To learn various

analytical methods in

Big Data Analytics

3 Day 4th International Conference on “Computing for Sustainable Global Development”

JNTUK IEEE Delhi Section at Bharati Vidyapeeth, New Delhi

01-03rd March, 2017

Mr. B. Suraj Aravind Asst. Prof. (C)

Faculty/S

tudents/

Research

Scholars

To familiar about

different algorithmic

techniques in

Association Rule Mining

Workshop on "TRYST - 2017"

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Ms. Ch. Divya Teja, 15021F0005

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology

Workshop on "TRYST - 2017"

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Ms. M. Priya Jyothirmai, 15021F0021

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology.

Workshop on "TRYST - 2017"

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Mr. T. Ram Praveen, 15021F0017

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology

Workshop on "TRYST - 2017"

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Mr. A. Suresh Babu, 15021F0026

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology

3 Day Short Term Course on “Data Analytics with SAS”

JNTUK Indian Institute of Technology, Kharagpur

22 – 24th March, 2017

Mr. B. Suraj Aravind Asst. Prof. (C)

Faculty/S

tudents/

Research

Scholars

To learn various

analytical methods in

Data Analytics

10th International Conference on “Advances in Science, Management and Engineering” (ICASME-2017)

JNTUK International Organisation of Scientific Research and Development, Chennai

10 – 11th February, 2017

Mr. Ch.S.Rao, 13022P0504 Ph.D. Student

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning

3 Day Global Summit on “Telecom, ICT and IOT”

JNTUK ICT Research & Development at HITEX, Hyderabad

13 – 15th February, 2017

Dr. L. Sumalatha

Faculty/S

tudents/

Research

Scholars

To know various

Research Learning in

Telecom, ICT and IOT

One week Interdisciplinary Short term course on “Smart Electric Power Grid With Emphasis On Embedded Systems and Cyber Security”

JNTUK UCEK-JNTUK 21-25 Fed 2017

Dr. L. Sumalatha

Faculty/S

tudents/

Research

Scholars

Cyber Security

challenges for embedded

systems

209

One day National level workshop on Internet of Things- A Research Perspective

JNTUK UCEK-JNTUK Kakinada

18-3-2017 Dr. L. Sumalatha

Faculty/S

tudents/

Research

Scholars

Discussion on research

perspective of IOT

TRYST - 2017

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Mr. Sk. Farook, 15021F0007 MCA Student

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology

TRYST - 2017

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Mr. N. Bhaskar Reddy, 15021F0018 MCA Student

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology

TRYST - 2017

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Mr. N. Bhaskar Reddy, 15021F0018 MCA Student

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology

TRYST - 2017

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Mr. Sk. Fareed, 15021F0025 MCA Student

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology

TRYST - 2017

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Mr. T. Sharieff, 15021F0022 MCA Student

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology

TRYST - 2017

JNTUK Indian Institute of Technology, Delhi

24 – 27th February, 2017

Mr. K. Govardhan Rao, 15021F0023 MCA Student

Faculty/S

tudents/

Research

Scholars

Innovative teaching,

Research Learning in

Android Technology

IEEE International conference on science , technology & Management –(ICSTEM)- 2017 in KIT Coimbatore paper

JNTUK KIT Coimbatore

3-4th March 2017

Smt.E.Suneetha

Faculty/S

tudents/

Research

Scholars

Research Learning in

science , technology &

Management

One day national level

workshop on

“AGILEMETHODOLOGI

ES”

JNTUK JNTUK 14th March 2017

Dr.N. Ramakrishnaiah

Faculty/S

tudents/

Research

Scholars

Discussion on Agile

methodology techniques

Celebrating Higher

Education:

Accomplishments and

Achievements

JNTUK Sri Venkateswara University, Tirupati.

February 5th -7 th , 2017

Dr.A.S.N Chakravarthy

Faculty/S

tudents/

Research

Scholars

Sharing achievements of

Higher education

Two day National level

Awareness on

Programme

Establishing

Incubation-Innovation

Centers

JNTUK JNTUK 15th - 16th June 2017.

