m.tech - information technology - jntucek...engineering, kakinada was established in the year 1990....
TRANSCRIPT
1
Self-Assessment Report (SAR)
For Accreditation of Postgraduate Engineering
Programme (TIER-I)
M.Tech - Information Technology
PART-A & PART-B
submitted by
Department of Computer Science and Engineering
J.N.T.U. College of Engineering Kakinada (A),
Jawaharlal Nehru Technological University Kakinada
Kakinada Andhra Pradesh
To
NATIONAL BOARD OF ACCREDITATION
New Delhi - 110003, India
2
Contents
Title Page No.
PART- A
1. Institutional Information 05
09 2. Departmental Information
3. Programme Specific Information 14
PART- B
1. Vision, Mission and Programme Educational Objectives 16
2. Programme Outcomes 30
3. Programme Curriculum 60
4. Students’ Performance 117
5. Faculty Contributions 124
6. Facilities and Technical Support 147
7. Teaching-Learning Process 154
8. Governance, Institutional Support and Financial Resources 167
9. Continuous Improvement 188
Declaration 212
3
Self-Assessment Report (SAR)
for
NBA Accreditation of Postgraduate
Engineering Programme
PART-I
INSTITUTIONAL SUMMARY
University College of Engineering Kakinada (A),
Jawaharlal Nehru Technological University Kakinada
Kakinada Andhra Pradesh
National Board of Accreditation
New Delhi, India
2017
5
I. Institutional Information
I.1.Name and address of the institution and affiliating university:
J.N.T. University College of Engineering Kakinada (A)
Jawaharlal Nehru Technological University Kakinada
Pithapuram Road, KAKINADA, East Godavari District
Pin: 533 003, Andhra Pradesh, INDIA
I.2.Name, designation, telephone number, and e-mail address of the contact person for the NBA: Dr. G.V.R. Prasada Raju, Principal Ph: 0884-2300823(O); Fax: 0884- 2386516 Mobile: 09618522555 Email: [email protected]
I.3.History of the institution (including the date of introduction and number of seats of various programmes of study along with the NBA accreditation, if any) in a tabular form:
Year Description Intake 1946 College started with the fallowing programmes (Intake Strength)
1. Civil Engineering 40 2. Mechanical Engineering 40 3. Electrical and Electronics Engineering 40
1958 Telecommunication Engineering 15
1972 Telecommunication Engineering converted into Electronics and 50
Communication Engineering
1975 Intake increased to
1. Civil Engineering 50 2. Mechanical Engineering 50 3. Electrical and Electronics Engineering 50
1987 Additional course started
1. Computer Science and Engineering 15 2002 Intake increased to 50
Computer science and Engineering
S.No. Description Intake Year of Accreditation
Strength Establishment Status
1 Civil Engineering 50 1946 YES
2 Mechanical Engineering 50 1946 YES
3 Electrical and Electronics Engineering 50 1946 YES
4 Electronics and communication 50 1958 YES
Engineering
5 Computer Science and Engineering 50 1988 YES
6 Petrochemical Engineering 50 2009 No
7 Petroleum Engineering 50 2010 No
6
Sl. No. Program Intake Year of Establishment
1. Soil Mechanics & Foundation Engineering 18+7* 1974 – 75
2. Structural Engineering 18+7* 2002 – 03
3. Advanced Electrical Power System 18+7* 2002 – 03
4. High Voltage Engineering 18+7* 1972 – 73
5. CAD/CAM 18+7* 2001 – 02
6. Machine Design 18+7* 1972 – 73
7. Instrumentation & Control Engineering 18+7* 1975 – 76
8. Computer & Communication 18+7* 2005 – 06
9. Computer Science and Engineering (CSE) 18+7* 2002 – 03
10. Information Technology 18+7* 2011 – 12 11. Petroleum (Pipeline) Engineering 18+7* 2014 – 15 * Sponsored category - seats filled by the University
I.4.Ownershipstatus:Govt. (central/state) / trust/ society (Govt./NGO/private)/ Private/ other: State Government
I.5.Mission and Vision of the Institution:
VISION: To be a premier institute of excellence developing highly talented holistic human capital that contributes to the nation through leadership in technology and innovation through engineering education.
MISSION:
• To impart Personnel Skills and Ethical Values for Sustainable Development of the Nation.
• To create Research & Industry oriented centers of excellence in all engineering disciplines.
• To be a renowned IPR generator and repository for innovative technologies. • To develop Research and Industry oriented technical talent. • To benchmark globally the academic & research output.
7
I.6.OrganizationalStructure:
Organizational chart showing the hierarchy of academics and administration is to be included
I.7.Financialstatus: Govt.(central/state)/grants-in-aid/not-for-profit / private self-Financing /other: State Government
I.8.Natureof the trust/society: It’s a Govt. Institute and not under any trust or society.
I.9.External sources of funds:
Name of the external CAY
CAY m1 CAY m2 CAY m3 source
2016-17 2015-16 2014-15 2013-14 ICS 2,12,93,243 70,35,015 57,91,747 67,88,319
I.10. Internally acquired funds:
Name of the CAY CAY m1 CAY m2 CAY m3
internal source
2016-17 2015-16 2014-15 2013-14
Students‘ fee 1,86,04,272 1,95,98,198 1,76,95,346 1,38,89,670
8
I.11. Scholarships or any other financial assistance provided to students
(Instruction: If any scholarship or financial assistance is provided to the students, then the details of such assistance over the last three financial years have to be listed here. Also mention needs to be made of the basis for the award of such scholarship).
Type of scholarship 2016-17 2015-16 2014-15 2013-14
SC 31,01,360 33,48,560 27,75,340 30,84,230
ST 9,80,540 10,42,720 11,67,440 6,99,200
OBC 74,24,980 79,55,680 64,56,140 27,29,500
Minorities 9,22,242 11,72,192 92,887 7,26,195
General 25,08,300 35,04,300 33,80,900 27,29,500
TEQIP-II for PG 98,13,805 41,62,586 59,25,497 36,00,000
TEQIP-II for PhD 35,61,561 41,39,788 37,13,285 12,96,000
I.12Basis/criterion for admission to the institution: GATE, State Level Entrance Examinations PGECET for PG Courses and EAMCET and ECET for UG Programs (Conducted by Andhra Pradesh state Government)
I.13Total number of engineering students:
CAY CAY m1 CAY m2 CAY m3 2016-17 2015-16 2014-15 2013-14
Total no. of boys: 1116 1079 1082 1054 Total no. of girls: 792 795 751 684 Total no. of students: 1908 1874 1833 1738
I.14Total number of employees
(Instruction: Total number of employees, both men and women, has to be listed here.
The data may be categorized in a tabular form as teaching and supporting staff.)
Minimum and maximum number of staff on roll in the engineering institution, during the CAY and the previous CAY (1st July to 30th June):
A. Regular Staff
Items
CAY CAY m1 CAY m2 CAY m3
2016-17 2015-16 2014-15 2013-14
Min Max Min Max Min Max Min Max
Teaching staff in engineering
M 59 65 61 65 63 65 65 65
F 23 24 24 24 24 24 24 24
Teaching staff in science & humanities
M 5 7 6 7 6 7 7 7
F 2 2 2 2 2 2 2 2
Non-teaching Staff
M 98 98 97 97 97 97 97 97
F 18 18 16 16 16 16 16 16
9
• Total Sanctioned Teaching Posts – 118
• Total Sanctioned Non teaching Posts – 243
(Instruction: Staff strength, both teaching and non-teaching, over the last three
academic years has to be listed here.)
B. Contract Staff
II. Departmental information
II.1. Name and address of the department:
Department of CSE, J.N.T.University College of Engineering (Autonomous), JNTU Kakinada, East Godavari Dist, Andhra Pradesh- 533003
II.2.Name, designation, telephone number, and email address of the contact person for the NBA:
Dr. A. Krishna Mohan, Professor& Head, Department of CSE,
J.N.T. University College of Engineering (Autonomous), J.N.T.U. Kakinada, East Godavari Dist, Andhra Pradesh- 533003 Mob: 9640027540, Email:[email protected]
II.3.History of the department including date of introduction and number of seats of various programmes of study along with the NBA accreditation, if any:
Programme Description
UG in CSE. Started with 15 seats in 1988,
Intake increased to 50 in 2002
PG in CSE
Computer Science And
Engineering
Started as CS with 25 seats in 2002
Changed as CSE in 2010
Items
CAY CAY m1 CAY m2 CAY m3
2016-17 2015-16 2014-15 2013-14
Min Max Min Max Min Max Min Max
Teaching staff in engineering
M 29 29 22 22 20 20 29 39
F 28 28 18 18 17 17 24 24
Teaching staff in science & humanities
M 20 20 20 20 23 23 18 21
F 10 10 11 11 10 10 14 14
Non-teaching Staff
M 96 96 95 95 84 84 82 95
F 26 26 27 27 19 19 18 27
10
PG in
Information Technology
Started with 25 seats in 2011
MCA Started with 30 seats in 1996
II.4.Mission and Vision of the Department (The department is required to specify its Mission and Vision).
About the Department of CSE:
The Department of Computer Science and Engineering, J.N.T.University College of
Engineering, Kakinada was established in the year 1990. The PGDCA Program was initiated
in the year 1987 - 1988 and was the first Computer Oriented course to be offered. This
course was initially started in the ECE Department. In the year 1989 - 1990, B.Tech.
Program in Computer Science and Engineering was started and was the second computer-
related program, which was also offered from the ECE Department for that year only.
Later, after the establishment of CSE Department separately in 1990, it continued to offer
the above-mentioned two courses. From 1996, M.C.A. program was started, from 2000-
2001 M.Tech CSE (Daytime) and from 2011 M.Tech IT.
The Academic Programmes for B.Tech., M.Tech. and M.C.A. are being modified
every two/three years to meet the needs of the industry. The Board of Studies in CSE
consists of 2 eminent professors from other universities and 2 well known industrialists
apart from 4 professors within our institute. Thus, our academic programs are more need
based rather than completely theory-oriented.
This department is equipped with the state-of-the-art computer laboratories and
laboratories required to cater to the needs of undergraduate and post graduate
programmes. In addition, active research is conducted in the realms of modeling,
engineering and understanding of software systems related to distributed, cognitive,
security, language engineering, databases, wireless networks, web services, cognitive
informatics and computer ergonomics domains of computing.
The Alumni of this department are occupying high positions in Multi-National
Companies like Microsoft in India and abroad, and software tycoons like TATA
Consultancy Services (TCS), Satyam, and Infotech etc. The department organized
successfully several National seminars, Workshops, and student paper contests. Most of
the students of this department are securing the jobs in reputed National and
International organizations through campus recruitments.
This department is actively involved in modernizing and developing the
laboratories with World Bank project, Technical Education Quality Improvement
Programme. All laboratories, which are useful for undergraduate programme, are
strengthened by procuring necessary equipment to conduct various experiments and
projects. In addition, new laboratories in the area of Software Testing, Internet
Technologies, Programming Languages and Data Engineering are developed to cater to
the needs of existing programmes. However, these facilities are to be augmented further
11
with new equipment to improve the facilities and to offer new post graduate
programmers. In addition, new faculty members (having expertise to teach advanced
subjects) are to be recruited. Building space is to planned and obtained for the new
courses. Library books have to be procured as per the new PG programmes to be offered.
Presently, the faculty of this department has expertise in various advanced fields in the
state-of-the-art technologies.
Vision and Mission of the Department
Vision:
Department of Computer Science and Engineering strives rigorously to impart intellectual environment with global standards that fosters the search for new knowledge in a highly dynamic computing-centric society through research & applied efforts.
Mission:
▪ To provide quality education in both theoretical and applied foundations of computer
science and train the students to solve the real world problems effectively thus enhancing
their potential for high quality careers.
▪ To facilitate the students and faculty to inculcate the research culture to advance the state
art of computer science and integrate research innovations in multi- disciplinary fields.
▪ To equip student / faculty with excellent teaching learning capabilities through advanced
learning tools and technologies.
▪ To produce students with critical thinking and lifelong learning capabilities to apply their
knowledge to uplift the living standards of the society.
▪ To produce students with enriched skill set, professional behavior, strong ethical values
and leadership capabilities so as to work with commitment for the progress of the nation.
12
II.5.List of the programmes/ departments which share human resources and/or the facilities of this department/programme (in %):
(Instruction: The institution needs to mention the different programmes
which share the human resources and facilities with this
department/programme being accredited.)
Name of the Programme & Specialization
Name of the Course (Theory)
Name of the Course (Laboratory)
Resources
Faculty Labs
I B.Tech ( ECE, ME, EEE, Civil, PE, PCE)
C Programming C Programming
√ √
IT Workshop IT Workshop √ √
IV B.Tech EEE Data Base Management Systems
√
IV B.Tech ECE TCP/IP √
IV B.Tech ECE Operating Systems √
I M.Tech Telecommunications
C++ C++ √
II.6. Total number of students:
UG: 214* P.G: 170
II.7.Minimum and maximum number of staff on roll during the current and three previous Academic years (1st Julyto30th June) in the department:
Items CAY(2015-16) CAY m1(2014-15) CAY m2(2013-14) CAYm3(2012-13)
Min. Max. Min. Max. Min. Max. Min. Max.
Teaching staff in the department
15(R)+ 17(A)
15(R)+ 17(A)
15(R)+ 13(A)
15(R)+ 13(A)
16(R)+ 13(A)
16(R)+ 13(A)
16(R)+ 13(A)
16(R)+ 13(A)
Non-teaching staff
8(R)+ 2(A)
8(R)+ 2(A)
8(R)+ 2(A)
8(R)+ 2(A)
8(R)+ 2(A)
8(R)+ 2(A)
7(R)+ 1(A)
7(R)+ 1(A)
Total 42 38 39 39
Note: R- Regular Staff, A-Ad-Hoc Staff.
13
II.7.1. Summary of budget for the CFY and the actual expenditure incurred in the
CFYm1, CFYm2and CFY3 (for the Department):
Items B
ud
gete
d in
CFY
20
16
-17
Act
ual
Exp
en
ses
in
CFY
20
16
-17
Bu
dge
ted
in C
FYm
1
20
15
-16
Act
ual
Exp
en
ses
in
CFY
m1
2
01
5-1
6
Bu
dge
ted
in C
FYm
2
20
14
-15
Act
ual
Exp
en
ses
in
CFY
m2
2
01
4-1
5
Bu
dge
ted
in C
FYm
3
20
13
-14
Act
ual
Exp
en
ses
in
CFY
m3
2
01
3-1
4
Lab Equipment 600000 590885 1500000 1454560 300000 292600 250000 283275
Lab Equipment (with TEQIP-II)
250000 262500 70000 70854 550000 571598 6000000 6095258
Software (with TEQIP-II)
700000 700000 225000 243260 3000000 3023879
Lab consumable --- --- 150000 137680 200000 209152 200000 192100
Maintenance and spares
--- --- --- --- --- --- --- ---
Training & Travel (with TEQIP-II)
1100000 1127725 800000 822163 900000 940392 850000 862345
Misc. expenses for academic activities
--- --- --- --- --- --- 60000 60000
Total 2650000 2681110 2520000 2485257 2175000 2257002 10360000 10516857
14
III. Programme Specific information
III.1. Name of the Programme
PG in Information Technology
(List name of the programme, as it appears on the graduate’s certificate and transcript, and abbreviation used for the programme.)
II.2. Title of the Degree
(List name of the degree title, as it appears on the graduate’s certificate and transcript, and abbreviation used for the degree.) Masters of Technology: M.Tech
III.3. Name, designation, telephone number, and email address of the Programme coordinator for the NBA:
Dr. MHM Krishna Prasad, Professor, Department of CSE,
J.N.T. University College of Engineering (Autonomous), J.N.T. University Kakinada East Godavari dist, Andhra Pradesh-533003. Mobile: +91-9989337589 Email.: [email protected]
III.4. History of the programme along with the NBA accreditation, if any:
Programme
Description
PG in. M.Tech IT
Started with 25 seats in 2011
First time applying for NBA
III.5.Deficiencies, weaknesses/concerns from previous accreditations:
This is the first accreditation application for PG programme
III.6.Totalnumber of students in the programme: 50(I Year: 25+ II Year 25)
15
III.7.Minimum and maximum number of staff for the current and three previous academic years
(1st July to 30th June) in the programme:
II.8.Summaryof budget for the CFY and the actual expenditure incurred in the
CFYm1, CFYm2 and CFY3 (exclusively for this programme in the department): *Budget expenditure is shared for UG and PG courses of the department
Programme Specific Budget Allocation and Utilization for IT
I.T. Course Budget Allocation and Utilization
Items
Bu
dge
ted
in C
FY
20
16
-17
Act
ual
Exp
en
ses
in C
FY
20
16
-17
Bu
dge
ted
in C
FYm
1
20
15
-16
Act
ual
Exp
en
ses
in
CFY
m1
20
15
-16
Bu
dge
ted
in C
FYm
2
20
14
-15
Act
ual
Exp
en
ses
in
CFY
m2
2
01
4-1
5
Bu
dge
ted
in C
FYm
3
20
13
-14
Act
ual
Exp
en
ses
in
CFY
m3
2
01
3-1
4
Lab Equipment 180000 177265 450000 436368 90000 87780 75000 84982
Lab Equipment (with TEQIP-II)
75000 78750 21000 21256 165000 171479 1800000 1828577
Software (with TEQIP-II)
210000 210000 --- --- 67500 72978 900000 907163
Lab consumable --- --- 45000 41304 60000 62745 60000 57630
Maintenance and spares
--- --- --- --- --- --- --- ---
Training & Travel (with TEQIP-II)
330000 338317 240000 246649 270000 282117 255000 258703
Misc.expenses for academic activities
--- --- --- --- --- --- 18000 18000
Total 795000 804332 756000 745577 652500 677099 3108000 3155055
Items
CAY CAY m1 CAY m2 CAY m3
Min. Max. Min. Max. Min. Max. Min. Max.
Teaching staff with the program
3 6 3 6 3 6 3 6
Non-teaching staff
2 2 2 2 2 2 2 2
16
PART B
1.Vision, Mission and Programme Educational Objectives (75) 1.1.Vision and Mission (5) 1.1.1. State the Vision and Mission of the institute and department(1)
(List and articulate the vision and mission statements of the institute and department)
INSTITUTE
Jawaharlal Nehru Technological University Kakinada is formed in the year 2008. JNTU College of
Engineering Kakinada is one of the constituent colleges of this University playing a significant role
since 1946 in imparting technological education in the state of Andhra Pradesh. It was a constituent
college of Jawaharlal Nehru Technological University, Hyderabad and recently this Institute has been
upgraded as Jawaharlal Nehru Technological University Kakinada. The college won appreciation for
judicious effective utilization of TEQIP-I funds and has been under TEQIP-II.
VISION
To be a premier institute of excellence developing highly talented holistic human capital that
contributes to the nation through leadership in technology and innovation through engineering
education.
MISSION
M1 To impart Personnel Skills and Ethical Values for Sustainable Development of the Nation
M2 To create Research & Industry oriented centers of excellence in all engineering disciplines
M3 To be a renowned IPR generator and repository for innovative technologies
M4 To develop Research and Industry oriented technical talent
M5 To benchmark globally the academic & research output
17
DEPARTMENT The Department of Computer Science & Engineering at University College of Engineering
Kakinada is formally established in 1989.It has NBA accreditation and TEQIP – II grant for promoting
research. The labs are equipped with state of art technology. The faculty is specialized in the areas of
Data Mining, Image Processing, Information Security and Computer Networks. The department aims at
promoting industry oriented research. It has MoU with TCS Ltd, Chicago State University and Loment
Technologies Ltd., USA for joint research collaboration. Department of CSE has NBA accreditation for
UG for 3 years (2016-2019) and M.Tech CSE for 3 years (2017-2020).
VISION
Department of Computer Science and Engineering strives rigorously to create intellectual academic
environment with global standards that fosters the search for new knowledge in a highly dynamic
compute-centric society through applied research.
MISSION
M1 To provide quality education in both theoretical and applied foundations of computer science and train the students to solve the real world problems effectively thus enhancing their potential for high quality careers.
M2 To facilitate the students and faculty to inculcate the research culture to advance the state-of-the art of computer science and integrate research innovations in multi-disciplinary fields.
M3 To equip students and faculty with excellent teaching-learning capabilities through advanced learning tools and technologies.
M4 To produce students with critical thinking and lifelong learning capabilities for applying their knowledge to uplift the living standards of the society.
M5 To produce students with enriched skill set, professional behavior, strong ethical values and leadership capabilities so as to work with commitment for the progress of the nation
1.1.2 Indicate how and where the Vision and Mission are published and disseminated (2)
18
(Describe in which media (e.g. websites, curricula, books, etc.) the vision and mission are published
and how these are disseminated among stakeholders)
Vision and Mission are published by displaying
➢ In the department portal of College web sitewww.jntucek.ac.in
➢ Curriculum and syllabus books
➢ On the notice board of the department.
➢ Display boards in the corridors in the Department.
1.1.3. Mention the process for defining Vision and Mission of the department (2)
(Articulate the process involved in defining the vision and mission of the department from the vision
and mission of the institute.)
Step1: Departmental Academic Committee articulates vision and mission in tune with vision and mission of the institution. Step2: The increased role of Computer Science and engineering in addressing the societal, industrial and research needs is embedded in the articulation of vision and mission of department Step3: The articulated vision and mission statements in step1 and 2 are reviewed and refined by Department Advisory Committee. Step4: Conformity and constituency in vision and mission of the department are examined through step1 and step3
1.2.Programme Educational Objectives (10)
1.2.1. Describe the Programme Educational Objectives (PEOs)(1)
(List and articulate the programme educational objectives of the programme under accreditation)
PEO’s: After completion of PG course students will become
Programme Educational Objectives
PEO 1. To produce IT professionals with in depth knowledge in software design , programming and analytical skills to cater the challenging industrial and societal needs in an effective manner with ethics and human values.
PEO 2. To produce Sustained learner to bring out creative and innovative ideas by addressing the research issues/ to serve as faculty for IT education.
PEO 3. To produce entrepreneurs in IT with good interpersonal and managerial skills to survive in multidisciplinary fields.
1.2.2. State how and where the PEOs are published and disseminated (1)
(Describe in which media (e.g. websites, curricula, books, etc.) The PEOs are published and how these are disseminated to stakeholders)
19
PEOs are published by displaying
➢ In the department portal of College web site www.jntucek.ac.in
➢ Curriculum books
➢ Display boards in the department office, library and laboratories.
➢ Display boards in the corridors in the Department.
1.2.3. List the stakeholders of the programme (1)
(List stakeholders of the programme under consideration for accreditation and articulate their relevance)
Stakeholder Relevance
Students Primary beneficiary of the programme.
Faculty
A key stakeholder in conducting the programme through mentoring the students, revising the curriculum and evaluating students.
Alumni Bridge the gap between institution and industry to promote the industry - institution symbiosis.
Parents Expectations of parents helpthe department to design the programme / realign the approaches to provide better education and employability
Educational and research Institutions
Post Graduates can serve as faculty or researchers with required teaching-learning and research abilities.
Industry as Employer
• Post Graduates can serve as an employee with required skill set.
• Employer satisfaction with students education provides the measure of programme success
Experts from premier Institutions/Universities
To improve quality of the programme
1.2.4. State the process for establishing the PEOs(3)
(Describe the process that periodically documents and demonstrates that the PEOs are based on the needs of
the programme various stakeholders.)
20
S.No. Process Frequency
of
interaction/
Year
Recommendations/Considerations
1 Alumni Interaction 1 To share Real time experience of their
employment
2 Industry
Interaction with
department
1 To get the knowledge of industrial
needs
To adopt upcoming technologies
3 Interaction with
parents
1 To know the aspirations and
expectations.
4 Feedback by
students –subject
wise
2
(1/Semester)
To assess the quality of teaching
methodologies and capabilities of
teacher
5 Exit Feedback
from outgoing
students
1 To assess the programme educational
objectives
To improve the student needs in both
co-curricular/ extracurricular
activities
6 Board of Studies
meetings
Once in two
years
Based on stakeholders feedback to
redesign curriculum by programme
experts
21
1.2.5. Establish consistency of the PEOs with the Mission of the institute (4)
(Describe how the Programme Educational Objectives are consistent with the Mission of the department.)
The picture shows the consistency and qualitative relevance (High, Medium, and Low) of PEOs with mission of institute and mission of the department
Key components From Department Mission PEO 1 PEO 2 PEO 3 M1. To provide quality education in both theoretical and applied foundations of computer science and train the students to solve the real world problems effectively thus enhancing their potential for high quality careers. M2. To facilitate the students and faculty to inculcate the research culture to advance the state-of-the art of computer science and integrate research innovations in multi-disciplinary fields. M3. To equip students and faculty with excellent teaching-learning capabilities through advanced learning tools and technologies. M4. To produce students with critical thinking and lifelong learning capabilities for applying their knowledge to uplift the living standards of the society. M5. To produce students with enriched skill set, professional behavior, strong ethical values and leadership capabilities so as to work with commitment for the progress of the nation
To produce IT
professionals with in
depth knowledge in
software design,
programming and analytical skills to cater
the challenging industrial and societal needs in an
effective manner with
ethics and human values.
To produce Sustained learner to bring out creative and innovative ideas by addressing the research issues/ to serve as faculty for IT education
To produce entrepreneurs in IT with good interpersonal and managerial skills to survive in multidisciplinary fields.
Quality education High Medium
Medium
Research Medium High Low
Teaching-Learning Medium High Medium
Sustained Learning High High
Medium
Social Responsibility with ethics High Medium
High
1.3. Achievement of Programme Educational Objectives (20)
1.3.1. Justify the academic factors involved in achievement of the PEOs (10)
(Describe the broad curricular components that contribute towards the achievement of the Programme Educational Objectives.)
➢ Attainment of PEOs through curricular components as shown in the picture.
• Innovative Curriculum Revision to meet gap between old & revised PEOs and to meet
industrial challenges
• Inclusion of Core subjects to gain the Knowledge of the Programme
• Inclusion of Elective subjects to equip knowledge of recent technologies and research
perspectives.
• Inclusion of project work to make the students to address the real world problems in
core and specific domain with cutting edge technologies.
22
• Inclusion of seminar to enhance self learning and presentation skills.
➢ Attainment of PEOs through other academic factor:
1. From Surveys of stakeholders : By conducting periodical surveys of Alumni, Industry, Students, faculty,
2. Preparation of course file by concerned faculty and provision to students at the time of admission
3. Follow the lesson plan and course schedule by the faculty. 4. Regular updates of Attendance registers indicating the topic taught and the reason
for the class is not being conducted 5. Log files
23
1.3.2. Explain how the administrative system helps in ensuring the achievement of the PEOs (10)
(Describe the committees and their functions, working process and related regulations.)
• Encourage and provide financial support to faculty and students to attend and conduct International/National workshops or seminars or conferences etc.
• Encourage and provide financial support to faculty and students to publish/present papers in technical, peer refereed National and International journals and conferences/seminars.
Academic factors- Curricular Components for the Achievement of PEO
Course Code
Course Title PEO1 PEO2 PEO3 Contribution
Theory High High High
MIT1.1 ADVANCED DATA STRUCTURES
✓ ✓ • For fundamental and advanced knowledge to address the challenging problems in Industry and Society
• To promote research in multi disciplinary fields
MIT1.2 ADVANCED GRAPH THEORY ✓ ✓
MIT1.3 PARALLEL ALGORITHMS ✓ ✓ ✓
MIT1.4 DATA MINING AND KNOWLEDGE DISCOVERY
✓ ✓ ✓
MIT1.5 ADVANCED COMPUTER NETWORKS
✓ ✓ ✓
MIT1.6 DISTRIBUTED PROGRAMMING APPLICATIONS THROUGH JAVA
✓ ✓ ✓
MIT2.1 ADVANCED UNIX PROGRAMMING
✓ ✓
MIT2.2 INFORMATION SECURITY ✓ ✓ ✓
MIT2.3 SOFT COMPUTING ✓ ✓ ✓
Electives High High Moderate
Elective 1 MIT2.4
ADHOC & SENSOR NETWORKS ✓ ✓ ✓ • For research interests and to enhance the knowledge in specific domain
• To promote research in multi disciplinary fields
• To address challenging problems related to industry and society
SEMANTIC WEBSERVICES ✓ ✓ ✓
UML AND DESIGN PATTERNS ✓
Elective 2
MIT2.5
MACHINE LEARNING
✓ ✓ ✓
INFORMATION RETRIEVAL SYSTEM
✓ ✓ ✓
ANIMATION & GAMING ✓ ✓ ✓
Elective 3
MIT 2.6
CLOUD COMPUTING
✓ ✓
IMAGE PROCESSING & PATTERN RECOGNITION
✓ ✓
INFORMATION STORAGE MANAGEMNT
✓ ✓
Practical High High Moderate
MIT1.7 IT LAB I ✓ ✓ ✓ • For Sound Applied foundations rendering solutions with the usage of modern tools and technology
MIT 2.7
IT LAB 2
✓ ✓ ✓
Project Work High High High • To address real world problems with expertise in the state-of-art of Computer science and Information Technology
• To enhance interpersonal skills with human and ethical values
Seminar Moderate High Moderate • To impart professional and presentation skills
24
• Encourage and provide financial support to faculty and students by conducting National and International technical meets.
• Depute faculty to technical teacher training programs.
• Support faculty for industrial visits on deputation for acquiring field knowledge and real time experience.
• To provide financial support for inviting external experts to deliver guest lecturers to students.
• PG students and faculty have been benefited through TEQIP II for attending workshops, short term courses and conferences.
• PG students admitted through PGCET are given scholarship under TEQIP-II
• JNTUK Library has subscribed to various International Journals.
• Faculty and Students can access online journals with institute user name and password.
The following administrative setup is put in place to ensure the attainment of PEOs ▪ Program Coordinator
▪ Course Coordinator
▪ Department Advisory Committee
Program Coordinator
Interacts and maintains liaison with key stake holders, students, faculty, Department Head and employer.
Monitor and reviews the activities of each year in program independently with course coordinators
Schedules program work plan in accordance with specifications of program objectives and outcomes
Oversees daily operations and coordinates activities of program with interrelated activities of other programs, departments or staff to ensure optimum efficiency and compliance with appropriate policies, procedures and specifications given by HOD.
Conducts and interprets various surveys required to assess POs and PEOs Course Coordinator
Coordinates and supervise the faculty teaching the particular course in the module Responsible for assessment of the course objectives and outcomes Recommend and facilitate workshops, faculty development programs, meetings or
conferences to meet the course outcomes Analyzes results of particular course and recommends the Program coordinator and/or
Head of the Department to take appropriate action Liaise with students, faculty, program coordinator and Head of the Department to
determine priorities and policies
Department Advisory Committee (DAC) DAC consists of head of the department, program coordinators, and the representatives
of key stake holders DAC chaired by head of the department, receives the report of the Program Assessment
Committee and monitors the progress of the program
25
DAC on current and future issues related to programs Develops and recommends new or revised program goals and objectives DAC meets at least once in a year to review the programs
1.4. Assessment of the achievement of the Programme Educational Objectives (35)
1.4.1. Indicate tools and processes used in assessment of the achievement of the PEOs (5)
Describe the assessment process that periodically documents and demonstrates the degree to which the Programme Educational Objectives are attained. Also include information on: a) Listing and description of the assessment processes used to gather the data upon which the evaluation of each programme educational objective is based. Examples of data collection processes may include, but are not limited to, employer surveys, graduate surveys, focus groups, industrial advisory committee meetings, or other processes that are relevant and appropriate to the programme. b) The frequency with which these assessment processes are carried out.
The process that is adopted to assess the achievement of the PEOs Tool Process Frequency/Year PEOs
Examinations ( Internal & External)
To evaluate the performance of students regularly. To assess student’s fundamental knowledge and problem solving skills.
4( 2/sem)
PEO1 PEO2
Alumni/ Employer Surveys
To assess the expertise of students in accordance with industrial needs. To assess mapping levels of the program outcomes with industrial and societal needs
1 PEO1 PEO2 PEO3
Assignments, Quizzes and Seminars
To assess the creativeness and innovativeness of the students in tune with research perspectives. To assess the levels of teaching–learning capabilities.
6 (3/sem)
PEO1 PEO2
Presentations and Projects
To assess the leadership qualities and self learning capabilities.
Project: 1 Reviews: 2
PEO2 PEO3
1.4.2. Provide the evidence for the achievement of the PEOs (30)
a) The expected level of attainment for each of the programme educational objectives;
b) Summaries of the results of the evaluation processes and an analysis illustrating the extent to which each of the programme educational objectives is being attained and; c) How the results are documented and maintained.
26
For evidence towards direct Attainment:
• Course Results
• Mapping of POs and PEOs
• Attainment values of PEOs
For evidence towards Indirect Attainment:
Evaluation Process for achievement of PEO's
Expected Level of Attainment Summary of results of the evaluation process
How the results are documented and maintained
PEO1 PEO2 PEO3
Conducting Class work High Moderate Low All courses have been conducted in all semesters
Record of time tables in each semester with the allotted faculty is available
Attendance Records of students High Moderate Low Every class is recorded with the attendance by the concern faculty
Attendance records are available with the academic section
Lesson Plans, Course files High Moderate Moderate Every Courses are delivered as per the lesson plan
Lesson plans are recorded in Attendance Records
Conducting Internal Examinations (Two per Semester for each course)
High Moderate Low
Academic calendar has been designed with class work, Internal and External Examinations
Record of Internal examination answer scripts and marks are maintained with the academic section
Conducting external examinations at the end of the semester
High Moderate Moderate Question papers are prepared with the specified syllabus
Copies of end semester question papers and answer scripts are available with the examination section
Conducting laboratories High High Moderate
Experiments are conducted as per the syllabus given and Lab records are updated weekly
Lab Attendance records are available with the academic section
Conduct internal and external laboratory exams in each semester
High High Moderate Internal and external exams are conducted
Records of internal and external laboratory results of each student along with their registration number are available with the academic section
Conducting Project Reviews three times in the duration of Project by Project Review Committee.
High High Moderate
Review meetings are conducted. Attendance of the students is recorded in the record
Record of attendance and status of the project is available in the department
Conducting Seminars two times during III Semester
Moderate Moderate High
Seminars are conducted by Project Review Committee. Attendance of the students is recorded in the record
Report is available in the department
To nominate some experts from the industry to Board of Studies to tailor the curricula and the syllabi to suit the needs of the industry. Likewise to invite eminent social activists to elicit their views on the societal needs relevant to the current state-of-art of Information Technology
Moderate Moderate High Board of Studies meetings are conducted before the start of academic year.
Record of BOS meetings is available with the academic section
27
• Placement Record
• Higher Studies Record
• Survey Record of Alumni and Industry
• Student Feed back The expected level of attainment for each of the programme educational objectives and Evidence
Type of Assessment
Expected level of attainment of PEOs (rubrics are 1 = Poor , 2 = Average , and 3 = Good )
Evidence LYG (2014-16)
PEO1 PEO2 PEO3
Direct
Examination Results (in percentage)
92 3 2 2
Project Reviews& Evaluations
(In percentage)
92 2 3 3
Indirect
Placements in Industry
(number of students)
11 3 2 2
Placements in Academia
(number of students)
10 3 3 2
Higher Studies Record (number of students)
04 2 2 2
Survey Record of Alumni
(1- Poor, 2-Average, 3- Good, 4 – Very Good,
5- Excellent)
04
3 2 2
Survey Record of Industry/Academia
(1- Poor, 2-Average, 3- Good, 4 – Very Good,
5- Excellent)
03 2 3 2
Graduate Survey (1- Poor, 2-Average, 3- Good, 4 – Very Good,
5- Excellent)
04 3 3 2
Analysis & Summaries of Evaluation Process & Evidence and documented in academic cell of University College of engineering Academic Year No of Students Examination
Results(pass %) Placements in
Industry/ Academia Registered for Higher
Education Project Reviews& Evaluations(% of Students recommended for submission)
LYG(2015-17) 24 91.3 2+placements are ongoing
-- 84
LYGm1 (2014-16)
25 92 21 01 92
LYGm2 (2013-15)
26 96.15 20 01 60
LYGm3 (2012-14)
25+2**
92.59 18 01 89
** Foreign Students
28
1.5. Indicate how the PEOs have been Redefined in the past (5)
(Articulate with rationale how the results of the evaluation of the PEOs have been used to review/redefine the PEOs)
The PEOs are redefined based on the evaluation of attainment of each PEO
• Step1 : Departmental Advisory Committee refines PEOs keeping in view the assessment & evaluation of PEOs and also the inputs of stakeholders(feedback from the alumni, employer, invited distinguished faculty, Industry, academia and market needs )
• Step2: They are also further refined in alignment with current state- of-the art and research trends and exit feedback.
• Step3: The PEOs are reviewed using SWOT analysis.
• Step4: Conformity and consistency in PEOs of the department are examined through step1 and step3.
30
2. Programme Outcomes (250)
2.1. Definition and Validation of Course Outcomes and Programme Outcomes (20) 2.1.1. List the Course Outcomes (COs) and Programme Outcomes (POs)(1)
(List the course outcomes of the courses in programme curriculum and programme outcomes of the
programme under accreditation)
Course Outcomes
R13 Course Structure
Course Code
Course Title(Course Category) L P C
MIT1.1 ADVANCED DATA STRUCTURES 4 0 3
MIT1.2 ADVANCED GRAPH THEORY 4 0 3
MIT1.3 PARALLEL ALGORITHMS 4 0 3
MIT1.4 DATA MINING AND KNOWLEDGE DISCOVERY 4 0 3
MIT1.5 ADVANCED COMPUTER NETWORKS 4 0 3
MIT1.6 DISTRIBUTED PROGRAMMING APPLICATIONS THROUGH JAVA 4 0 3
MIT1.7 IT LAB I 0 3 2
Course
Code
Course Title(Course Category) L P C
MIT2.1 ADVANCED UNIX PROGRAMMING 4 0 3
MIT2.2 INFORMATION SECURITY 4 0 3
MIT2.3 SOFT COMPUTING 4 0 3
MIT2.4 Elective 1
ADHOC & SENSOR NETWORKS
SEMANTIC WEBSERVICES
UML AND DESIGN PATTERNS
4 0 3
MIT2.5 Elective 2
MACHINE LEARNING
INFORMATION RETRIEVAL SYSTEM
ANIMATION & GAMING
4 0 3
MIT2.6 Elective 3
CLOUD COMPUTING
IMAGE PROCESSING & PATTERN RECOGNITION
INFORMATION STORAGE MANAGEMNT
4 0 3
MIT2.7 IT LAB 2 0 3 2
III SEMESTER
S.NO. SUBJECT L P C
1 SEMINAR-I 0 0 2
2 PROJECT WORK PART - I 0 0 18
31
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT1.2 ADVANCED GRAPH
THEORY
3 C 40 60
• Course Outcomes (COs):
1. Understand basic concepts in graph theory: coloring, planar graphs.
2. Write precise and accurate mathematical definitions of objects in graph theory
3. Describe and solve some real time problems using concepts of graph theory (e.g., scheduling problems).
4. Use some classical graph algorithms in order to find sub graphs with desirable properties
5. Find maximal flows in networks and give an account of how this method is connected with results of
Menger, Konig and Hall as well as solving certain problems by formulating them in terms of network flows
6. Compute and deduce properties of chromatic numbers and polynomials and identify certain problems as
graph colorings problems
7. .Apply results of Euler, Kuratowski-Wagner and Appel-Haken to deduce properties of (non)planar
graphs
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT1.3 PARALLEL ALGORITHMS 3 C 40 60
• Course Outcomes (COs):
1. Understand fundamental concepts of parallelism- pipeline, Amdahl's law.
2. Know the physical limits of linear approach and solving problems in parallel.
3. How to design & analyze parallel algorithms and implement them with parallel processors.
4. Understand various approaches in parallel sorting and Searching.
5. Gain knowledge on various parallel processor architectures and know how to embed one architecture into
another.
Subject Code
Subject Name Credits Core/Elective Internal marks External marks
MIT 1.1 ADVANCED DATA
STRUCTURES AND
ALGORITHM
3 C 40 60
• Course Outcomes (COs):
1. Ability to write and analyze algorithms for algorithm correctness and efficiency
2. Master a variety of advanced abstract data type (ADT) and data structures and their implementations
3. Master various searching, sorting and hash techniques and be able to apply and solve problems of real life
4. Design and implement variety of data structures including linked lists, binary trees, heaps, graphs and search
trees
5. Ability to compare various search trees and find solutions for IT related problems
IV SEMESTER
S.NO. SUBJECT L P C
1 SEMINAR-II 0 0 2
2 PROJECT WORK PART - II 0 0 18
TOTAL 20
32
Subject Code Subject Name Credits Core/Elective Internal
marks
External marks
MIT1.4 DATA MINING AND
KNOWLEDGE DISCOVERY
3 C 40 60
• Course Outcomes (COs):
1. An ability to understand the basics of types of data, quality of data, suitable measures required to perform data
analysis. (UNIT-I)
2. To understand various classification techniques to perform classification, model building and evaluation (UNIT-
II)
3. Identify the usage of association rule mining techniques on categorical and continuous data (UNIT III)
4. Identify suitable clustering algorithm (apply with open source tools), interpret, evaluate and report the
result(UNIT IV)
5. To understand the need of web mining (UNI-V)
6. Design and implement a data-mining application using synthetic, realistic data sets using open source tools viz.,
Weka
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT1.5 ADVANCED COMPUTER
NETWORKS
3 C 40 60
• Course Outcomes (COs):
Upon the successful completion of the course, students will be able to:
1.The Students will get good knowledge of Network layer functions and routing algorithms
2. The students will know different IP addressing techniques used in internet
3. The students will gains good knowledge about transport layer functions and protocols for data delivery in the
internet
4. The students will gains good knowledge about architecture of DNS, email, www and multimedia
5.The students will get good knowledge about design of Manets and Wireless Sensor networks and their
applications in reality
Subject Code Subject Name Credits Core/Elective Internal
marks
External
marks
MIT1.6 DISTRIBUTED
PROGRAMMING
APPLICATIONS THROUGH
JAVA
3 C 40 60
• Course Outcomes (COs):
The theory should be taught and practical should be carried out in such a manner that students are able to
acquire different learning out comes in cognitive, psychomotor and affective domain to demonstrate following
course outcomes.
1. Build simple distributed applications using Java’s networking capabilities
2. Build concurrent distributed applications using multiple threads
3. Build distributed applications with security enhancements using Java’s security and cryptographic
extensions.
33
4. Develop Java Applet Programming using various techniques
5. Develop applications using Abstract Window Toolkit
6. Update and retrieve the data from the databases using JDBC-ODBC.
7. Develop server side programs using servlets.
8. Develop Java Server Pages applications using JSP Tags
SNO
Subject Name Credits Core/Elective Internal marks External marks
MIT1.7 IT LAB-1 2 C 40 60
• Course Outcomes (COs):
1. Identify classes, objects, members of a class and relationships among them needed for a specific problem.
2. Analyze algorithms performance using A priori analysis and asymptotic notations.
3. Analyze and apply to solve the complex problems using advanced data structures (like arrays, stacks,
queues, linked lists, graphs and trees.
4. Ability to solve the real life problem using different algorithm design techniques
5. Using different data mining tools.
Subject Code Subject Name Credits Core/Elective Internal
marks
External marks
MIT2.1 ADVANCED UNIX
PROGRAMMING
3 C 40 60
• Course Outcomes (COs):
After learning the course, the student will be able to
1. Students will understand the basic set of commands and utilities in Linux/UNIX systems
2. Students will get good knowledge in Linux/UNIX library functions and system calls.
3. Student will gain some knowledge in UNIX administration.
4. Obtain a foundation for an advanced course in operating systems.
5. Understands various socket system calls that are used in network programming.
6. Student is able to develop one to one chat applications using various IPC system calls.
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT 2.2 Information Security 3 C 40 60
• Course Outcomes (COs):
Upon the successful completion of the course, students will be able to:
1. The learner will get good awareness regarding different security threats and countermeasures.
2. The students will know the basic principles of symmetric and asymmetric key cryptography
3. The students will gains good knowledge design and applications of hash algorithms and digital signatures.
4. The students will gains good knowledge at application layer security such as IP security, Web Security, email
Security and Firewalls.
34
Subject Code Subject Name Credits Core/Elective Internal
marks
External marks
MIT2.3 SOFT
COMPUTING
3 C 40 60
• Course Outcomes (COs):
1. Able to apply fuzzy logic and reasoning to handle uncertainty in engineering problems.
2. Make use of genetic algorithms to combinatorial optimization problems
3. Apply artificial intelligence techniques, including search heuristics, knowledge representation, planning
and reasoning.
4. Learn and apply the principles of self adopting and self organizing neuro fuzzy inference systems.
5. Evaluate and compare solutions by various soft computing approaches for a given problem
6. Evaluate and compare solutions by various soft computing approaches for a given problem.
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT2.4 ADHOC AND SENSOR
NETWORKS
3 E 40 60
• Course Outcomes (COs):
Upon completion of the course the student will be able to
1. Describe the principles and characteristics of mobile ad hoc networks (MANETs) and what distinguishes them
from infrastructure-based networks.
2. Describe the principles and characteristics of wireless sensor networks
3. Discuss the challenges in designing MAC, routing and transport protocols for wireless ad-hoc sensor networks.
4. Comprehend the various sensor network Platforms, tools and applications.
5. Describe the issues and challenges in security provisioning and also familiar with the mechanisms for
implementing security and trust mechanisms in MANETs and WSNs.
Subject Code Subject Name Credits Core/Elective Internal
marks
External marks
MIT2.4 SEMANTIC
WEBSERVICES
3 E 40 60
Course Outcomes (COs):
1. Understand the concept structure of the semantic web technology
2. How this technology revolutionizes the World Wide Web and its uses.
3. Understand the concepts of metadata, semantics of knowledge and resource, ontology, and their
descriptions in XML-based syntax and web ontology language (OWL).
4. Describe logic semantics and inference with OWL
5. Use ontology engineering approaches in semantic applications, program semantic applications with Java
API.
Subject Code Subject Name Credits Core/Elective Internal
marks
External
marks
MIT2.4 UML AND DESIGN
PATTERNS
3 E 40 60
35
• Course Outcomes (COs):
1. Design the Structural aspects of the System.
2. Design the Behavioral aspects of the System.
3. Understand and be able to apply incremental/iterative development
4. Understand common design patterns
5. Be able to identify appropriate patterns for design problems
6. Be able to evaluate the quality software source code
7. Be able to refractor badly designed program properly using patterns
Subject Code Subject Name Credits Core/Elective Internal
marks
External marks
MIT 2.5 Machine Learning 3 E 40 60
• Course Outcomes (COs):
By the end of course the student will be able
1. Familiarity with a set of well-known supervised, unsupervised and semi-supervised learning
Algorithms.
2. The ability to implement some basic machine learning algorithms
3. Understanding of how machine learning algorithms are evaluated
4. The ability to comprehend a Machine Learning conference paper (NIPS, ICML)
5. Design own machine learning algorithms
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT2.5 INFORMATION
RETRIEVAL SYSTEMS
3 E 40 60
• Course Outcomes (COs):
1. Understanding the basics of Information retrieval such as precision and recall
2. Understanding the data structures like Inverted Indices, signature files used in Information retrieval systems
3. Understanding the basics of web search
4. Understanding the different techniques for compression of an index including the dictionary and its posting
list
5. Understanding the different components of an Information retrieval system
6. Developing the ability of develop a complete IR system from scratch
7. Understand and implement with various types of string matching algorithms
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT 2.5 ANIMATION & GAMING 3 E 40 60
• Course Outcomes (COs):
1. Learn all aspects of game development from visual storytelling
2. Learn modeling of game development.
3. Learn texturing, lighting, rigging & animation of game development
36
4. Learn audio, user interface & game level design.
5. Basic understanding for the creation of 2D animation through the use of traditional techniques and stop-action
animation. Students create 2D objects and move them in time and space, then render them to video. Topics
include all twelve principles of animation.
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT2.6 CLOUD COMPUTING 3 E 40 60
• Course Outcomes (COs):
1. To explain the core concepts of the cloud computing paradigm: how and why this paradigm shift
came about, the characteristics, advantages and challenges brought about by the various models and
services in cloud computing.
2. To apply the fundamental concepts in datacenters to understand the tradeoffs in power, efficiency
and cost by Load balancing approach.
3. To discuss system virtualization and outline its role in enabling the cloud computing system model.
4. To illustrate the fundamental concepts of cloud storage and demonstrate their use in storage
systems such as Amazon S3.
5. Understanding the hardware necessary for cloud computing
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT2.6 IMAGE PROCESSING &
PATTERN RECOGNITION
3 E 40 60
• Course Outcomes (COs):
1. The student will get sound knowledge about pattern recognition.
2. The student can apply unsupervised learning techniques for pattern recognition
3. The student can apply supervised and supervised learning techniques for pattern recognition
4. One can get a clear sound knowledge about representation of digital image in memory and various operations
to get a clear enhanced image
5. The student will become expertise in applying mathematical concepts and techniques in image processing
Subject Code Subject Name Credits Core/Elective Internal
marks
External marks
MIT 2.6 INFORMATION STORAGE
MANAGEMENT
3 E 40 60
• Course Outcomes (COs):
1. Learn storage system and the different storage system models
2. Offer essential new material that explores the advances in existing technologies
3. Emergence of the "Cloud" as well as updates and vital information on new technologies.
4. Learn to make informed decisions across multiple technologies involving SAN, NAS, CAS, IP-SAN,
Backup and Recovery
5. Business Continuity, Security and Virtualization
37
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT 2.7 IT LAB 2 2 C 40 60
• Course Outcomes (COs):
On completion of this course the student should be able to:
1. Identify and use UNIX/Linux utilities to create and manage simple file processing operations, organize
directory structures with appropriate security, and develop shell scripts to perform more complex tasks.
2. Effectively use the UNIX/Linux system to accomplish typical personal, office, technical, and software
development tasks.
3. Effectively use software development tools including libraries, preprocessors, compilers, linkers, and make
files.
4. Comprehend technical documentation, prepare simple readable user documentation and adhere to style
guidelines.
5. Be familiar with the application of the Unified Modeling Language (UML) towards analysis and design.
6. Master the fundamental principles of OO programming.
Programme Outcomes:
PO1: The student shall possess fundamental and advanced knowledge of core discipline such as
networking and security, programming and computing and other IT applications.
PO2. Design and implement web enabled solutions for Information Technology problems with the
usage of different software design paradigms and patterns.
PO3. Develop higher order research skills and innovative ideas to solve unknown problems through
the application of appropriate research methodologies, techniques and tools. .
PO4. Learn and Work in competing open ended environment with modern engineering and IT tools
PO5. Obtain knowledge in cutting edge technologies to contribute positively towards collaborative
multidisciplinary scientific research.
PO6. Acquire leadership skills and project management techniques to manage projects efficiently to
work in teams.
PO7. Present their knowledge and ideas in any technical forum through the effective design of
documents and reports.
PO8. Engage in lifelong learning with commitment to acquire knowledge of contemporary issues to
meet the challenges in career.
PO9. Realize professional and ethical responsibility and act in accordance to social welfare.
PO10. Adopt Self learning abilities so as to educate or to guide others.
38
2.1.2. State how and where the Pos are published and disseminated (1)
(Describe in which media (e.g. websites, curricula, books, etc.) the Pos are published and how these
are disseminated among stakeholders)
POs are published by displaying
➢ In the department portal of Collage web site : www.jntucek.ac.in/cse
➢ Curriculum books
➢ On the flexes in the department.
➢ Display boards in the corridors in the Department.
2.1.3. Indicate processes employed for defining the Pos (3)
(Describe the process that periodically documents and demonstrates that the Pos are defined in
alignment with the graduate attributes prescribed by the NBA.)
➢ The Process employed to define the POs:
Step1: Programme Coordination Committee (Department Staff Committee) articulates P.Os keeping
in view of Graduate Attributes(GAs)and P.E.Os and disseminated to selected alumni, faculty .
Step2: Re-articulating by Department Advisory Committee based on feedback given by alumni,
faculty.
Step3: Conformity and constituency in P.Os are examined through step1 and step2 and finalized
after B.O.S approval and revision.
39
2.1.4. Indicate how the defined Pos are aligned to Graduate Attributes prescribed by the NBA (7)
(Indicate how the Pos defined for the programme are aligned with the Graduate Attributes of the NBA as articulated in accreditation manual.)
POs Graduate Attributes
PO1 Scholarship of Knowledge
PO2 Critical Thinking and Problem Solving
PO3 Research Skills
PO4 Usage of Modern Tools
PO5 Multidisciplinary Work
PO6 Project Management & Finance
PO7 Communication
PO8 Lifelong Learning
PO9 Ethical practices & Social
Responsibilities
PO10 Independent and Reflective learning
2.1.5. Establish the correlation between the Pos and the PEOs (8)
(Explain how the defined Pos of the programme correlate with the PEOs)
Program Educational Objectives
Program Educational Objectives
PEO 1
To produce IT professionals with in depth knowledge in software design, programming and
analytical skills to cater the challenging industrial and societal needs in an effective manner with
ethics and human values
PEO 2 To produce Sustained learner to bring out creative and innovative ideas by addressing the research
issues/ to serve as faculty for IT education.
PEO 3 To produce entrepreneurs in IT with good interpersonal and managerial skills to survive in
multidisciplinary fields.
Program Outcomes (POs)
PO Program Outcomes
1 The student shall possess fundamental and advanced knowledge of core discipline such as
networking and security, programming and computing and other IT applications.
2 Design and implement web enabled solutions for Information Technology problems with the
usage of different software design paradigms and patterns.
3 Develop higher order research skills and innovative ideas to solve unknown problems
through the application of appropriate research methodologies, techniques and tools.
40
Correlation between the Pos and the PEOs:
PEO PROGRAM OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
PEO 1 3 3 2 3 3 2 2 2 3 2
PEO 2 2 2 3 2 3 2 2 3 2 3
PEO 3 2 - - 2 3 3 3 - - -
Degree of correlation: 2 – Moderate 3 – High
2.2. Attainment of Programme Outcomes (75)
2.2.1. Illustrate how the course outcomes contribute to the Pos (5)
(Provide the correlation between the course outcomes and the programme outcomes.
The strength of the correlation may also be indicated)
Course
Code
Course Title Program Outcomes
P
O
1
PO2 PO
3
P
O
4
P
O
5
PO
6
PO
7
P
O
8
P
O
9
PO
10
MIT1.1 ADVANCED DATA
STRUCTURES √ √ √ √ √ √ √
MIT1.2 ADVANCED GRAPH THEORY √ √ √ √ √ √ √
MIT1.3 PARALLEL ALGORITHMS √ √ √ √ √
MIT1.4 DATA MINING AND
KNOWLEDGE DISCOVERY √ √ √ √ √ √
MIT1.5 ADVANCED COMPUTER
NETWORKS √ √ √ √ √ √ √
4 Learn and Work in competing open ended environment with modern engineering and IT
tools
5 Obtain knowledge in cutting edge technologies to contribute positively towards collaborative
multidisciplinary scientific research.
6 Acquire leadership skills and project management techniques to manage projects efficiently
to work in teams.
7 Present their knowledge and ideas in any technical forum through the effective design of
documents and reports.
8 Engage in lifelong learning with commitment to acquire knowledge of contemporary issues
to meet the challenges in career.
9 Realize professional and ethical responsibility and act in accordance to social welfare.
10 Adopt Self learning abilities so as to educate or to guide others
41
MIT1.6 DISTRIBUTED PROGRAMMING
APPLICATIONS THROUGH
JAVA
√ √ √ √ √ √ √ √
MIT1.7 IT LAB I √ √ √ √ √ √ √ √ √
MIT2.1 ADVANCED UNIX
PROGRAMMING √ √ √ √ √ √ √
MIT2.2 INFORMATION SECURITY
√ √ √ √ √ √
MIT2.3 SOFT COMPUTING
√ √ √ √ √ √
MIT2.4 Elective 1
ADHOC & SENSOR NETWORKS
√ √ √ √ √
SEMANTIC WEBSERVICES
√ √ √ √ √ √ √
UML AND DESIGN PATTERNS √ √ √ √ √ √ √ √
MIT2.5 Elective 2
Machine Learning √ √ √ √ √ √ √
INFORMATION RETRIEVAL
SYSTEM
√ √ √ √ √ √ √ √
ANIMATION & GAMING √ √ √ √ √ √ √
MIT2.6 Elective 3
CLOUD COMPUTING
√ √ √ √ √ √ √ √
IMAGE PROCESSING &
PATTERN RECOGNITION
√ √ √ √ √ √ √
INFORMATION STORAGE
MANAGEMNT √ √ √ √ √ √ √
MIT2.7 IT Lab-2 √ √ √ √ √ √ √ √ √
2.2.2. Explain how modes of delivery of courses help in attainment of the Pos (5)
(Describe the different course delivery methods/modes (e.g. lecture interspersed with discussion,
asynchronous mode of interaction, group discussion, project etc.) used to deliver the courses and justify the
effectiveness of these methods for the attainment of POs. This may be further justified using the in direct
assessment methods such as course-end surveys.)
Modes of Delivery of Course:
42
2.2.3. Indicate how assessment tools used t o assess the impact of delivery of course/course content contribute
towards the attainment of course outcomes/programme outcomes (15)
(Describe different types of course assessment and evaluation methods (both direct and indirect)in practice
Modes of Delivery of
Course
POs Attained Justification
Class room Lectures
PO1, PO2, PO3, PO4,
PO5, PO6, PO7, PO9,
PO10
• To teach students about particular subject.
• To acquire the foundation & applied
knowledge with core expertise.
• Lectures are used to convey critical
information, theories.
• To expose the students with contemporary
issues and the need for life-long learning in the
appropriate context.
• Efficient way to reach large number of
students
Guest lecturers
/Seminars by subject
experts (Still and
Video)
PO2, PO3, PO4, PO5 • To impart students with applied knowledge
and critical thinking
• To develop higher order research skills from
the discussions with experts.
• To learn advanced tools and techniques to
address multidisciplinary issues
Experimentation through
lab sessions
PO2, PO3, PO4, PO7,
PO8, PO9, PO10
• To analyze and solve engineering
problems with sound applied knowledge.
• To learn cutting technologies
• To acquaint leadership qualities while
experimenting with group.
• To adopt self learning capabilities to guide
or educate others.
Seminars
PO3, PO4, PO5,PO7,
PO8, PO9,PO10
• To acquaint the students with research
challenges and analysis.
Projects
PO1, PO2, PO3, PO4,
PO5, PO6, PO7, PO8,
PO9, PO10
• To address complex engineering problems
with core and applied expertise.
• To contribute collaboratively towards
multi disciplinary scientific and research
problem through innovative ideas.
• To present their knowledge in technical
forums and workshops.
• To adopt self learning skills.
• To uplift the societal life standards
through professional and ethical
responsibility.
Assignments
PO2, PO3, PO4, PO5,
PO7,PO8, PO9
• To analyze and solve engineering
problems with sound applied knowledge.
• To relate the subject with real world
problems and its impact on society.
• To adopt self learning and lifelong
learning skills.
Group Discussion
PO4, PO6, PO7, PO8,
PO9
• To work in teams.
• To acquire leadership and management
qualities.
• To present their knowledge before group
of people.
43
and their relevance towards the attainment of POs)
• All the Courses in Programme directly related to one or more POs. Performance in
various courses reflects the extent of achievement of POs.
• Evaluation is conducted by Course teacher throughout the semester. Each Subject
contains 3 main components to evaluate.
Direct Assessment Method
Course assessment
and Evaluation Method PO
1
PO
2
PO
3
PO
4
PO
5
PO
6
PO
7
PO
8
PO
9
PO
10
Relevance
towards the
Attainment of
POs
End Semester Examinations
(Internal-Theory and Labs
√ √ √ √ √ √ √ To test the
core and
applied
knowledge of
the course
twice in
semester to
solve
engineering
problems with
modern
techniques and
tools. End Semester
Examinations(External-
Theory and Labs)
√ √ √ √ √ √ √ To test the core
and applied
knowledge of
the full course at
the end of
semester to
solve
engineering
problems with
modern
Course Work(Evaluated regularly)
•Contains Home assignments, Tutorials
•Problem Solving, Group Discussion, Quizzes
Mid Semester Examinations(Internal Evaluation)
•Conducted twice per semester/ after 7-8 weeks of instruction period
•Evaluated for 40/100 marks( Average of two mid examinations.)
End Semester Examinations( External Evaluation)
•Conducted at the end of semester( 16 -18 weeks of instruction period)
•Evaluated for 60/100.
44
techniques and
tools.
Assignments & Tutorial as
part of Course work
√ √ √ √ √ √ √ To test the
applied
knowledge of
students in
solving the real
world problems(
Home Work &
Self Solving
skills)
Projects & Presentations √ √ √ √ √ √ √ √ √ √ Project reviews
enables students
to learn cutting
edge
technologies
and exhibit their
presentation and
team skills.
Seminar Lectures √ √ √ √ √ √ √ To acquaint the
students with
research
challenges and
analysis.
INDIECT ASSESSMENT
Placements √ √ √ √ √ √ √ √ √ An evidence
for student’s
sound
fundamental
knowledge in
core discipline
and inter
personnel
skills Alumni Surveys √ √ √ √ √ √ √ √ √ √ Record of the
Surveys helps
to improve
course
symbiosis with
industry Graduate Surveys
(Mid and End of the Course)
√ √ √ √ √ √ √ √ √ √ Record of the
Surveys helps to
improve the
Teaching-
Learning
methodologies
and to know the
strengths and
weakness of the
course
Employer Survey √ √ √ √ √ √ √ √ Record of the
Surveys helps to
produce
improved
quality students
for
Industry/Acade
45
mia
Higher Studies √ √ √ √ √ √ √ √ √ An evidence for
student’s
applied
knowledge and
higher order
research skills
in inter/intra
disciplinary
fields
2.2.4 Indicate the extent to which project work/thesis contributes towards attainment of Pos (50)
(Justify how the project works /thesis works carried out as part of the programme curriculum
contribute towards the attainment of the POs.)
➢ The Project Work is spanned for one Year. It also carries credits on par with
theory and practical.
➢ Project Reviews and Seminars also provide platform for attainment of number
of POs.
▪ I-Semester: 6-Theory-Credits:3(per subject), Lab-1(combination of two
Subjects) - Credits:2
▪ II- Semester: 6 Theory -Credits:3(per subject), Lab-2(combination of
three subjects) --Credits:2
▪ III- Semester: Seminar-I(2) and Project Work Part-I(18) - Credits:20
▪ IV- Semester: Seminar-II(2) and Project Work Part –II(18) - Credits:20
Course Credits % of
weight age
Theory 36 45%
Practical 4 5%
Seminar 4 5%
Project Work 36 45%
Total 80 100%
Course Credits-% of Weightage
Theory
Practical
Seminar
Project Work
46
Project Evaluation Process
Review 1: Students has to present their problem statement and literature. PRC will evaluate and recommend suggestions
accordingly
Review 2: Students has to come up with system model and methodology with the usage of modern tools and techniques.
PRC will evaluate and recommend necessary suggestions.
Review3: Students has to demonstrate the working model along with relevant test cases.
PRC will evaluate and recommended for final submission or modification.
M.Tech Information Technology 2014-1016
Final Project Evaluation Internal Evaluation will be based on Average of two project reviews (Each review with maximum
allotment of 50 marks)
External Evaluation The thesis shall be adjudicated by one examiner selected by the University. The Principal of the College shall submit a panel
of 5 examiners, eminent in the field concerned to thesis, with the help of the guide concerned and head of the department.
The Examiner will be provided with internal evaluation report of thesis and will verify the thesis. If the report of the examiner
is favorable, Viva-Voce examination shall be conducted by a board consisting of the Supervisor, Head of the Department and
the examiner who adjudicated the Thesis. The Board shall jointly report the candidate’s work as one of the following:
A. Excellent
B. Good
C. Satisfactory
D. Unsatisfactory
If the report of the Viva-Voce is unsatisfactory, the candidate shall retake the Viva-Voce examination only
after three months. If he fails to get a satisfactory report at the second Viva-Voce examination, the candidate
has to re-register for the project and complete the project within the stipulated time after taking the approval
from the University.
Selects the area of Interest
Performs Literature
Survey and formulates
the problem formally
Implement the
solution with
modern tools and
techniques
Progress is continuously
monitored by supervisor and Project
Review Committee
Final evaluation by external examiner based on
report submitted.
Review 2 Review 3
Review 1
47
J.N.T. University College of Engineering Kakinada (A)
Department of Computer Science and Engineering
Final Project Evaluation Sheet for M.Tech (I.T.) 2014-16 Batch
Roll No. Title Internal Evaluation
External
Evaluation -
Project Grade
14021D2201 Implementation of linear programming
technique for dietician problem using
hadoop map reduce in a bib data
framework.
48 B
14021D2202 Personalized and location aware wed
service recommendation system
implementation
43 B
14021D2203 Color image encryption and decryption
using two stage Radom matrix affine
cipher associated with DWT.
48 B
14021D2204 Un Registered
14021D2205 Novel hash for data communication
based on image steganography and
position based encryption.
47 B
14021D2206 Tunner controller and pulse analysis. 45 B
14021D2207 A framework to find opinion of tweets
with text & emotions using K-means and
Sentiwordnet.
44 B
14021D2208 Privacy preserving public auditing for
multi-level encryption based cloud
storage.
47 B
14021D2209 Fine grained structured learning from
heterogeneous behavior for social
identity linkage
42 B
14021D2210 performance of matrix and graph
computations using data compression
techniques in MPI and HADOOP
47 B
14021D2211 Detection of brain tumor using fast
bounding box and SVM classifier
48 C
14021D2212 Automatic Bug triage data reduction
techniques
43 A
14021D2213 Design for multi-trust-domain network
of internet of things by using blind
folded packet transactions
43 B
14021D2214 secure and lifetime maximization
routing protocol design for wireless
sensor networks
42 A
14021D2215 Un Registered
14021D2216 Enhanced approach for multi keyword
ranked search over encrypted cloud data.
45 C
14021D2217 Efficient segmentation method for brain
tumor
48 B
14021D2218 An effective model for counter attacks
on social networks
47 B
48
14021D2219 Un Registered
14021D2220 Graph based seasonal and trend anomaly
detection thesis
45 B
14021D2221 Image compression and encryption using
CRT and CHAOTIC logistic MAP.
49 B
14021D2222 Enhanced Routing algorithm for best
relay node selection in WSN
44 B
14021D2223 Fast aggregation scheduling in wireless
sensor networks
46 A
14021D2224 Hybrid approach for integrating random
seed distribution with transitory master
key mechanisms in WSN
43 C
14021D2225 Detection and rectification of distorted
fingerprints
48 B
2.3. Evaluation of the attainment of Programme Outcomes (125)
2.3.1. Describe assessment tools and processes used for assessing the attainment of each PO (25)
Describe the assessment process that periodically documents and demonstrates the degree to which the
Programme Outcomes are attained. Also include information on:
a) Listing and description of the assessment processes used to gather the data upon which the evaluation of
each the programme outcome is based. Examples of data collection processes may include, but are not
limited to, specific exam questions, student portfolios, internally developed assessment exams, project
presentations, nationally-normed exams, oral exams, focus groups, industrial advisory committee; b) The frequency with which these assessment processes are carried out.
Frame work for overall attainment of POs:
The tools are classified as Direct and Indirect assessment tools for evaluation of POs.
Direct Assessment Tools: PG Programme is credit based with continuous evaluation system,
conducted by course coordinators throughout the semester
49
The weight distribution of components
• Contains Home assignments, Tutorials
• Problem Solving, Group Discussion, Quizzes
Course Work
(Evaluated regularly)
• Conducted twice per semester/ after 7-8 weeks of instruction period
• Evaluated for 40/100 marks( Average of two mid examinations.)
Mid Semester Examinations
(Internal Evaluation)
• Conducted at the end of semester ( 16 -18 weeks of instruction period)
• Evaluated for 60/100.
End Semester Examinations
(External Evaluation)
• Two seminar presentations conducted for 50 marks during III semester and IV semester (Internal Evaluation only)
Seminars
•Project work is carried out during III and IV semester
•Internal Evuation is done through three reviews by Project Review Committee
•External evaluation (Grades Assignment) by External Examiner
Project Work
Course Assessment
Components and
process
Weightage
in terms of
Marks
Frequency
of
Assessment
Weightage(
%)(in terms
of credits)
POs Attained
Theory(Core
/Elective)
Coursework(Evaluated
regularly)
Contains Home
assignments, Tutorials
Problem Solving,
Group Discussion,
Quizzes
-
Monthly
36
PO1, PO2, PO4,
PO5, PO6, PO7,
PO9, PO10
Mid Semester
Examinations
(Internal Evaluation)
40
(Average of
two Mid
exams)
Twice in
Semester
End Semester
Examinations(External
Evaluation)
60
Once after
Semester
Practical
Sessions
Internal Evaluation
(Weekly)
40 Weekly
4
PO1, PO2, PO3,
PO4, PO5, PO7,
PO8, PO9, PO10 End Semester
Examinations(External
Evaluation)
60 Once after
Semester
50
Indirect Assessment Tools:
• Placement record of the students who placed in either industry or academia
• Feedback surveys of alumni, outgoing students, employers about the
Performance of the programme.
Indirect Assessment Tool Frequency POs Attained
Placement Record Annually PO1, PO2, PO4, PO5, PO6, PO7
Course Outcome Feedback End of Semester PO1, PO2, PO3, PO4, PO5, PO6, PO7, PO8,
PO9, PO10
Exit Student Feedback Annually PO1, PO2, PO3, PO4, PO5, PO6, PO7, PO8,
PO9, PO10
•Students can be placed in industry as IT professional
•Can serve as faculty in affiliated colleges of JNTUK
Placement Record
•Feedback for individual subject with reference to their outcomes
Course Outcome Feedback
•In the last semester feed back for achievement of POs and GAs
Exit Feedback
•Feedback from passed out students with reference to achievement of POs
Alumni Feedback
•Feedback from industries in which students got internships/ placements with reference to
their performance.Employer feedback
Seminars Internal Evaluation periodically- 2
reviews / Sem
4
PO1, PO3, PO4,
PO5, PO6, PO7,
PO8, PO10 End Semester
Examinations(External
Evaluation)
50 Once after
Semester
Project Internal Evaluation Grades
Assignment
A-Excellent
B-Good
C-Satisfactory
D-Not
Satisfactory
periodically- 3
reviews / Sem
36
PO1, PO2, PO3,
PO4, PO5, PO6,
PO7, PO8, PO9,
PO10
End Semester
Examinations(External
Evaluation)
Once after
Semester
51
Alumni Feedback Annually PO1, PO2, PO3, PO4, PO5, PO6, PO7, PO8,
PO9, PO10
Employer Feedback Annually PO1, PO2, PO4, PO5, PO6, PO7, PO8,
PO10
Survey of students going for
Higher Education and Research
Annually PO1, PO2, PO3, PO5, PO6, PO7, PO8, PO9,
PO10
2.3.2. Indicate results of evaluation of each PO (100)
c) The expected level of attainment for each of the programme outcomes;
d) Summaries of the results of the evaluation processes and an analysis illustrating the extent to
which each of the programme outcomes are attained and
e) How the results are documented and maintained.
Direct Assessment
The program outcome assessment plan is set to primarily confirm that the students are achieving the
desired outcomes. It is also used to improve the program and the student learning, based on real evidence.
Assessm
ent
Tools
Expected Level of Attainment of POs Summaries
of the results
of the
evaluation
processes
Analysis for
the expected
level of
Attainment
How the
results are
documente
d and
maintaine
d
P
O
1
P
O
2
P
O
3
P
O
4
P
O
5
P
O
6
P
O
7
P
O
8
P
O
9
P
O
10
Course
Work
(Evaluat
ed
regularl
y)
3 3 2 2 2 2 2 2 3 3 All courses
have been
conducted in
all semesters
and recorded
in
Attendance
Registers
Conducting
course work
regularly
helps the
student to
attain
fundamental
and applied
knowledge
for problem
solving
(Assignment
and
Tutorials)
Record of
time tables
and
attendance
in each
semester is
available in
Academic
Section
Universi
ty
Examina
tions
(Internal
-Theory
and
Labs
3 3 3 3 3 1 1 3 2 3 Internal
exams are
conducted
twice per
semester
with weight
age of 40
marks.
The results
are tabulated
in Results
Helps to
assess the
regularity
and
attainment of
course work
by the
students.
Record of
Internal
examinatio
n (Lab and
theory)
answer
scripts and
marks are
maintained
with the
academic
52
Table I section
Universi
ty
Examina
tions
(Externa
l-Theory
and
Labs)
3 3 3 3 3 1 1 3 2 3 External
exams are
conducted at
the end of
semester
with weight
age of 60
marks.
The results
are tabulated
in Results
Table I
Direct
evidence for
the
attainment of
POs
through
achievement
of Course
Outcome in
accordance
with students
performance
in
examination
Copies of
end
semester
question
papers and
answer
scripts are
available
with the
examinatio
n section
Project
Work
3 3 3 2 3 3 3 3 3 3 Project work
is carried out
by the
students in
III and IV
semester and
Final
evaluation
and Grade
Assignment
is done by
external
examiner
Enables
students to
attain
expertise in
core and
specific
domain with
interpersonal
and project
management
skills
Status of
the project
is
evaluated
by Project
Review
Committee
and record
of
attendance
is available
in the
department
Seminar 3 3 2 2 2 1 3 3 2 3 Seminars on
state-of-art of
the computer
science are
conducted in
III Semester
and is being
evaluated
internally for
50 marks
Enables
students to
acquire and
improve self
learning
capabilities
and
presentation
skills
Seminars
are
evaluated
by Project
Review
Committee
and record
of
attendance
is available
in the
department
Indirect Assessment
The evaluation is based on the surveys conducted to solicit assessments from the program constituents,
such as: graduating or exit students, faculty, alumni and employers. In addition to these, assessments were
carried out based on placement data, the achievements disseminated in media/public forum and the feed
backs from professional bodies.
Assessm
ent
Tools
Expected Level of Attainment of POs Summarie
s of the
results of
the
evaluation
processes
Analysis for
the expected
level of
Attainment
How the
results are
documented
and
maintained P
O
1
P
O
2
P
O
3
P
O
4
P
O
5
P
O
6
P
O
7
P
O
8
P
O
9
P
O
10
Placeme
nts
3 3 2 2 2 2 2 2 3 3 Number
of
Students
Number of
Students
placed is an
Placement
records are
maintained
53
are placed
in various
IT
industries
(TCS,
Wipro,
CapGemin
i, Infosys,
HoneyWel
l, CMC
etc.)
Placement
Record
indirect
evidence for
attainment for
POs
by Training
and
Placement
Cell
Alumni
Survey
3 3 2 2 2 2 2 2 3 3 Conducted
annually
information
about
graduates
perception of
their learning
Survey
reports are
maintained
in the
department
Graduat
e
Surveys
(Mid
and End
of the
Course)
3 3 2 3 3 2 2 2 3 3 Conducted
twice per
semester
Key survey to
assess the
achievement of
desired
outcomes. It
helps to
improve the
program and
student
learning, based
on real
evidence
Survey
reports are
maintained
in the
department
Employ
er
Survey
2 2 1 2 2 2 2 3 2 3 Conducted
annually
Reflects on
students
learning. They
assess opinions
or thoughts
about the
graduates
knowledge or
skills
Survey
reports are
maintained
in the
department
Higher
Studies
3 3 3 2 2 2 3 3 2 3 Conducted
annually
Number of
students
registered for
Higher studies
is an evidence
to assess the
research and
self learning
skills.
Survey
reports are
maintained
in the
department
54
Summaries of the results of the evaluation processes:
Results Table: .
Attainment of POs from Examination results LYG
(2015-17) LY
Gm
1 (2014-16)
LYGm1
(2013-15)
LYGm2 (2012-14)
Approximating the Attainment of Pos from the following
Analysis
9<Number of students with CGPA<10.0 (a) 00 00 00 00
8<Number of students with CGPA<9.0 (b) 01 04 09 10
7<=8 (c) 15 15 14 13
6<=7 (d) 06 05 02 00
5<=6 (e) 01 01 00 00
Total Students Appeared (N) 23 25 25 23
Approximating percentage of Attainment of POs
(( a * 5) + (b * 4 ) + (c *3 ) + (d * 2) + (e * 1) ) * 25 / N 67.39 72 82 72.68
Project work: Year
Evaluation Results Attainment of POs based on
evaluation results
No of Students Appeared
Grade A (Excellent)
Grade B (Good)
Grade C (Satisfactory)
Grade D (Not
Satisfactory)
2015-17
23 Project submission is in the progress
2014-16
23 03 17 03 - Moderate
2013-15
25 03 19 03 - Moderate
2012-14
25 6 14 5 - Moderate
55
Placements Higher Studies Record:
Year Placements in Industry Faculty Engg.
Colleges Higher Studies
Attainment of POs based on
placements and Higher Studies
No of Students
TCS Cap Gemini
Infosys
2015-16 24 2 Placements are in Progress
2014-15 25 10 1 - 10 1 88%
2013-14 26 5 1 - 14 1 81%
2012-13 27 6 - 1 11 1 71%
56
FEEDBACK Forms:
J.N.T.UNIVERSITY COLLEGE OF ENGINEERING, JNTUK,KAKINADA
DEPARTMENT of CSE
Parent’s Feedback Form
.............................................................................................................................................................................
Name& Occupation of Parents:
Name :………………………………………………………………………………..
Name of Student/Ward :…………………………………………………………………………………
Course/semester :…………………………………………………………………….
1. Do you find this institution better than others for your ward? Yes/No.
2. Do you feel facilities in the department are good? Yes/No.
3. Are you satisfied about library facilities in the department? Yes/No.
4. Are you satisfied for cooperation from the administrative staff? Yes/No.
5. Can you make direct communication with teaching staff? Yes/No.
6. Rate the placement related training offered? Good/Satisfactory
7. Rate the learning atmosphere offered by the department Good/Satisfactory
8. Rate the teaching efficiency of the staff members Good/Satisfactory
9. Rate the curriculum and the course content Good/Satisfactory
10. Do you feel that your ward is physically secured in the department? Yes/No
Any other suggestions:
…………………………………………………………………………………………..
…………………………………………………………………………………………..
Signature :
Date :
J.N.T. University College of Engineering, JNTUK,Kakinada
DEPARTMENT of CSE
INDUSTRY FEEDBACK FORM
Name of Contact Person/Industry:
Mobile No & E-Mail:_
_______________________________________________________________________
1. Would you like to be a member of Board of Studies (BOS) to the CSE Department?
Yes/ No
2. Would you like to help in academic/ innovative activities of this Department?
57
Yes/ No
3. Opinion about CSE Department Syllabus: Is this syllabus matching to your industrial requirements?
Yes / No
4. Placement / Training: Would you like to implant training to CSE students?
Yes / No
5. Are you interested in placement of CSE students in your Industry?
Yes / No
6. Are you willing to visit CSE Department for Academic interactions?
Yes / No
7. Rate the effectiveness of the laboratory session
Good/Satisfactory
8. Will you be interested in visiting us again?
Yes / no
9. Your Overall Experience during the recruitment visit to our campus?
Good/Satisfactory
Any other Suggestions:
________________________________________________________________________________________________________________
________________________________________________________________________________________________________________
________________________________________
Signature:
J.N.T.University College of Engineering, JNTUK, Kakinada
DEPARTMENT of CSE
ALUMNI FEEDBACK FORM We shall be thankful to and appreciate you, if you can spare some of your valuable time to fill up this feedback form and give us your
valuable suggestions for further improvement of the Institute. Your valuable inputs will be of great use to improve the quality of our
academic programs and enhance the credibility of the Institute. Hence your feedback on Institute will help us to improve our approach in
Academics.
Name of the Alumni
Degree [√] B.Tech M.Tech MCA
Branch
Passing Year
Dear Alumni,
Please give your overall assessment of our Department academics. Please rate us on following criterion :
1-Unsatisfactory(UN), 2- Satisfactory(S), 3- Fair(F), 4- Good(G), 5- Very Good(VG)
Sr. Details VG G F S UN
1 Environment
2 Infrastructure & Lab facilities
3 Faculty/ Delivery of Course
4 Project Guidance
5 Quality of support material
6 Training & Placement
7 Library
8 Evaluation Procedures
9 Alumni Association/ Network of Old Friends
58
Please suggest any skills you want our Institute should focus on for grooming of students. All of your suggestions are welcome.
Any other suggestions/ comments: ______________________
2.4. Use of evaluation results towards improvement to the programme (30)
2.4.1. Indicate how the results of evaluation used for curricular improvement (5)
(Articulate with rationale the curricular improvement brought in after the review of the attainment to the
POs)
Based on the evaluation and review of the attainment of POs, modification will be attempted in
the programme curriculum aspects such as increase or decrease in the components of theory,
practical, project work, communication skills courses and elective courses.
In addition, attempt will be made to introduce new courses, labs, experiments, exercises for
project work, etc on the basis of external interaction with the industry and academia at seminar or
conference.
2.4.2. Indicate how results of evaluation used for improvement of course delivery and assessment (10)
(Articulate with rationale the curricular delivery and assessment
improvement brought in after the review of the attainment of the POs)
▪ Based on the evaluation of the attainment of POs and along with the results and analysis
of the student feedback about each lecture and course, the methods of course delivery and
59
assessment method will be reviewed.
▪ New methods will be evolved, in consultation with faculty and thus ensuring the
improvement in the course delivery.
▪ The assessment methods will also be reviewed such as increase or decrease in the
assignments, talks, presentations, quizzes, etc.
▪ Novel assessment methods may be evolved once the results of evaluation after few
years/batches are available.
2.4.3. State the process used for revising/redefining the POs (15)
(Articulate with rationale how the results of the evaluation of Pos have been used to review/redefine
the Pos in line with the Graduate Attributes of the NBA.)
This systemic attempt to articulate the POs, mostly with participation of stake holders On
board (faculty and select Alumni from reputed organizations).
However, based on the results of such evaluation and the feedback from the
Exiting graduates, we will examine the relevance of the existing POs and,
If felt necessary, based on the review and supplemented by the needs of
The nation and industry as well, POs can be revised in line with GAs of the NBA.