Dr.A.S.N Chakravarthy

Faculty Awareness on

Establishing Incubation

center and its

prominence

210

One day workshop on

“Empowering

Teaching Excellence

through E-Learning

platform”

JNTUK JNTUK 8th JULY 2017

Dr. L.Sumalatha

Faculty/S

tudents/

Research

Scholars

To learn various E-

Learning tools

Remote Internship

Programme

JNTUK TCS 9th DEC 2016– 11th April 2017

Dr. L.Sumalatha

Internal

Mentor

Research Guidance with

Industry

Assessment =

9.7 New Facility Created (15)

Specify new facilities created during the last three years for strengthening the curriculum

and/or meeting the POs:

• Student is sponsored financial support to attend workshops and conferences.

• CSI Student Chapter initiative to organize various technical events.

• Established Advanced Computing Lab with High Performance Computing facilities

185 High end Personal Computers Workstations equipped with GPU cards (CUDA SERVER) IBM DUAL XEON Processor Server with 320 GB HD, 4GB RAM WINDOWS 2003/Red Hat Linux OS IBM P520 SERVER with 2 x 1.5 GHz CPUs,4GB Memory, 4 x 146 GB HD,DVD ROM, AIX OS

• Students are being trained for national level competitive exams.

• Students are involving as organizers in conducting various co-curricular activities like Technical

Fests/events in the department

• Special Campus Recruitment Training (CRT) sessions are provided for motivating students and make them

to be ready for placements..

• Students are able to acquire leadership and communication skills and project management technologies to

work in a team (Inter personal Skills).

9.8 Overall Improvements since last accreditation, if any, otherwise, since the commencement of the

programme (20)

Specify the overall improvement:

Specify

the

strengths

/

weakness

Improveme

nts brought

in

Contribut

e d by

List the PO(s),

which are

strengthene

d

Comments

, if any

CAY Established Advanced

Computing Lab with

High Performance

Facility

JNTUK PO2, PO3, PO4 Students able to

use and practice

advanced

Computing

Techniques and

tools

211

Inclusion of Seminar

to the Curriculum

JNTUK PO8, PO10 Students are able to

improve

presentations and

Self learning

abilities CAYm1 Conduct of Campus

Recruitment Training

classes for Students

JNTUK PO6, PO7, PO8, PO10 To improve the

interpersonal skills

and professional

behavior

Organizing Technical

Fest in the

Department

JNTUK PO6, PO7, PO8, PO10 To improve the

interpersonal skills

CAYm2 Provides E-Class

Rooms with LCD

projector, PC with

Internet connection

JNTUK PO1, PO2, PO10 To create

qualitative

Teaching – learning

environment

212

Declaration The head of the institution needs to make a declaration as per the format given

below:

This Self- Assessment Report (SAR) is prepared for the current academic year ( ) and the current

financial year ( ) on behalf of the institution.

I certify that the information provided in this SAR is extracted from the records and to the best of my

knowledge, is correct and complete.

I understand that any false statement/information of consequence may lead to rejection of the

application for the accreditation for a period of two or more years. I also understand that the National

Board of Accreditation (NBA) or its sub-committees will have the right to decide on the basis of the

submitted SAR whether the institution should be considered for an accreditation visit.

If the information provided in the SAR is found to be wrong during the visit or subsequent to grant of

accreditation, the NBA has right to withdraw the grant of accreditation and no accreditation will be

allowed for a period of next two years or more and the fee will be forfeited.

I undertake that the institution shall co-operate with the visiting accreditation team, shall

provide all desired information during the visit and arrange for the meeting as required for

accreditation as per the NBA’s provision.

I undertake that, the institution is well aware of the provisions in the NBA’s

accreditation manual concerned for this application, rules, regulations and notifications in force as

on date and the institute shall fully abide by them.

Place: Signature, Name, and Designation of the

Date: Head of the Institution with seal