Programme Curriculum (75)
3.1. Curriculum (15)
60
3.1.1. Describe the Structure of the Curriculum (5)
PG programme is scheduled for 4 semesters in a span of 2 years. During First semester course
work is conducted with 6 subjects and one lab. Each subject is evaluated with Internal (40
marks) and External Examinations (60). Two Internal examinations are conducted in the mid
and end of semesters with weight-age of 40 internal marks. End examinations are conducted for
60 marks. If students pass the subject he will get 3 credits if not he/she has to rewrite the exam.
During second semester along with core and lab three electives are included. During third
semester seminar-I and project work part-I included which carries 2 and 18 credits respectively.
In fourth semester seminar-II, project work part-II included which carries 2 and18 credits
respectively.
Curricular Composition Credits
Theory courses 36
Laboratory courses 4
Seminars 4
Project work 36
R13 Course Structure:
Course
Code
Course Title(Course Category) L P C
MIT2.1 ADVANCED UNIX PROGRAMMING 4 0 3
MIT2.2 INFORMATION SECURITY 4 0 3
MIT2.3 SOFT COMPUTING 4 0 3
MIT2.4 Elective 1
ADHOC & SENSOR NETWORKS
SEMANTIC WEBSERVICES
UML AND DESIGN PATTERNS
4 0 3
MIT2.5 Elective 2 4 0 3
Course
Code
Course Title(Course Category) L P C
MIT1.1 ADVANCED DATA STRUCTURES 4 0 3
MIT1.2 ADVANCED GRAPH THEORY 4 0 3
MIT1.3 PARALLEL ALGORITHMS 4 0 3
MIT1.4 DATA MINING AND KNOWLEDGE DISCOVERY 4 0 3
MIT1.5 ADVANCED COMPUTER NETWORKS 4 0 3
MIT1.6 DISTRIBUTED PROGRAMMING APPLICATIONS
THROUGH JAVA
4 0 3
MIT1.7 IT LAB I 0 3 2
61
MACHINE LEARNING
INFORMATION RETRIEVAL SYSTEM
ANIMATION & GAMING
MIT2.6 Elective 3
CLOUD COMPUTING
IMAGE PROCESSING & PATTERN RECOGNITION
INFORMATION STORAGE MANAGEMNT
4 0 3
MIT2.7 IT LAB 2 0 3 2
III SEMESTER
S.NO. SUBJECT L P C
1 SEMINAR-I 0 0 2
2 PROJECT WORK PART - I 0 0 18
TOTAL 20
IV SEMESTER
S.NO. SUBJECT L P C
1 SEMINAR-II 0 0 2
2 PROJECT WORK PART - II 0 0 18
TOTAL 20
62
3.1.2. Justify how the curricular structure helps for the attainment of the Pos and the PEOs (10)
(Articulate how the curricular structure helps in the attainment of each PO and PEO)
S.NO COURSE PEOs PEOs
JUSTIFICATION
Pos POs
JUSTIFICATION
1
Theory
PEO1- High Fundamental and
advanced knowledge
for problem solving
Industrial Exposure to
the student.
PO1, PO2,
PO4, PO5,
PO9
Strong knowledge of
basics. Awareness of
modern tool and
adopting multi
disciplinary works
PEO2-
Moderate
Student interest in
research perspectives PO3, PO5,
PO10
Development in
Critical thinking
and problem
solving
PEO3-
Moderate
Self learning
capability of student
PO4, PO5,
PO6, PO7
Communication
and handling of
multiple
disciplinary tasks
2 Electives PEO1-
Moderate
Adopting to new
technology and tools
Advancement in
industry technology
PO2,PO3,
PO4,PO5,
PO8,PO9
Increased social
responsibility.
Adopted to
Continuous
learning
PEO2-High Multidisciplinary
research
PO1,PO2,
PO4,PO7
Communication and
handling of multiple
disciplinary tasks
PEO3-High Tools and measures
taken by student in
research.
PO1,
PO4
Strong knowledge
and usage of
modern tools.
3 Seminars PEO1-
Moderate
Updating of
knowledge
Exposes to words
upcoming
technologies
PO3, PO4,
PO5,PO8
Adoptable learning
skills.
Flexibility with
Modern tool and
methodologies
PEO2- High Awareness on
burning technology
PO3, PO5,
PO8,PO10
Independent and
adoptive learning
PEO3- High Material gathering
and presenting
PO5, PO6,
PO7
Use of modern tools
to acquire
knowledge.
4 Project PEO1-
Moderate
Invention of new
technologies
PO1,PO2,
PO4,PO5,
project management
techniques to
63
Meets need of
industrial
expectations.
PO9
manage projects
efficiently
Giving solutions to
the real time
applications
PEO2-
Moderate
Using of advanced
tools
PO3,PO5,
PO8,PO10
Get real time
experience
PEO3- High Enthusiasm to learn
new things
PO5, PO6,
PO7
Adopting Modern
tools
3.2. Indicate interaction with R&D organizations/Industry (40)
(Give the details of R&D organizations and industry involvement in the programme such as
Industry attached laboratories and partial delivery of courses and internship opportunities for students)
The department invites experts from industry for invited lectures that the students and staff attend. The
lectures result in lively discussion thus imparting current state of the art knowledge to students and staff.
➢ MOU - JNTUK & Tata Consultancy Services Ltd. 1st Feb 2010
To offer TCS-Sangam Package of TCS Academic interface programme
➢ MOU - JNTUK &Tejas Networks Ltd. 12th Feb 2010
To establish Center of Excellence in Optical Networking
➢ Draft Agreement - JNTUK &EdCIL (India) Limited 10th May 2010
For arranging admissions and placements for foreign students to pursue study and training in
Indian educational institutions
➢ MOU - JNTUK & Smart Net Working Switzerland 11th Dec 2010
To offer Global study program to promote educational and cultural enrichment and personal
growth
➢ MOU-JNTUK & M/s. Consortium of Institutions of Higher Learning (CIHL)-4th April,2012
➢ MOU-JNTUK & LOMENT Inc. Naperville, Illinois, USA 7th June 2012 on Research and
Development in the area of Mobile Financial Services & Security.
➢ MOU-JNTUK & MNCRC for research and development activities CBIT Hyderabad &JNTUK
to establish and develop “ Marine navigation and Communication Research Centre”, Academic
Exchange and co-operation in Teaching, Training, R&D activities .
64
➢ MOU-JNTUK & Chicago State University USA to offer Ph.D (External Registration) for foreign
nationals/NRIs exclusively for CSE and CS disciplines from 2016-17 academic year onwards
➢ MOU-JNTUK & TRUZIO on 16th March 2017 for Development of an Educational ERP
Software for University and affiliated colleges by utilizing domain knowledge of JNTUK Staff,
technical , functional expertise of qualified manpower of TRUZIO – B.Tech/M.Tech students
will be trained on relevant technologies
A list of some of the lectures held since last two years are given below.
Topic of Lecture
Name of the
Resource
Person
R&D
Organization/
Industry
Date
Participants No of
Partici
pants
Research Oriented
Expert Lecture
Dr. Rakesh
Chandra
Balabantaray
IIT,
Bhubaneswar
30th
December,
2016
UG, PG, Ph.D.
and Faculty
203
Research Oriented
Expert Lecture
Prof. C.
RaghavendraRa
o, Professor,
School of
Mathematics &
Computer
Sciences
University of
Hyderabad
07th
December,
2016
UG, PG, Ph.D
and Faculty
205
Possible Research
Collaboration on
Recent Trends,
Mobile & Cloud
Centric IOT
Dr.
SatishSreerama,
Mobile
Computing
Division
University of
Tartu, Estonia
3rd
December,
2016
UG, PG, Ph.D
and Faculty
200
expert lecture on
"Network Traffic
Classification"
Dr.T.Venkatesh
, ,
IIT Guwahathi 16th
December,
2015
Students &
faculty
102
"Startups and
entrepreneurship
orientation"
Teams from software industry –
Career Analytics
10th
March,
2016
Students &
faculty
98
Research
Possibilities in HPC
and multi-core
computing
Dr. V.C.V.Rao,
Associate
Director HPC-
FTE Goup C-
DAC, Pune
CDAC, Pune 5-6th
October,
2015
Students &
faculty
104
Industry Expert
Lecture during
September, 2015 on
"To Train to work on
Microsoft September,
2015 in 2
sessions.
Students &
faculty
98
65
latest Technology
aiming to enhance
research &
Implementing real
time solutions
Research oriented
expert lecture on
large scale Metric
Learning using
locality sensitive
hashing and
SMARTS
Prof.
KotagiriRama
MohanaRao
University of
Melbourn,
Australia.
14th
September,
2015
Students &
faculty
100
Research oriented
expert lecture on
Digital India Project
Proposals
Prof.C.Raghav
endraRao,
Central
University and
University of
Hyderabad,
Hyderabad.
27.08.2015
Students &
faculty
105
Research oriented
expert lecture the
Big data Analytics
Dr.R.B.V.
Subrahmanyam
NIT, Warangal.
13th
August,
2015
Students &
faculty
98
HPC and Multi core
computing and
Interaction on
National
supercomputing
mission project
Dr. V.C.V.Rao,
Associate
Director HPC-
FTE Goup C-
DAC, Pune
CDAC, Pune 13th July,
2015
Students &
faculty
102
To guide some of
our faculty in
preparing self
assessment reports
for applying
National Board
Accreditation to PG
Courses of the
College/
University
Dr.A.Koteswar
Rao, Prof. of
Information
Technology
Noted person in
guiding NBA
accreditation
process in ESCI
Anna University.
16-17th
March,
2015
Faculty 28
Research
Possibilities in HPC
and multi-Core
computing
V.C.V.Rao,
Associate
Director HPC-
FTE Goup C-
DAC, Pune
CDAC, Pune 2nd
February,
2015
PG Students 78
High performance
Computing
Dr.V.C.V.Rao, CDAC, Pune 22-01-14 UG & PG
Students
197
Expert Lecture on
recent trends in CS
Dr.N.B.
Venkateswarlu,
Former
Faculty,
Bits Pilani 28-01-14 UG & PG
Students
198
66
Privacy, Security,
Authenticity in
Cyberspace
Dr.P.S.
Avadhani
Andhra
University
03-04-14 UG & PG
Students
197
Hadoop Map Reduce Dr.R.B.V.Subra
manyam
NIT, Warangal 15-3-14 UG & PG
students
204
Role of Business
Analytics In
Transforming
Enterprises &
Society
Sri
VenkatN.Peri,
PriceWater
Coopers
04-07-13 UG & PG
Students
298
Recent trends in
Data Analytics
Dr.Dhara
Kishore
Lucent
Technologies
24-12-2013 UG & PG
students
182
Wire-less Sensor
networks
Dr. Garimella
Ram Murthy
Ex Professor,
Purdue
University USA
UG & PG
students
206
Recent trends in
Data Analytics
Dr. M N
Murthy
IISc Bangalore 24-12-
20113
UG & PG
students
180
Trends in
Technology
Mr. Surya
PrakashT
Wipro
Hyderabad
28-11-2012 UG & PG
students
200
How to pursue
project
work/research work
Prof. MM
Naidu
SV University
Tirupati
11-01-2012 UG & PG
students
202
*** IBM has sanctioned to establish Centre of Excellence in Dept. of Computer Science and
Engineering Technology
In addition the students go on summer internships to the industry during the summer vacations after III
year. This internships/training is arranged through the Training and Placement Office (TPO). A list of
some industrial units / companies where the students have gone for internship last year is given below:
In-plant Training
S.No. Company No of Students Period
1 Honey Well 1 M.Tech IT(2012-13)
2 Loment Technology 1 M.Tech IT(2013-14)
3 C-DAC 2 M.Tech IT(2014-15)
4 TRUZIO 1 M.Tech IT(2015-17)
5 TRUZIO 1 M.Tech IT(2016-18 )
67
3.3. Curriculum Development (15)
3.3.1. State the process for designing the programme curriculum (5)
(Describe the process that periodically documents and demonstrate show the programme
curriculum is evolved considering the PEOs and the POs)
The curriculum is designed by the Board of Studies (BoS) of the department after
exhaustive discussion with the teaching faculty. The following points are kept as
guidelines for the entire curriculum design process
Step1: Consideration of existing curriculum of reputed institutes in India &Abroad
and Needs of Society through industry interaction, scientific and research
publications to model AICTE Curriculum
Step2: Department Staff Committee, Department Advisory Committee and
Board Of Studies keeping in view of POs, PEOs and inputs from step1
designs the curriculum with Core, Elective, Practical, Seminar and Project courses
Step3: Re-Design by BOS based on feedback given by Stakeholders.
Step4: Conformity and constituency in Curriculum are examined through step1
to step3 and finalized after BOS approval and revision. The approved curriculum
is send to the College Academic Council for their final endorsement.
68
➢ The faculty in the department is loosely divided into groups. These groups discuss the
portions of the curriculum specifically related to them and come up with
recommendations.
➢ Such recommendations are then discussed in a coordination committee headed by the
Chairman of the department.
➢ The coordinated recommendations are placed in the Board of Studies meeting, which
finally approves the curriculum after adding general and elective courses.
➢ Similar procedure is used for changes in syllabi of various courses. Syllabi changes are
done more often than curricular changes.
69
Programme Curriculum Revisions
R10 R13 R16
Process in updating
programme curriculum
BoS meeting headed by
Dr.EV Prasad
BoS meeting headed by
Dr. L Sumalatha
BoS meeting headed by
Dr A Krishna Mohan
Periodical documents
Available, Revised by
Combined JNT
University
Available, Revised Available, Revised by
Combined JNT
University
BOS Conducted on 07/06/2009 28/01/2014 18/06/2016,
19/06/2016
Resolutions
I Sem 5 Core +
1Elective + 1 lab
II Sem 4core + 2
Elective + 1 Lab
III & Iv Sem Project
+ Seminar
I Sem 6 Core + 1 Lab
II Sem 3 core + 3
Electives(4 subjects in
each elective ) + 1 Lab
III & Iv Sem Project
+ Seminar
I Sem 6 Core + 1 Lab
II Sem 4 core + 2
Electives(3 subjects in
each elective ) + 1 Lab
III Project work part
-I + Seminar -
I+Comprehensive Viva
IV Sem Project work
part -II+ Seminar-II
3.3.2. Illustrate the measures and processes used to improve courses and curriculum (10)
(Articulate the process involved in identifying the requirements for improvement in courses and curriculum and
provides the evidence of continuous improvement of courses and curriculum)
Same procedure, as mentioned above in 3.3.1, is followed for improvement of curriculum and
courses.
➢ The basis for the improvement comes primarily from the international research scenario in
various disciplines of Information Technology.
➢ This input is given by the faculty members, many of whom are involved in high quality research
work.
➢ In addition, the needs of the industry obtained through feedback from discussions held with the
experts from industry and discussion with the employers who come for placement at the Training
and Placements Office is also taken into consideration.
70
3.4. Course Syllabi (5)
(Include in appendix, a syllabus for each course used .Syllabi format should be consistent and
shouldn’t exceed two pages.)
The syllabi format may include:
Department, course number, and title of course
Designation as a required or elective course
Pre-requisites
Contact hours and type of course (lecture, tutorial, seminar, project etc.,)
Course Assessment methods (both continuous and semester-end assessment)
Course outcomes
Topics covered
Text books, and/or reference material
Information Technology Core Subjects
± Electives
as per current needs of the technological development or
industry
Curricular Improvement
Results Analysis +
Surveys +
Subject studied
Steps initiated by Course
Coordinator& Programme
Coordinator
BOS Committee measures
71
Program Educational Objectives
Program Educational Objectives
PEO 1
To produce IT professionals with in depth knowledge in software design, programming and
analytical skills to cater the challenging industrial and
societal needs in an effective manner with ethics and human values
PEO 2 To produce Sustained learner to bring out creative and innovative ideas by addressing the
research issues/ to serve as faculty for IT education.
PEO 3 To produce entrepreneurs in IT with good interpersonal and managerial skills to survive in
multidisciplinary fields.
Program Outcomes (POs)
PO Program Outcomes
1 The student shall possess fundamental and advanced knowledge of core discipline such as
networking and security, programming and computing and other IT applications.
2 Design and implement web enabled solutions for Information Technology problems with the
usage of different software design paradigms and patterns.
3 Develop higher order research skills and innovative ideas to solve unknown problems through
the application of appropriate research methodologies, techniques and tools.
4 Learn and Work in competing open ended environment with modern engineering and IT tools
5 Obtain knowledge in cutting edge technologies to contribute positively towards collaborative
multidisciplinary scientific research.
6 Acquire leadership skills and project management techniques to manage projects efficiently to
work in teams.
7 Present their knowledge and ideas in any technical forum through the effective design of
documents and reports.
8 Engage in lifelong learning with commitment to acquire knowledge of contemporary issues to
meet the challenges in career.
9 Realize professional and ethical responsibility and act in accordance to social welfare.
10 Adopt Self learning abilities so as to educate or to guide others
72
Correlation between the Pos and the PEOs
PEO PROGRAM OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
PEO 1 3 3 2 3 3 2 2 2 3 2
PEO 2 2 2 3 2 3 2 2 3 2 3
PEO 3 2 - - 2 3 3 3 - - -
Degree of correlation:
2 – Moderate 3 – High R13 Syllabus
Subject
Code
Subject Name Credits Core/Elective Internal marks External
marks
MIT 1.1 ADVANCED DATA
STRUCTURES AND
ALGORITHM
3 C 40 60
Course Description: In this course the student will learn Single Linked, Double Linked Lists, Stacks,
Queues, Searching and Sorting techniques, Trees, Binary trees, representation, traversal, Graphs-
storage, traversal. Dictionaries, ADT for List, Stack, Queue, Hash table representation, Hash functions,
Priority queues, Priority queues using heaps, Search trees , AVL trees, operations of AVL trees, Red-
Black trees, Splay trees, comparison of search trees.
• Syllabus / Text books:
UNIT I:
Introduction to Data Structures, Singly Linked Lists, Doubly Linked Lists, Circular Lists-Algorithms.
Stacks and Queues: Algorithm Implementation using Linked Lists.
UNIT II:
Searching-Linear and Binary, Search Methods, Sorting-Bubble Sort, Selection Sort, Insertion Sort,
Quick Sort, Merge Sort. Trees- Binary trees, Properties, Representation and Traversals (DFT, BFT),
Expression Trees (Infix, prefix, postfix). Graphs-Basic Concepts, Storage structures and Traversals.
UNIT III:
Dictionaries, ADT, The List ADT, Stack ADT, Queue ADT, Hash Table Representation, Hash
Functions, Collision Resolution-Separate Chaining, Open Addressing-Linear Probing, Double
Hashing.
UNIT IV:
Priority queues- Definition, ADT, Realising a Priority Queue Using Heaps, Definition, Insertion,
Deletion .Search Trees- Binary Search Trees, Definition, ADT, Implementation, Operations-
Searching, Insertion, Deletion.
UNIT V:
Search Trees- AVL Trees, Definition, Height of AVL Tree, Operations-, Insertion, Deletion and
Searching.
73
Search Trees- Introduction to Red-Black and Splay Trees, B-Trees, , Height of B-Tree, Insertion,
Deletion and Searching, Comparison of Search Trees.
TEXT BOOKS:
1. Data Structures: A PseudoCode Approach, 2/e, Richard F.Gilberg, BehrouzA.Forouzon,
Cengage.
2. Data Structures, Algorithms and Applications in java, 2/e, SartajSahni, University Press.
REFERENCES BOOKS:
1. Data Structures and Algorithm Analysis, 2/e, Mark Allen Weiss, Pearson.
2. Data Structures and Algorithms, 3/e, Adam Drozdek, Cenage.
3. C and DataStructures: A Snap Shot Oriented Treatise Using Live Engineering Examples,
N.B.Venkateswarulu, E.V.Prasad, S Chand & Co, 2009.
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Introduction to Data Structures, Singly Linked Lists 3
2 Doubly Linked Lists, Circular Lists-Algorithms 3
3 Stacks and Queues: Algorithm Implementation using Linked Lists 3
4 Searching-Linear and Binary Search Methods 2
5 Sorting-Bubble Sort, Selection Sort, Insertion Sort, Quick Sort, Merge Sort 4
6 Trees- Binary trees, Properties, Representation and Traversals
(DFT,BFT),Expression Trees(Infix, prefix, postfix)
3
7 Graphs-Basic Concepts , Storage Structures and Traversals 2
8 Dictionaries, ADT, The List ADT, Stack ADT, Queue ADT 2
9 Hash Table Representation, Hash Functions, Collision Resolution-Separate
Chaining
3
11 Priority queues- Definition, ADT, Realising a Priority Queue Using Heaps 2
12 Insertion, Deletion of Heaps 3
13 Search Trees- Binary Search Trees, Definition, ADT, Implementation 3
14 Operations on Binary Search Trees -Searching, Insertion, Deletion 3
15 Search Trees- AVL Trees, Definition, Height of AVL Tree 3
16 Operations on AVL Trees, Insertion, Deletion and Searching 3
17 Introduction to Red-Black and Splay Trees 3
18 B-Trees, , Height of B-Tree, Insertion 2
19 Deletion and Searching operations 2
20 Comparison of Search Trees 3
Course Outcomes (COs):
1. Ability to write and analyze algorithms for algorithm correctness and efficiency
2. Master a variety of advanced abstract data type (ADT) and data structures and their
Implementation.
3. Master various searching, sorting and hash techniques and be able to apply and solve problems of real
life
4. Design and implement variety of data structures including linked lists, binary trees, heaps, graphs and
search trees
5. Ability to compare various search trees and find solutions for IT related problems
74
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √ √
CO2 √ √
CO3 √ √ √ √ √
CO4 √ √ √ √ √ √
CO5 √ √ √ √ √
Subject
Code
Subject Name Credits Core/Elective Internal marks External marks
MIT1.2 ADVANCED
GRAPH THEORY
3 C 40 60
Course Description: The intension of this course is to introduce the subject of graph theory to computer science students in a
thorough way. While the course will cover all elementary concepts such as coloring, covering, hamiltonicity, planarity,
connectivity and so on, it will also introduce the students to some advanced concepts. The successful student will know the
definitions of relevant vocabulary and various algorithms from graph theory
• Syllabus / Text books:
UNIT I:
Basic Concepts: Graphs and digraphs, incidence and adjacency matrices, isomorphism, the
automorphism group;
Trees: Equivalent definitions of trees and forests, Cayley's formula, the Matrix-Tree theorem,
minimum spanning trees;
UNIT II:
Connectivity: Cut vertices, cut edges, bonds, the cycle space and the bond space, blocks, Menger's
theorem;
Paths and Cycles: Euler tours, Hamilton paths and cycles, theorems of Dirac, Ore, Bondy and
Chvatal, girth, circumference, the Chinese Postman Problem, the Traveling Salesman problem,
diameter and maximum degree, shortest paths;
UNIT III:
Matchings: Berge's Theorem, perfect matchings, Hall's theorem, Tutte's theorem, Konig's theorem,
Petersen's theorem, algorithms for matching and weighted matching (in both bipartitie and general
graphs), factors of graphs (decompositions of the complete graph), Tutte's f-factor theorem;
Extremal problems: Independent sets and covering numbers, Turan's theorem, Ramsey theorems;
UNIT IV:
Colorings: Brooks theorem, the greedy algorithm, the Welsh-Powell bound, critical graphs,
chromatic polynomials, girth and chromatic number, Vizing's theorem;
Graphs on surfaces: Planar graphs, duality, Euler's formula, Kuratowski's theorem, toroidal graphs,
2-cell embeddings, graphs on other surfaces;
UNIT V:
Directed graphs: Tournaments, directed paths and cycles, connectivity and strongly connected
digraphs, branching;
Networks and flows: Flow cuts, max flow min cut theorem, perfect square;
Selected topics: Dominating sets, the reconstruction problem, intersection graphs, perfect graphs,
random graphs.
75
TEXT BOOKS:
1. Douglas B. West, Introduction to Graph Theory, Prentice Hall of India.
2. NarsinghDeo, Graph Theory with Applications to Engineering and Computer Science.
Prentice-Hall.
REFERENCE BOOKS:
1. Frank Harary, Graph Theory, Narosa.
2. R. Ahuja, T. Magnanti, and J. Orlin, Network Flows: Theory, Algorithms, and
Applications, Prentice-Hall.
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Basic Concepts: Graphs and digraphs, incidence and adjacency matrices 3
2 Isomorphism, the automorphism group 2
3 Trees: Equivalent definitions of trees and forests, Cayley's formula 3
4 The Matrix-Tree theorem, minimum spanning trees 2
5 Connectivity: Cut vertices, cut edges, bonds, the cycle space and the bond
space
3
6 Blocks, Menger's theorem, Paths and Cycles: Euler tours 2
7 Hamilton paths and cycles, theorems of Dirac 2
8 Ore, Bondy and Chvatal, girth, circumference, the Chinese Postman Problem 3
9 The Traveling Salesman problem, diameter and maximum degree, shortest
paths
3
10 Matchings: Berge's Theorem, perfect matchings, Hall's theorem, Tutte's
theorem, Konig's theorem
3
11 Petersen's theorem, algorithms for matching and weighted matching, factors
of graphs
3
12 Tutte's f-factor theorem; Extremal problems: Independent sets and covering
numbers,
3
13 Turan's theorem, Ramsey theorems, Colorings: Brooks theorem, 3
14 the greedy algorithm, the Welsh-Powell bound, critical graphs 3
15 Chromatic polynomials, girth and chromatic number, Vizing's theorem 2
16 Graphs on surfaces: Planar graphs, duality, Euler's formula, Kuratowski's
theorem
3
17 Toroidal graphs, 2-cell embeddings, graphs on other surfaces 3
18 Directed graphs: Tournaments, directed paths and cycles, connectivity and
strongly connected digraphs, branching
3
19 Networks and flows: Flow cuts, max flow min cut theorem, perfect square 2
20 Selected topics: Dominating sets, the reconstruction problem 2
21 Intersection graphs, perfect graphs, random graphs 2
Course Outcomes (COs):
8. Understand basic concepts in graph theory: coloring, planar graphs.
9. Write precise and accurate mathematical definitions of objects in graph theory
10. Describe and solve some real time problems using concepts of graph theory (e.g., scheduling
problems).
11. Use some classical graph algorithms in order to find subgraphs with desirable properties
76
12. Find maximal flows in networks and give an account of how this method is connected with
results of Menger, König and Hall as well as solving certain problems by formulating them in
terms of network flows
13. Compute and deduce properties of chromatic numbers and polynomials and identify certain
problems as graph colouring problems
14. Apply results of Euler, Kuratowski-Wagner and Appel-Haken to deduce properties of (non)
planar graphs
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √
CO2 √ √
CO3 √ √ √ √ √ √
CO4 √ √ √
CO5 √ √ √ √ √ √ √
CO6 √ √ √ √ √
CO7 √ √ √ √ √
Subject
Code
Subject Name Credits Core/Elective Internal marks External
marks
MIT1.3 PARALLEL
ALGORITHMS
3 C 40 60
• Course Description: The student will learn How to work on Parallel Programming Platforms,
Principles of Parallel Algorithm Design, Parallelization aspects , Parallel sorting methods,
.Mapping and scheduling aspects of algorithms
• Syllabus / Text books:
UNIT1: Introduction:
Computational demand in various application areas, advent of parallel processing, terminology-
pipelining, Data parallelism and control parallelism-Amdahl’s law. Basic parallel random access
Machine Algorithms– definitions of P, NP and NP-Hard, NP-complete classes of sequential
algorithms-NC–class for parallel algorithms.
UNIT II: Scheduling:
Organizational features of Processor Arrays, Multiprocessors and multi-computers. Mapping and
scheduling aspects of algorithms. Mapping into meshes and hyper cubes-Load balancing-List
scheduling algorithm Coffman-graham scheduling algorithm for parallel processors.
77
UNIT III: Algorithms:
Elementary Parallel algorithms on SIMD and MIMD machines, Analysis of these algorithms. Matrix
Multiplication algorithms on SIMD and MIMD models. Fast Fourier Transform algorithms.
Implementation on Hyper cube architectures. Solving linear file -system of equations, parallelizing
aspects of sequential methods back substitution and Tridiagonal.
UNIT IV: Sorting:
Parallel sorting methods, Odd-even transposition Sorting on processor arrays, Biotonic, merge sort on
shuffle – exchange ID, Arrayprocessor, 2D-Mesh Processor and Hypercube Processor Array. Parallel
Quick-sort on Multiprocessors. Hyper Quick sort on hyper cube multicomputer. Parallel search
operations. Ellis algorithm and Manberandladner’s Algorithms for dictionary operations.
UNIT V: Searching
Parallel algorithms for Graph searching, All Pairs shortest paths and minimum cost spanning tree
Parallelization aspects of combinatorial search algorithm swith focus on Branch and Bound Methods
and Alpha-beta Search methods.
TEXT BOOKS:
1. Parallel computing t heo r y and practice, MichelJ.Quinn
2. Programming Parallel Algorithms, GuyE.Blelloch, Communications of the ACM
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Computational demand in various application areas, advent of parallel
processing
3
2 Terminology-pipelining, Data parallelism and control parallelism-Amdahl ‘s
law
2
3 Basic parallel random access Machine Algorithms-definitions of P 3
4 NP and NP-Hard, NP-complete classes of sequential algorithms-NC–class
for parallel algorithms
3
5 Organizational features of Processor Arrays, Multiprocessors and multi-
computers
2
6 Mapping and scheduling aspects of algorithms. Mapping into meshes and
hyper cubes
3
7 Load balancing-List scheduling algorithm Coffman-graham scheduling
algorithm for parallel processors
3
8 Elementary Parallel algorithms on SIMD and MIMD machines, 3
9 Analysis of Parallel algorithms 2
10 Matrix Multiplication algorithms on SIMD and MIMD models. Fast Fourier
Transform algorithms.
3
11 Implementation on Hyper cube architectures, Solving linear file -system of
equations
3
12 Parallelizing aspects of sequential methods back substitution and Tridiagonal 3
13 Parallel sorting methods, Odd-even transposition Sorting on processor arrays 3
14 Biotonic, merge sort on shuffle - exchangeID,Arrayprocessor,2D-Mesh
processor and Hypercube Processor Array
3
15 Parallel Quick-sort on Multiprocessors. Hyper Quicksort on hypercube
multicomputer
2
16 Parallel search operations. Ellis algorithm and Manberandladner’s Algorithms 3
78
for dictionary operations
17 Parallel algorithms for Graph searching, 3
18 All Pairs shortest paths, Minimum cost spanning tree. 3
19 Parallelization aspects of combinatorial search algorithms with Focus on
Branch and Bound Methods
3
20 Alpha-beta Search methods 2
Course Outcomes (COs):
6. Understand fundamental concepts of parallelism- pipeline, Amdahl's law.
7. Know the physical limits of linear approach and solving problems in parallel.
8. How to design & analyze parallel algorithms and implement them with parallel processors.
9. Understand various approaches in parallel sorting and Searching.
10. Gain knowledge on various parallel processor architectures and know how to embed one
Architecture into another.
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √
CO2 √ √
CO3 √ √ √
CO4 √ √ √ √
CO5 √ √ √ √
Subject
Code
Subject Name Credits Core/Elective Internal marks External marks
MIT1.4 DATA MINING AND
KNOWLEDGE
DISCOVERY
3 C 40 60
• Course Description: This subject provides an introduction to multidisciplinary field of data
mining, the general data features, techniques for data preprocessing, modelling, design
architectures, general implementation of data warehouses and OLAP, the relationship between
data warehousing and other generalization methods, data-cube technology & data cube
computation, market basket analysis with many techniques for frequent item set mining,
classification including decision tree induction, bayes classification, advanced methods for
bayaesian belief networks, the concepts of data clustering includes a different methods of
clustering such as k-means, k-mediods, db scan algorithm, role of data mining in web mining.
• Syllabus / Text books:
Unit 1:
Introduction to Data mining, types of Data, Data Quality, Data Processing, Measures of Similarity
and Dissimilarity, Exploring Data: Data Set, Summary Statistics, Visualization, OLAP and multi
dimensional data analysis.
79
Unit 2: Classification: Basic Concepts, Decision Trees and model evaluation: General approach
for solving a classification problem, Decision Tree induction, Model over fitting: due to presence
of noise, due to lack of representation samples, Evaluating the performance of classifier. Nearest
Neighborhood classifier, Bayesian Classifier, Support vector Machines: Linear SVM, Separable
and Non Separable case.
Unit 3: Association Analysis: Problem Definition, Frequent Item-set generation, rule generation,
compact representation of frequent item sets, FP-Growth Algorithms. Handling Categorical,
Continuous attributes, Concept hierarchy, Sequential, Sub graph patterns
Unit 4: Clustering: Over view, K-means, Agglomerative Hierarchical clustering, DBSCAN,
Cluster evaluation: overview, Unsupervised Cluster Evaluation using cohesion and separation,
using proximity matrix, Scalable Clustering algorithm
Unit 5: Web data mining: Introduction, Web terminology and characteristics, Web content
mining, Web usage mining, web structure mining, Search Engines: Characteristics, Functionality,
Architecture, Ranking of WebPages, Enterprise search
TEXT BOOKS:
1. Introduction to Data Mining: Pang-Ning tan, Michael Steinbach, Vipin Kumar, Addison-
Wesley.
2. Introduction to Data Mining with Case Studies: GK Gupta; Prentice Hall.
REFERENCE BOOKS:
1. Data Mining: Introductory and Advanced Topics, Margaret H Dunham, Pearson, 2008.
2. Fundamentals of data warehouses, 2/e ,Jarke, Lenzerini, Vassiliou, Vassiliadis, Springer.
3. Data Mining Theory and Practice, Soman, Diwakar, Ajay, PHI, 2006.
4. Data Mining, Concepts and Techniques, 2/e, Jiawei Han, MichelineKamber, Elsevier, 2006.
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Introduction to Data mining, types of Data, Data Quality, Data Processing 4
2 Measures of Similarity and Dissimilarity 2
3 Exploring Data: Data Set, Summary Statistics 2
4 Visualization, OLAP and multi dimensional data analysis 3
5 Classification: Basic Concepts, Decision Trees and model evaluation: General
approach for solving a classification problem
4
6 Decision Tree induction, Model over fitting: due to presence of noise, due to
lack of representation samples
2
7 Evaluating the performance of classifier. Nearest Neighborhood classifier,
Bayesian Classifiers
4
8 Support vector Machines: Linear SVM, Separable and Non Separable case 3
9 Association Analysis: Problem Definition, Frequent Item-set generation 3
11 Rule generation, compact representation of frequent item sets, FP-Growth
Algorithms
3
12 Handling Categorical , Continuous attributes, concept hierarchy, Sequential ,
Sub graph patterns
4
80
13 Clustering: Over view, K-means, Agglomerative Hierarchical clustering 4
14 DBSCAN, Cluster evaluation: overview, Unsupervised Cluster Evaluation
using cohesion and separation
3
15 Using proximity matrix, Scalable Clustering algorithm 3
16 Web data mining: Introduction, Web terminology and characteristics 2
17 Web content mining, Web usage mining, web structure mining 3
18 Search Engines :Characteristics, Functionality, Architecture, Ranking of
WebPages, Enterprise search
4
Course Outcomes:
7. An ability to understand the basics of types of data, quality of data, suitable measures required to
perform data analysis. (UNIT-I)
8. To understand various classification techniques to perform classification, model building and
evaluation (UNIT-II)
9. Identify the usage of association rule mining techniques on categorical and continuous data (UNIT
III)
10. Identify suitable clustering algorithm (apply with open source tools), interpret, evaluate and report
the result(UNIT IV)
11. To understand the need of web mining (UNI-V)
12. Design and implement a data-mining application using synthetic, realistic data sets using open
source tools viz., Weka
Mapping between COs and POs:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √
CO2 √ √
CO3 √ √
CO4 √ √ √
CO5 √
CO6 √ √
Subject
Code
Subject Name Credits Core/Elective Internal marks External
marks
MIT1.5 ADVANCED
COMPUTER
NETWORKS
3 C 40 60
• Course Description: The student will learn about the principals and practice of computer
networking, with emphasis on the internet, structure and components of computer network, layer
architectures, physical layer, LAN, conjunction control, quality of service and multicasting.
• Syllabus / Text books:
Unit-I:
81
Network layer: Network Layer design issues: store-and forward packet switching, services
provided transport layers, implementation connection less services, implementation connection
oriented services, comparison of virtual –circuit and datagram subnets.
Routing Algorithm –shortest path routing, flooding, distance vector routing, link state routing,
Hierarchical routing, Broadcast routing, Multicasting routing, routing for mobiles Hosts, routing in
Adhoc networks-
Congestion control algorithms-Load shedding, Congestion control in Data gram Subnet.
Unit-II:
IPV4 Address address space, notations, classful addressing, classless addressing network
addressing translation(NAT) , IPV6 Address structure address space, Internetworking need for
network layer internet as a data gram, internet as connection less network.
IPV4 datagram, Fragmentation, checksum, options.
IPV6 Advantages, packet format, extension Headers, Transition from IPV4 to IPV6
Unit–III:
Process to process delivery: client/server paradigm, multiplexing and demultiplexing,
connectionless versus connection oriented services, reliable versus reliable.
UDP: well known ports for UDP, user data gram, check sum, UDP operation, and uses of UDP
TCP: TCP services, TCP features, segment, A TCP connection, Flow control, error control,
congestion control.
SCTP: SCTP services SCTP features, packet format, An SCTP association, flow control, error
control.
Congestion control: open loop congestion control, closed loop congestion control, Congestion
control in TCP, frame relay,
QUALITY OF SERVICE: flow characteristics, flow classes TECHNIQUES TO IMPROVE
QOS: scheduling, traffic shaping, resource reservation, admission control.
Unit –IV:
Domain name system: The name space, resource records, name servers
E-mail: architecture and services, the user agent, message formats, message transfer, final delivery
Www: architecture overview, static web documents, dynamic web documents, hyper text transfer
protocol, performance elements, the wireless web.
Multimedia: introduction digital a audio , Audio compression, streaming audio, internet radio,
voice over IP, introduction to video, video compression, video on demand, the MBone-the
multicast back bone
Unit –V: Emerging trends Computer Networks:
Mobile Ad hoc networks: applications of Ad hoc networks, challenges and issues in MANETS,
MAC layers issues, routing protocols in MANET, transport layer issues, Ad Hoc networks security.
Wireless sensors networks: WSN functioning, operation system support in sensor devices, WSN
Characteristics, sensor network operation, sensor Architecture: cluster management;
Wireless mesh networks WMN design, Issues in WMNs;
TEXT BOOKS:
1. Data communications and networking 4thedtionBehrouz A Fourzan, TMH
2. Computer networks 4thediton Andrew S Tanenbaum, Pearson
3. Computer networks, Mayank Dave, CENGAGE
REFERENCE BOOKS:
82
1. Computer networks, A system Approach, 5thed, Larry L Peterson and Bruce S Davie,
Elsevier
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Unit-I: Network Layer design issues: store-and forward packet switching,
services provided transport layers.
2
2 Implementation connection oriented services, comparison of virtual –circuit
and datagram subnets.
3
3 shortest path routing, flooding, distance vector routing 2
4 link state routing, Hierarchical routing, Broadcast routing, 2
5 Routing for mobiles Hosts, routing in Adhoc networks.
2
6 Load shedding, Congestion control in Data gram Subnet. 2
7 Unit-I : IPV4address space, notations, classful addressing, classless
addressing network addressing translation(NAT) ,
4
8 IPV6 Address structure address space, Internetworking need for network
layer internet as a data gram, internet as connection less network.
2
9 IPV4 datagram, Fragmentation, checksum, options.
2
10 IPV6 Advantages, packet format, extension Headers, Transition from IPV4 to
IPV6
3
11 Unit–III: Process to process delivery: client/server paradigm, multiplexing
and demultiplexing connectionless versus connection oriented services,
reliable versus reliable.
3
12 UDP: well known ports for UDP, user data gram, check sum, UDP operation,
and uses of UDP
2
13 TCP: TCP services, TCP features, segment, A TCP connection, Flow control,
error control, congestion control.
3
14 SCTP services SCTP features, packet format, An SCTP association, flow
control, error control in TCP, frame relay.
3
15 Congestion control: open loop congestion control, closed loop congestion
control, Congestion control
2
16 Unit–IV: Domain name system: The name space, resource records, name
servers E-mail: architecture and services, the user agent, message formats,
message transfer, final delivery.
4
17 QOS: flow characteristics, flow classes TECHNIQUES TO IMPROVE QOS
scheduling, traffic shaping, resource reservation, admission control.
3
18 Www: architecture overview, static web documents, dynamic web
documents, Hyper text transfer protocol, performance elements, the wireless
web.
4
19 Multimedia: introduction digital a audio , Audio compression, streaming
audio, internet radio, voice over IP,
2
20 introduction to video, video compression, video on demand, the MBone-the
multicast back bone
2
21 Unit–V: applications of Ad hoc networks, challenges and issues in MANETS,
MAC layers issues, routing protocols in MANET, transport layer issues, Ad
Hoc networks security.
2
83
22 WSN functioning, operation system support in sensor devices, WSN
Characteristics, sensor network operation, sensor Architecture: cluster
management.
4
23 Wireless mesh networks WMN design, Issues in WMNs.
2
Course Outcomes:
Upon the successful completion of the course, students will be able to:
1. The Students will get good knowledge of Network layer functions and routing algorithms
2. The students will know different IP addressing techniques used in internet
3. The students will gains good knowledge about transport layer functions and protocols for data
delivery in the internet
4. The students will gains good knowledge about architecture of DNS, email, www and multimedia
5. The students will get good knowledge about design of Manets and Wireless Sensor networks and their
applications in reality
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √
CO2 √ √ √ √ √
CO3 √ √ √ √ √ √
CO4 √ √ √ √ √ √ √
CO5 √ √ √ √ √ √ √
• Syllabus / Text books:
Unit 1: Introduction to distributed programming: Anatomy of a distributed Application,
Requirements for Developing Distributed Applications, What does Java Provide?
Introduction to sockets programming: Sockets and Streams, URLs, URL Connections and Content
Handlers, The Class Loader.
Unit 2: Distributing Objects: Why Distribute Objects?, What’s so Tough About Distributing
Objects?, Features of Distributed Object Systems, Distributed Object Schemes for JAVA,
CORBA, Java RMI, RMI Vs CORBA.
Threads: Thread and Runnable, Making a Thread, Managing Threads at Runtime, Networked
Threads.
Subject
Code
Subject Name Credits Core/Elective Internal marks External marks
MIT1.6 DISTRIBUTED
PROGRAMMING
APPLICATIONS
THROUGH JAVA
3 C 40 60
84
Unit 3: Security: Security Issues and Concerns, The java. Security Package, Identities and Access
Control, Keys: Public, Private and Secret, Digital Signature, Data Encryption, Choosing a
Cryptographic Algorithm
Message-Passing Systems: Messages defined, Why Do we need Messages?, Message Processing,
Fixed Protocols, Adaptable Protocols, Message Passing with Java Events, Using Remote Objects
Databases: An Overview of JDBC, Remote Database Applications, Multi-Database Applications
Unit 4: RMI: The Basic Structure of RMI, The Architecture Diagram Revisited, Implementing the
Basic Objects, The Rest of the Server, The Client Application.
The RMI Registry: Why use a Naming Service? The RMI Registry, The RMI Registry is an RMI
Server, Examining the Registry, Limitations of the RMI Registry, Security Issues
Unit 5: Naming Services: Basic Design, Terminology and Requirements, Requirements for our
Naming Service, Federation and Threading, The Context Interface, The Value Objects, Context
Impl, Switching between Naming Services, The Java Naming and Directory Interface(JNDI).
The RMI Runtime: Reviewing the Mechanics of a Remote Method call, Distributed Garbage
Collection, RMIs Logging Facilities, and Other JVM Parameters.
TEXTBOOKS:
1. Java Distributed Computing , Jim Farley , O’ Reilly
2. Java RMI Designing and Building: The Basics of RMI Applications, by William Grosso,
O’Reilly
3. Java SOA Cook book SOA Implementation Recipes, Tips and Techniques, Eben Hewitt,
O’Reilly, 2009
4. Service Oriented Architecture with Java, MalharBaral, Vincenzo Caselli, Binildas A. Christudas,
Packt
REFERENCES:
1. Distributed Programming with Java, QusayH.Mahnoud, Manning Publisher 2000
2. Java in Distributed Systems: Concurrency, Distribution and Persistence, Marko Boger, 2001.
3. Developing Distributed and E-Commerce Applications, Darrel Ince, 2/e, Addison Wesly, 2004.
4. Java Message Service (O’Reilly Java Series), Richard Monson- Haefel, David Chappell.
5. Sun SL 301 Distributed Programming with Java.
6. Java Tutorial, http://java.sun.com/docs/books/tutorial/index.html.
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Anatomy of a distributed Application, Requirements for Developing
Distributed Applications,
2
2 Sockets and Streams, URLs, URL Connections and Content Handlers, The
Class Loader
3
3 Distributing Objects: Why Distribute Objects? What’s so Tough About
Distributing Objects?
2
4 Features of Distributed Object Systems, Distributed Object Schemes for
JAVA, CORBA, Java RMI, RMI Vs CORBA.
3
5 CORBA, Java RMI, RMI Vs CORBA. 2
6 Thread and Runnable, Making a Thread, Managing Threads at Runtime,
Networked Threads.
2
7 Security: Security Issues and Concerns, The java. Security Package, Identities 3
85
and Access Control
8 Keys: Public, Private and Secret, Digital Signature, 2
9 Data Encryption, Choosing a Cryptographic Algorithm 2
10 Message-Passing Systems: Messages defined, Why Do we need Messages?,
Message Processing,
3
11 Fixed Protocols, Adaptable Protocols, Message Passing with Java Events 2
12 An Overview of JDBC, Remote Database Applications, Multi-Database
Applications
2
13 The RMI Registry: Why use a Naming Service? The RMI Registry, The RMI
Registry is an RMI Server,
4
14 Examining the Registry, Limitations of the RMI Registry, Security Issues 3
15 Naming Services: Basic Design, Terminology and Requirements 2
16 Requirements for our Naming Service, Federation and Threading, 2
17 The Context Interface, The Value Objects, Context Impl, Switching between
Naming Services,
2
18 The Java Naming and Directory Interface (JNDI). 2
19 The RMI Runtime: Reviewing the Mechanics of a Remote Method call 2
20 Distributed Garbage Collection, RMIs Logging Facilities, Other JVM
Parameters.
2
Course outcomes:
The theory should be taught and practical should be carried out in such a manner that students are
able to acquire different learning out comes in cognitive, psychomotor and affective domain to
demonstrate following course outcomes.
1. Build simple distributed applications using Java’s networking capabilities
2. Build concurrent distributed applications using multiple threads
3. Build distributed applications with security enhancements using Java’s security and
cryptographic extensions.
4. Develop Java Applet Programming using various techniques
5. Develop applications using Abstract Window Toolkit
6. Update and retrieve the data from the databases using JDBC-ODBC.
7. Develop server side programs using servlets.
8. Develop Java Server Pages applications using JSP Tags
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √ √
CO2 √ √ √ √
CO3 √ √ √ √ √
CO4 √ √ √ √ √
CO5 √ √ √ √ √ √
CO6 √ √ √ √ √ √ √
CO7 √ √ √ √ √
CO8 √ √ √ √ √
86
SNO
Subject Name Credits Core/Elective Internal marks External marks
MIT1.7 IT LAB-1 2 C 40 60
• Course Description:
Through this course the student is going to learn various programs like establishing client
server application in computer networks and advanced data structures. We are going to learn
about association rules, classification and clustering techniques etc using WEKA tool.
• Syllabus / Text books:
1. Write a c program to implement one to one chat application using sockets?
2. Write a c program to implement redundancy check using CRC?
3. Write a java program to implement simulation of sliding window protocol?
4. Write a java program to get the MAC or Physical address of the system using Address
Resolution Protocol?
5. By using Data mining tool Demonstration of preprocessing on dataset student.arff?
6. By using Data mining tool Demonstration of classification rule process on dataset employee. arff
using j48 algorithm
7. By using Data mining tool Demonstration of Association rule process on dataset test.arff using
apriori algorithm?
8. By using Data mining tool Demonstration of classification rule process on dataset
employee.arff using naïve baye’s algorithm
9. By using Data mining tool Demonstration of clustering rule process on dataset iris.arff using
simple k-means algorithms.
10. To perform various Recursive & Non-Recursive operations on Binary Search Tree
11. To implement BFS & DFS for a Graph
12. To implement Merge & Heap Sort of given elements
13. To perform various operations on AVL trees
14. To implement Krushkal’s algorithm to generate a min-cost spanning tree
15. To implement Prim’s algorithm to generate a min-cost spanning tree
16. To implement functions of Dictionary using Hashing
Lecture Plan:
SNO TOPICS COVERED HOURS
1 To implement one chat application using sockets
And implement redundancy check using CRC
3
2 To implement simulation of sliding window protocol
To perform MAC or Physical address of the system using Address Resolution
Protocol
3
3 Implementation by using Data mining tool Demonstration of preprocessing on 3
87
dataset student.arff
4 Implementation by using Data mining tool Demonstration of classification rule
process on dataset employee.arff using j48 algorithm
3
5 Implementation by using Data mining tool Demonstration of Association rule
process on dataset test.arff using apriori algorithm
3
6 Implementation by using Data mining tool Demonstration of classification rule
process on dataset employee.arff using naïve baye’s algorithm
3
7 Implementation by using Data mining tool Demonstration of clustering rule
process on dataset iris.arff using simple k-means algorithms
3
8 To perform various Recursive & Non-Recursive operations on Binary Search
Tree
3
9 To implement graphs by using BFS and DFS techniques 3
11 Implementing merge and heap sorts for given elements 3
12 Performing various operations in AVL trees 3
13 To implement krushkal’s algorithm to find minimum cost spanning tree 3
14
To implement Prim’s algorithm to find min cost spanning tree 3
15 To implement functions of Dictionaries using hashing 3
Course Outcomes:
1. Identify classes, objects, members of a class and relationships among them neededfor a specific
problem.
2. Analyze algorithms performance using Prior analysis and asymptotic notations.
3. Analyze and apply to solve the complex problems using advanced data structures (likearrays,
stacks, queues, linked lists, graphs and trees.)
4. Ability to solve the real life problem using different algorithm design techniques
5. Using different data mining tools.
Mapping between COs and POs
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √ √ √
CO2 √ √ √ √ √ √ √ √
CO3 √ √ √ √ √ √ √ √
CO4 √ √ √ √ √ √ √ √
CO5 √ √ √ √ √ √ √
Subject Code Subject Name Credits Core/Elective Internal
marks
External
marks
MIT2.1 ADVANCED
UNIX
PROGRAMMING
3 C 40 60
88
• Course Description: This course will develop the programming skills of the student, File access
and attributes, I/O issues, signals, concurrent programming with processes and threads, network
programming, client-server paradigm.
• Syllabus / Text books:
UNIT-I
Introduction to unix-Brief History-What is Unix-Unix Components-Using Unix-Commands in Unix-
Some Basic Commands-Command Substitution-Giving Multiple Commands.
UNIT-II
The File system –The Basics of Files-What’s in a File-Directories and File Names-Permissions-I Nodes-
The Directory Hierarchy, File Attributes and Permissions-The File Command knowing the File Type-
The Chmod Command Changing File Permissions-The Chown Command Changing the Owner of a
File-The Chgrp Command Changing the Group of a File.
UNIT-III
Using the Shell-Command Line Structure-Met characters-Creating New Commands-Command
Arguments and Parameters-Program Output as Arguments-Shell Variables- -More on I/O Redirection-
Looping in Shell Programs.
UNIT-IV
Filters-The Grep Family-Other Filters-The Stream Editor Sed-The AWK Pattern Scanning and
processing Language-Good Files and Good Filters.
UNIT-V
Shell Programming-Shell Variables-The Export Command-The Profile File a Script Run During
Starting-The First Shell Script-The read Command-Positional parameters-The $? Variable knowing the
exit Status-More about the Set Command-The Exit Command-Branching Control Structures-Loop
Control Structures-The Continue and Break Statement-The Expr Command: Performing Integer
Arithmetic-Real Arithmetic in Shell Programs-The here Document(<<)-The Sleep Command-
Debugging Scripts-The Script Command-The Eval Command-The Exec Command. The Process-The
Meaning-Parent and Child Processes-Types of Processes-More about Foreground and Background
processes-Internal and External Commands-Process Creation-The Trap Command-The Stty Command-
The Kill Command-Job Control.
TEXT BOOKS:
1. The Unix programming Environment by Brain W. Kernighan & Rob Pike, Pearson.
2. Introduction to Unix Shell Programming by M.G.Venkateshmurthy, Pearson.
REFERENCE BOOKS:
1. Unix and shell programmingby B.M. Harwani, OXFORD university press.
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Basic Unix Commands and Shell programming. 2
2 File system related system calls. Unix file structure, directories, files and
device system calls and device drivers.
3
3 Library functions, low-level file access and file descriptors, file and directory
maintenance.
3
89
4 File locking-creating lock files, locking regions 3
5 Processes and threads-process structure, starting new process, zombie process. 3
6 fork(), vfork(), exit(),wait(), exec() family of system calls. 2
7 User identification, process timers, Threads, managing system limits.
Managing system limits.
2
8 Inter process communication: pipes, process pipes, parent child process. 2
9 Named pipes-FIFO. 2
11 IPC using semaphores and message queues . 3
12 IPC using shared memory. Applications of IPC. 3
13 Signals: signal functions, reliable signals, interrupted system calls. 2
14 Kill and raise functions, alarm, pause functions. 2
15 abort, system, sleep functions. 2
16 Threads synchronization using mutexes. 2
17 Socket Address structures, byte ordering and manipulation functions. 2
18 Elementary TCP sockets-socket, connect, bind, listen, accept, close functions. 3
19 TCP echo client server programs. 2
20 Socket options-setsockopt, getsockopt system calls, socket options . 2
21 UDP socket functions. 2
22 Use of calls such as gethost by name function. 2
23 Simple client server programs using UDP. 2
23 Implementing a simple ping. 2
24 Simulating DOS attack. 2
Course Outcomes:
After learning the course, the student will be able to
1. Students will understand the basic set of commands and utilities in Linux/UNIX systems
2. Students will get good knowledge in Linux/UNIX library functions and system calls.
3. Student will gain some knowledge in UNIX administration.
4. Obtain a foundation for an advanced course in operating systems.
5. Understands various socket system calls that are used in network programming.
6. Student is able to develop one to one chat applications using various IPC system calls.
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √
CO2 √ √ √
CO3 √ √ √ √ √
CO4 √ √
CO5 √ √
CO6 √ √ √ √ √ √
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT 2.2 Information
Security
3 C 40 60
90
• Course Description: This course addresses various software security problems in a secure and
controlled environment and techniques that could be used to protect the software from security
threats. This course also contains”modus operandi” of adversaries; which could be used for
increasing software dependability.
• Syllabus / Text books:
UNIT I:
Introduction: Security Attacks (Interruption, Interception, Modification and Fabrication), Security
Services (Confidentiality, Authentication ,Integrity, Non-repudiation, access Control and
Availability) and Mechanisms, A model for Internetwork security, Internet Standards and RFCs,
Buffer overflow & format string vulnerabilities, TCP session hijacking, ARP attacks, route table
modification, UDP hijacking, and man-in-the-middle attacks.
UNIT II:
Conventional Encryption:
Conventional Encryption Principles, Conventional encryption algorithms, cipher block modes of
operation, location of encryption devices, key distribution Approaches of Message Authentication,
Secure Hash Functions and HMAC.
UNIT III:
Number Theory: Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and
Euler’s Theorems, the Chinese Remainder theorem, discrete logarithms
Public key: Public key cryptography principles, public key cryptography algorithms, digital
signatures, digital Certificates, Certificate Authority and key management Kerberos,
X.509Directory Authentication Service
UNIT IV:
IP Security: IP Security Overview, IP Security Architecture, Authentication Header,
Encapsulating Security Payload, Combining Security Associations and Key Management
Transport Level Security: Web Security Requirements, Secure Socket Layer (SSL) and Transport
Layer Security (TLS), Secure Electronic Transaction (SET)
Email Privacy: Pretty Good Privacy (PGP) and S/MIME.
UNIT V:
Intrusion Detection: Intruders, Intrusion Detection systems, Password Management.
Malicious Software: Viruses and related threats & Countermeasures.
Fire walls: Firewall Design principles, Trusted Systems.
TEXT BOOKS:
1. Network Security& Cryptography: Principles and Practices, William Stallings, PEA, Sixth
edition.
2. Hack Proofing your Network, Russell, Kaminsky, Forest Puppy, Wiley Dreamtech
REFERENCE BOOKS:
1. Network Security & Cryptography, Bernard Menezes, Cengage,2010
91
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Security Attacks (Interruption, Interception, Modification and Fabrication) 2
2 Security Services: Confidentiality, Authentication, Integrity. 2
3 Non-repudiation, access Control and Availability and Mechanisms. 2
4 A model for Internetwork security, Internet Standards and RFCs, Buffer overflow
& format string vulnerabilities
3
5 TCP session hijacking, ARP attacks, route table modification, UDP hijacking and
man-in-the-middle attacks.
3
6 Conventional Encryption Principles, Conventional encryption algorithms, cipher
block modes of operation
3
7 Location of encryption devices, key distribution Approaches of Message
Authentication, Secure Hash Functions and HMAC
3
8 Prime and Relatively Prime Numbers, Modular Arithmetic, Fermat’s and Euler’s
Theorems,
4
9 The Chinese Remainder theorem, Discrete logarithms, Public key cryptography
principles.
3
10 Public key cryptography algorithms, digital signatures. 3
11 Digital Certificates, Certificate Authority and key management Kerberos, X.509
Directory Authentication Service
3
12 IP Security Overview, IP Security Architecture, Authentication Header 3
13 Encapsulating Security Payload, Combining Security Associations and Key
Management
3
14 Web Security Requirements, Secure Socket Layer (SSL) and Transport Layer
Security (TLS).
4
15 Secure Electronic Transaction (SET) 3
16 Pretty Good Privacy (PGP) and S/MIME. 2
17 Intruders, Intrusion Detection systems, Password Management 3
18 Viruses and related threats & Countermeasures 3
19 Firewall Design principles, Trusted Systems. 4
Course Outcomes:
Upon the successful completion of the course, students will be able to:
1. The learner will get good awareness regarding different security threats and countermeasures.
2. The students will know the basic principles of symmetric and asymmetric key cryptography
3. The students will gains good knowledge design and applications of hash algorithms and digital
signatures.
4. The students will gains good knowledge at application layer security such as IP security, Web
Security, email Security and Firewalls
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √
92
CO2 √ √ √ √ √
CO3 √ √ √ √ √ √
CO4 √ √ √ √ √ √ √
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT2.3 SOFT
COMPUTING
3 C 40 60
• Course Description: In the course the student will Learn soft computing concepts and techniques
and foster their abilities in designing and implementing soft computing based solutions for real-
world problems.
• Syllabus / Text books:
UNIT I :
FUZZY SET THEORY: Introduction to Neuro – Fuzzy and Soft Computing, Fuzzy Sets, Basic
function and Terminology, Set-theoretic Operations, Member Function Formulation and
Parameterization, Fuzzy Rules and Fuzzy Reasoning, Extension Principle and Fuzzy Relations, Fuzzy
If-Then Rules, Fuzzy Reasoning, Fuzzy Inference Systems, Mamdani Fuzzy Models, Sugeno Fuzzy
Models, Tsukamoto Fuzzy Models, Input Space Partitioning and Fuzzy Modeling.
UNIT II:
OPTIMIZATION: Derivative based Optimization, Descent Methods, and The Method of
Steepest Descent, Classical Newton’s Method, Step Size Determination, Derivative-free Optimization,
Genetic Algorithms, Simulated Annealing, and Random Search – Downhill Simplex Search.
UNIT III:
ARTIFICIAL INTELLIGENCE : Introduction, Knowledge Representation, Reasoning, Issues
and Acquisition: Prepositional and Predicate Calculus Rule Based knowledge Representation Symbolic
Reasoning Under Uncertainty Basic knowledge Representation Issues Knowledge acquisition, Heuristic
Search: Techniques for Heuristic search Heuristic Classification State Space Search: Strategies
Implementation of Graph Search based on Recursion Patent-directed Search Production System and
Learning.
UNIT IV:
NEURO FUZZY MODELING: Adaptive Neuro-Fuzzy Inference Systems, Architecture
Hybrid Learning Algorithm, Learning Methods that Cross-fertilize ANFIS and RBFN Coactive Neuro
Fuzzy Modeling, Framework Neuron Functions for Adaptive Networks Neuro Fuzzy Spectrum.
UNIT V:
APPLICATIONS OF COMPUTATIONAL INTELLIGENCE: Printed Character Recognition, Inverse
Kinematics Problems, Automobile Fuel Efficiency Prediction, Soft Computing for Color Recipe
Prediction.
TEXT BOOKS:
1. J.S.R.Jang, C.T.Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, PHI, 2004, Pearson
Education 2004.
2. N.P.Padhy, “Artificial Intelligence and Intelligent Systems”, Oxford University Press, 2006.
.
REFERENCES:
1. Elaine Rich & Kevin Knight, Artificial Intelligence, Second Edition, Tata Mcgraw Hill
93
Publishing Comp., 2006, New Delhi.
2. Timothy J.Ross, “Fuzzy Logic with Engineering Applications”, McGraw-Hill, 1997.
3. Davis E.Goldberg, “Genetic Algorithms: Search, Optimization and Machine Learning”,
Addison Wesley, N.Y., 1989.
4. S. Rajasekaran and G.A.V.Pai, “Neural Networks, Fuzzy Logic and Genetic Algorithms”,
PHI.
5. R.Eberhart, P.Simpson and R.Dobbins, “Computational Intelligence - PC Tools”, AP
Professional, Boston, 1996.
6. AmitKonar, “Artificial Intelligence and Soft Computing Behaviourand Cognitive model of
The human brain”, CRC Press, 2008
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Introduction to neuro-fuzzy and soft computing. 2
2 Fuzzy sets, basic definition and terminology. Set –theoretic operations. 3
3 Member function formulation and parameterization. Fuzzy rules and fuzzy
reasoning.
3
4 Extension principles and fuzzy relations. Fuzzy if-then rules, fuzzy reasoning,
fuzzy inference systems.
3
5 Mandani fuzzy models, sugeno fuzzy models, Tsukamoto fuzzy models. 3
6 Input space portioning and fuzzy modeling. 2
7 Optimization: Derivative based optimization, descent methods, and the method
of steepest descent.
2
8 Classical newton’s method. Step size determination. 3
9 Derivative free optimization. Genetic algorithms. 2
11 Simulated annealing, random search-downhill simplex search. 3
12 Artificial intelligence-introduction, knowledge representation, reasoning, issues
and acquisition.
3
13 Prepositional and predicate calculus, rule based knowledge representation,
symbolic reasoning under uncertainty.
2
14 Heuristic search: techniques for heuristic search and heuristic classification
state space search.
3
15 Graph search based on recursion patent-directed search production system and
learning.
2
16 Neuro fuzzy modeling-adaptive neuro fuzzy inference systems, architecture –
hybrid learning algorithm.
3
17 Learning methods that cross fertilize ANFIS and RBFN. 2
18 Coactive neuro fuzzy modeling, framework neuron functions for adaptive
networks.
3
19 Neuro fuzzy spectrum. 2
20 Application of computational intelligence- printed character recognition. 2
21 Inverse kinematics problems. Automobile fuel efficiency prediction. 2
22 Soft computing for color recipe prediction. 2
Course Outcomes:
1. Able to apply fuzzy logic and reasoning to handle uncertainty in engineering problems.
2. Make use of genetic algorithms to combinatorial optimization problems
94
3. Apply artificial intelligence techniques, including search heuristics, knowledge representation,
planning and reasoning.
4. Learn and apply the principles of self-adopting and self organizing neuro fuzzy inference
systems.
5. Evaluate and compare solutions by various soft computing approaches for a given problem
6. Evaluate and compare solutions by various soft computing approaches for a given problem
Mapping between COs and POs:
CO\PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √
CO2 √ √ √
CO3 √ √ √
CO4 √ √ √
CO5 √ √ √
CO6 √ √
Subject
Code
Subject Name Credits Core/Elective Internal marks External marks
MIT2.4 ADHOC AND
SENSOR
NETWORKS
3 E 40 60
• Course Description: This course covers major aspects of ad hoc and sensor networking, from
design through performance issues to application requirements. It starts with the design issues and
challenges associated with implementations of ad hoc and sensor network applications. This includes
mobility, disconnections, and battery power consumption. The course provides a detailed treatment of
proactive, reactive, and hybrid routing protocols in mobile wireless networks. It also covers the IEEE
802.11 Wireless LAN and Bluetooth standards and discusses their characteristics and operations.
About half of the course time is spent on wireless sensor networks (architecture, design, protocols,
and applications).
• Syllabus / Text books:
UNIT I: Introduction to Ad Hoc Wireless Networks
Cellular and Ad Hoc Wireless Networks, Characteristics of MANETs, Applications of MANETs, Issues
and Challenges of MANETs, Ad Hoc Wireless Internet, MAC protocols for Ad hoc Wireless Networks-
Issues, Design Goals and Classifications of the MAC Protocols
UNIT II: Routing Protocols for Ad Hoc Wireless Networks
Issues in Designing a Routing Protocol, Classifications of Routing Protocols, Topology-based versus
Position-based Approaches, Issues and design goals of a Transport layer protocol, Classification of
Transport layer solutions, TCP over Ad hoc Wireless Networks, Solutions for TCP over Ad Hoc
Wireless Networks, Other Transport layer protocols.
UNIT III: Security protocols for Ad hoc Wireless Networks
95
Security in Ad hoc Wireless Networks, Network Security Requirements, Issues and Challenges in
Security Provisioning, Network Security Attacks, Key Management, Secure Routing in Ad hoc Wireless
Networks, Cooperation in MANETs, Intrusion Detection Systems.
UNIT IV: Basics of Wireless Sensors and Applications
The Mica Mote, Sensing and Communication Range, Design Issues, Energy Consumption, Clustering of
Sensors, Applications, Data Retrieval in Sensor Networks-Classification of WSNs, MAC layer, Routing
layer, Transport layer, High-level application layer support, Adapting to the inherent dynamic nature of
WSNs.
UNIT V: Security in WSNs
Security in WSNs, Key Management in WSNs, Secure Data Aggregation in WSNs, Sensor Network
Hardware-Components of Sensor Mote, Sensor Network Operating Systems–TinyOS, LA-TinyOS,
SOS, RETOS, Imperative Language-nesC, Dataflow style language: TinyGALS, Node-Level
Simulators, NS-2 and its sensor network extension, TOSSIM.
TEXT BOOKS:
1. Ad Hoc Wireless Networks – Architectures and Protocols, C. Siva Ram Murthy, B. S. Murthy,
Pearson Education, 2004
2. Ad Hoc and Sensor Networks – Theory and Applications, Carlos Corderio Dharma P.Aggarwal,
World Scientific Publications / Cambridge University Press, March 2006
3. Wireless Sensor Networks – Principles and Practice, Fei Hu, Xiaojun Cao, An Auerbach book,
CRC Press, Taylor & Francis Group, 2010
REFERENCE BOOKS:
1. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas Guibas,
Elsevier Science imprint, Morgan Kauffman Publishers, 2005, rp2009
2. Wireless Ad hoc Mobile Wireless Networks – Principles, Protocols and Applications, Subir
Kumar Sarkar, et al., Auerbach Publications, Taylor & Francis Group, 2008
3. Ad hoc Networking, Charles E.Perkins, Pearson Education, 2001
4. Wireless Ad hoc Networking, Shih-Lin Wu, Yu-Chee Tseng, Auerbach Publications, Taylor &
Francis Group, 2007
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Cellular and Ad hoc wireless networks, characters of MANETs. 2
2 Applications of MANET’s. Issues and challenges of MANETs. 2
3 Ad hoc wireless internet, MAC protocols for Ad Hoc wireless networks-
issues.
3
4 Design goals and classifications of the MAC protocols. 3
5 Routing protocols Ad hoc Wireless Networks
Issues in designing a routing protocol, classification of routing protocols.
3
6 Topology based versus position based approaches.
Issues and design goals of a transparent layer protocol.
2
7 Classification of transport layer solutions. TCP over Ad hoc wireless
networks.
2
8 Solution for TCP over Ad hoc Wireless networks, Other transport layer
protocols.
3
96
9 Security in Ad hoc wireless networks. Network security requirements. 2
11 Issues and challenges in security provisioning, networking security attacks. 3
12 Key management, secure routing in Ad hoc wireless networks. 3
13 Co operation in MANETs, Intrusion detection systems. 3
14 Basics of wireless sensors and applications- the mica mote, sensing and
communication range.
2
15 Design issues, energy consumption, clustering of sensors, applications. 2
16 Data retrieval in sensor networks- classification of WSNs, MAC layer,
routing layer, transport layer.
4
17 High level application layer support, adapting to the inherent dynamic nature
of WSNs.
2
18 Security in WSNs, key management in WSNs, Secure data Aggregation in
WSNs.
3
19 sensor network hardware –components of sensor mote 2
20 Sensor Network Operating Systems- TinyOS, LA- TinnyOS, SOS, RETOS,
Imperative Language-nesc.
4
21 Dataflow style language- TinyGALS, node-level simulators, NS-2 and its
sensor network extension, TOSSIM.
3
Course outcomes:
Upon completion of the course the student will be able to
1. Describe the principles and characteristics of mobile ad hoc networks (MANETs) and what
distinguishes them from infrastructure-based networks.
2. Describe the principles and characteristics of wireless sensor networks
3. Discuss the challenges in designing MAC, routing and transport protocols for wireless ad-hoc
sensor networks.
4. Comprehend the various sensor network Platforms, tools and applications.
5. Describe the issues and challenges in security provisioning and also familiar with the
mechanisms for implementing security and trust mechanisms in MANETs and WSNs.
Mapping between COs and POs:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √
CO2 √
CO3 √ √ √
CO4 √ √
CO5 √ √ √ √
• Course Description: In this course the student will learn about the Syntax, Structure and Semantics
of web. The student will learn about Metadata, metadata standards, XML+ metadata specification,
RDF and metadata processing. This course introduces techniques that are useful stand-alone and can
Subject
Code
Subject Name Credits Core/Elective Internal marks External marks
MIT2.4 SEMANTIC
WEBSERVICES
3 E 40 60
97
be integrated for building a semantic web. It will cover XML with Document Type Definitions and
Schemas; transformation/inference rules in XSLT, Rule ML, and the W3C rule language RIF;
metadata with RDF (Resource Description Framework); metadata taxonomies with RDF Schema;
description logic and the W3C ontology language OWL 2; as well as integrating these techniques for
ontology/rule-based multi-agent systems.
• Syllabus / Text books:
Unit I: Web Intelligence
Thinking and Intelligent Web Applications, The Information Age ,The World Wide Web, Limitations
of Today’s Web, The Next Generation Web, Machine Intelligence, Artificial Intelligence, Ontology,
Inference engines, Software Agents, Berners-Lee www, Semantic Road Map, Logic on the semantic
Web.
Unit II: Knowledge Representation for the Semantic Web
Ontologies and their role in the semantic web, Ontologies Languages for the Semantic Web –
Resource Description Framework(RDF) / RDF Schema, Ontology Web
Language(OWL),UML,XML/XML Schema.
Unit III: Ontology Engineering
Ontology Engineering, Constructing Ontology, Ontology Development Tools, Ontology Methods,
Ontology Sharing and Merging, Ontology Libraries and Ontology Mapping, Logic, Rule and
Inference Engines.
Unit IV: Semantic Web Applications, Services and Technology
Semantic Web applications and services, Semantic Search, e-learning, Semantic Bioinformatics,
Knowledge Base, XML Based Web Services, Creating an OWL-S Ontology for Web Services,
Semantic Search Technology, Web Search Agents and Semantic Methods,
Unit V:.Social Network Analysis and semantic web
What is social Networks analysis, development of the social networks analysis, Electronic Sources
for Network Analysis – Electronic Discussion networks, Blogs and Online Communities, Web Based
Networks? Building Semantic Web Applications with social network features.
TEXT BOOKS:
1. Thinking on the Web - Berners Lee, Godel and Turing, Wiley interscience, 2008.
2. Social Networks and the Semantic Web , Peter Mika,Springer,2007.
REFERENCE BOOKS:
1. Semantic Web Technologies, Trends and Research in Ontology Based Systems, J.Davies, Rudi
Studer, Paul Warren, JohnWiley&Sons.
2. Semantic Web and Semantic Web Services -Liyang Lu Chapman and Hall/CRCPublishers,
(Taylor & Francis Group)
3. Information Sharing on the semantic Web - HeinerStuckenschmidt;Frank Van Harmelen,
Springer Publications.
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Thinking and Intelligent Web Applications, The Information Age ,The World
Wide Web
3
98
2 Limitations of Today’s Web, The Next Generation Web, Machine
Intelligence,
3
3 Artificial Intelligence, Ontology, Inference engines, Software Agents, 4
4 Berners-Lee www, Semantic Road Map, Logic on the semantic Web. 3
5 Ontologies and their role in the semantic web 2
6 Ontologies Languages for the Semantic Web –Resource Description
Framework(RDF) / RDF Schema
4
7 Ontology Web Language (OWL), UML, XML/XML Schema. 3
8 Ontology Engineering, Constructing Ontology, Ontology Development Tools 2
9 Ontology Methods, Ontology Sharing and Merging 2
10 Ontology Libraries and Ontology Mapping, Logic, Rule and Inference
Engines.
3
11 Semantic Web applications and services, Semantic Search 2
12 e-learning, Semantic Bioinformatics, 3
13 Knowledge Base, XML Based Web Services 3
14 Creating an OWL-S Ontology for Web Services, Semantic Search Technology 4
15 Web Search Agents and Semantic Methods 3
16 What is social Networks analysis, development of the social networks analysis 4
17 Electronic Sources for Network Analysis – Electronic Discussion networks 3
18 Blogs and Online Communities, Web Based Networks 3
19 Building Semantic Web Applications with social network features. 3
Course Outcomes:
1. Understand the concept structure of the semantic web technology
2. How this technology revolutionizes the World Wide Web and its uses.
3. Understand the concepts of metadata, semantics of knowledge and resource, ontology, and their
descriptions in XML-based syntax and web ontology language (OWL).
4. Describe logic semantics and inference with OWL
5. Use ontology engineering approaches in semantic applications, program semantic applications
with Java API.
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √
CO2 √ √ √ √ √
CO3 √ √ √ √
CO4 √ √ √ √ √
CO5 √ √ √ √
• Course Description: The student will learn how to draw the Use case Diagram, Activity Diagrams,
Class Diagrams, Object Diagrams, Sequence Diagrams, Collaboration Diagrams, State Chart
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT2.4 UML AND DESIGN
PATTERNS
3 E 40 60
99
Diagram, Component Diagram, and Deployment Diagram. And also identify recurring design
problems, document possible solutions to these problems through the general arrangement and
composition of objects and classes discuss the advantages and disadvantages of the various solutions
and provide implementation examples. This course will introduce the student to the concept of design
patterns, examine several patterns in detail, apply these patterns to specific problems, and point the
student to design pattern resources.
• Syllabus / Text books
UNIT-I:
Introduction to UML: Importance of modeling, principles of modeling, object oriented modeling,
conceptual model of the UML, Architecture, and Software Development Life Cycle.
UNIT-II:
Structural Modeling: Classes, Relationships, common Mechanisms, and diagrams. Advanced classes,
advanced relationships, Object diagrams: common modeling techniques.
UNIT-III:
Behavioral Modeling: Interactions, Interaction diagrams. Use cases, Use case Diagrams, Activity
Diagrams., Events and signals, state machines, state chart diagrams. Advanced Behavioral Modeling:
Architectural Modeling: Components, Deployment, Component diagrams and Deployment diagrams,
Common modeling techniques for component and deployment diagrams
UNIT-IV:
Introduction: What Is a Design Pattern?, Design Patterns in Smalltalk MVC, Describing Design
Patterns, The Catalog of Design Patterns, Organizing the Catalog, How Design Patterns Solve Design
Problems, How to Select a Design Pattern, How to Use a Design Pattern.
Categories of Design Patterns: Creational Patterns: Abstract Factory, Builder, Factory Method,
Prototype, And Singleton.
UNIT-V:
Structural Patterns: Adapter, Bridge, Composite, Decorator, Façade, Flyweight, Proxy.
Behavioral Patterns: Chain of Responsibility, Command, Interpreter, Iterator, Mediator, Memento,
Observer, Strategy, Template Method, What to Expect from Design Patterns
TEXT BOOKS:
1. The unified Modeling language user guide by Grady Booch, James Rumbaugh ,Ivar Jacobson,
PEA
2. Design Patterns By Erich Gamma, Pearson Education
REFERENCE BOOK:
Satzinger: Object Oriented Analysis and Design, CENGAGE
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Introduction to UML: Importance of modeling 2
2 Principles of modeling, object oriented modeling, conceptual model of the 4
100
UML, Architecture
3 Software Development Life Cycle. 2
4 Structural Modeling: Classes, Relationships 3
5 Common Mechanisms and diagrams. Advanced classes, advanced
relationships
2
6 Object diagrams: common modeling techniques. 3
7 Behavioral Modeling: Interactions, Interaction diagrams. 4
8 Use cases, Use case Diagrams, Activity Diagrams. Events and signals 3
9 State machines, state chart diagrams. 2
10 Advanced Behavioral Modeling: Architectural Modeling: Components 3
11 Deployment, Component diagrams and Deployment diagrams 2
12 Common modeling techniques for component and deployment diagrams 3
13 Introduction: What Is a Design Pattern?, Design Patterns in Smalltalk MVC,
Describing Design Patterns
4
14 The Catalog of Design Patterns, Organizing the Catalog, How Design
Patterns Solve Design Problems
4
15 How to Select a Design Pattern, How to Use a Design Pattern. 3
16 Categories of Design Patterns: Creational Patterns: Abstract Factory, Builder,
Factory Method, Prototype, And Singleton.
4
17 Structural Patterns: Adapter, Bridge, Composite, Decorator, Façade,
Flyweight, Proxy.
3
18 Behavioral Patterns: Chain of Responsibility, Command, Interpreter, Iterator 3
19 Mediator, Memento, Observer, Strategy 3
20 Template Method, What to Expect from Design Patterns 2
Course Outcomes:
1. Design the Structural aspects of the System.
2. Design the Behavioral aspects of the System.
3. Understand and be able to apply incremental/iterative development
4. Understand common design patterns
5. Be able to identify appropriate patterns for design problems
6. Be able to evaluate the quality software source code
7. Be able to refractor badly designed program properly using patterns
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √
CO2 √ √ √ √ √
CO3 √ √ √ √
CO4 √ √ √ √ √
CO5 √ √ √
CO6 √ √ √ √ √ √
CO7 √ √ √ √
101
• Course Description:
This course provides basic knowledge of artificial intelligence, a deepened technical understanding of
machine learning research and theories, as well as practical experience of the use and design of
machine learning and data mining algorithms for applications and experiments. The course has a
strong focus towards applied IT. The student not only learns how to critically review and compare
different algorithms and methods, but how to plan, design, and implement learning components and
applications and how to conduct machine learning experiments.
• Syllabus / Text books:
UNIT -I:The ingredients of machine learning, Tasks: the problems that can be solved with
machine learning, Models: the output of machine learning, Features, the workhorses of machine
learning. Binary classification and related tasks: Classification, Scoring and ranking, Class
probability estimation
UNIT- II: Beyond binary classification: Handling more than two classes, Regression,
Unsupervised and descriptive learning. Concept learning: The hypothesis space, Paths through
the hypothesis space, beyond conjunctive concepts
UNIT- III: Tree models: Decision trees, Ranking and probability estimation trees, Tree learning
as variance reduction. Rule models: Learning ordered rule lists, Learning unordered rule sets,
Descriptive rule learning, First-order rule learning
UNIT -IV: Linear models: The least-squares method, The perception: a heuristic learning
algorithm for linear classifiers, Support vector machines, obtaining probabilities from linear
classifiers, going beyond linearity with kernel methods. Distance Based Models: Introduction,
Neighbors and exemplars, Nearest Neighbors classification, Distance Based Clustering,
Hierarchical Clustering.
UNIT- V: Probabilistic models: The normal distribution and its geometric interpretations,
Probabilistic models for categorical data, Discriminative learning by optimizing conditional
likelihood Probabilistic models with hidden variables.
Features: Kinds of feature, Feature transformations, Feature construction and selection. Model
ensembles: Bagging and random forests, Boosting
TEXT BOOKS:
1. Machine Learning: The art and science of algorithms that make sense of data, Peter Flach,
Cambridge.
2. Machine Learning, Tom M. Mitchell, MGH.
REFERENCE BOOKS:
1. Understanding Machine Learning: From Theory to Algorithms, ShaiShalev-Shwartz, Shai Ben
David, and Cambridge.
3. Machine Learning in Action, Peter Harington, 2012, Cengage.
Lecture Plan:
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT 2.5 Machine
Learning
3 E 40 60
102
SNO TOPICS COVERED HOURS
1 Introduction: Well-posed learning problems, Designing a learning system 3
2 Perspectives and issues in machine learning. Concept learning and the general
to specific ordering – Introduction
3
3 A concept learning task, Concept learning as search, Find-S: finding a
maximally specific hypothesis
3
4 Version spaces and the candidate elimination algorithm, Remarks on version
spaces and candidate elimination, Inductive bias.
4
5 Introduction, Decision tree representation, Appropriate problems for decision
tree learning
3
6 The basic decision tree learning algorithm, Issues in decision tree learning 2
7 Introduction, Neural network representation, Appropriate problems for neural
network learning
3
8 Perceptions, Multilayer networks and the back propagation algorithm 2
9 Remarks on the back propagation algorithm, An illustrative example face
recognition, advanced topics in artificial neural networks
3
11 Evaluation Hypotheses: Motivation, Estimation hypothesis accuracy, Basics
of sampling theory
2
12 A general approach for deriving confidence intervals, Difference in error of
two hypotheses, Comparing learning algorithms
4
13 Introduction, Bayes theorem, Bayes theorem and concept learning, Maximum
likelihood and least squared error hypotheses
4
14 Maximum likelihood hypotheses for predicting probabilities, Minimum
description length principle, Bayes optimal classifier, Gibs algorithm
4
15 Naïve bayes classifier, An example learning to classify text, Bayesian belief
networks The EM algorithm.
3
16 Introduction, Probability learning an approximately correct hypothesis,
Sample complexity for Finite Hypothesis Space
3
17 Sample Complexity for infinite Hypothesis Spaces -Instance-Based Learning-
Introduction, k -Nearest Neighbor Learning
3
18 Locally Weighted Regression, Radial Basis Functions, Case-Based
Reasoning, Remarks on Lazy and Eager Learning
4
Course Outcomes:
By the end of course the student will be able
1. Familiarity with a set of well-known supervised, unsupervised and semi-supervised learning
algorithms.
2. The ability to implement some basic machine learning algorithms
3. Understanding of how machine learning algorithms are evaluated
4. The ability to comprehend a Machine Learning conference paper (NIPS, ICML)
5. Design own machine learning algorithms
103
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √
CO2 √ √ √ √ √
CO3 √ √ √
CO4 √ √ √ √ √
CO5 √ √ √
Subject
Code
Subject Name Credits Core/Elective Internal
marks
External
marks
MIT2.5 INFORMATION
RETRIEVAL
SYSTEMS
3 E 40 60
• Course Description: Information retrieval plays a major role in processing of huge amounts of data.
The student will learn about representation of data in inverted files and signature files, types of
algorithms like Naive Algorithm, Knutt-Morris-Pratt Algorithm, Boyer-Moore Algorithm, Shift-Or
Algorithm, Karp-Rabin Algorithm searching of strings in a give large text.
• Syllabus / Text books:
Unit I: Introduction to Information storage and retrieval systems:
Domain Analysis of IR systems, IR and other types of Information Systems, IR System Evaluation
Introduction to Data structures and algorithms related to Information Retrieval: Basic
Concepts, Data structures, Algorithms.
Unit II: Inverted Files and Signature Files:
Introduction, Structures used in Inverted Files, Building an Inverted file using a sorted array,
Modifications to the Basic Techniques.
Signature Files: Concepts of Signature files, Compression, Vertical Partitioning, and Horizontal
Partitioning.
Unit III: New Indices for Text, Lexical Analysis and Stop lists:
PAT Trees and PAT Arrays: Introduction, PAT Tree structure, Algorithms on the PAT Trees,
Building PAT Trees as PATRICA Trees, PAT representation as Arrays. Lexical Analysis, Stop
lists.
Unit IV: Stemming Algorithms and Thesaurus Construction:
Types of Stemming algorithms, Experimental Evaluations of Stemming, Stemming to Compress
Inverted Files.
Thesaurus Construction: Features of Thesauri, Thesaurus Construction, Thesaurus construction
from Texts, Merging existing Thesauri.
Unit V: String Searching Algorithms:
Introduction, Preliminaries, the Naive Algorithm, The Knutt-Morris-Pratt Algorithm, The Boyer-
Moore Algorithm, The Shift-Or Algorithm, The Karp-Rabin Algorithm.
104
TEXT BOOKS
1. Modern Information Retrieval, Ricardo Baeza-Yates, Neto, PEA,2007.
2. Information Storage and Retrieval Systems: Theory and Implementation, Kowalski, Gerald,
Mark Academic Press, 2000.
REFERENCE BOOKS
1. Information Retrieval Data Structures and Algorithms , Frakes, Ricardo Baeza-Yates, PEA
2. Information Storage and Retieval, Robert Korfhage, John Wiley & Sons.
3. Introduction to Information Retrieval, Manning, Raghavan, Cambridge University Press.
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Introduction to Information storage and retrieval systems, Domain Analysis of IR
systems.
3
2 IR and other types of Information Systems, IR System Evaluation. 3
3 Introduction to Data structures and algorithms related to Information Retrieval,
Basic Concepts, Data structures, Algorithms.
4
4 Inverted Files and Signature Files, Introduction, Structures used in Inverted Files 3
5 Building an Inverted file using a sorted array, Modifications to the Basic
Techniques.
3
6 Signature Files: Concepts of Signature files, Compression, Vertical Partitioning. 4
7 Horizontal Partitioning, New Indices for Text, Lexical Analysis and Stop lists. 3
8 PAT Trees and PAT Arrays Introduction, PAT Tree structure, Algorithms on the
PAT Trees.
4
9 Building PAT Trees as PATRICA Trees, PAT representation as Arrays. Lexical
Analysis, Stop lists
4
10 Stemming Algorithms and Thesaurus Construction, Types of Stemming
algorithms.
3
11 Experimental Evaluations of Stemming, Stemming to Compress Inverted Files. 4
12 Thesaurus Construction: Features of Thesauri, Thesaurus Construction. 4
13 Thesaurus construction from Texts, Merging existing Thesauri. 3
14 String Searching Algorithms, Introduction, Preliminaries. 3
15 The Naive Algorithm, The Knutt-Morris-Pratt Algorithm. 3
16 The Boyer-Moore Algorithm, The Shift-Or Algorithm, The Karp-Rabin
Algorithm.
4
Course Outcomes:
• Understanding the basics of Information retrieval such as precision and recall
• Understanding the data structures like Inverted Indices, signature files used in Information
retrieval systems
• Understanding the basics of web search
• Understanding the different techniques for compression of an index including the dictionary and
its posting list
• Understanding the different components of an Information retrieval system
105
• Developing the ability of develop a complete IR system from scratch
• Understand and implement with various types of string matching algorithms
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √
CO2 √ √ √ √ √
CO3 √ √ √ √
CO4 √ √ √ √ √
CO5 √ √ √ √
CO6 √ √ √ √ √ √
CO7 √ √ √ √
Subject
Code
Subject Name Credits Core/Elective Internal
marks
External
marks
MIT 2.5 ANIMATION &
GAMING
3 E 40 60
• Course Description : In this course the student will be learn about game programming principles
and techniques for planning and implementing 3D interactive games. In a collaborative fashion,
students are exposed to a structured process that explains how to develop 3D games incorporating
object-oriented programming statements, 3D graphic scripts, character animation, sound, and music.
This course concludes with a final project involving a game prototype that exhibits 3D graphics
programming and animation techniques studied in this course. Emphasis is on problem solving and
collaboration. This course introduces students to fundamental principles of game design and 3D
computer animation. The course explores methods of modeling, rendering, and animating 3D
objects for video games, computer simulations, and virtual worlds. Students use 3D modeling
software to create character animation and 3D environments including rigging, key framing
animation, lighting, camera angles, texture formation, and motion.
• Syllabus / Text books:
UNIT I: What is mean by Animation. Why we need Animation. History of Animation. Uses of
Animation – Types of Animation – Principles of Animation – Some Techniques of Animation –
Animation on the WEB –3DAnimation –Special Effects- Creating Animation.
UNIT II: Creating Animation in Flash: Introduction to Flash Animation. Introduction to Flash–
Working with the Timeline and Frame-based Animation-Working with the Timeline and Tween-
based Animation–Understanding Layers
UNIT-III: Concept Development–Story Developing –Audio & Video–Color Model– Device
Independent Color Model–Gamma and Gamma Correction – Production Budgets -3D Animated
Movies.
106
UNIT –IV: Animation: The Animation Loop, Calculating Frame Rates, Scheduling Tasks at
Alternate Frame Rates, Restoring the Background, Double Buffering, Time – Based Motion,
Scrolling the Background, Parallax, User Gestures, Timed Animations, Animation Best Practices
UNIT –V: A Game Engine , The Game Loop, Loading Images, Multitrack Sound, Keyboard
Events, High Scores, The Game Engine Listing, The Ungame, A Pinball Game
TEXTBOOK:
1. PRINCIPLESOF MULTIMEDIA–RanjanParekh, 2007, TMH. (UnitI, UnitIII )
2. MultimediaTechnologies–AshokBanerji, AnandaMohanGhosh–McGrawHill
Publication.(Unit II:Chapter10)
3. Core HTML5 CANVAS, Graphics, Animation and Game Development, David Geary, PEARSON
(Unit IV, Unit V)
Lecture Plan:
SNO TOPICS COVERED HOURS
1 What is meant by Animation – Why we need Animation 3
2 History of Animation – Uses of Animation 3
3 Types of Animation – Principles of Animation – Some Techniques of
Animation –Animation on the WEB
4
4 3DAnimation –Special Effects- Creating Animation 3
5 Creating Animation in Flash: Introduction to Flash Animation 4
6 Introduction to Flash–Working with the Timeline and Frame-based Animation 3
7 Working with the Timeline and Tween-based Animation–Understanding
Layers
3
8 Concept Development – Story Developing –Audio & Video–Color Model 3
9 Device Independent Color Model – Gamma and Gamma Correction 3
10 Production Budgets -3DAnimatedMovies 4
11 Animation: The Animation Loop, Calculating Frame Rates 3
12 Scheduling Tasks at Alternate Frame Rates 3
13 Restoring the Background, Double Buffering 3
14 Time – Based Motion, Scrolling the Background 2
15 Parallax, User Gestures, Timed Animations, Animation Best Practices 3
16 A Game Engine , The Game Loop, Loading Images 3
17 Multitrack Sound, Keyboard Events, High Scores 3
Course Outcomes:
1. Learn all aspects of game development from visual storytelling
2. Learn modeling of game development.
3. Learn texturing, lighting, rigging & animation of game development
107
4. Learn audio, user interface & game level design.
5. Basic understanding for the creation of 2D animation through the use of traditional
techniques and stop-action animation. Students create 2D objects and move them in time
and space, then render them to video. Topics include all twelve principles of animation.
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √
CO2 √ √ √ √ √
CO3 √ √ √ √
CO4 √ √ √ √ √
CO5 √ √ √ √
Subject
Code
Subject Name Credits Core/Elective Internal
marks
External marks
MIT2.6 CLOUD
COMPUTING
3 E 40 60
• Course Description: The student will learn about the cloud environment, building software
systems and components that scale to millions of users in modern internet, cloud concepts
capabilities across the various cloud service models including IaaS, PaaS, SaaS, and developing
cloud based software applications on top of cloud platforms.
• Syllabus / Text books:
UNIT I:
Introduction: Network centric computing, Network centric content, peer-to –peer systems, cloud
computing delivery models and services, Ethical issues, Vulnerabilities, Major challenges for cloud
computing
Parallel and Distributed Systems: introduction, architecture, distributed systems, communication
protocols, logical clocks, message delivery rules, concurrency, model concurrency with Petri Nets.
UNIT II:
Cloud Infrastructure: At Amazon, The Google Perspective, Microsoft Windows Azure, Open Source
Software Platforms, Cloud storage diversity, Inter cloud, energy use and ecological impact,
responsibility sharing, user experience, Software licensing
Cloud Computing : Applications and Paradigms: Challenges for cloud, existing cloud applications and
new opportunities, architectural styles, workflows, The Zookeeper, The Map Reduce Program model,
HPC on cloud, biological research
108
UNIT III:
Cloud Resource virtualization: Virtualization, layering and virtualization, virtual machine monitors,
virtual machines, virtualization- full and para, performance and security isolation, hardware support for
virtualization, Case Study: Xen, vBlades
Cloud Resource Management and Scheduling: Policies and Mechanisms, Applications of control
theory to task scheduling, Stability of a two-level resource allocation architecture, feedback control
based on dynamic thresholds, coordination, resource bundling, scheduling algorithms, fair queuing, start
time fair queuing, cloud scheduling subject to deadlines, Scheduling Map Reduce applications, Resource
management and dynamic application scaling
UNIT IV:
Storage Systems: Evolution of storage technology, storage models, file systems and database,
distributed file systems, general parallel file systems. Google file system. Apache Hadoop, Big Table,
Megastore (text book 1), Amazon Simple Storage Service(S3) (Text book 2)
Cloud Security: Cloud security risks, security – atop concern for cloud users, privacy and privacy
impact assessment, trust, OS security, Virtual machine security, Security risks
UNIT V:
Cloud Application Development: Amazon Web Services : EC2 – instances, connecting clients,
security rules, launching, usage of S3 in Java, Installing Simple Notification Service on Ubuntu 10.04,
Installing Hadoop on Eclipse, Cloud based simulation of a Distributed trust algorithm, Cloud service for
adaptive data streaming ( Text Book 1)
Google: Google App Engine, Google Web Toolkit (Text Book 2)
Microsoft: Azure Services Platform, Windows live, Exchange Online, Share Point Services, Microsoft
Dynamics CRM (Text Book 2)
TEXT BOOKS:
1. Cloud Computing, Theory and Practice, Dan C Marinescu, MK Elsevier
2. Cloud Computing, A Practical Approach, Anthony T Velte, Toby J Velte, Robert Elsenpeter, TMH
REFERNCE BOOK:
1. Mastering Cloud Computing, Foundations and Application Programming, Raj Kumar Buyya,
Christen vecctiola, S Tammaraiselvi, TMH
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Network centric computing, Network centric content, peer-to –peer systems 3
2 Cloud computing delivery models and services, Ethical issues, Vulnerabilities,
Major challenges for cloud computing
3
3 Parallel and distributed Systems introduction, Architecture, Distributed systems 2
4 Communication protocols, logical clocks, message delivery rules, Concurrency,
model concurrency with Petri Nets.
3
5 Cloud Infrastructure at Amazon, The Google Perspective, Microsoft Windows
Azure
2
6 Open Source Software Platforms, Cloud storage diversity, Intercloud, energy use
and ecological impact
3
7 Responsibility sharing, user experience, Software licensing 2
8 Applications and Paradigms: Challenges for cloud, existing cloud applications and
new opportunities
3
9 Architectural styles, workflows, The Zookeeper, The Map Reduce Program 2
109
model, HPC on cloud, biological research
10 Virtualization, layering and virtualization, virtual machine monitors, virtual
machines, virtualization- full and para
3
11 performance and security isolation, hardware support for virtualization, Case
Study: Xen, vBlades
2
12 Policies and Mechanisms, Applications of control theory to task scheduling,
Stability of a two-level resource allocation architecture,
3
13 feed back control based on dynamic thresholds, coordination, resource bundling,
scheduling algorithms
2
14 fair queuing, start time fair queuing, cloud scheduling subject to deadlines 2
15 Scheduling Map Reduce applications, Resource management and dynamic
application scaling
4
16 Evolution of storage technology, storage models, file systems and database,
distributed file systems
3
17 General parallel file systems. Google file system., Apache Hadoop, Big Table,
Megastore, Amazon Simple Storage Service(S3)
3
18 Cloud security risks, security – atop concern for cloud users, privacy and privacy
impact assessment
3
19 Trust, OS security, Virtual machine security, Security risks, Amazon Web
Services : EC2 – instances, connecting clients, security rules
3
20 launching, usage of S3 in Java, Installing Simple Notification Service on Ubuntu
10.04
2
21 Installing Hadoop on Eclipse, Cloud based simulation of a Distributed trust
algorithm, Cloud service for adaptive data streaming
3
22 Google App Engine, Google Web Toolkit, Azure Services Platform 2
23 Windows live, Exchange Online, Share Point Services, Microsoft Dynamics CRM 2
Course Outcomes:
1. To explain the core concepts of the cloud computing paradigm: how and why this paradigm shift
came about, the characteristics, advantages and challenges brought about by the various models and
services in cloud computing.
2. To apply the fundamental concepts in datacenters to understand the tradeoffs in power,
efficiency and cost by Load balancing approach.
3. To discuss system virtualization and outline its role in enabling the cloud computing system
model.
4. To illustrate the fundamental concepts of cloud storage and demonstrate their use in storage
systems such as Amazon S3.
5. Understanding the hardware necessary for cloud computing
110
Mapping between Cos and POS:
• Course Description: Image processing deals with the processing of image. Through this course the
student will learn about pattern recognition techniques along with image processing techniques,
unsupervised and supervised learning techniques for pattern recognition, image processing techniques
like geometric transformations, edge detection to produce the enhanced image in required format.
• Syllabus / Text books:
UNIT I:
Pattern Recognition: machine perception, pattern recognition example, pattern recognition systems,
the design cycle, learning and adaptation.
Bayesian Decision Theory: Introduction, continuous features- two categories classifications, minimum
error rate classification-zero-one loss function, classifiers, discriminate functions, and decision surfaces.
UNIT II:
Normal density: Univariate and multivariate density, discriminate functions for the normal density-
different cases, Bayes decision theory – discrete features, compound Bayesian decision theory and
context.
Component analyses: Principal component analysis, non-linear component analysis, Low dimensional
representations, and multi dimensional scaling.
UNIT III:
Digitized Image and its properties: Basic concepts, Image Functions, the dirac distribution
and convolution, the Fourier transform, Images as a Stochastic process, Images as linear systems.
Image Digitization: Sampling, Quantization, Color Images.
Digital Image Properties: Metric and topological properties of Digital Images, Histograms, Visual
perception of the Image, Image quality, Noise in Images.
UNIT IV:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √ √
CO2 √ √ √ √
CO3 √ √ √ √ √
CO4 √ √ √ √ √
CO5 √ √ √ √ √ √
Subject
Code
Subject Name Credits Core/Elective Internal
marks
External marks
MIT2.6 IMAGE PROCESSING &
PATTERN
RECOGNITION
3 E 40 60
111
Data Structures for Image Analysis: Levels of Image Data representation, traditional Image Data
Structures- Matrices, Chains, Topological Data Structures, and Relational Structures.
UNIT V:
Image Pre-processing: Pixel brightness transformation – Position dependent brightness correction,
Gray scale transformation. Geometric Transformations -- Pixel co-ordinate transformation, Brightness
interpolation. Local Pre-processing – Image smoothing, Edge-detectors, Zero crossings of the second
deritives, scale in Image processing, canny edge detection, parametric edge models, edges in multi
spectral images, other local pre-processing operators, adaptive neighborhood pre-processing.
Text Books:
1.Image Processing, Analysis and Machine Vision – Milan Sonka, Vaclav Hlavac, Roger Boyle, And
Second Edition – Vikas Publishing House.
2.pattern classification ,Richard o.Duda, peter E.Hart, David G.Stroke, Wiley student edition,2nd
Edition.
3.Digital Image processing, RafealC.Gonzalez, RichardE.Woods, 2ndedition, Pearson Education/ PHI.
Reference:
1. Digital Image Processing And Analysis – Chanda & Majumder
Lecture Plan:
SNO TOPICS COVERED HOURS
1 Pattern Recognition: machine perception, pattern recognition example 2
2 pattern recognition systems, the design cycle, learning and adaptation 2
3 Bayesian Decision Theory: Introduction, continuous features-two categories
classifications, minimum error rate classification-zero-one loss function,
classifiers
2
4 Discriminant functions and decision surfaces.
Normal density: Univariate and multivariate density
3
5 discriminant functions for the normal density-different cases, Bayes decision
theory – discrete features
2
6 Compound Bayesian decision theory and context. 3
7 Un-supervised learning and clustering: Introduction, mixture densities and
identifiability
3
8 Maximum likelihood estimates, application to normal mixtures, K-means
clustering.
3
9 Date description and clustering – similarity measures, criteria function for
clustering
2
10 Component analyses: Principal component analysis, non-linear component
analysis, Low dimensional representations, and multi-dimensional scaling.
3
11 Digitized Image and its properties: Basic concepts, Image Functions, the dirac
distribution and convolution,
2
12 The Fourier transform, Images as a Stochastic process, Images as linear
systems.
2
13 Image Digitization: Sampling, Quantization, Color Images. 2
14 Digital Image Properties: Metric and topological properties of Digital Images,
Histograms, Visual perception of the Image, Image quality, Noise in Images.
3
15 Data Structures for Image Analysis: Levels of Image Data representation,
traditional Image Data Structures- Matrices
3
112
16 Chains, Topological Data Structures, Relational Structures. 2
17 Image Pre-processing: Pixel brightness transformation – Position dependent
brightness correction, Gray scale transformation.
3
18 Geometric Transformations -- Pixel co-ordinate transformation, Brightness
interpolation. Local Pre-processing – Image smoothing, Edge-detectors
3
19 Zero crossings of the second deritives, scale in Image processing, canny edge
detection, parametric edge models,
3
20 Edges in multi spectral images, other local pre-processing operators, adaptive
neighborhood pre-processing.
2
21 Segmentation: Thresholding – Threshold detection methods, optimal
thresholding, multi- spectral thresholding, thresholding in hierarchical data
structures.
3
22 Edge Based Segmentation: Edge image thresholding, Edge relaxation, border
tracing, border detection as graph searching
3
23 Border detection as dynamic programming, Hough transformation, border
detection using border location information, region construction from borders.
3
24 Region Based Segmentation: Region merging, region splitting, splitting and
merging, Watershed segmentation, region growing post processing.
3
Course Outcomes:
1. The student will get sound knowledge about pattern recognition.
2. The student can apply unsupervised learning techniques for pattern recognition
3. The student can apply supervised and supervised learning techniques for pattern recognition
4. One can get a clear sound knowledge about representation of digital image in memory and
various operations to get a clear enhanced image
5. The student will become expertise in applying mathematical concepts and techniques in image
processing
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √
CO2 √ √ √ √ √
CO3 √ √ √ √
CO4 √ √ √ √ √
CO5 √ √ √ √
• Course Description: In this course the student will be learn about the storage technology that will
enable you to make more informed decisions in an increasingly complex IT environment. It builds a
strong understanding of underlying storage technologies and prepares you to learn advanced
Subject
Code
Subject Name Credits Core/Elective Internal marks External marks
MIT
2.6
INFORMATION
STORAGE
MANAGEMENT
3 E 40 60
113
concepts, technologies, and products. challenges and solutions for data storage and data management,
intelligent storage systems, storage networking, backup recovery, and archive, business continuity
and disaster recovery, security and virtualization, and managing and monitoring the storage
infrastructure.
• Syllabus / Text books:
UNIT I: INTRODUCTION TO STORAGE TECHNOLOGY: Concepts of storage networking -
Business applications defined for Storage - Sources of Data and states of data creation - Data center
requirements and evolution - Managing complexity - Storage infrastructure - Evolution of storage -
Information lifecycle management.
UNIT II: STORAGE SYSTEMS ARCHITECTURE: Storage architectures - Peripheral
connectivity- Components and concepts- Magnetic disk storage- Disk systems –Disk arrays- RAID
storage arrays- Magnetic tape storage- Physical vs Logical disk organization - Caching properties and
algorithms - connectivity options - Differences in bus and network architectures.
UNIT III: INTRODUCTION TO NETWORK STORAGE: Putting storage on the Network- The
NAS Hardware- Software architecture- Network connectivity- NAS as a Storage system- NAS
connectivity options- Connectivity protocols- Management principles- Storage Area Networks:
Architecture- Hardware devices- Host bus adaptors- Connectivity - Content Addressable Storage
(CAS) : Elements- Connectivity options- Standards and Management principles - Hybrid storage
solutions overview.
UNIT IV: INTRODUCTION TO INFORMATION AVAILABILITY: Business continuity and
disaster recovery basics: Local business continuity techniques- Remote business continuity
techniques - Storage design and implementations of Business continuity plan- Managing availability-
Disaster recovery principles & techniques.
UNIT V: MANAGING STORAGE VIRTUALIZATION: Managing Availability: Availability
metrics – serviceability - capacity planning - Management tools: overview - information security
virtualization - different virtualization technologies
REFERENCES:
1. Robert Spalding, “Storage Networks: The Complete Reference”, Tata McGraw Hill
Publishing Company, New Delhi, 2003.
2. Gerald J Kowalski and Mark T Mayburk,” Information storage and Retrieval Systems”,
Springer International Edition, New Delhi, 2006.
3. Ulf Troppens, Rainer Erkens and Wolfgang Müller “Storage Networks Explained” Wiley &
Sons, USA, 2004.
4. Marc Farley Osborne, “Building Storage Networks”, Tata McGraw Hill Publishing Company,
New Delhi, 2000.
5. EMC Corporation, “Information Storage and Management: Storing, Managing, and Protecting
Digital Information”, Wiley India, New Delhi, 2009
Course Outcomes:
6. Learn storage system and the different storage system models
7. Offer essential new material that explores the advances in existing technologies
8. Emergence of the "Cloud" as well as updates and vital information on new technologies.
114
9. Learn to make informed decisions across multiple technologies involving SAN, NAS, CAS, IP-
SAN, Backup and Recovery
10. Business Continuity, Security and Virtualization
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √
CO2 √ √ √ √ √
CO3 √ √ √ √
CO4 √ √ √ √ √
CO5 √ √ √ √
Subject Code Subject Name Credits Core/Elective Internal marks External marks
MIT 2.7 ITLAB 2 2 C 40 60
• Course Description:
Through this course the student is going to learn about basics of UNIX operating system and
writing shell programming in UNIX operating system. We can implement algorithms like RSA
to give data security. We can get good domain knowledge about concepts like association,
clustering, classification etc by using WEKA tool.
• Syllabus / Text books:
1. Write a Program to count the number of words and lines supplied at standard input using
UNIX shell programming?
2. Write a shell script to find the factorial of a number entered through keyboard?
3. Write a shell script to find the gross salary given that if the basic salary is less then 1500 then
HRA =10% of basic salary and DA=90% if the basic salary is greater then or equal to 1500
then HRA=500 and DA=98% of basic salary. The employee’s basic salary is the input
through keyboard?
4. Write a shell script to display following information using case statement?
5. Write a shell script to display following information using case statement?
a. List users
b. Show date
c. Display file
d. Change working directory
e. Return to original directory
f. Quit
6. Write a c program to implement one to one chat application using sockets?
7. Write a c program to implement redundancy check using CRC?
115
8. Write a java program to implement simulation of sliding window protocol?
9. Write a java program to get the MAC or Physical address of the system using Address
Resolution Protocol?
10. Write a java program to implement Play Fair Cipher to encrypt and decrypt a given message?
11. Write a java program to demonstrate public-key based asymmetric algorithms for
encryption-based security of information?
12. Write a java program that implement secured Internet Protocol (IP) communications by using
Internet Protocol Security (IPSec)?
13. Write a java program to implement RSA algorithm?
14. Design a Abstract factory design pattern using UML?
15. Design a Builder Design Pattern using UML?
16. Design a Flyweight Design pattern using UML?
17. Design a Proxy Design pattern using UML?
Lecture Plan:
SNO TOPICS COVERED HOURS
1 To implement a Program to count the number of words and lines supplied at
standard input using UNIX shell programming
3
2 To implement shell script to find the factorial of a number entered through
keyboard
To implement shell script to find the gross salary given that if the basic salary is
less than 1500 then HRA =10% of basic salary and DA=90% if the basic salary is
greater than or equal to 1500 then HRA=500 and DA=98% of basic salary. The
employee’s basic salary is the input through keyboard?
3
3 To implement a shell script to display
a. List users
b. Show date
c. Display file
d. Change working directory
e. Return to original directory
f. Quit
3
4 Implementation of one to one chat application using sockets 3
5 Implement redundancy check using CRC 3
6 To perform MAC or Physical address of the system using Address Resolution
Protocol
3
7 To implement java program for play fair cipher to encrypt and decrypt message 3
8 To implement graphs by using BFS and DFS techniques 3
9 Implementing merge and heap sorts for given elements 3
10 Performing various operations in AVL trees 3
11 To implement krushkal’s algorithm to find minimum cost spanning tree 3
12 To implement Prim’s algorithm to find min cost spanning tree 3
13 To implement functions of Dictionaries using hashing 3
Course Outcomes:
On completion of this course the student should be able to:
116
1. Identify and use UNIX/Linux utilities to create and manage simple file processing operations,
organize directory structures with appropriate security, and develop shell scripts to perform more
complex tasks.
2. Effectively use the UNIX/Linux system to accomplish typical personal, office, technical, and
software development tasks.
3. Effectively use software development tools including libraries, preprocessors, compilers, linkers,
and make files.
4. Comprehend technical documentation, prepare simple readable user documentation and adhere to
style guidelines.
5. Be familiar with the application of the Unified Modeling Language (UML) towards analysis and
design.
6. Master the fundamental principles of OO programming.
Mapping between COs and POs:
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 √ √ √ √ √ √
CO2 √ √ √ √ √ √ √ √
CO3 √ √ √ √ √ √ √ √
CO4 √ √ √ √ √ √ √ √
CO5 √ √ √ √ √ √ √
CO6 √ √ √ √ √ √ √
117
4. Students’ Performance (100)
4.1. Admission intake in the programme (15)
YEAR Sanctioned
Strength of
the
Programme
Number of
Students
Admitted
Percentage
of seats filled
Number of
Students
Admitted
with Valid
GATE
Score/PG
ECET
Percentag
e of
Students
with
Valid
GATE
Score/PG
ECET
M.Tech (I.T.)
CAY (2016-17) 18* 18 100 18 100
CAYm1 (2015-16) 18*+7# 24 96 15+1 66.6
CAY m2(2014-15) 18*+7# 25 100 6+9 60
CAYm3 (2013-14) 18*+7# 25 100 11+7 72
*Strength sanctioned by AICTE #under University Sponsored category
Average percentage of seats filled through approved procedure =99%
Average percentage of students admitted with valid GATE Score/PG entrance of state (I.T.) = 74.65%
YEAR Number of Students
Admitted
API = Academic
Performance Index
= Average CGPA or Average
Marks on a Scale of 10 (Compiled
from the
Graduation Records)
M.Tech(IT)
CAY (2016-17) 18 6.48
CAY m1(2015-16) 24 7.06
CAY m2(2014-15) 25 7.23
CAYm3 (2013-14) 25 7.62
Average API 7.09
Average API = mean of percentage of marks of all successful students/10(ten point CGPA) =7.09
4.1.1Number of seats filled through the admission procedure approved
by the University (5)
Assessment will be based on average percentage of seats filled through
approved procedure and points awarded to be proportionate accordingly.
118
Average percentage of seats filled through approved procedure = 99%
Average percentage of students admitted with valid GATE Score/PG entrance of state (I.T.) = 74.65%
Assessment (I.T.) =74.65/10=7.46
4.1.2 Quality of students as judged from their complete graduation records (5)
Assessment =1.5AverageAPI
= 1.5 7.09
= 10.63
4.1.3 Number of students admitted having a valid GATE score/PG entrance of state (5)
Assessment (I.T.) =10X 74. 65 (out of 100 students)
= 746.5
4.2. Success Rate (20)
Provide data for the past three batches of students
GI = Graduation Index
= (Number of students graduated from the programme) / (Number of students joined the
programme)
M.Tech (IT)
YEAR
Number of students graduated from the programme
Number of students joined the programme
GI
LYG (2014-16)
23
25 0.92
LYG m1(2013-15)
25
25
1.00
LYG m2(2012-14)
23
23
1.00
LYGm3(2011-13)
25
25
1.00
Average GI =0.98
Assessment = 20 x 0.98=19.6
4.3. Academic Performance (20) Academic Performance= 2*API
Where API= Academic Performance Index
=Mean of Cumulative Grade Point Average of all successful
Studentsona10pointCGPASystem
119
OR=Mean of the percentage of marks of all successful students/ 10
Item LYG 2015-17
LYGm1 2014-16
LYGm2
2013-15 LYGm3
2012-14
Approximating the API by the following mid-point analysis
9<Number of students with CGPA<10.0 0 0 0 0
8<Number of students with CGPA<9.0 1 4 9 10
7<=8 15 15 14 13
6<=7 6 5 02 00
5<=6 1 1 00 00
Total 23 25 25 23
Approximating API by Mid-CGPA
Mean of CGPA/Percentage of all the students(API) 7.10 7.35 7.73 7.4
Average API=7.39
Academic Performance=2xAv.API
=2 * 7.39
=14.78
120
4.4. Placement and Higher Studies (20)
Assessment Points=20×(x+3y)/N
Where, x =Number of students placed
y=Number of students admitted for higher studies with
valid qualifying scores/ranks, and
N=Total number of students who were admitted in the batch to
maximum assessment points=20.
M.Tech (I.T.)
Item
LYG(2014-16)
LYGm1(2013-
15)
LYGm2(2012
-14)
Number of admitted students corresponding to LYG(N)
25 26 23
Number of students who obtained jobs as
per the record in the industry/academia (x) 21 20 18
Number of students who opted for higher
studies with valid qualifying scores/ranks(y) 01 01 00
Assessmentpoints20×(x+3y)/N
19.2 17.69 15.65
Average assessment points = 17.51
4.5 Professional Activities (25)
4.5.1Membership in Professional Societies/Chapters and organising engineering events (5)
(Instruction: The institution may provide data for past three years).
• CSI Student chapter is initiated in the year 2017
• IEEE Student membership for PG students is initiated to start in the month of
Jan 2015
• It is proposed to initiate IETE professional activity in the month of March 2015
• Every year in the month of February/March PG/UG students organizes
Technical event ZEIT GIEST in the department with various events like
Technical Paper presentations, Project Expo, Workshop jointly organized with
IIT Delhi, Poster Presentations, Program Debugging and Technical Quiz
4.5.2 Participation and their outcomes in international/national events (5) Instruction: The institution may provide data for past three years).
121
1. M. Ravi Kumar, M.Tech has presented a paper entitled Image Water marking
Scheme Using simplified significant Wavelet Tree Quantization in IEEE
sponsored International Conference on Advanced Computing Technologies (ICACT)
in Annamacharya Institute of Technology and Sciences, RajamPeta, Kadapa.
Date: 10th, 11th Aug 2013
4.5.3. Publication and awards in international/national events (10)
(Instruction: The institution may list the publications mentioned earlier along with the
names of the editors, publishers, etc.).
Awards:
1. M.Tech (I.T.) Students got Internship Award of Cash Rs: 15,000/- per Month
for a period of Ten Months in TCS Pvt.Ltd. named N S K Krishna & N Harish.
2. M.Tech (I.T.) Students got Internship Award of Cash Rs: 10,000/- in Loment
Technologies. IncPvt.Ltd., USA named B Manasa
3. M.Tech (I.T.) Students got Internship Award in DRDO, Hyderabad Division for
their M.Tech Project Work named L Anand, L Ganga Sai Lakshmi
Publications:
S.No Student Name Publication
Title
Journal
Name
Year
1 Sameer Tuladhar Replication of Query Messages in the
unstructured overlays peer to peer
networks
IJERA, Vol
2
Issue 5
Sep-Oct
2013
2 V. Nageena Concurrent Context Free framework for
conceptual similarity problem using
reverse dictionary
IJRITCC
Vol 2, Issue
8
Aug 2014
3 N. Mounica Adaptive Data Aggregation with mobile
Agents and Evolutionary Computing
based clustering in Sparse WSN
IJRITCC
Vol 2, Issue
9
2014
4 K. Sindhu Bit slicing based visual cryptography on
Gray Scale images
IJRITCC
Vol 2, Issue
8
Aug 2014
5 G Sowjanya An integrated Approach for anchor
based localization and energy efficient
secure communication in WSN
IJRITCC
Vol 2 Issue
7
July
2014
6 P Ramya A Framework for improved intrusion
detection and countermeasure selection
in cloud systems
IJRITCC
Vol 2 Issue
7
July
2014
7 P Santhosh A framework for decoupling of routing
and scheduling using shadow queues on
multi commodity networks
IJARCSMS
Vol 2 Issue
8
Aug 2014
8 N. S. V. Srinivas Attack Detection and Classification of
Heterogeneous Wireless Sensors Using
Co-Clustering
IJET Feb-Mar
2012
9 ChiranjeeviPalaparth
i,MahaboobBashaM
A Prototype System using Lexical
Chains for Web Images Retrieval Based
IJCSE
May-12
May-12
122
ula, Satya Krishna
Pepakayala
on Text Description and Visual Features
10 Gowtham Kumar
Lingabathina,
Michael
VijayanandSonga,
PaluriVara Prasad
Light Weight and Secured Mobile
Commerce in Android Environment
JCER Apr-12
11 Jagadeeswararao. E,
Nimakayala S V
Srinivas
Predilection Perspective of Peremptory
Evaluation of Wireless Sensor Networks
with Machine Learning Approach
GJCST -
(USA)
Aug-12
12 R S Hemanth Effective Loss-less Encryption Using
Haar Wavelet Transform
NCCSPS-
2014 PP-
108
ISBN:0974
-6854
Aug 23-
24,2014
13 M S
LavanyaKrishnaveni
Swarm Intelligence Based MANET
Routing Protocol
IJCST
VOL.3
Issue 3
July-Sept
2012
14 K Narendra, M
Pavan Kumar
A Method to Improve Energy Efficiency
by Leader Election and packet
Classification in MANET
IJCST
15 FathimabiShaik Secure Host IP Configuration Protocol
for Mobile Ad Hoc Networks
IJERT
VOL.1
Issue 7
Sep-2012
16 Sowndarya Karri Framework for Phishing Detection in
Email under Heave Using Conceptual
Similarity
IJRITCC
VOL2.
Issue8
Aug-2014
17 K Udaya Ravi Kiran Secure Transmission To Remote
Cooperative Groups With Minimized
Communication Overhead
IJRITCC
VOL2.
Issue8
Aug-2014
18 Sandya Rani Barre Detecting Targeted Malicious Email
Through Mail Client
IJRITCC
VOL2.
Issue8
Aug-2014
19 TejaswiBommi Identifying Misbehaving Nodes in
MANET
IJRITCC
VOL2.
Issue8
Aug-2014
20 M SowmyaTanuja Effective and Efficient Approach for
Detecting Outliers
IJRITCC OCT-2014
21 M Choharika A New Clustering Algorithm for
Comparable Entities from Web
IJRITCC OCT-2014
22 M V S Prabha Reconstructing of Search Results in Web
Search Engine Using Feedback
Activities
IJRITCC OCT-2014
23 G.Soujanya An Integrated Approach for Anchor-
Based Localization and Energy Efficient
Secure Communication in WSNs
IJRITCC JULY-2014
24 Tejaswi Bommi LD: Identifying Misbehaving Nodes in
MANET
IJRITCC AUG-2014
25 M.Sowmya Tanuja Effective And Efficient Approach for
Detecting Outliers
IJRITCC OCT-2014
123
26 Sowndarya Karri Framework for Phishing Detection in
Email under Heave Using Conceptual
Similarity
IJRITCC AUG-2014
27 Naladala Mounika Adaptive Data Aggregation with Mobile
Agents and Evolutionary Computing
based Clustering in Sparse Wireless
Sensor Networks
IJRITCC NOV-2014
28 V.Nageena Concurrent Context-Free Framework for
Conceptual Similarity Problem using
Reverse Dictionary
IJRITCC AUG-2014
29 Sandhya Rani Barre Detecting Targeted Malicious Email
Through Mail Client
IJRITCC AUG-2014
30 Marri Sireesha Enhanced Routing Algorithm for Best
Relay Node Selection In WSN
IJCST OCT-DEC
2016
31 R Subrahmanya
Hemanth
Effective Loss-less Encryption Using
Haar Wavelet Transform,PP-108, Aug-
2014
NCCSPS
Aug 2014
32 P. Sri Hari ECC Base point Generation using
Finger print for Authentication and
Message Encryption and Decryption
Using ECC
IARJSET Vol
4,Issue 8,
Aug 2017
4.5.4 Entrepreneurship initiatives and innovations (5)
(Instruction: The institution may specify the efforts and achievements.)
1. Entrepreneurship Awareness Programme organised by Centre for Entrepreneurship
development, JNTUK Kakinada on 5th and 6th March 2014
2. A Program “International Institute of Entrepreneurship Development (I2E) “by
APSSDC and Northeastern University Boston, US. Organised by Directorate
EDC&SDC, JNTUK on 18th August 2017.
3. Maker’s Space is established in Incubation Center.
124
5 Faculty Contributions (200)
List of Faculty Members: Exclusively for the Programme/Shared with other Programmes
Name of the
faculty
member
Qualification
, university,
and year of
graduation
Designation and date of joining the
institution
Distribution
of teaching
load (%)
Number of
research
publications
in journals
and
conferences
since joining
IPRs R&D and
consulta
ncy work
with
amount
Holding
an
incubatio
n unit
Interacti
on with
outside
world 1st Year
UG
PG
Prof. J.V.R. Murthy
Ph. D, JNTU 2005
Professor 100 0 12 1.2 Cr. 10
Prof. K.V. Ramana
Ph. D Rayalaseema University 2012
Professor 100 0 6 08
Prof CH. Satyanarayana
Ph. D JNTU 2007
Professor -- 100 15 5.3 Cr. 08
Prof. L. Sumalatha
Ph. D JNTUK 2013
Professor 50 50 13 08
Prof. MHM Krishna Prasad
Ph. D JNTU 2009
Professor 50 50 17 1.2 Cr. 10
Prof. A. Krishna Mohan
Ph. D JNTUK 2015
Professor 100 6 05
Prof. K. Sahadevaiah
Ph. D JNTUH 2014
Professor 100 0 8 02
Prof.ASN Chakravarthy
Ph.D ANU 2011
Professor 0 100 23 08
Dr D. Haritha Ph. D JNTUK 2013
Associate Professor
40 60 8 03
Dr O. Srinivasa Rao
Ph. D JNTUK 2012
Associate Professor
40 60 14 03
Dr N. Ramakrishnaiah
M. Tech. Ph.D., 2016
Associate Professor
50 50 4 02
S. Chandra Sekhar
M. Tech VIT
Assistant Professor
50 50 0 02
125
SSSN Usha Devi N
M. Tech, JNTUK 2010
Assistant Professor
50 50 5 02
E. Suneetha M. Tech JNTUH 2010
Assistant Professor
30 70 5 02
Karuna Arava M. Tech JNTUK 2010
Assistant Professor
100 0 4 02
Ch. Ratna Kumari
M. Tech, HCU, 2009.
Assistant Professor
50 50 5 02
(Instruction: The institution may complete this table for the calculation of the student-
teacher ratio (STR).Teaching loads of the faculty member contributing to only
undergraduate programme (2nd, 3rd, and 4th year) are considered to calculate the STR.)
5.1 StudentTeacher Ratio (STR)(20) U1 = Number of Students in UG 2ndYear U2 = Number of Students in UG 3rdYear U3 = Number of Students in UG 4thYear P1 = Number of Students in PG 1stYear P2 = Number of Students in PG 2ndYear
N1 = Total Number of Faculty Members in the Parent Department S=Number of Students in the Parent Department
= U1 + U2 + U3 + P1 + P2 Student Teacher Ratio (STR) = S / N1
Assessment = [20 x 13 /STR], subject to maximum of 20. Year U1 U2 U3 P1 P2 S F
(N1)
STR Assessment
CAY
(2016-17)
55 53 56 41 49 254 21 12.09 21.50
CAYm1
(2015-16)
53 56 56 49 50 264 21 12.57 20.68
CAYm2(2014-
15)
56 56 57 50 52 271 21 12.90 20.15
CAYm3
(2013-14) 56 57 52 52 50 267
20
13.35 19.47
Average Assessment = 20.45
5.2 Faculty strength in PG programme (20)
X = Number of faculty members with Ph.D available for PG Programme
126
Y= Number of faculty members with Ph.D. / M.Tech. / M.E available for PG Programme
Assessment will be done on the basis of the number of faculty members with Ph.D. /M.Tech. /M.E., available for the PG programme. [Minimum number suggested: 4]
Year X Y Assessment
CAY(2016-17) 2 2 20
CAYm1 (2015-16) 2 2 20
CAY m2 (2014-15) 2 2 20
CAY m3 (2013-14) 2 2 20
Assessment = 20 x [X/Y]
Average Assessment = 20
5.3 Faculty Qualifications (30)
Assessment = 4×FQI
where, FQI = Faculty qualification index
= (10x+6y+4z0)/N2
such that, x+ y +z0≤ N2; and z0≤ z
where, x = Number of faculty members with PhD
Y = Number of faculty members with ME/M.Tech
Z = Number of faculty members with BE / B.Tech / MSc.
x y z N2 ( Total) FQI Assessment
CAYm3(2013-14) 7 13 0 20 7.40 29.6
CAYm2(2014-15) 8 13 0 21 7.52 30.08
CAYm1(2015-16) 11 19 0 30 7.46 29.86
CAY(2016-17) 11 19 0 30 7.46 29.86
Average assessment 29.85
127
5.4 Faculty Competencies correlation to Programme Curriculum (15) (Indicate the faculty competencies (specialization, research publication, course developments etc.) to correlate the programme curriculum)
Faculty Name
Specialization
Course Developments
2013-14
2014-2015
2015-2016
2016-17
No of Courses Develop
ed
Course
Prof. J.V.R Murthy
Data Mining and Data Warehousing
5
3
5
2
3
Data Mining and Data Warehousing, DBMS,
Prof. K.V.Ramana
Neural Networks
0
2
3
0
3
Operating Systems,
Computer Networks, Computer
Organization and
Architectures
Prof CH. Satyanarayana
Image Processing
2
5
5
5
2
Image Processing,
Pattern Recognition
Prof. L. Sumalatha
Image Processing
3
1
1
5
3
Machine Learning,
Cloud Computing, Security in
WSNs Prof. MHMKrishna Prasad
Data Mining and Data Warehousing
4
9
8
2
2
Computer Networks,
Data Mining and Data
Warehousing Prof. A. Krishna Mohan
Data Mining and Data Warehousing
0
8
0
1
2
Web Technologies,
Distributed java
programming Prof. K. Sahadevaiah
Computer Networks
2
3
2
0
2
Network security, Ad-hoc & Sensor
Networks Prof.ASN Chakravarthy
Network Security &Cryptograohy
7
3
11
0
1
Forensics
Dr D. Haritha Image Processing
1
3
3
0
3
Advanced UNIX
Programming, Advanced
Data Structures,
Image Processing
Dr O. SrinivasaRao Computer Networks & Network Security
0
3
2
5
2
Computer Networks, Network security
Dr.N.Ramakrishna Computer Networks
1
3
4
0
2
Ad-hoc & Sensor
128
iah Networks Distributed
java programming
S.Chandra Sekhar Computer Networks
0
0
0
0
1
Mobile Computing
SSSN Usha Devi N Automata
Theory
3
3
0
0
1 Object
Oriented Analysis &
Design E. Suneetha Data
Analytics with
Machine Learning
3
3
1
0
1
Compiler Design
KarunaArava Cloud Computing
1
0
1
1
1
Advanced Unix
Programming RatnaKumari Ch Security in
Cloud Computing
3
2
1
0
1
Advanced Data
Structures
5.5 Faculty as participants/resource persons in faculty development/training activities (15)
(Instruction: A faculty member scores maximum five points for a participation/resource person.) Participant/resource person in two week faculty development programme: 5 points Participant/resource person in one week faculty development programme: 3 Points
Name of the faculty
Max. 5 per faculty
CAY m3 CAY m2 CAY m1 CAY
Prof. J.V.R Murthy 5 5 5 5
Prof. K.V. Ramana 5 5 5 5
Prof. Ch. Sathyanarayan 5 5 3 5
Prof. L. Sumalatha 5 5 5 5
Prof. M.H.M Krishna Prasad 5 5 5 5
Prof. A. Krishna Mohan 5 5 5 5
Prof. K. Sahadevaiah 5 3 5 3
Prof.ASN Chakravarthy 5 5 5 5
Dr. D. Haritha 3 5 5 5
Dr. O. Srinivasa Rao 5 3 5 5
Dr. N. Ramakrishnaiah 3 5 5 5
S. Chandra Sekhar 3 3 3 3
SSSN Usha Devi N
5 5 3 5
129
5.6 Faculty Retention (15)
Assessment = 3×RPI/N Where RPI = Retention point index
= Points assigned to all faculty members
Where points assigned to a faculty member=1point for each year of experience at
the institute but not exceeding5.
Item CAYm3 CAYm2 CAYm1 CAY
Number of faculty members with experience of less than l year (x0)
--- -- -- --
Number of faculty members with 1 to 2 years experience (x1)
--- --- --- ---
Number of faculty members with 2 to 3 years experience (x2)
--- --- --- ---
Number of faculty members with 3 to 4 years experience (x3)
1 --- --- ---
Number of faculty members with 4 to 5 years experience (x4)
1 1 --- ---
Number of faculty members with more than 5 years experience (x5)
14 14 15 15
N 16 15 15 15
Karuna Arava 3 5 3 5
E. Suneetha 3 5 5 5
Ch. Ratna Kumari
3 5 -- --
Sum 68 74 72 74
N(Number of faculty
positions required for
an STR= no of faculty/13)
20 20 20 20
Assessment=3×Sum/N 10.2 11.1 10.8 11.1
Average Assessment=11
130
RPI=x1+2x2+3x3+4x4+5x5 77 74 75 75
Assessment 14.43 14.8 15 15
Average assessment 14.80
5.7 Faculty Research Publications (FRP)(30) Assessment of FRP =6× (Sum of the research publication points scored by each faculty member)/N
(Instruction: A faculty member scores maximum five research publication points depending upon the quality of
the research papers and books published in the past three years.)
The research papers considered are those (i) which can be located on Internet and/or are included in hard-copy
volumes/proceedings, published by reputed publishers, and (ii) the faculty member’s affiliation, in the
published papers/books, is of the current institution.
Include a list of all such publications and IPRs along with details of DOI, publisher, month/year, etc.
Name of the faculty (contributing to FRP)
FIP Points
CAY m3 (2013-14)
CAYm2
(2014-15)
CAYm1
(2015-2016)
CAY
(2016-2017)
Prof. J.V.R. Murthy
4 1 3 2
Prof. K.V. Ramana
- 1 2 -
Prof. Ch. Satyanarayana 2 2 2 5
Prof. L. Sumalatha
3 - 2 5
Prof. MHM Krishna Prasad
3 2 4 5
Prof. A. Krishna Mohan 0 - 3 3
Prof. K. Sahadevaiah
2 - 3 -
Prof. ASN Chakravarthy 5 5 5 5
Dr. D. Haritha 2 - 3 -
Dr. O. SrinivasaRao 0 2 3 5
Dr. N. Ramakrishnaiah 1 - 3 5
S Chandra Shekar -- -- -- -
SSSN Usha Devi N
3 4 3 3
A. Karuna
3 3 1 3
E. Suneetha
2 3 1 -
Ratna Kumari Challa
2 2 2 -
Sum 32 25 40 41
131
N(Number of
faculty positions
required for an STR
of 13)
20 20 20 20
Assessment of FRP=6 ×Sum/N 9.6 7.5 12 12.3
Average Assessment=10.35
Prof. J. V. R. Murthy
1) Sirisha Velampalli &V.R. Murthy Jonnalagedda “Minimum Description Length (MDL) based Graph Analytics”,
International Conference on Computational Intelligence & Informatics (ICCII-2016) (IACC- 2016), May 28-30, 2016, Springer, JNTUH, India. [Springer AISC Series]
2) Sirisha Velampalli & V.R. Murthy Jonnalagedda "Analytics through statistics for computer science curriculum” A.P. Science Congress, Sri Venkateswara University, Tirupati, January, 2016
3) Sirisha Velampalli & V.R. Murthy Jonnalagedda "Frequent Sub Graph Mining Algorithms: Framework, Analysis, Comparisons", 3rd International Conference on Computer and Communication Technologies"(IC3T-2016) [Springer AISC Series]
4) D. Rajeswara Rao & Dr. JVR Murthy "An Extensive Investigation on Coronary Heart Disease using Various
Neuro Computational Models", Global Journal of Computer Science and Technology: E ,Network, Web &
Security ,Volume 16 Issue 5 Version 1.0 Year 2016
5) D. Rajeswara Rao& Dr. JVR Murthy "Comparative Analysis: Heart Diagnosis Classification using Bp-LVQ
Neural Network Models for Analog and Digital Data" Global Journal of Computer Science and Technology: E
,Network, Web & Security ,Volume 16 Issue 5 Version 1.0 Year 2016
6) Sirisha Velampalli & V.R. Murthy Jonnalagedda “Intelligent Computing for Skill-set Analytics in a Big Data
Framework-A Practical Approach”, First International Conference on Intelligent Computing and Communication 2016 (ICIC2 2016), 18-19 February, 2016. University of Kalyani, West Bengal, India [ springer AISC Series]
7) Sirisha Velampalli & V.R. Murthy Jonnalagedda "Analytics for Course Management in Computer Science Curriculum-A Novel Visualization and Summarization Approach" 7th International Conference on Technology for Education T4E 2015, December 10-12, 2015 at NIT warangal [Indexed in IEEE Explore]
8) Dr. J. V. R. Murthy, AnuradhaYarlagadda, M.H.M. Krishna Prasad, 2014. Particle Swarm Optimized Optimal
Threshold Value Selection for Clustering based on Correlation Fractal Dimension. Applied Mathematics. 1615-
1622.
9) Dr. J. V. R. Murthy, P.Srinivasa Rao, Dr. K. Thammi Reddy, Feb 2013. A Novel and Efficient Method for Protecting
Internet Usage from Unauthorized Access Using Map Reduce. International Journal of Information Technology
and Computer Science. 49-55.
10) Dr. J. V. R. Murthy, M. Bhanu Sridhar, Y. Srinivas, Jul-Dec 2012. Software Reuse in Medical Database - A
Comparison of the Application of Clustering Techniques and Mixture Models. Journal of Software Engineering
and Technology.
11) Dr. J. V. R. Murthy, M. Bhanu Sridhar, Y. Srinivas, Nov 2012. Software Reuse in Medical Database for Cardiac
Patients using Mixture Models. International Journal of Computer Applications .12 to 19.
132
12) Dr. J. V. R. Murthy, Srinivasa Rao Dammavalam, Seetha Maddala, Jul 2012. Iterative Image Fusion Using Fuzzy
Logic with Applications. AISC, Springer. 145-152.
13) Dr. J. V. R. Murthy, M. Bhanu Sridhar, Y. Srinivas, Jun 2012. Software Reuse in Cardiology Related Medical
Database Using Clustering Techniques. Journal of Software Engineering and Applications. 682-686.
14) Dr. J. V. R. Murthy, Srinivasa Rao Dammavalam, Seetha Maddala, Apr 2012. Comparison of Fuzzy and Neuro
Fuzzy Image Fusion Techniques and its Applications. International Journal of Computer Applications. 31-37.
15) Dr. J. V. R. Murthy, M. D. R. Mounica Sree, Mar 2012. DenTrac: A Density based Trajectory Clustering Tool.
International Journal of Computer Applications. 17-21.
16) Dr. J. V. R. Murthy, Srinivasa Rao Dammavalam, Seetha Maddala, Feb 2012. Quality assessment of pixel-level
image fusion using fuzzy logic. International Journal on Soft Computing. 13 to 25.
Prof. K. V. Ramana
1) Dr. K.V. Ramana, Jagadeeswara Rao.E, Nimmakayala S.V.Srinivas, August 2012. Predilection Perspective of
Peremptory Evaluation of Wireless Sensor Networks with Machine Learning Approach. Global Journal of
Computer Science and Technology Network, Web & Security (GJCST) (USA). Volume (12), Issue (10). 56-59.
2) Dr. K.V. Ramana, Chiranjeevi Palaparthi, Mahaboob BashaMula, Satya Krishna Pepakayala, May 2012. A
Prototype System using Lexical Chains for Web Images Retrieval Based on Text Description and Visual Features.
International Journal on Computer Science and Engineering (IJCSE). Vol. 4 No. 05. 846-852.
3) Dr. K.V. Ramana, Gowtham Kumar Lingabathina, Michael Vijayanand Songa, Paluri Vara Prasad, April 2012. Light
Weight and Secured Mobile Commerce in Android Environment. Journal of Current Engineering Research
(JCER). Volume (2), Issue (2). 56-59.
4) Dr. K.V. Ramana, N.V.S. Srinivas, February- March 2012. Attack Detection and Classification of Heterogeneous
Wireless Sensors Using Co-Clustering. International Journal of Engineering and Technology (IJET). Volume 4 No
1. 11 - 14.
5) Dr. K.V. Ramana, Raghu K.Korrapati, K.S.S. Praveen, Bh.V. Naveen, October 2011. Performance of Various
Mobile IP Protocols and Security Considerations. International Journal of Computer Networks (IJCN). Volume
(3), Issue (4). 222-238.
6) Dr. K.V. Ramana, Raghu K.Korrapati, N. Pattabhi Ram, K. Syam Kumari, October 2011. Traffic Control System by
Incorporating Message Forwarding Approach. International Journal of Computer Networks (IJCN). Volume (3),
Issue (4). 209-221.
7) Dr. K.V. Ramana, Raghu K.Korrapati, N. Praveen Kumar, D. Prakash, August 2011. Efficient Traducer Tracing
System Using Traffic Volume Information. International Journal of Advanced Computer Science and
Applications, (IJACSA). Volume (1), Issue (2). 40-49.
8) Dr. K.V. Ramana, Raghu K.Korrapati, S. Hemanth, N. Praveen Kumar, February 2011. Replica Placement in
Unstable Radio Links. International Journal of Computer Networks (IJCN). Volume (2), Issue (6). 227-239.
9) Dr. K.V. Ramana, Raghu K.Korrapati, July 2010. Neural Network Based Classification and Diagnosis of Brain
Hemorrhages. International Journal of Artificial Intelligence and Expert System (IJAE). Volume (1), Issue (2). 7 -
25.
Prof. L. Sumalatha
1) Prof. L. Sumalatha, IEEE International Conference on Science, Technology, Engineering and Management
(ICSTEM’17).
2) Prof. L. Sumalatha, A. Mallikarjuna Reddy, V.V. Krishna,”Facial Recognition Based on Straight Angle Fuzzy
Texture Unit Matrix” IEEE International Conference on Big Data Analytics and Computational Intelligence 2017.
3) Prof. L. Sumalatha, Obulesh.A, V.Vijay Kumar, “Region Based Image Retrieval Using Ranking Concept of Local
Binary Pattern”, IEEE International Conference on Big Data Analytics and Computational Intelligence 2017.
133
4) Prof. L. Sumalatha, P. Uma Shankar, B. Sujatha, “Rough set based Decision Rule generation to find behavioural
patterns of customers” Sadhana(Springer), 2016,ppl-7.DOI 10.1007/s12046-016-0528-1.SCI,SCOPUS indexed.
5) Prof. L. Sumalatha, P. Uma Shankar, “Fuzzy Random Decision Tree (FRDT) Framework for Privacy Preserving
DataMining”, IEEE Technical sponsored SAI Computing Conference, London 2016.
6) Prof. L. Sumalatha, K.Devi Priya,”Novel Hash Based Key Generation for Stream Cipher in Cloud” 3rd International
Computer and Communication Technologies (IC3T), Springer LNSS, Nov 2016.
7) Prof. L. Sumalatha, B.Sujatha, February 2013. A New Approach for Recognition of Mosaic Textures by LBP based
on RGB Model. Signal & Image Processing: An International Journal (SIPIJ). Vol.4, No.1. 65-73.
8) Prof. L. Sumalatha, V. Venkata Krishna, Sushma Thotakura, February 2013. Reversible Watermarking for Image
Authentication using IWT. International Journal of Signal Processing, Image Processing and Pattern Recognition.
Vol. 6, No. 1. 145-156.
9) Prof. L. Sumalatha, B.Sujatha, February 2013. Global and Local Linear Significant Binary Pattern for a Robust and
Rotational Invariant Classification. National Conference on Emerging Trends in Information Technology
(NCETIT).
10) Prof. L. Sumalatha, V. Venkata Krishna,M. Ravi Kumar, 2013. A Robust Image Watermarking Scheme Using
Simplified Significant Wavelet Tree Quantization. IEEE Sponsored International Conference on Advanced
Computing Technologies (ICACT 2013).
11) Prof. L. Sumalatha, B. Sujatha, P. Sreekanth, 2013.A Novel Boundary Approach for Shape Representation and
Classification. IEEE International Conference on Computing, Communications, and Network Technologies.
12) Prof. L. Sumalatha, G. Rosline Nesa Kumari,V. Vijaya Kumar, September 2012. A Simple Block Based Content
Watermarking Scheme for Image Authentication and Tamper Detection. International Journal of Soft
Computing and Engineering (IJSCE). Vol-2, Issue-4. 113-117.
13) Prof. L. Sumalatha, V. Venkata Krishna, V. Vijaya Kumar, September 2012. Local Content Based Image
Authentication for Tamper Localization. International Journal of Image, Graphics and Signal Processing. Vol. 9.
30-36.
14) Prof. L. Sumalatha, G. Rosline Nesa Kumari, S.Maruthu Perumal, August 2012. A Simple Texture based Image
Watermarking for Authentication. Artificial Intelligence Applications of Image Processing (National Seminar).
15) Prof. L. Sumalatha, V. Venkata Krishna, A Vinay Babu, July 2012. Image Content Authentication based on
Wavelet Edge Features. International Journal of Computer Applications. Vol. 49 - No. 23. 24-29.
16) Prof. L. Sumalatha, G. Rosline Nesa Kumari,V. Vijaya Kumar, June 2012. Fuzzy Based Chaotic and Logistic
Method for Digital Watermarking Systems. International Journal of Scientific & Engineering Research. Vol. 3,
Issue 6. 1- 6.
17) Prof. L. Sumalatha, G.Rosline Nesa kumari, V. Venkata Krishna, March 2012. Block based Watermarking for
Image Authentication using Statistic Approach. International Conference on Recent Advances in Computer
Sciences. 736-740.
18) Prof. L. Sumalatha, S.Maruthu Perumal, V. Vijaya Kumar, 2012. Image Watermarking Based on Simplified
Wavelet Tree Quantization. International Journal of Computer Science and Information Security. Vol. 10, No. 2.
64-70.
19) Prof. L. Sumalatha, S.Maruthu Perumal, V. Venkata Krishna, 2010. Digital Image Authentication Based on
Threshold Values. 1st International Conference on Emerging Trends in Signal Processing and VLSI Design.
20) Prof. L. Sumalatha, G.Rosline Nesa Kumari, B. Vijaya Kumar,2009.Secure and Robust Digital Water marking on
Grey Level Images,IJAST,Vol.11,pp:1-8,2009.
Prof. M.H.M. Krishna Prasad 1) Dr. M.H.M. Krishna Prasad, Community detection in large scale social networks-2017. 2) Dr. M.H.M. Krishna Prasad, Mining overlapping communities in real world networks based on extended
modularity gain.-2017.
134
3) Dr. M.H.M. Krishna Prasad, Dr. J.V.R Murthy, Anuradha Yarlagadda, 2014. Particle Swarm Optimized Optimal
Threshold Value Selection for Clustering based on Correlation Fractal Dimension. Applied Mathematics. 1615-
1622.
4) Dr. M.H.M. Krishna Prasad, P. Srinivasa Rao, K. Thammi Reddy, 2014. A Novel Approach for Identification of
Hadoop Cloud Temporal Patterns Using Map Reduce. I.J. Information Technology and Computer Science. 37-42.
5) Dr. M.H.M. Krishna Prasad, Srinivasa Rao Dammavalam, Seetha Maddala, 2013. Iterative Image Fusion Using
Fuzzy Logic with Applications. Advances in Computing and Information Technology. 145-152.
6) Dr. M.H.M. Krishna Prasad, Srinivasa Rao Dammavalam, Seetha Maddala, February 2012. Quality Assessment of
Pixel-Level Image Fusion Using Fuzzy Logic. International Journal on Soft Computing (IJSC). 13-25.
7) Dr. M.H.M. Krishna Prasad, K. VijayaBabu, O. Srinivasa Rao, February 2012. SECURED TREE BASED KEY
MANAGEMENT IN WIRELESSBROADCAST SERVICES. International Journal of Engineering Science and
Technology (IJEST). 523-529.
8) Dr. M.H.M. Krishna Prasad, M. Bhanu Sridhar, Y. Srinivas, 2012. Software Reuse in Cardiology Related Medical
Database Using K-Means Clustering Technique. Journal of Software Engineering and Applications. 682-686.
9) Dr. M.H.M. Krishna Prasad, Kartheek Srungaram, 2012. Enhanced Cluster Based Routing Protocol for MANETS.
Advances in Computer Science and Information Technology, Networks and Communications. 346-352.
10) Dr. M.H.M. Krishna Prasad, G. Netaji, 2012. Fractal Based Approach for Indexing and Querying Heterogeneous
Data Streams. International Journal on Advanced Computer Theory and Engineering (IJACTE). 84-88.
11) Dr. M.H.M. Krishna Prasad, T. Kameswara Prasad, O. SrinivasaRao, 2012. Exploration of Meaningful Information
from Educational Data Using Clustering and Sequential Pattern Miner. International Journal on Advanced
Computer Theory and Engineering (IJACTE). 29-34.
Prof. A. Krishna Mohan
1) A. Krishna Mohan, J. Satyanarayana, MHM Krishna Prasad. July - Sept. 2012. International Journal of Computer
Science & Technology. Vol. 3, ISSue 3. 425-429.
2) A. Krishna Mohan, Harika Yelisala, A.Suekha, MHM Krishna Prasad. July - Sept. 2012. FCIR Tree – A novel
method to build for Handling Geographic Document. International Journal of Computer Science & Technology.
Vol. 3, Issue 3. 197-201.
3) A. Krishna Mohan, V.V. Narasimha Rao, MHM Krishna Prasad, June 2012. A Novel Fuzzy Based Clustering
Algorithm for Text Classification. International Journal of Computer Applications. Volume 47(No.8) 33-39.
4) A. Krishna Mohan, Harika Yelisala, MHM Krishna Prasad, May-Jun 2012. IR Tree - An Adept Index for Handling
Geographic Document Searching. International Journal of Engineering Research and Applications (IJERA). Vol. 2,
Issue 3. 1433-1438.
5) A. Krishna Mohan, Surekha Alokam, MHM Krishna Prasad, May-Jun 2012. An Efficient Decision Tree for
Uncertain Data. International Journal of Engineering Research and Applications (IJERA). Vol. 2, Issue 3. 1401-
1405.
6) A. Krishna Mohan, Hari Krishna Gurram, Shanmukha Rao Kummari, 2011. Distance Sort. International Journal of
Experimental Algorithms (IJEA). Vol. 2, Issue 2. 42-47.
Prof. K. Sahadevaiah
1) Kuncha Sahadevaiah, Nagendla Ramakrishnaiah and P.V.G.D. Prasad Reddy,An Empirical Study of a
Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks,Springer International Publishing
Switzerland 2016 , First International Conference On Information and Communication Technology for Intelligent
Systems: Volume 2,Smart Innovation, Systems and Technologies 51
2) Nagendla Ramakrishnaiah, Pakanati Chenna Reddy and Kuncha Sahadevaiah,Performance Analysis of Dynamic
Addressing Scheme with DSR, DSDV and ZRP Routing Protocols in Wireless Ad Hoc Networks
135
©Springer International Publishing Switzerland 2016,First International Conference On Information and
Technology for Intelligent Systems: Volume 1,Smart Innovation, Systems and Technologies 50
3) K. Sahadevaiah, N.RamaKrishnaiah, Prasad Reddy P.V.G.D,IPv6 address auto-configuration protocol for mobile
Ad Hoc Networks1877-0509©2015 .3rd International Conference on Recent Trends in computing 2015(ICRTC-
2015)
DR. ASN CHAKRAVARTHY
1) “Utilization of SC-FDMA and OFDMA Based Uplink and Downlink Resources in LTE-A Network
Assisted Device To Device Communication for Effective”, ARPN Journal of Engineering and
Applied Sciences, VOL. 12, NO. 5 MARCH 2017.
2) “Evolution of Higher Education in India: Ancient to Golden Era”, University News: Association of
Indian Universities, Volume 55 N0. 05, January 30-Febraruary 05 2017.
3) “Optical Character Recognition Technique Algorithms, Journal of Theoretical and Applied Information
Technology”, 20th January 2016. Vol.83. No.2, p.p275-282.
4) “A Study on Developing Groundwater Information System (GWIS) for Sustainable Management of
Groundwater Resources-A Case Study from Visakhapatnam Urban Region “, International Journal of Science
and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 2185-2190.
5) “ Variable Modulation Schemes for AWGN Channel based Device to Device Communication, Indian Journal of
Science and Technology” , Vol 9(20), May 2016, pp.1-6.
6) “Design of WSN based Water Quality Monitoring System in a Mining District, International Journal of Science
and Research (IJSR)”, Volume 5 Issue 6, June 2016, pp.1183-1188.
7) “Providing A Secure Group Communication by Using a Novel Key Transfer Protocol and by Generating Multiple
Session Keys “, International Journal of Advance Research in Science and Engineering (IJARSE), Volume 5 Issue
10, October 2016, pp.36-45.
8) “Survey on Android Forensic Tools and Methodologies”, International Journal of Computer Applications (0975
– 8887) Volume 154 – No.8, November 2016.
9) “International Journal of Computer Applications (0975 – 8887) Volume 154 – No.8, November 2016 “,
International Journal of Electrical and Computer Engineering (IJECE), Volume 6, No 6: December 2016, pp.
2962~2970.
10) “Palm Vein Biometric Technology: An Approach to Upgrade Security in ATM Transactions”, International
Journal of Computer Applications (0975 – 8887), Volume 112 – No. 9, February 2015.
11) “Analysis of Canonical Character Segmentation Technique for Ancient Telugu Text Documents”, Journal of
Theoretical and Applied Information Technology, 20th December 2015. Vol.82. No.2, pp. 311-320.
12) “Performance Evaluation Of Quantitative Metrics on Ancient Text Documents Using MIGT”, Journal of
Theoretical and Applied Information Technology, 31st December 2015. Vol.82. No.3 pp. 360-365.
13) “Gesture Recognition Technology to Annihilate Burglaries amid ATM Transactions “, International Research
Journal of Engineering and Technology (IRJET), Volume: 02 Issue: 08 | Dec-2015, pp. 2293-2297.
14) “Prevention of Fire Accidents In Villages Using Wireless Sensor Networks “, International Journal of Computer
Science and Information Technologies (IJCSIT), Vol. 5 (3), 2014, pp. 3968-3971.
Dr. D. Haritha 1) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, 2013. Studies on Face recognition system using DCT
coefficients under Logarithm domain and LBP. International Journal of Research and Reviews in Applicable
Mathematics & Computer Science. Vol. 3(1). 44-57.
2) Dr. D. Haritha, S V H H L Narasimham Nallamilli, Saritha Hepsibha P, Oct 2012. Deterministic Evaluation of
Wireless Sensor Network using GRID and RANDOM Development Knowledge. International Journal of
Knowledge Engineering and Research. Vol 1 Issue 1. 1 to 5.
136
3) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, Sep-2012. Performance evaluation on the effect of
combining DCT and LBP on face recognition system. International Journal of Modern Education and Computer
Science. Vol. 4 (11). 21-32.
4) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, Sep-2012. Face Recognition System Using Doubly
Truncated Multivariate Gaussian Mixture Model and DCT Coefficients Under Logarithm Domain. International
Journal of Image, Graphics and Signal Processing. Vol. 4 (10). 8 to 17.
5) Dr. D. Haritha, Nakka Sindhuri, Sep 2012. Time Series Classification and Prediction using Kernal Estimates.
International Journal of Computer Science and technology. Vol. 3, Issue 3. 731-734.
6) Dr. D. Haritha, K. V Durga Devi, Jul 2012. Business Analysis frameworks for actionable knowledge discovery.
International Journal of Advanced and Innovative Research. Volume 1, Issue 2. 1 to 6.
7) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, Mar-2012. Face Recognition Algorithm Based on
Doubly Truncated Gaussian Mixture Model Using Hierarchical Clustering Algorithm. International Journal of
Computer Science Issues. Vol. 9, Issue 2, No 1. 388-395.
8) Dr. D. Haritha, Dr. K. Srinivasa Rao, Dr. Ch. Satyanarayana, Feb 2012. Face Recognition Algorithm based on
Doubly Truncated Gaussian Mixture Model using DCT Coefficients. International Journal of Computer
Applications. Volume 39– No.9. 23-28.
Dr. O. Srinivasa Rao
1) Dr. O. Srinivasa Rao, Authorship Attribution on Imbalanced English Editorial Corpora, IJCA, UGC Approved
Journal (0975-8887) Volume 169-No.1,July 2017
2) Dr. O. Srinivasa Rao, Labeling Document Clusters with Thematic Phrases, IARJSET Vol 4,Issue 7,July 2017(UGC
Approved Journal)
3) Dr. O. Srinivasa Rao, Authorship Attribution using Unsupervised Clustering Algorithms on English C50 News
Articles ,IARJSET Vol 4,Issue 7,July 2017(UGC Approved Journal)
4) Dr. O. Srinivasa Rao, Performance Evaluation of Unsupervised algorithms on Morpheme based authorship
Clustering, IARJSET Vol 4, Issue 8, August 2017.
5) Dr. O. Srinivasa Rao, ECC Base point Generation using Finger print for Authentication and Message Encryption
and Decryption Using ECC, IARJSET Vol 4,Issue 8,August 2017, (UGC Approved Journal)
6) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, Nov 2011. Huffman compression technique in the context of ECC for
enhancing the security and effective utilization of channel Bandwidth for Large Text. International Journal of
Computer Applications. Special Issue. 45-54.
7) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, Oct 2011. Huffman compression technique in the context of ECC for
enhancing the security and effective utilization of channel Bandwidth for Images. International Journal of
Science and Advanced Technology .Volume 1 (No 8). 13-23.
8) Dr. O. Srinivasa Rao, Satya Venkatesh Kadali, Dr MHM Krishna Prasad. Sep-Oct 2011. A Routing-Driven Public-
Key Cryptosystem Based Key Management Scheme for a Sensor Network. International Journal of Computer
Trends and Technology. Special Issue. 11 to 14.
9) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, Sept 2011. Comparative study of Arithmetic and Huffman
Compression techniques for enhancing security and effective bandwidth utilization in the context of ECC for
Text. International Journal of Computer Applications. Volume 29(No.6). 44-60.
10) Dr. O. Srinivasa Rao, N.Sandhya rani, Dr MHM Krishna Prasad. Sep 2011. Efficient implementation of Data
aggregation in WSNs by Mobile Agent paradigm. International Journal on Computer Science and Engineering.
Vol. 3 (No. 9). 3254-3258.
11) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, Jan 2011. Comparative Study of Arithmetic and Huffman Data
Compression Techniques for Koblitz Curve Cryptography. International Journal of Computer Applications.
Volume 14(No.5). 45-49.
137
12) Dr. O. Srinivasa Rao, S.Rama Subba Reddy, Dr MHM Krishna Prasad, 2011. Hybrid Broadcast Routing with
Dynamic Security Considerations. International Journal of Computer Science and Information Technologies. Vol.
2 (5). 2091-2094.
13) Dr. O. Srinivasa Rao, B. Govardhan Singh, Dr MHM Krishna Prasad, 2011. Effectively Utilizing the Unused
Bandwidth. Advances in Computational Sciences and Technology. Vol. 4(No. 4). 379-387.
14) Dr. O. Srinivasa Rao, Madhu Babu Mogali, Dr MHM Krishna Prasad, 2011. Stateless Multi Hop Optimization in
Mobile Ad Hoc Networks. International Journal of Computer Trends and Technology. volume2 Issue2. 75-78.
15) Dr. O. Srinivasa Rao, B. Pruthvi raj, Dr MHM Krishna Prasad, 2011. Mitigating Congestion Aware routing
Protocol in Wireless Sensor Network. International Journal of Computer Trends and Technology. volume2
Issue1. 42-47.
16) Dr. O. Srinivasa Rao, G Satish, Dr MHM Krishna Prasad, 2011. Analyzing CSMA and TDMA scheduling in wireless
sensor networks. Advances in Computational Sciences and Technology. Vol. 4 (No.4). 367-378.
17) Dr. O. Srinivasa Rao, 2011.Associative Classification techniques for predicting e-banking phishing website.
International Journal of Computer Trends and Technology. volume2 Issue2. 124-127.
18) Dr. O. Srinivasa Rao, 2011. Integration of Bin Rank and Hub Rank by executing Hub Rank on MSGs of Bin Rank
generates. International Journal of Computer Trends and Technology. volume2 Issue2. 157-160.
19) Dr. O. Srinivasa Rao, Prof. S. PallamSetty, 2010. Efficient mapping methods of Elliptic Curve Crypto Systems.
International Journal of Engineering Science and Technology. Vol. 2(8). 3651-3656.
Dr N. Ramakrishnaiah
1) Nagendla Ramakrishnaiah, Sirigiri Konda Reddy,Performance Analysis of Matrix and Graph Computations using
Data Compression Techniques In MPI and Hadoop Map Reduce in Big Data Framework
IEEE International conference on Smart Technologies and Management for Computing, Communication,
Controls, Energy and Materials (ICSTM) 2-4 August 2017.
2) Kuncha Sahadevaiah, Nagendla Ramakrishnaiah and P.V.G.D. Prasad Reddy,An Empirical Study of a
Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks,Springer International Publishing
Switzerland 2016 , First International Conference On Information and Communication Technology for Intelligent
Systems: Volume 2,Smart Innovation, Systems and Technologies 51
3) Nagendla Ramakrishnaiah, Pakanati Chenna Reddy and Kuncha Sahadevaiah,Performance Analysis of Dynamic
Addressing Scheme with DSR, DSDV and ZRP Routing Protocols in Wireless Ad Hoc Networks
©Springer International Publishing Switzerland 2016,First International Conference On Information and
Technology for Intelligent Systems: Volume 1,Smart Innovation, Systems and Technologies 50
4) Nagendla Ramakrishnaiah, Pakanati Chenna Reddy,Tree Based Variable Length Address Auto Configuration
Protocol For Mobile Ad Hoc Networks,2nd International Conference on Advances in Computing Communication
& Automation (ICACCA) 30th Sep – 1st 2016.
5) K. Sahadevaiah, N.RamaKrishnaiah, Prasad Reddy P.V.G.D,IPv6 address auto-configuration protocol for mobile
Ad Hoc Networks1877-0509©2015 .3rd International Conference on Recent Trends in computing 2015(ICRTC-
2015)
6) N. RamaKrishnaiah, P.Chenna Reddy,A Review Of Addressing Protocols in Mobile Ad-hoc Networks
International Journal of Computer Applications (0975-8887 ) Volume 132-No.9, December 2015
138
7) N. RamaKrishnaiah, P.Chenna Reddy,An Addressing Mechanism for Network Partitioning and Merging in
Wireless Ad Hoc Networks,International Journal of Applied Engineering Research ISSN 0973-4562 Volume 10,
Number 17(2015) pp 37992-37996
SSSN Usha Devi N
1) Cellular Automata and its Application in Bioinformatics: A Review in Global Percepective on Artificial Intellegence , Volume 2,Issue 2,pp 16-22.
2) A Fast Multiple attractor Cellular Automata with Modified Clonal Classifier Promoter Region Prediction in Eukaryotes in Journal of Bioinformatics and Intelligent Control,Volume 3,pp 123-127.
3) Cellular Automata in Splice Site Prediction,in MOJ Proteomics & Bioinformatics ,Volume 1,issue 2. 4) A Fast Multiple attractor Cellular Automata with Modified Clonal Classifier for Coding Region Prediction in
Human Genome, Journal of Bioinformatics and Intelligent Control,Volume 3,issue 2.pp 128-133. 5) International Conference on Advances in Intelligent Systems and Computing ,Paper titled PRMACA:A Promoter
Region Identification Using Multiple Attractor Cellular Automata, International Publications Springer 6) SSSN Usha Devi Nedunuri, Pokkuluri.KiranSree, Inampudi Ramesh Babu, September 2013. PSMACA: An
Automated Protein Structure Predicyion using MACA(Multiple Attractor Cellular Automata). Journal of Bioinformatics and Intelligent Control (JBIC). Volume 2 Number 3. 211-215.
7) SSSN Usha Devi Nedunuri, Pokkuluri.KiranSree, Inampudi Ramesh Babu, September 2013. Multiple Attractor
Cellular Automata (MACA) for addressing Major problems in Bioinformatics. Review of Bioinformatics and
Biometrics (RBB).Volume 2 Issue 3. 70-76.
8) SSSN Usha Devi Nedunuri, Pokkuluri.KiranSree, Inampudi Ramesh Babu, December 2012. FELFCNCA: Fast &
Efficient Log File Compression Using Non Cellular Automata Classifier. International Journal on
Communications. Volume 1 Issue 1. 7 – 11.
9) SSSN Usha Devi Nedunuri, Prof. L. Sumalatha, May- June 2010, Fast and Effective heart attack prediction system
using Non Linear Cellular Automata. International Journal of Computer Engineering and Technology (IJCET).
Volume 1 Number 1. 196-206.
A. KARUNA
1) A. Karuna, V.Navya Sree, B. Sarath Chandra, July- August 2012. A new Algorithm for Training task graphs on
mixed systems. International Journal of Research in Engineering Science & Technology (IJREST). Vol.-1, Iss.-1. 11
– 15.
SUNEETHA ELURI
1) Published paper “Anonymi,iin “IEEE international Conference on Science , Technology and Management” in
Attended and published paper on “Sentiment Analysis of Stock Prediction Using machine Learning” in
International conference on emerging trends in engineering and technology on 30th Aug-2015 at
Vishakhapatnam.
2) “Efficient Data Dissemination and Privacy Preservation using Trajectory Prediction in VANETs” published in
International Journal of Innovative Science, Engineering and technology, Volume 2 Issue 8, August 2015.
3) “Analysis of Public Health Concern using Two-Step Sentiment Classification “ Published in International Journal
of Engineering Research & Technology Volume 4, Issue 9, September 2015.
4) “Sentiment Analysis for Frontier Security issues using Phrase Patterns “Published in International Journal of
Engineering Research & Technology Volume 4, Issue 9 September 2015.
139
5) Suneetha Eluri, G Sowjanya “An integrated Approach for anchor based localization and energy efficient secure
communication in WSN” in IJRITCC Vol2, Issue 7 July-2014
6) Suneetha Eluri, P Ramya “A framework for improved Intrusion detection and Countermeasure Selection in
Cloud systems” in IJRITCC Vol2, Issue 7 July-2014
7) Suneetha Eluri, P Santhosh “A framework for decoupling of Routing and Scheduling using Shadow Queues on
Multi Commodity Networks”, IJARCSMS , Vol 2 Issue 8 Aug 2014
RATNA KUMARI CHALLA
1) Ratna Kumari Challa, SRINIVAS RAO KANUSU, October 2013. Adaption of Cloud Computing in Education and
Learning. International Journal of Advanced Research in Computer and Communication Engineering. Vol. 2,
Issue 10. 4160-4163.
2) Ratna Kumari Challa, n. Mounica “Adaptive Data Aggregation with mobile Agents and Evolutionary Computing
based clustering in Sparse WSN” IJRITCC Vol2, Issue 9 ,2014
3) Ratna Kumari Challa,K. Sindhu “Bit slicing based visual cryptography on Gray Scale images” IJRITCC Vol2, Issue
8 , Aug 2014
4) Ratna Kumari Challa, V. Nageena “Concurrent Context Free framework for conceptual similarity problem using
reverse dictionary” IJRITCC Vol2, Issue 8 , Aug 2014
5.8 F a c u l t y Intellectual Property Rights (FIPR)(10)
Assessment of FIPR=2× (Sum of the FIPR points scored by each faculty member)/N
(Instruction: A faculty member scores a maximum of five FIPR points. FIPR
includes awarded national/international p a t e n t s , design, and copyrights.)
Name of faculty member(contributing to FIPR)
FIPR points(max.5 per faculty member)
CAYm2 CAYm1 CAY
Prof. Ch. Satyanarayana The patent examination is in final stage Dr. D. Haritha The patent examination is in final stage
Sum
N
Assessment of FIPR=2×Sum/N
Average assessment
5.9 Funded R&D Projects and Consultancy (FRDC) Work (30)
Instruction: A faculty member scores maximum 5 points, depending upon the amount.)A Suggested scheme is given below for a minimum amount of
140
Rs.1lakh: Five points for funding by national agency,
Four points for funding by state agency/ private sector
Two points for funding by the sponsoring trust/society. Assessment of R&D and consultancy projects=6×(Sum of FRDC by each faculty member)//N
Name of faculty member (contributing to FPPC) FRDC points (max.5 per)
CAYm1
m3(2013-14)
CAY
m2(2014-15)
CAYm1
(2015-16)
CAY
(2016-17)
Dr. JVR Murthy -- 5 5 5
Dr.MHM Krishna Prasad -- 5 5 5
Dr. Ch. Satyanarayana 5 5 5 5
Sum 5 15 15 15
N 20 20 20 20
Assessment of FRDC=6×Sum/N 1.5 4.5 4.5 4.5
Average=3.75
➢ Prof Ch. Satyanarayana as Co-Principal Investigator for the project Creation of facilities for
translator research in type-2 Diabetes Mellitus (DM) funded by Department of Science and
Technology (DST), Govt. of India under IRHPA scheme
Cost of Project Rs. 5,31,21,600/- for 5 years started on 01/03/2011 ➢ Prof. JVR Murthy as Principal Investigator and Prof MHM Krishna Prasad as co- Investigator
for project Obama-Simgh Initiative on “ Promoting University Industrial Cooperation
Creativity Diversity and Entrepreneurship in Computer Science” Funded by Ministry of
Human resources and Development, Govt. Of India, for an amount of approx. Rs. 1.2 Crores.
➢ Prof. JVR Murthy developed Janamithri Software for AP Police.
➢ Prof. JVR Murthy developed File Monitoring System for East Godavari Collecterate, AP.
➢ Prof. JVR Murthy developed Grievance monitoring System for RDO, EastGodavari as part of
ISO Certification
➢ Prof. JVR Murthy developed Randomized Transfer System for Constables of AP Police
➢ Prof. JVR Murthy developed and delivered R& D Project “Centralized Meta Data warehouse
” in collaboration with BI division of TCS Hyderabad which is currently implemented by
British Telecom
141
5.10 Faculty Interaction with Outside World (15)
FIP=Faculty interaction points
Assessment=3× (Sum of FIP by each faculty member)/N
(Instruction: A faculty member gets a maximum of five interaction points,
depending upon the type of institution or R&D laboratory or industry, as follows)
Five points for interaction with a reputed institution abroad, institution of eminence in India, or national research laboratories,
Three points for interaction with institution/industry (not covered earlier).
Points to be awarded, for those activities, which result in joint efforts in publication of books/research paper, pursuing externally funded R&D/ consultancy projects and/or development of semester-long course/teaching modules.
List of Faculty Interactions with outside world:
Prof. J.V.R Murthy
1) Dr. J.V.R Murthy, 19th December 2014. Expert talk on Big Data Analytics. Workshop on “Big
Data Analytics” at Andhra University, Vizag.
2) Dr. J.V.R Murthy, 22nd November 2014. As CSE Board of Studies Member. Adikavi Nannayya
University, Rajahmundry.
3) Dr. J.V.R Murthy, 13th November 2014. Expert talk on Big Data Analytics. UGC Academic Staff
College, Hyderabad.
4) Dr. J.V.R Murthy, 31st July 2014. As an Advisory Member to Help TTD in Queue line
Monitoring System.
5) Dr. J.V.R Murthy, 10th July 2014. Inauguration of CSI chapter and Keynote Speaker on Big
Data Analytics. Swarnandhra Engineering College, Narsapuram.
6) Dr. J.V.R Murthy, 26th May 2014. As a Board of Studies Member for CSE Department. V R
Siddhartha Engineering College, Vijayawada.
7) Dr. J.V.R Murthy, 28th March 2014. As a Keynote Address. Workshop on “Big Data Analytics”
at UCEV, JNTUK.
8) Dr. J.V.R Murthy, 20th March 2014. As a Keynote Speaker. National Level Workshop on
“Pattern Recognition & its Applications” at UCEV, JNTUK.
9) Dr. J.V.R Murthy, 08th January 2014. As a Chief Guest & Resource Person. At National seminar
on “Frontiers in Machine Learning” at AITAM Tekkali.
10) Dr. J.V.R Murthy, 13th December 2013. As a Jury Committee member to select Awardees for
“Awards for Excellence in IT”. Computer Society of India.
142
11) Dr. J.V.R Murthy, Still. As Advisory Board member. Software Technology Park of India.
12) Dr. J.V.R Murthy, Still. As Advisory Board member. AP Police CCTN Team.
13) Dr. J.V.R Murthy, As a Visiting Faculty and preparing the proposal for Obama Singh Initiatives
Grant in Collaboration with Chicago State University. Dr. J.V.R Murthy Acted as an Advisor to
the Chicago State University data centre. And he delivered a lecture on “Database
Normalization” in CSU.
Prof. Ch. Satyanarayana
1) Dr. Ch. Satyanarayana, 27th& 28th December 2014. As an Advisory Committee Member for
International Conference on Health & Disease.
Prof. L. Sumalatha 1) Dr. L. Sumalatha, 28th& 29th June 2013. Resource Person for Two days Workshop on
MATLAB, at Chaitanya Institute of Technology, Rajahmundry.
2) Dr. L. Sumalatha, 25th& 26th September 2012. Resource Person for Two days Workshop
on “How to Teach C”, at Chaitanya Institute of Technology, Rajahmundry.
3) Dr. L. Sumalatha, 15th& 17th March 2013. Resource Person for Two days Workshop on
“Android”, at Chaitanya Institute of Technology, Rajahmundry.
4) Dr. L. Sumalatha, 29th December 2012. As a Member for BOG in BVCITS.
5) Dr. L. Sumalatha, 2010. As a Resource Person for AICTE Sponsored Staff Device
Programme on Network Security & Applications, at AITAM, Tekkali.
6) Dr. L. Sumalatha, September 2010. As a Session Chairperson for TRACS 2010, A National
Conference on Technology & Resource Advances in Computer Science at Aditya
Institutions.
7) Dr. L. Sumalatha, As Chief Guest for International Conference.
8) Dr. L. Sumalatha, As a Session chair for an IEEE sponsored Conference at JNTUV.
9) Dr. L. Sumalatha, 27th& 28th December 2014. As a Advisory Committee Member for
International Conference on Health & Disease.
10) Dr. L. Sumalatha, 27th -31st January 2015, Invited as a Resource person for 1 week
Workshop on Research Challenges & Issues in Big Data & Cloud Computing at JNTUV.
11) Dr. L. Sumalatha, 28th& 29th March 2015. Invited as a Session Chair for National
Conference on Emerging Technology in Computer Science organized by JNTUV under
UGC 12th Plan.
12) Dr. L. Sumalatha, November 2014. As a Reviewer for Kuwait Journal of Science.
13) Dr. L. Sumalatha,As a Key Note Speaker for Information Security Day on 16th Dec 2016 in
Eastern Offshore Asset,ONGC Kakinada.
14) Dr. L. Sumalatha,As a Resource Person for Smart Electric Power Grid with Emphasis on
Embedded Systems and Cyber Security during 21st-25th February 2017
Prof. M.H.M. Krishna Prasad
143
1) 18th and 19th Feb 2017, participated in BoS meeting (Dept of IT) in Pragathi Engineering
College, Surampalem, East Godavari (dt)
2) 22nd Feb 2017, Participated for TEQIP-III Selection Process at National Project Implementation Unit (NPIU), Delhi
3) 27th and 28th Jan 2017, Participated in CII Summit at Vishakhapatna 4) 12th March 2017, expert committee member in JNTUK Ratification process
5) 13th and 14th March 2017, as an expert member in the ratification process, K. L. University ,
Vaddeswaram, Vijayawada
6) 20th to 24th March 2017, London, UK for paper presentation in ICC 2017 and meeting with
Prof Guo Yi-Ki, Director, HPC division, Imperial College, London, UK
7) 1st April 2017, participated in BoS meeting as a Subject Expert, Dept of MCA, VR SEC,
Vijayawada
8) 13th and 14th April 2017, participated in TEQIP-II Post Procurement Review, at NPIU, Delhi
9) Dr. M.H.M. Krishna Prasad, 20th May 2017,as a BOS Member (University Nominee), Vignan
Institute of Technology, Visakhapatnam
10) Dr. M.H.M. Krishna Prasad, 14th and 15thMarch 2017, as an expert committee member in
selection of Faculty & Staff in Computer Science and Engineering Department, GEC
11) Dr. M.H.M. Krishna Prasad, Resource person “Parallel Computing” on 19.2.2016 Organized by
E &ICT Academy, Dept of CSE, NITW
12) Dr. M.H.M. Krishna Prasad, 27th Sept. 2014. Chief guest and key note speaker on Recent
Trends in Data Mining, INCEPTRA2K14, Idle College, Kakinada.
13) Dr. M.H.M. Krishna Prasad, 11th to 13th Sept. 2014. Session chair in IEEE Sponsored WOCN-
2014, organized by KLU.
14) Dr. M.H.M. Krishna Prasad, 21st Sep 2014. AFRC Observer duty for counseling PGECET-AC
admissions at Avanthi PG College, VSKP.
15) Dr. M.H.M. Krishna Prasad, 19th Oct 2014. Guest Lecture on Big Data Analytics. Prakasam
Engineering College, Kandukur.
16) Dr. M.H.M. Krishna Prasad, 11th Aug 2014. A.P attended the Observer duty for conducting
EAMCET-AC. Admission and Fee Regulatory Committee (AFRC), Higher Education, Nove
College of Engineering VZA on Ref: Lr.No.11/AFRC-RA/SW.III-2014-15
17) Dr. M.H.M. Krishna Prasad,Feb 2012 to Sep 2013. Subject Expert in BOS, Sri Vishnu
Engineering College for Women, Bhimavaram
18) Dr. M.H.M. Krishna Prasad, 22nd February, 2013. Chief guest and key note speaker on Recent
Trends in Data Bases, International Seminar on Security and Software Engineering, DIET,
Ankapalli.
19) Dr. M.H.M. Krishna Prasad, June 5, 2014. Doctoral committee Member to consider the thesis
titled “Investigations on Formal Concept Analysis in the Fuzzy Setting” proposed to be
submitted by Mr. Prem Kumar Singh. Dept of CSE, VIT, Vellore.
20) Dr. M.H.M. Krishna Prasad, 9th Nov 2013. Doctoral committee Member, to consider the
thesis proposal of Ms. Preethi G, Dept of CSE, VIT, Vellore.
21) Dr. M.H.M. Krishna Prasad,9th Nov 2013. As a Doctoral committee Member participated in
the comprehensive viva voce examination of Mr. Saravana Kumar,Dept of CSE, VIT, Vellore.
144
22) Dr. M.H.M. Krishna Prasad, 15th Feb 2012. Guest Lecture (Key Note), ignITiCSE, One-day
National Student Technical Symposium, SISTAM, Srikakulam.
23) Dr. M.H.M. Krishna Prasad, Guest Lecture (Key Note), National Workshop on Statistical
Computing. GMRIT.
24) Dr. M.H.M. Krishna Prasad, AFRC Observer conducting PGECET-AC at Nova College of
Engineering VZA.
Prof. ASN Chakravarthy
1) Chaired a Technical Session at "IEEE International Conference on Soft Computing & Network Security (ICSNS-2015) held during 25th -27th February 2015 organized by SNS College of Technology Coimbatore in association with “KYUNGPOOK National University, South Korea.
2) Delivered a Guest lecturer at GVR&S College of Engineering & Technology, Guntur on the eve of Engineers day held on 15th September 2015.
3) Delivered a Guest lecture on “MOOCs – the power of disruptive innovation”, at a state level 3-Day workshop on “Teaching enabled Teaching Learning in Higher Education institutions”, held during 6th -8th October 2015 at Pithapur Rajah’s Government College, Kakinada.
4) Given a Welcome Address and Chaired a Technical Session at the 4th World Conference on Applied Sciences, Engineering and Technology (WCSET-2015) is going to be organized jointly by the Basha Research Corporation, Singapore and Graduate School of Science and Technology, Kumamoto University, Japan during 24th -26th October 2015 at Kumamoto University.
5) Delivered a Keynote and Chaired a Session at “The International Conference on Cryptography and Security” (ICCS 2015) organized by ASDF, during 26th -27th November 2015, Kuala Lumpur, Malaysia.
6) Delivered a Keynote and Chaired a Session at The International Conference on Human Machine Interaction (ICHMI 2015)” organized by ASDF, during 26th -27th November 2015, Kuala Lumpur, Malaysia.
7) Chaired a Technical Session at International Conference on. Computation Intelligence and Soft Computing organized by the Institute of Bioinformatics and Computational Biology (IBCB), held during 19th – 20th December 2015 at Palm Beach Hotel, Visakhapatnam.
8) Delivered a speech on Cloud, Big Data Security issues and conducted hands on session on Digital Forensic tools at a Three day faculty development Programme on Big Data Analytics & Computer Forensics(03-04-2016), held during 02nd-04th May 2016, organized by Dept. of CSE, Dhanekula Institute of Engineering & Technology, Vijayawada, India.
9) Delivered a guest lecture on "Cloud, Big Data Security issues & Digital Forensics"(15-07-2016) at a one week faculty development program on Recent Trends in Cloud Computing & Big Data Analytics held during 11th -16th July 2016, organized by Dept. of CSE, Malla Reddy Engineering College(A), Secunderabad, India.
145
10) Delivered a guest lecture on "Standardization of Higher Education &Online Learning &
MOOCs in Education" (21-07-2016), at a “Refresher course in Educational Technology “held during 11th- 31st July 2016 organized by UGC Human Resource Development and Andhra University, Visakhapatnam, India.
11) Delivered an expert lecture on “Reforms in Higher Education, MOOCs, Learning Management System/MOODLE and Education Technology Tools” on 30th July, 2016 at SVU College of Engineering, SV University, Tirupati, India.
12) Delivered an expert lecture on "Research opportunities in Computer Network and Security", in a three day workshop on " Fundamentals of Computer Networking", organized by the department of CSE during 16th -18th September' 2016 at RGUKT Nuzvid.
13) Delivered an expert lecture on Software Engineering, Networks and Cash less Transactions at SasiSasi Institute of Technology & Engineering, Kadakatla, Tadepalligudem , on 10th December 2016.
14) Delivered an expert lecture on "IOT& Security" at GVR & S College of Engineering & Technology, Guntur on 23rd December 2016.
15) Delivered an expert lecture on "IOT& Security" in a two day national workshop on “Revolution of internet of things and its applications” in A.M Reddy Memorial college of Engineering and Technology, on 24th December 2016, is sponsored by Science and Engineering Research Board (SERB) New Delhi.
16) Delivered an expert lecture on Digital Ethics & Cyber Security in a" Two Days Seminar on Ethics and Human Values in Engineering" on 6th January 2017, RVR&JC College of Engineering GUNTUR.
17) Delivered an invited talk on "Massive Open Online Courses" on 06th February 2017 at SreeVidyanikethan Engineering College, Tirupati.
18) Delivered an expert lecture on " Security in Smart Grid, IOT & Cyber Space " at one week
Interdisciplinary workshop on "Smart Electric Power Grid with Emphasis on Embedded
Systems and Cyber Security" 0n 23rd February 2017.
19) Delivered an online expert lecture on Technology in Education (Ed-Tech Tools) to Andhra University on 14-07-2017.
146
Dr. D. Haritha 1) Dr. D. Haritha, 2013. Chairperson for IPCV International Conference (WORLD COMP’ 13) at
Los Vegas, USA.
2) Dr. D. Haritha, As a Reviewer for IET journal.
SSSN Usha Devi N
1) SSSN Usha Devi N, as Judge for ABHYASA 2k17 ,Technical Paper Presentation contest on14th
march 2017.
Suneetha E 1) Suneetha E, as Resource Person for Two Week Orientation Programme on Physical Director
of affiliated colleges of JNTUK organized by Directorate of Faculty Development, JNTUK,
Kakinada, August 2014.
RatnaKumari Ch 1) Ratnakumari Ch, As Resource Person for Two Week Orientation Programme on Physical
Director of affiliated colleges of JNTUK organized by Directorate of Faculty Development,
JNTUK, Kakinada, August 2014.
147
6 Facilities and Technical Support (75)
Description of classrooms, faculty rooms, seminar, and conference halls :( Entriesin the
following table are sampler entries)
Room description
Usage Shared/
exclusive
Capacity Roomsequipped withPC,
Internet,Book rack, meeting
space,etc.
6 Lecturer Halls
Classroom for
UG
Exclusive
30 to 60 Black Board, class room furniture and LCD Projector with Screen ( in 3 class rooms)
Hall 5
Hall 6
M.Tech IT
M.Tech CSE
Exclusive 60 Black Board, LCD Projector with Screen, PC with Internet connection and class room furniture
Tutorial rooms ------------- Shared 30 to 60 Black Board, LCD Projector with Screen and class room furniture
No. of Meeting rooms
01 Shared 30 Furniture with PCs, printer, Xerox machine, Alma rah, rack, Plasma Digital panel and board.
No.of Faculty rooms
13 Exclusive 2 Furniture, PC with internet connection, Printer, Alma rah and rack
6.1 Classrooms in the Department (15)
6.1.1 Adequate number of rooms for lectures (core/electives), seminars, tutorials, etc., for the programme (5)
(Instruction: Assessment based on the information provided in the precedingtable.)
Number of rooms for lectures (core/electives), tutorials--------08 ➢ Adequate number of Class rooms, Faculty rooms along with e-class room is available in
the Department.
➢ Seminar hall is available for the Department on shared basis with university; and also
the e-class room is utilized for conducting seminars, guest lecturers in the Department.
148
6.1.2 Teaching aids---multimedia projectors, etc. (5)
Multimedia projectors-----10
➢ All Class rooms are equipped with Black boards.
➢ LCD projectors are provided in 6 class rooms to deliver Power Point presentations, e-
class notes, demos and etc.
➢ Display charts are provided in some places to explain the basic principles of Information
Technology.
➢ Display charts of list of practical conducted in laboratories are provided.
6.1.3 Acoustics, class room size, conditions of chairs/benches, air circulation, lighting, exits, ambience, and such other entities/facilities (5)
(Instruction: Assessment based on the provided in the preceding table and the inspection there of.)
▪ Acoustics---------- Yes ▪ Classroom size----6x72 Sqm , 2x48 Sqm ▪ Air circulation----- Abundant ▪ Lighting------------ Abundant ▪ Conditions of chairs/benches------Excellent
• All class room are well equipped with windows for air circulation, also there are
provisions for natural and sufficient artificial lighting
• Sufficient number of fans and tube lights are provided for better air circulation and
ventilation.
• All class rooms are provided teacher table, student benches for comfortable seating.
• All class rooms are having three seated furniture with sufficient number of benches to
accommodate all the students as per the requirement. Each class room is provided with
entry and exit.
• The class rooms are adequate in size to enable excellent audible environment.
• The provided Glass Board is clearly visible from all corners of the class room.
• Good academic ambience is maintained in the classes and in the vicinity of the
department.
6.2 Faculty Rooms in the Department (15)
6.2.1 Availability of individual faculty rooms (5)
149
(Instruction: Assessment based on the information provided in the preceding table.)
• Faculty Rooms------------13 • White/black board-------- 02 • Computer------------------15 PCs with internet connections and Printers • All Professors and Associate Professors are provided with Personal Laptops
➢ The department is having one HOD room and 13 Faculty rooms.
➢ The HOD Room is equipped with necessary IT Infrastructure viz., smart board,
projector, computer with internet etc., to capture and deliver e-content
➢ All regular faculty members have individual rooms with necessary IT Infrastructure
(computer with internet, printer, scanner etc.,)to support academic and research
activities.
➢ All ad-hoc faculty members have shared rooms; those accommodated with sufficient
furniture, PCs with printer and internet connections.
6.2.2 Room equipped with white/black board, computer, Internet, and such other amenities/facilities (5)
(Instruction: Assessment based on the information provided in the preceding table)
• white/black board --------- 8
• computers ---------Yes
• Internet ---------Yes
➢ All class rooms are equipped with board; moreover four class rooms are having
projectors, screens and PCs with internet connection facility.
➢ All computers available in the department are having internet facility.
➢ The computer labs available in the department are having Internet/Intranet/USB Drive +
printer facility.
➢ The department is having well notice boards, intercom connection and dustbin.
➢ Ladies waiting room is available for girls students with furniture
6.2.3 Usage of room for counseling/discussion with students (5)
(Instruction: Assessment based on the information provided in the preceding table and the inspection there of.)
➢ In addition to the faculty rooms, Class room, seminar hall are used for
discussion and counseling the students.
150
➢ E-class room is provided to share the ideas of students and Faculty as and when
required.
6.3 Laboratories in the Department to meet the programme curriculum requirements and the POs
(30) The following table is required for the subsequent criteria.
Laboratory
description in the
curriculum
Exclusive use
/shared
Space, number
of students
Number of
experiments
Quality of
instruments
Laboratory
manuals
Programming Language
Laboratory Shared with UG 120(Sqm), 54 16-25 High End
Yes, Available in the
Laboratories
Data Engineering Laboratory
shared 120(Sqm),50 16-25 High End Yes, Available
in the Laboratories
Advanced Computing Laboratory
PG (CSE & IT) 120(Sqm),60 16-25 High End Yes, Available
in the Laboratories
6.3.1 Adequate, well-equipped laboratories to meet the curriculum requirements and the POs
(10)
(Instruction: Assessment based on the information provided in the preceding table.)
To inculcate the interest in analyzing and developing experiments to make their Academics cope up with industry needs; the following programming facilities are available in
Laboratories
• C (Scientific Programming)
• C++ (Object Oriented Programming)
• COBOL (Mainframe)
• NS2 (Network Simulator)
• WEKA Tool (Design Aspect)
• JAVA (Scientific Object Oriented)
• ORACLE10g (Database)
• Rational Rose
• ANEKA Cloud computing
• Wireless Toolkit
• Android Framework for Mobile Apps Simulations
151
• All other Curriculum related application Software
Operating Systems
• Windows 7
• Windows XP
• LINUX Antivirus
• Symantec
Servers
• Application Servers: 03
• Database Servers: 03
• Network Servers : 03
• Workstations equipped with GPU cards (CUDA SERVER):02 (Intel core i7 -3820CPU 3.60GHz, 500 GB HDD, 32 GB RAM, 64 bit OS)
6.3.2Availability of computing facilities in the department (5)
(Instruction: Assessment based on the information provided in the preceding table.) Computing facilities in the department-----
• 200 High end Personal Computers
• Workstations equipped with GPU cards (CUDA SERVER)
• IBM DUAL XEON Processor Server with 320 GB HD, 4GB RAM WINDOWS 2003/Red Hat Linux OS
• IBM P520 SERVER with 2 x 1.5 GHz CPUs,4GB Memory, 4 x 146 GB HD,DVD ROM, AIX OS
• Red Hat Linux Server
• Windows 2003 Server
• IBM INTEL CORE i3 Processor Server with 500 GB HD, 16 GB RAM WINDOWS 2008.
6.3.3 Availability of research facilities to conduct project works/thesis work (5)
(Articulate the facilities provided to carry out the project works/thesis). ➢ In the lab 25 systems are dedicated to carry out the project work (to access journals)
and Students can utilize the lab at any time.
Number of Servers
• IBM DUAL XEON Processor Server with 320 GB HD, 4GB RAM WINDOWS 2003/Red Hat Linux OS
• IBM P520 SERVER with 2 x 1.5 GHz CPUs,4GB Memory, 4 x 146 GB HD,DVD ROM,AIX OS
• Red Hat Linux Server
• Windows 2003 Server
• IBM INTEL CORE i3 Processor Server with 500 GB HD, 16 GB RAM WINDOWS 2008.
152
Number of Clients
• IBM—100(P IV,3GHz Processor, 1GB RAM, 80GB HD CD Drive)
• Wipro—35(P IV, 2.6 GHz Processor ,512 MB RAM ,80GB HD)
• HP—10(P IV, 3GHz Processor, 512MB RAM, 80GB HD)
• DELL-60(I 3,3.40GHz Processor, 4GB RAM,500GB HD)
Power Back-Up Provision (with solar)
• 65KVA Generator
• 20 KVA UPS – 2; 10 KVA UPA –2; 2 KVA UPS – 1; 6 KVA UPS – 1
Number of Peripherals ----- 17
• HP Laser Jet 2420n network Printers - 3
• HP Laser Jet 1020n Printer - 4
• HP Laser Jet 1020n Printer - 10 6.3.4 Availability of laboratories with technical support within and beyond working hours(5)
(Instruction: Assessment based on the information provided in the preceding table.)
• We provide extra Lab our for students to practice the experiments before examinations
• If Lab Session are not sufficient the total number of experiments, extra are labs conducted beyond the working hours
• To carry out programming based assignments, the students can avail the laboratory facilities beyond the working ours
6.3.5 Equipment to run experiments and their maintenance, numberof students per
experimental setup, size of the laboratories, over all ambience, etc.(5)
(Instruction: Assessment based on the information provided in the preceding table.)
➢ Labs are equipped with sufficient number of systems, so that each student can work
on individual system
➢ One faculty is assigned as Lab In-charge for each laboratory
➢ Each Lab is maintained by one Technical and one non technical staff
➢ Every week Lab is maintained and upgraded by the technical staff in co-ordination
with Lab In-charge
➢ Before commencement of laboratory course in each semester, the system are
installed with all required software’s/tools
➢ List of experiments are displayed in each lab
➢ Dedicated Server cabin is maintained in Lab
➢ Minimum of Four Air conditioners are provided in each lab
Computing facilities in the Laboratories-------165 (54+50+60).
153
6.4 Technical Man power Support in the Department (15)
Name of the
technical staff
Designation
Pay-scale
Exclusive/
shared
work
Date of joining
Qualification Other technical
skills gain
d
Responsibility
At Joining
Now
A. VenkatRao
Computer operator
23,600 Shared 05/07/85 B.sc PGDCA
MBA Systems
MCSACCNA Systems Administrations
T. Vijay Kumar
Artisan 17,209 Shared 16/07/08 Diploma B.Tech APCDCA Systems Administrations
PS.Prakash System Administrator
Out Sourcing Staff
Shared 1/7/2004 Diploma ECE
BCA ---- Systems Administrations
K.Lovaraju Babu
Computer OPerator
Out Sourcing staff
Shared 07/07/2017
MCA MCA PGDCA Systems Administrations
6.4.1 Availability of adequate and qualified technical supporting staff or programme-specific laboratories (10)
(Instruction: Assessment based on the information provided in the preceding table.)
➢ One faculty is assigned as Lab In-charge for each laboratory
➢ Well qualified Technical staff is assigned to each laboratory
➢ Labs are maintained by one Technical and one non technical staff
➢ Every week Lab is maintained and upgraded by the technical staff in co-ordination
with Lab In-charge
➢ Before commencement of laboratory course in each semester, the system are
installed with all required software’s/tools by the technical staff in coordination with
Lab In-charge
6.4.2 Incentives, skill-upgrade, and professional advancement (5)
(Instruction: Assessment based on the information provided in the preceding table.)
Technical staff attended the following workshops for professional advancement
• LINUX ADMINSTRATOR,
• PC HARDWARE AND TROUBLE SHOOTING,
• CCNA, and
• MCSA
154
7 Teaching-Learning Process (75)
7.1 Evaluation process: coursework (25)
7.1.1 Evaluation Process–Class test/mid-term test schedules and procedures for systematic evaluation, internal assessments.
(Assessment is based upon the efficacy of the evaluation process being followed. Relevant data may be
inserted here.)
• The performance of the candidate in each semester shall be evaluated subject-wise, a
maximum of 100 marks for theory and 100 marks for Laboratory, on the basis of Internal
Evaluation and End Semester Examination.
• For the theory subjects, 60 marks shall be awarded based on the performance in the End
Semester Examination, 40 marks shall be awarded based on the Internal Evaluation. The
internal evaluation shall be made based on the average of the marks secured in the two Mid
Term-Examinations conducted, one in the middle of the Semester and the other
immediately after the completion of instruction.
• The external examination shall be conducted for duration of 180 minutes with 5 questions to
be answered out of 8 questions. For practical subjects. 60 marks shall be awarded based on
the performance in the End Semester Examinations, 40 marks shall be awarded based on the
day-to-day performance in Laboratory as Internal Marks.
• Laboratory external examination for M.Tech courses must be conducted with two
Examiners, one of them being Laboratory Class Teacher as internal examiner and external
examiner shall be appointed by the Head of the Department.
• The internal examination shall be conducted for duration of 120 minutes with 4 questions to
be answered out of 4 questions without any choice. For practical subjects, 40 internal marks
Mid 1 Marks (Theory) (Max 40)
Mid 2 Marks (Theory) (Max 40)
Average of two mid exams (Theory) (Max 40)
End Exam Marks (Theory) (Max 60)
Total (Theory) (Max 100)
Lab Internal Marks (Max 40)
Lab End Exam Marks (Max 60)
Total Lab Marks (Max100)
155
shall be awarded based on the day-to-day performance and internal exam conducted at the
end of semester.
• Pass Criteria: A candidate shall pass if he secures a minimum of 40% of external marks in
theory and 50% of external marks in the lab Examination, and should secure a minimum
aggregate of 50% of the total marks.
• Re-registration criteria: A candidate shall be given one chance to re-register for each subject
provided the internal marks secured by a candidate are less than 50% and he has failed in
the end examination. At a given time a candidate is permitted to re-register for a maximum
of two subjects in addition to the subjects of regular semester subjects.
• Project work evaluation: A candidate is allowed to submit the thesis based on the
recommendations of the project review committee (PRC) and on completion of all subjects
at the end of 4thsemester. Head of the Department shall submit a panel of 5 examiners,
eminent in that field in consultation with the concerned internal guide and the thesis shall
be adjudicated by external examiner appointed by the Principal. The external viva voce
examination is conducted by external examiner and grades are awarded.
Assessment=
7.1.2 Seminar and Presentation Evaluation (10)
• There will be two seminar presentations during 3rdand 4thSemesters. For seminar, a student
under the supervision of a faculty member, shall collect the literature on a topic and critically
review the literature and submit it to the Department in a report form and shall make an oral
presentation before the Departmental Committee.
• The Departmental Committee consists of Head of the Department, supervisor and two other
senior faculty members of the department. For Seminar there will be only internal evaluation
of 50 marks. A candidate has to secure a minimum of 50% to be declared successful.
7.1.3 Performance and Feedback [3]
Assessment is based upon effective implementation of the following activities:
O Post-semester feedback to students on their performance
O Extra care for poor performers
156
O Comparison of mid and end semester performance
Relevant data may be inserted here
• The performance of each candidate after every semester is evaluated and the feedback is
given to each student. If any student has backlogs in a semester.
• The remedial classes will be conducted for them in the evening hours without disturbing the
normal working hours. The feedback given to the students helps them to improve in their
weak areas in the coming semesters.
7.1.4 Mechanism for addressing evaluation related grievances [2]
• All the grievances related to evaluation are sorted by a committee appointed by the
Principal.
• The constitution of the committee is as follows
Vice-Principal - Chairman
HOD - Member
Subject expert - Member
Officer In-charge of Exams - Convener
7.2 Evaluation Process: Project Work/THESIS (25)
Details of Thesis Allocation, Evaluation and Presentation:
DEPARTMENT OF CSE
JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY, KAKINADA
M.Tech (IT) 2014-16 batch project details
S.No Regd. No. Student Name Supervisor
Name Title of
Dissertation External Examiner
Thesis Presentation
Date
1 14021D2201 A MuraliSankar Smt A Karuna
Implementation of linear
programming technique for
dietician problem using handoop map reduce in a bib
data framework.
Dr. V SrinivasaRao, Professor of CSE
VR Siddardha Engineering College,
Vijayawada
15/12/2016
2 14021D2202 Swathi K Dr. A Krishna
Mohan
Personalized and location aware
wed service recommendation
system implementation
Dr. M. Kamala Kumari, Associate Professor,
AKNU Rajhmundry.
15/12/2016
157
3 14021D2203 K Saraswathi Dr. O
SrinivasaRao
Color image encryption and
decryption using two stage radom
matrix affine cipher associated
with DWT.
Dr. S
PallamsettyHaritha, Professor of CSE and SE UCE, Andhra University
Visakapatnam
10/12/2016
4 14021D2204 D Jagadeswararao Dr. A Krishna
Mohan
Fine grained secure
distributed Deduplicatiokn systems with
improved reliability
Dr. Naga Jagadeesh Professor of CSE, KLCU University
Vijayawada.
15/12/2016
5 14021D2205 K Raju Sir S Chandra
Sekhar
A novel hash for data
communication based on image steganography
and postion based
encryption.
Dr. S PallamsettyHaritha,
Professor of CSE and SE UCE, Andhra University
Visakapatnam
10/12/2016
6 14021D2206 V Ramakrishna Dr. O
SrinivasaRao
Tunner controller and pulse analysis.
Dr. S PallamsettyHaritha,
Professor of CSE and SE UCE, Andhra University
Visakapatnam
10/12/2016
7 14021D2207 K Sushma Dr.LSumalatha
A framework to find opinion of
tweets with text & emotions using
K-means and Sentiwordent.
Dr. D Rajya Lakshmi Professor,Dept. of CSE
JNTU College of Engineering
Vijayanagram
11/12/2016
8 14021D2208 KuncheSireesha Smt A Karuna
Privacy preserving public
auditing for multi-level
encryption based cloud storage.
Dr. V SrinivasaRao, Professor of CSE
VR Siddardha Engineering College,
Vijayawada
15/12/2016
9 14021D2209 C V S N Ravi Teja Dr A Krishna
Mohan
Fine grained structured
learning from heterogeneous
behavior for social identity
linkage
Dr. M. Kamala Kumari, Associate Professor,
AKNU Rajhmundry.
15/12/2016
10 14021D2210 S Konda Reddy Dr. N
Ramakrishnaiah
perfomance of matrix and graph
computations using data
compression techniques in
MPI and HADOOP
Dr. A Prasad Professor of CSE
VikramaSimhapuri University
Nellore
18/12/2016
11 14021D2211 S Prathyusha Dr. D Haritha
Detection of brain tumur
using fast bounding box
and SVM classifier
Dr. D Rajya Lakshmi Professor,Dept. of CSE
JNTU College of Engineering
Vijayanagram
11/12/2016
12 14021D2212 D Lakshmi gayatri Smt SSS N Usha
Devi N
Automatic Bug triage data reduction
Dr. M. Kamala Kumari, Associate Professor,
AKNU 15/12/2016
158
techniques Rajhmundry.
13 14021D2213 J GeethaMaounika Dr. N
Ramakrishnaiah
Design for multi-trust-domain network of
internet of things by using blind folded packet transactions
Dr. A Prasad Professor of CSE
VikramaSimhapuri University
Nellore
17/12/2016
14 14021D2214 M Sravani Dr. A Krishna
Mohan
secure and lifetime
maximization routing protocol
design for wireless sensor
networks
Dr. R RajeswaraRao, Professor & Head of CSE
University College of Engineering
Vizianagaram
18/12/2016
15 14021D2215 K Ramanji Reddy Not registered
16 14021D2216 S Surya Sreekanth Smt A Karuna
Enchanced approach for
multi keyword ranked search
over encrypted cloud data.
Dr. V SrinivasaRao, Professor of CSE
VR Siddardha Engineering College,
Vijayawada
15/12/2016
17 14021D2217 GollapalliHima Dr. D Haritha
Efficient segmentation
method for brain tumor
Dr. Naga Jagadeesh Professor of CSE, KLCU University
Vijayawada
15/12/2016
18 14021D2218 C Bhavana Smt E Suneetha
An effective model for
counter attacks on social networks
Dr. Naga Jagadeesh Professor of CSE, KLCU University
Vijayawada.
15/12/2016
19 14021D2219 Ch Priyankaraju Not registered
20 14021D2220 S Kiran Kumar Dr. JVR Murthy
Graph based seasonal and
trend anomaly detection thesis
Dr. Rakesh Chandra Balabantaray
Associate Professor, Dept. Of CSE
IIT Bhubaneswar, GothpatnaBhubaneswa,
Oriss-751003
24/12/2016
21 14021D2221 A
SontoshaRupaVani Dr. O
SrinivasaRao
Image compression and encryption using
CRT and CHAOTIC logistic
MAP.
Dr. S PallamsettyHaritha,
Professor of CSE and SE UCE, Andhra University
Visakapatnam
10/12/2016
22 14021D2222 MarriSireesha Smt SSS N Usha
Devi N
Enhanced Routing
algorithm for best relay node
selection in WSN
Dr. M. Kamala Kumari, Associate Professor,
AKNU Rajhmundry.
15/12/2016
23 14021D2223 S Lalitha Dr. K
Sahadevaiah
Fast aggregation scheduling in
wireless sensor networks
Dr. R RajeswaraRao, Professor & Head of CSE
University College of Engineering
Vizianagaram
18/12/2016
24 14021D2224 P Anusha Dr. N
Ramakrishnaiah
Hybrid approach for integrating random seed
Dr. A Prasad Professor of CSE
VikramaSimhapuri 17/12/2016
159
distribution with transitory master key mechanisms
in WSN
University Nellore
25 14021D2225 R B V Chowdary Dr. Ch
Satyanarayana
Detection and rectification of
distorted fingerprints
Dr. S Pallamsetty Professor of CSE and SE UCE, Andhra University
Visakapatnam
29/12/2016
7.2.1 Allocation of Students to Eligible Faculty Members (supervisors) [10]
➢ The students are having flexibility to choose the supervisor.
➢ The faculty who are having P.G qualification are eligible as project supervisors
➢ The faculty member has to accept for supervision of the project for specific number of PG
students depending upon the total strength of students available in that academic year
Assessment=
7.2.2 Constitution of Evaluation Committee with at least One External Member [10]
➢ For the evaluation of a project, a project review Committee (PRC) was constituted with Head
of the Department and two other senior faculty members in the department.
➢ Registration of Project Work: A candidate is permitted to register for the project work after
satisfying the attendance requirement of all the subjects, both theory and practical.
➢ A candidate is permitted to submit Project Thesis only after successful completion of theory
and practical course with the approval of PRC not earlier than 40 weeks from the date of
registration of the project work.
➢ Head of the Department shall submit a panel of 5 examiners, eminent in that field in
consultation with the concerned internal guide and the thesis shall be adjudicated by
external examiner appointed by the Principal. The external viva voce examination is
conducted by external examiner and grades are awarded.
Name & address of the supervisor
Name & address of the External Examiner
Name of the Internal Examiner
Date of the Viva-Voce Examination
Report of the viva – voce examination
160
A – Excellent, B – Good, C – Satisfactory, D – Unsatisfactory**
** The candidate is recommended for re-submission with necessary modifications suggested by the examiners, if candidate is awarded D grade,
Assessment=
7.2.3 Schedule Showing Thesis Presentation at least twice during the semester [5]
➢ The work on the project shall be initiated at the beginning of the II year and the duration of
the project is two semesters.
➢ A candidate is permitted to submit Project Thesis only after successful completion of theory
and practical course with the approval of PRC not earlier than 40 weeks from the date of
registration of the project work.
➢ The students are permitted to present their thesis work two times during III and IV
semesters before the project review committee. At the end of the thesis work it is
evaluated by the internal and external examiners.
Assessment=
7.3 TEACHING EVALUATION AND FEEDBACK SYSTEM [10]
7.3.1 Guidelines for Student Feedback System[3]
Students Feedback on the teacher and the subject is based on the following criteria
on scale of 20 points for each criterion and 100 points for all the criteria.
1. Depth of knowledge in the subject and clarity of expression
2. Syllabus coverage and utilization of class time
3. Judgment of Student Merit
4. Accessibility to student for discussion of subject outside the class room
5. Helping the students for their personality development
Based on these criteria the performance of the faculty is measured for the effective
course delivery.
Assessment=
7.3.2 Analysis of Feedback by HOD and the Faculty [2]
161
• The automated feedback is taken through online before the commencement of the end
theory examination and these feedback forms are preserved in the software. This
feedback is taken by the examination section under the supervision of Vice-Principal
and the chairman of feedback committee of the College. The feedback is analyses and
evaluated by the software and the reports are generated automatically. A committee is
constituted for managing automated feedback system. The members of the feedback
committee are as follows:
Dr. B.Balakrishna, Professor & Vice-Principal, Chairman
DrP.Dakshina Murthy, Professor & HOD in Physics, Member
DrV.V.SubbaRao, Professor & Head of Mech. Engineering, Member
DrV.Ravindranath, Professor & Head of Maths and SS Dept., Convener
7.3.3 Corrective Measures and Implementation Followed [5]
The result of the feedback analysis is communicated to the respective departments
and to the concerned faculty, so as to enable them to know their weakness in the course
delivery and the subject knowledge. Based on the feedback analysis one of the faculty may
secure best teacher award. The award of best teacher is given to encourage the teaching
staff for ensuring effective course delivery. However the faculty with weak performance is
advised to improvise their subject knowledge and delivery skills. After the performance
appraisal, staff members are encouraged to attend faculty development courses,
workshops, refresher courses and training programmes.
Assessment=
7.4 Self learning beyond syllabus and outreach activities [15]
7.4.1 Scope for self-learning (5)
(Instruction: The institution needs to specify the scope for self learning /learning beyond syllabus and
creation of facilities for self learning / learning beyond syllabus.)
Mode of Learning Facilities/Means
Self-learning The students are assigned to practice the usage of software tools from the user manuals in order to
162
carry project works. The students are given assignments, tutorials which will prompt them to learn on their own. Active learning and collaborative learning processes are encouraged in the class room.
Learning beyond syllabus The students are given seminar and project
works such that they acquire knowledge in the
areas which are beyond the syllabus
7.4.2 Generation of self-learning facilities, and availability of materials for learning beyond syllabus (5)
• The Department is generating self learning facilities through various modes. The various
models are:
Web based learning:
• Internet offers new possibilities to structure, represent, adapt and integrate various learning
content and materials. Based on it, we are providing digital library facility to all the students
in which internet connection is available.
• All course material is available on intra-net. By watching the NPTEL videos on internet, the
student is able to learn beyond syllabus.
• In addition to digital library, a library in which hundreds of volumes of books are present is
available. The nook and corner of every topic is available through the library. All the video
lectures are present in CD form for referring at any moment.
Class room presentations:
• We allow students to prepare and present topics from curriculum. There are LCD projectors
for presentations in the class rooms. Not only the technical aspects but also non technical
topics are also presented.
Symposiums:
• The Department is organizing several symposiums and quiz contests. Students are motivated
to participate in inter-college events like paper presentations and project exhibitions etc.
Several workshops are being organized in order to develop the soft skills of the student. All
these facilities contribute for the student to learn beyond syllabus.
163
7.4.3 Career Guidance, Training, Placement, and Entrepreneurship Cell (5) VISION
Equipping the students with relevant and conceptualized professional skills and guiding them
towards a bright future and career all around the world with the values of – Sincerity, Hard Work
and Justice.
MISSION To achieve 100% placement for students through dedication, attitude and complete
involvement in training the students to meet the expectations of the industry is our mission.
GOALS & OBJECTIVES GOALS
➢ To enhance the employability skills among the students to meet out the corporate
expectations.
➢ To improve the industry – institute relationships
➢ To place all the students in the prospective IT and Core Companies.
➢ To enhance the student’s interest towards the entrepreneurship and business
strategies.
OBJECTIVES ➢ To provide world class training for the students through continuous training module
➢ To approach top multi-national companies for arranging the campus recruitment
➢ To counsel the students to improve their career exposure across the global.
➢ To produce the most competitive engineers to fit in all scenario of the job mar
The Training and Placement Office of this college provides career guidance and all the
assistance for the students in order to achieve their career goals. The unit takes right steps in
identifying the demands of the current industry and prepares students towards this need. Adequate
emphasis is given for soft skill development complementing the regular academic programmes.
Training and Placement Cell arranges and coordinates various programmes that aim at
moulding the students so as to meet the industry expectations in career building and in turn bring
laurels to the parent institution. The Training and Placement Cell, guided by a set of rules and
principles, strives to maintain good relationship with industries. Preparing the recruitment schedule
for the year, inviting corporations for pre-placement talks on the campus followed by final
placements, and overseeing the process to its end, is the responsibility of the Training and
164
Placement Cell. The Cell endeavours to carry out successfully all the processes methodically
throughout the year.
Aptitude tests and group discussions are conducted at regular intervals to enable the
students to improve their performance in competitive exams. The Placement Officer who is assisted
by Coordinator student representatives from all the departments heads this unit. Job oriented
courses and special training programmes are regularly conducted. The UCEK (A) also welcomes
guest lectures, visiting faculty members for training students and faculty members too.
At JNTUCEK, we foster a climate where collaboration with industry thrives, generating both
breakthrough discoveries and the science and technology that can support continuous innovation
and growth. With a perfect track record of very productive relationships with corporations of all
sizes, from start-ups to mature, successful enterprises, our institutions provide the students with
education, research and connections to world class faculty and corporate.
The Training and Placement Office of the Institute centrally handles campus placement of
the graduating students and Post graduates of our campus. The Office provides complete support to
the visiting companies at every stage of placement process. The Office is well equipped with
infrastructure in Terms of Testing halls, Conference Hall for Presentations, Pre-Placement Talks,
Written Tests, Interviews and Group Discussions are made as per the requirement of the visiting
companies.
Training:
To meet the rapid changes in technology placement office conducts Value Added Courses
which the students learn beyond their syllabus for the students. The other unique feature of the
training programme is the need analysis done among the students and based on their need they are
exposed to various training programmes. The effectiveness of the training programme is analysed by
the feedback collected from each and every student.
The Training is provided to the final year students with the support of TEQIP II and the
details are as follows:
1. Communication training, Soft Skill training and Engineering training.
2. Technical Training -C and C++, Oracle, Embedded systems, Java .
3. IV year students – The Office arranges Campus Recruitment Training for students in
industries for 3-4 weeks at the beginning of 7th Semester.
165
4. The Office arranges Company Specific Training Programme before four/three day’s
commencement of the recruitment.
Placement Activities:
The institute is having full-fledged Placement Office, which monitors the employment
opportunities and arrange campus interviews for the final year students.
➢ Our Campus recruitment program starts by the beginning of the Pre-Final semester.
➢ The On Campus recruitment program keeps continuing till the end of their final semester.
➢ Offer support for our students by arranging Off-Campus Interviews also.
Recruitment Process:
The placement office liaises with the industry and corporate offices which conducts their
recruitment activity with the colleges. A good number of reputed companies have conducted
campus recruitment in our college and many more have expressed their desire to come for
assessment as per their norms.
The T&P Office focuses on:
➢ Functioning as a guide for students with creative ideas which can be transformed into
successful companies.
➢ Providing Mentorship through individuals for students launching their start-ups.
Industry Institute Interaction:
The Training & Placement Office firmly believes in 'Industry Institute Interaction'. In order to
accomplish 'Industry-Institute Interaction' it organizes technical talks and national seminars to
provide a platform for the budding engineers to interact with professionals from various industries.
It encourages visits to the industries by the college students. It arranges for industrial problems to
be worked on by students as part of their projects. It also takes suggestions from members of
industry regarding designing/changing of curriculum. The college is in the process of signing MOUs
with many industrial organizations and industrial chambers.
India’s best corporate are where our Alumni are presently working. Other than this, we are
hopeful of further improving our placement opportunities, activities and avenues in the near future
while working in association with our powerful Alumni.
166
The following workshops towards career guidance have been organized by the T&P Office for
the benefit of the final year and pre-final year’s students.
Sl. No.
Date Name of Career Guidance Activity Resource Person/Organization
1 31/01/2014 Career guidance and placements: orientation program for pre final year students
Placement Office
2 01/06/14 Software project management TCS , Hyderabad
3 07/12/14 Employability skills and technology expectations
Mr. M.S. Subrahmanyam, TCS, Hyderabad
4 07/09/14 employability opportunities for engineering students in armed forces
Placement Office
5 08/05/14 Innovation ,change Management & Leadership
Placement Office
6 17/08/2014 Effective communication and impact on career
Dr V.N.Rao& Dr KSS.Rao, City Counselling, Bangalore
7 27/08/2014 Employability and technology trends Mr. P. Vivek TCS, Hyderabad
8 12/08/14 Higher education and career opportunities in USA and Europe
Prof.Nikhil Gupta, Newyork Universities, USA /Sri A.K.Mitra, Ex Vicepresident, Force motors
9 04/03/16 MD connect with Accenture ArunkumarRanganaini – MD Accenture
10 19/03/16 Accenture Alumni Connect Anija Robert Campus Recruitment Team
11 26/07/16
and 27/07/16
Faculty Development Program to EEE, ECE and CSE Faculty on Technologies
Tata Consultancy Services
12 08/08/2016 and
09/08/2016 Power of Habits and Harnessing Mind Power
Placement Office
13 11/03/2017 and
12/03/2017 Workshop on Sales Force Platform
Placement Office
14 01/04/2017 Workshop to TCS UG Selected Candidates TCS and Placement Office
15 08/08/2017
To 10/08/2017 FDP on TC’s Remote Internships
TCS, Incubation Centre JNTUK and Placement Office
16 18/08/2017 workshop on Entrepreneurship Development
APSSDC, Northeastern University at Boston, EDC&SDC of JNTUK
167
8. Governance, Institutional support and financial resources (75) 8.1. Campus Infrastructure and Facility (5)
8.1.1. Maintenance of academic infrastructure and facilities (2)
(Instruction: Specify distinct feature)
Table 8.1: Academic Infrastructure & Facilities Maintenance details Ambience, Green cover
Infrastructure facility Maintenance Description
Land Built up Area Exclusive
for the Institution
Land : 110 acres
Build-up floor space: Sqm.
Cleanliness is maintained by the outsourced people
Maintained at the institute level
Classrooms Well-furnished class rooms are cleaned by out sourced sweepers
every day
Seminar Halls Seminar hall (equipped with PA systems and LCD) of the department
is maintained by departmental – in charge faculty & Technician at
regular intervals
Tutorial Rooms Tutorial rooms are cleaned every day and maintained by faculty in
charge.
Laboratories A faculty in charge and a laboratory technician looks after the
maintenance of each laboratory. They put together propose the
budget for the required consumables, new equipment, repairs and
calibration if required
Equipment In addition to the centralized department level stock registers (for
Non-consumables and Consumables) technicians maintain the
logbook for equipment of the laboratory. They prepare the preventive
maintenance schedules under the guidance of faculty-in-charge and
carry out regular maintenance as per the schedules.
Computers A programmer/ Technician and a faculty in-charge of each computer
laboratory are responsible for maintenance of systems and software.
Programmer carryout maintenance of each computer at regular
intervals and record in the logbook. Faculty in charge prepares
necessary budget and submit to HOD.
Main Library All the books are accessioned accordingly by the serial number of
accession number and classified subject wise and shelved in the
rack according to call numbers regularly.
Dept. Libraries Faculty members of departments can borrow books from Dept.
Library, and students in their free time can make use of the books
available in the Dept. Library. One Faculty member is made in-
charge of the Dept. Library.
Internet /Intranet Internet related matters are maintained by a team offaculty, systems
administrator and programmers in computer science department.
They maintain the daily band width, usage, band width allocation,
sharing etc.
Electricity Maintenance Engineer, Two technicians and one attendees look after
the maintenance of electricity.
Water A number of bore-wells available to meetrequirements of garden and
toilets. It caters needs of Staff & Students, Buildings etc.
The college is spreadover110.0acres of land surrounded by greenery of the fertile lands. The college evinces interest in
ambience management, Landscaping, environmental preservation including water harvesting without losing the
professional touch.
Maintenance: One supervisor and 12 gardeners maintain the Green cover. Built-up space:
• College Buildings are constructed in the form of different blocks covering an instructional area
168
of21841.36sq.m and administrative area of 1888.20sq.m. • All the Engineering Departments are located in separate & wide blocks. • The campus is surrounded by a compound wall separating the college from the surrounding
environment. All the buildings are well connected by wide internal roads so that the central facilities are accessible to all the members of faculty and students.
Maintenance: DE, AE and supervisors, site engineers and work inspectors take care the Engineering section and
perform repairs and maintenance job.
Following are some of the highlights of the ambience management and landscaping
• Multi-color plantation highlighting the verdure with nominal inscription • Adorning the statue of the benefactor of the college with a bio-necklace. • The towering emeralds on the main road Clasping green at the faculty parking lot Green
carpet on the quadrangle. • Sponsored sports complex having alumni sponsored multi-functional gymnasium, play
courts, sports facilities, running track spanning over 15+ acres • Rows of ‘natural oxygen’ pots all over the college • In order to create eco-friendly atmosphere, lawns are developed and maintained
around different blocks • Underground pipelines interconnect the sprinklers for watering plants, Lawns etc.
Ambience of the work places
• EachandeveryDepartmenthassufficientnumberofclassroomsandlaboratoriesthat are fully ventilated and provided with necessary concealed electrical wiring and electrical items like fans, lights, computer systems with internet connectivity etc.
• Faculty members are provided with separate staff rooms with all the necessary facilities (Like internet facility, intercom)
• Proper maintenance of Classroom infrastructure
Environmental Preservation
Following items present the efforts related to environmental preservation
• With a missionary zeal related to social forestry, around 200 well-grown trees are spread over the entire area of the campus.
• For continuing next-gen greenery, the college is nursing about 1000 plants • Thus, the college administration is keen on the environmental protection
and preservation, and to take up measures to reduce soil erosion and land degradation.
Cleanliness
• Cleanliness is maintained on the campus by disposing all the waste material on a daily basis with the help of sufficient man-power. Waste water is drained out by the well- maintained side canals.
• All the Bio degradable waste such as dry leaves twigs and paper are collected on a daily basis, and made into good compost which again is added to the soil to maintain soil fertility.
• Each block is provided with toilets in each of the floors for boys, girls and faculty separately. All the toilets are cleaned everyday
• Besides the regular cleaning process, the environmental protection in the college is maintained by some activities like plant atoning which the students (Student activity center (SAC)) and also participate as a part of NSS Programs.
169
Canteen Yes
Number of Canteen(s) 02
Area 125 sq. m
Daily Usage More than 200+
Maintenance: One Sergeant with the help of 100 maintenance workers (attendees, weepers, scavengers etc.)
performs the maintenance job.
Water Harvesting
• In order to facilitate the water harvesting, the college has taken a few measures like absorption pit method and percolation pit method.
• There is enough open space and mud paths to harvest the rain waters • There is enough extent of plantation to reduce evaporative loss and soil
erosion.
8.1.2 Hostel (boys and girls), transportation facility, and canteen(1)
• College is having four boys’ hostels and three girl hostels’ (viz., Nalanda, Narendra, Nagarjuna, Nagavali hostels etc.,) having 172 rooms for boys and 144 rooms for girls.
• A total of 1350 students are staying in hostels (700 boys and 648 girls students) Table 8.2: Hostel Details
Hostels No of Rooms No of students Accommodated
Hostel for Boys 220 700
Hostel for Girls 208 648
Transport
JNTUCEK (A) is located in the heart of the city and easily accessible. Maximum percentage of students will stay in
hostels and day scholars others will utilize the public transportation system.
Canteen facility is available for students, faculty and staff on subsidized rates in the campus.
Table8.3: Canteen Details
8.1.3 Electricity, power backup ,telecom facility, drinking water, and security(2)
(Instruction: Specify the details of installed capacity, quality, availability, etc.)
A. Electricity and Power back-up:
One of the regular teaching faculties of the EEE department will act as the Project Engineer and supported by
one AE and supervisors/electricians staff. The college has wide spread arrangements for power connections with
a substation (maintained by APEPDCL), control panel and decentralized power panels. Panels and Distributions
boxes are available at Individual Departments. Generator backup is available, as shown in the table. The campus
is partly (>70%) having underground cabling system.
S.No Department Generator capacity
1 Principal Office 63 kva
2 Guest House 63 kva
3 Civil/HSS Dept. 63 kva
4 CSE/ECE 63 kva
5 EEE/Library/ME 140 kva
6 Ladies Hostel 40kva
7 Alumni Auditorium/placement office 63 kva
170
8 Sports Complex 140kva
9 Hostels
Tenders are floated for procuring 120kva
generator for hostels
10 PC/PCE
Tenders are floated for procuring 120kva
generator
B. Telecom facility:
• The college has created facilities for smooth and fast communication involving different kinds of phone connections in tune with the requirements
• Landline telephones are available in the Chambers of the Principal, Vice-Principal, and Steno to the principal, office of the Principal, Training and Placement Cell and in Autonomous (confidential) section.
• Intercom facility is extended to the functionaries in the Office of the principal, chambers of Heads of Departments, Department Offices, select laboratories, Main entrance and other importance units of the college.
The college has the following kinds of telephone connections
Landline connections with STD facility (BSNL) 59
FAX 1
Mobile Phones 25
Intercom Phone connections 51
C. Drinking water
The college has two (2000lph and 3000lph) capacity water purifying units with Reverse Osmosis
process. It supplies purified water to college, hostels and other places (as shown in the table).
S.No Supply Bodies No of (20lit) cans
1 Hostels 90
2 Staff Quarters 60
3 College 20
4 Departments 40
5 General 40
Equipment available with the plant
S.No Name of the Equipment Cost of the item
1. Reverse Osmosis Water Plant (2000lph) 8.00 Lakhs
2 Reverse Osmosis Water Plant (3000lph) (for hostels) 9.00 Lakhs
Table 8.5: Water Plant Equipment details
D. Security Measures of the college:
Infrastructural:
• All the buildings are constructed taking proper care with the required iron gates and windows.
• All the buildings have two or more entrances/ exits which are managed based on the need.
• All the classrooms, laboratories, offices, libraries and all the places of work are properly locked without prejudice to the balance of secrecy and transparency.
Human Resource oriented:
• The college has a three-tier security system supported by specialized security personnel (served through an authorized man power agency) with 27 security
171
persons. • In-house mechanism- there are3 watchmen for principal office and 10Watchmen
(one for each department during night shifts) who work on three shifts • The college hired the services of a reputable security agency in Kakinada through
which 27 Security personnel work in the college. • The annual financial commitment on the college is about Rs.21 lakhs (app) for both
the items put together.
8.2. Organization, Governance, and Transparency (10) 8.2.1. Governing body, administrative setup, and functions of various bodies (2)
(Instruction: List the governing, senate, and all other academic and administrative bodies; their memberships,
functions, and responsibilities; frequency of the meetings; and attendance therein, in a tabular form. A
few sample minutes of the meetings and action taken reports should be annexed.)
Organization and Governance
To enhance the good governance the college has a well-marked administrative setup conforming to the norms of
the AICTE and the UGC.
Figure 8.1: Internal Organization Structure
The following statutory committees are functioning in the college to look after the
administrative and academic procedures as per the norms stipulated by the University Grants
Commission.
.
Statutory
Committees
Number of
Members
Functions & Responsibilities Frequency of
Meetings Attendance
2016
Meetings
Governing
Council
10 Academic,
Administrative &approvals
related to faculty, staff
&students.
Four times in a
year
80%
Academic 22 Scrutinizing and Approval Once in a 95%
172
Council
Proposals with or without
modifications of BOS with
regard to Academic Regulations,
Curriculum, Syllabus etc.,
year
Board of
Studies
HOD, All Faculty
of the department
& Five outside
experts from CFIs
(IITs/NITs)
Industry.
Preparation of Academic
Regulations, Curricula, Syllabi
etc.,
Once in a
year 95%
Governing Council: The Governing Council (BoG) of UCEK is constituted by the JNTUK,
Kakinada, as per the UGC’s norms. University is the deciding authority and Principal is the
Member Secretary with twelve members, including UGC nominee, University nominee, State
govt. nominee, eminent people from different industries and members invited by the
Principal from senior faculties of the College. The Council usually meets four times a year to
discuss various policy matters. The main objective is to ensure that the students and the staff
have trust and confidence in the good governance of the College. It is also to see that all
those involved in the governance fulfill their responsibilities and accountabilities effectively.
Sri. M. T. Krishna Babu I.A.S., Chairman of Visakhapatnam Port Trust (formerly Prof. M. R.
Madhav (Retd., IIT Kanpur) is presently the Chairman of the Governing Council. All the
minutes of the governing council meetings are uploaded in UCEK website
(http://jntucek.ac.in/teqip.php).
College Academic Committee: The College Academic Committee (CAC) is the apex body of
academics and essentially responsible for the framing, regulating, organizing and sustaining
the standards of teaching, research, and examination of the College. CAC consists of
University nominees, eminent people from industries, Heads of the Departments, Senior
Professors of respective departments, nominated teachers and so on. Principal is the
Chairman of the CAC. The Committee reviews all academic matters and the related
administrative issues, too.
The Principal/Head of the Institution: JNTUCEK is headed by the Principal and mainly
concentrates on academic (with the help of vice-principal) and administrative activities. He is
the strategic figure, accountable to the Governing Council. He is held answerable to the
University in matters of administration. He is the reviewing authority of the functioning of
the various academic departments, teaching and non-teaching. Above all, the Principal is the
custodian of the College’s discipline among the students, monitor of the research, convener
173
of various programmes held in the College and so on. Besides, the Principal implements
TEQIP Programme, by directing its components viz., Finance, the Academic, the Procurement
and Mentoring Committees. In particular his duties and responsibilities lie in:
a. Planning policy matters concerning administration as well as academics
b. Managing the College as per the norms of the University in particular and the UGC in
general
c. Overseeing the fair conducting of examinations, semester wise, and timely declaration of
the results on completion of evaluation with promotion of successful students
d. Ensuring the management of financial resources and maintenance of proper accounting
as per the University norms.
e. Co-coordinating the industry-institute interaction along with Research and Development
activities
f. Maintain the quality management system
g. Participating in the regional and national level policy planning meetings.
h. Every Funded project has a coordinator who is totally responsible along with his or her
team for the project. Principal wields the financial power.
i. On the whole, the members of faculty and non-teaching staff of the college believe in the
dignity of labor, and all the functions of the college are meticulously planned, properly
coordinated and perfectly executed.
j. All the monetary transactions (both the receipts and payments) are processed
through a Nationalized bank.
Vice-Principal: The Vice-Principal plays multiple and responsible roles. His chief responsibility is to officiate as the Principal in the latter’s absence. Among several responsibilities, the following are the most significant: Academic Responsibilities:
• Assist the Principal in finalization of prospectus, syllabi, academic calendar, registration,
examination and classroom arrangement for proper teaching.
• Responsible for conducting the mid semester, end semester or any other component of
examinations and assisted by two Officers In-charge of Exams (OIEs) for this purpose.
• Responsible for maintenance of up-to-date academic records of students.
• Assist the Principal in the organization of academic committee meetings and all matters
related with it.
• Assist and provide any necessary liaison with other academic organizations.
• Assist the Principal for issue of certificates and other student related activities.
• Help the Principal in the formulation of new courses, in finalizing the Registration of
Students, in conducting the Academic Council Meeting etc.
• Preside over the curricular and co-curricular activities cell or wings.
Administrative Responsibilities:
174
• Assist the Principal in preparing the institutional planning, in deciding the academic
calendars, in fixing the work schedules, in deciding upon the examination and evaluation
of each course and so on.
• Associates with the Principal in recruiting and training of the various faculties.
• Collaborates with the Principal in supervising the financial matters such as scholarships
for the students of reserved categories, grants-in-aid for developmental activities from
government and non-government agencies, maintaining proper accounts and records
and so on.
• Assist the Principal in attending to the grievances of both the staff and the students.
• Plays the role of the liaison officer between the parents and the institution, between the
Principal and the staff and between the teaching staff and students.
Heads of the Department: The Head of Department is usually the senior Professor the department. Provides
leadership in both under graduate (B. Tech) and post graduate (M. Tech) courses in the relevant field of
specialization.
• Heads of the Department are responsible for the academic and administrative
management of the department.
• They take active part in research guidance and teaching-learning processes; they guide
the assistant and associate professors and approve their teaching plans.
• Participates in not only the curriculum designing, but also developing new programmes
and projects
• They play vital roles in policy planning, monitoring the evaluation and promotional
activities at both the individual departmental and institutional levels.
• Besides catering to the needs of students by means of counseling and interaction at the
department, they also hold interactions with industry and society.
• They provide consultancy services not only to the students but also to the industrial
clientele.
• The faculty and students are involved in several activities in addition to academic
assignments. The sense of involvement makes them develop a sense of belonging for the
institution.
In addition to the committees or bodies presented above, the college has the following
Non-statutory committee
1. Examinations committee
2. Grievance appeal committee
3. Student affairs and welfare committee
4. Academic audit committee
5. College Development Planning and Evaluation committee
6. Co-curricular & Extra-curricular activities committee
7. Games and sports committee
8. Counseling Coordination Committee(Anti Raging Committee)
175
9. Academic Results Monitoring committee (College Academic Committee)
10. Purchase committees
The said committees have been functioning in the college in order to facilitate the successful functioning of autonomy. Each of the committees has been conducting its meetings the minutes of which have been ratified in the governing body meetings from time to time.
The Disciplinary committees have been constituted on a dynamic basis both for academic
and for general discipline. Principal constitutes the committees whenever the situation demands.
In addition to the above, Anti Ragging Committees are formed with staff of the college with specific
schedules and locations (department premises, hostel premises, canteen and library premises and overall college
premises) in the college especially during the initial months of academic session for the I year students of B.Tech and
other programmes.
Implementation of TEQIP:
UCEK (A) has participated in TEQIP-I, TEQIP-II, and currently participating in TEQIP-III.
JNTUCEK got TEQIP-III under subcomponent 1.3 (Twinning arrangements for participating institutions and
ATUs) as a Mentor institute and mentee institute is College of Engineering and Technology, Bhubaneswar.
8.2.2. Defined rules, procedures, recruitment, and promotional policies, etc. (2) (Instruction: List the published rules,
policies, and procedures; year of publications; and state the extent of awareness among the employees/students. Also
comment on its availability on Internet, etc.) As the college is the government college follows norms recommended by the UGC/AICTE and state govt.
norms (e.g., G.O.Ms.No.14), and also faculty recruitments and CAS promotions are taken care by the
University with the necessary permissions from the Governor/MDC/EC under the supervision of governor’s
and UGC nominee.
• Recruitment of faculty and staff for regular appointment is done by the JNTUK staff selection committee headed by the Vice chancellor
• All the newly recruited staff is made awareof these rules through orientation programmes. These are also made available on the college website.
8.2.3. Decentralization in working including delegation of financial power and grievance redress system (3)
(Instruction: List the names of the faculty members who areAdministrators/decision m a k e r s for various
responsibilities. Specify the mechanism and composition of grievance redresses system, including faculty
association, staff-union, if any.)
• As the college is the constituent college of JNTUK, follows the University norms.
• The principal is given the power to spend Rs.1,00,000/- (for procuring non-consumables) and Rs. 25,000/- for procuring consumables/maintenance
• Heads of departments are permitted to spend Rs. 5,000/-. The account is periodically reviewed by the principal.
• Based on the grievance, Grievance redresser committees are constituted to address the grievances.
• Principal constitutes separate committees based on the requirements. Based on the recommendations of the individual committees Principal takes action.
Administrators/ Decision makers:
- Head of the Institution : Principal
- Heads of Academic sections : Vice Principal
176
The following members of faculty have been assigned with administrative responsibilities.
Table 8.6: List of faulty with administrative responsibilities
S.No Name of the member of
faculty Designation
Additional / Administrative
responsibilities
Civil Engineering Dept
1 Dr.GVR.
Prasada Raju Professor of CE Principal, JNTUCEK
2 Dr. K. Ramu Professor of CE Head, Civil Engineering
3 Dr. V. Ravindra Professor of CE Chief Engineer, JNTUK
EEE Dept
4 Dr. V.V.N. Murthy Professor Head, EEE Dept.
5 Sri. M. Ravindra Babu Asst., Professor Project Engineer & NSS Program
Officer, UCEK
ME Dept.,
8 Dr. B. Balakishna Professor of ME Vice Principal (Academics)
9 Sri. M. Kumara swamy Assoc., Professor Head, Mechanical Engineering
10 Dr. K. Meera Saheb Professor ME Head, PE & PCE Dept.,
12 Sri. K. Krishna Bhaskar Asst., Professor Officer in-charge of Examinations
13 Dr D Linga Raju Asst., Professor Associate NCC Officer
14 Sri. V. Jaya Prasad Asst., Professor Deputy Warden
15 Sri. K. Prasad Asst., Professor Deputy Warden
ECE Dept.,
16 Dr. A. M. Prasad Professor of ECE Vice Principal (Administration)
17 Dr K. Padma Priya Professor of ECE Head, ECE
18 Dr. B. Leela Kumari Asst., Professor Officer In-charge of Examinations
19 Smt. A. Rajani Asst., Professor Officer In-charge of Examinations
20 Dr. R. Madhu Asst., Professor Officer, In-charge of Hostels
21 Sri. K. Rajasekhar Asst., Professor Deputy Warden
22 Smt. K. Ramadevi Asst., Professor Deputy Warden
177
23 Smt. P. Pushpa Latha Asst., Professor Deputy Warden
Dept., of CSE
24 Dr A. Krishna Mohan Professor of CSE Head, CSE Dept.,
Coordinator, RGYK Project and Cultural
25 Dr L. Sumalatha Professor of CSE Coordinator, APSSDC
26 Dr. M.H.M. Krishna Prasad Professor of CSE Coordinator, TEQIP-III
27 Sri. S. Chandra Sekhar Asst., Professor Training & Placement officer
28 Smt. E. Suneetha Asst., Professor Deputy Warden
29 Smt A. Karuna Asst., Professor Coordinator, JNTUCEK Website
Mathematics Dept.,
30 Dr. V. Ravindranath Professor Head, Dept. of Mathematics
31 Dr G.V.S.R. Deekshitulu Professor Coordinator, Helpline Center
Physics Dept.,
31 Dr. G. Padmaja Rani Professor
Head, Dept., of Physics
Chemistry Dept.,
33 Dr. S. Satya Veni Assistant Professor
HOD, Dept., of Chemistry
Grievance Redressal Committee
The Grievance redressal committee is intended to undertake the processes of attending to
the grievances put forward by the students and staff. It focuses on setting proper facilitation
procedures for settling the issues in a cordial atmosphere. The committee is expected to initiate
proper or appropriate enquiry or investigative mechanism within 24hours from the receipt of the
complaint in written form duly signed by complainant(s). The committee is expected to
meticulously adhere to the standard arbitration procedures of the college and those of AP
education act 1982, A prohibition of ragging act 1997, AP service rules corrected up to 01-04-
2008, Industrial disputes act 1947(Section-9C Chapter IIB), the administrative tribunal act1985,
negotiable instruments act 1881, Societies registration act 1860 and all other such enactments of
the Government of Andhra Pradesh and Government of India from time to time.
Scope of the operations:
The committee shall take into consideration all the redresses criteria and rules and
regulations of the college, University and government of Andhra Pradesh both in admitting the
complaint and in conducting the enquiry. The committee is expected to commence its
operations by constituting a special committee in case of need.
The observations, findings, suggestions and recommendations are merely
recommendatory in nature and do not carry any legal binding for the college to follow or
implement. The committee is expected to submit the minutes of its meetings along with
observations, suggestions, if any, and resolutions to the respective statutory committees for
178
further processing the same at the deliberations. The chairman and the members of the
committee shall undertake all the operations in coordination with the Heads of the
departments and administrative office.
Composition of the committee:
• A senior member of the faculty is appointed as Chairman/Chairperson by the Principal
• Members are the faculty are nominated by the Principal
• The chairman is expected to undertake all prime duties of the committee, namely convening the meetings, recording minutes, recording special observations and suggestions, if any, processing the data and obtaining ratification of the minutes, resolutions, observations, taking necessary steps for tabling the said documents for ratification by the statutory bodies etc.
Basic functions of the committee:
The following items fall under the purview of the committee. The committee is expected to
extend its co-operation to the members of faculty and staff appointed or drafted for specific
tasks from time to time like other members of faculty including heads of departments or non-
teaching staff appointed or drafted by the Principal for taking up a special enquiry related to
any complaint, controller of examinations and other personnel drafted by the principal in case
of an examination oriented grievance etc. The activities are classified in two categories
planning, monitoring & execution.
Planning Activity:
• Preparing the grievance redresses procedures from time to time and notifying the tenets to the staff and students.
• Studying and compiling the relevant enactments of the Government of AP and Government of India.
Monitoring and Execution
• Receiving appeals from the students and staff.
• Identifying the gravity of the appeal.
• Ascertaining the legal implications of the appeal.
• Ascertaining whether it falls under the purview of a non-statutory committee or not.
• Classification of appeals into academic, administrative and discipline-oriented.
• Constitution of a separate committee in case of need.
• Ascertaining the provisions of the committee.
• The committee may meet within 24 hours from the time of commencement of its operation and decide over the course of enquiry.
• Ascertaining the individuals to be involved in the enquiry.
• Categorizing the individuals enquired - Prime accused, second accused, connivers, Witnesses etc. based on the item if it is related to an act of indiscipline.
• Recording the depositions with time and date.
• Submission of the report after deliberations among the members of the committee
• Based on the report, the action taken can be finalized. The disciplinary action is finalized since the item falls under the jurisdiction of the Principal except in such circumstances which warrant the intervention of the statutory bodies namely Governing Body, Finance committee, Academic council, boards of studies and ultimately the University administration.
• In case of an academic appeal, constituting a house-committee and subsequently the
179
committee with experts from other institutions, and finally referring the reports of the committee to the academic council
• If it is an administrative appeal, an in-house committee has to be constituted the report of which shall be sent to the university administration for further action.
Meeting Schedule and Process of convening a meeting:
The chairman is expected to issue a circular with the schedule and agenda one week in advance. However the
chairman reserves the right to conduct any emergency session under certain circumstances that can be deemed to be an
emergency situation. If it is not possible for the chairman to convene a meeting because of any academic or
administrative reasons, one of the senior members of the committee can take up the responsibility of convening the
meeting with the prior approval of the Principal. Tentative schedule of the meetings during an academic year has to be
drawn by the chairman.
Quorum and other standard tenets:
• An Attendance of 2/3rd of the committee is considered as the quorum for any of the meetings.
• The committee may prepare a draft plan for items presented supra for further processing by the relevant bodies.
• If any member comes up with an innovative proposal, he/she may be advised to prepare a full-stretch document of the project put forward with projected financial commitment with relevant documents failing which such open suggestions can deferred to the next meeting by requesting the members to be more focused in their approach.
• The deliberations are strictly confidential and shall be confined to in-house circulation, and if any member is found leaking the information to external agencies, the matter shall be reported for correctional administration.
8.2.4. Transparency and availability of correct/ unambiguous information (3) (Instruction: Availability and
dissemination of information through the Internet. Information provisioning in accordance with Right to
Information Act, 2005).
Transparency:
In order to ensure transparency, the college takes the following measures.
Academic and Administrative Transparency:
• All internal Professors of the department concern together with external members from reputed academic institutes and industries are the members of the Board of studies headed by HOD.
• All the issues are discussed in the meetings of the Heads of Departments, which are held periodically the minutes of which are circulated to all the departments.
• The decisions taken and the issues discussed in meetings of the Heads of Departments are informed to the faculty in the department level meetings
• Every important information is published in the college website (www.jntucek.ac.in)
• All the decisions taken by the Statutory bodies pertaining to particular items are informed to all the staff/faculty
• All the important pieces of information are sent to the faculty, staff and students
• There are Notice Boards in all the Blocks through which information is made available to the staff and students and circulars related to students are sent to the class rooms/laboratories.
• Academic calendars, examinations schedules, results and all the important items are placed on the College website
• The Mandatory Disclosure is presented on the website including the academic regulations and syllabus.
• All the information about the college is made crystal clear through the college web-
180
site.
• Every parent can get information about his/her ward’s attendance and performance through internet.
• The college has arranged web mail facility to the entire faculty with individual Ids for faster and more accurate information.
8.3. Budget Allocation, Utilization, and Public Accounting (10)
Summary of current financial year’s budget and the actual expenditures incurred (exclusively for the institution) for
three previous financial years.
Table 8.7: Budget Report
F.Y
Bu
dg
eted
in
CF
Y
20
16-1
7
Act
ua
l E
xp
ense
s
in C
FY
20
16-1
7
Bu
dg
eted
in
CF
Ym
1
20
15-1
6
Act
ua
l E
xp
ense
s
in
CF
Ym
1
20
15
-
16
Bu
dg
eted
in
CF
Ym
2
20
14-1
5
Act
ua
l E
xp
ense
s
in
CF
Ym
2
20
14
-
15
Items
Infrastructural
Built up 4300000 4369721 18000000 18066600 40000000 42939589
Library 210000 208627 3000000 2989324 2100000 2101737
Laboratory
Equipment 6000000 5909333 13250000 13261763 12500000 12927701
Laboratory
Equipment (with
TEQIP-II)
2800000 27724754 7500000 7522673 6000000 6089659
Laboratory
Consumables 100000 97852 90000 85384 150000 166195
Teaching & Non-
Teaching Salaries 197000000 197660660 184900000 184910692 172000000 171939037
TEQIP-II Salaries 1100000 1081880 859200 859200 859200 849772
R&D (with
TEQIP-II) 2300000 2261790 650000 638484 175000 174706
Training and
Travel 80000 80570 250000 245151 250000 246124
Training and
Travel (with
TEQIP-II)
7200000 7174059 3500000 3149254 4000000 3921918
Total 221090000 246569246 231999200 231728525 238034200 241356438
8.3.1. Adequacy of budget allocation (4)
(Instruction: Here the institution needs to justify that the budget allocated over the years was
adequate.)
University timely provides the financial support for meeting the requirements of students and faculty, e.g., recently
University has issued Laptops for Professors and Associate Professors to enhance the research activity and usage of e-
content.
The yearly budget is prepared according to the needs and requirements of the departments taking into consideration
of annual intake of students, laboratory & infrastructure developments and also including students, faculty & staff
requirements and promotions and latest technologies etc.
In general, proposal along with estimates will be prepared by each department and reviewed in HODs meeting
along with the Principal and submitted to the concern authority, e.g., Registrar/University.
After deliberations formal proposal made altered in departments and forwarded to Principal for preparing
updated/consolidated proposal at college level and submitted to the University.
8.3.2. Utilization of allocated funds (5)
181
(Instruction: Here the institution needs to state how the budget was utilized during the last three
years.)
Table 8.8: Fund Utilization report
Utilization of allocated funds 2016-17 2015-16 2014-15 2013-14
101.17% 98.62% 103.08% 88.19%
8.3.3. Availability of the audited statements on institute’s Website (1)
(Instruction: Here the institution needs to state whether the audited statements are available on its
Website.)
2014–15 NO Yes URL:http://jntucek.ac.in/office.php
2015–16 NO Yes URL:http://jntucek.ac.in/office.php
2016–17 NO Yes Auditing is over, need to get the statements.
Table 8.9: Details of Audited Statements
8.4. Program Specific Budget Allocation, Utilization (10)
Summary of budget for the CFY and the actual expenditures incurred in the CFYm1and
CFYm2 (exclusively for this program in the department):
Table 8.10: Program Budget Details
Items
Bu
dg
eted
in
CF
Y
20
16-1
7
Act
ual
Ex
pen
ses
in C
FY
20
16-1
7
Bu
dg
eted
in
CF
Y m
1
20
15-1
6
Act
ual
Ex
pen
ses
in C
FY
m1
20
15
-16
Bu
dg
eted
in
CF
Ym
2
20
14-1
5
Act
ual
Ex
pen
ses
in
CF
Ym
2
2
014
-15
Bu
dg
eted
in
CF
Ym
3
20
13-1
4
Act
ual
Ex
pen
ses
in
CF
Ym
3
2
01
3-1
4
Lab Equipment 180000 177265 450000 436368 90000 87780 75000 84982
Lab Equipment
(with TEQIP-II) 75000 78750 21000 21256 165000 171479 1800000 1828577
Software (with
TEQIP-II) 210000 210000 --- --- 67500 72978 900000 907163
Lab consumables --- --- 45000 41304 60000 62745 60000 57630
Training & Travel
(with TEQIP-II) 330000 338317 240000 246649 270000 282117 255000 258703
Misc. expenses for
academic activities --- --- --- --- --- --- 18000 18000
Total 795000 804332 756000 745577 652500 677099 3108000 3155055
8.4.1. Adequacy of budget allocation (3)
(Instruction: Here the institution needs to justify that the budget allocated over the years was
adequate.)
The budget is progressively increased to meet the new facilities for equipment, replacement of
outdated equipment and new labs due to revision in syllabi.
182
8.4.2 Budget allocation for Research facilities (4)
(Instruction: Articulate the provisions in the budget to carry out the research by post graduate students)
Provided stipend of Rs.8000/- per month for Students who got admission in PG Program through
PGECET (State wide Entrance Test) under TQIP-II
Students were supported financially to publish papers, to attend conferences and workshops and to
buy supporting hardware to carry out the Projects under TEQIP-II.
No specific budget allocated but as and when it is requested by the students amount will be sanctioned
under TEQIP-II.
Under TEQIP-II Advanced Computing Laboratory with GPU cards established in the department for
UG and PG students
8.4.3. Utilization of allocated funds (3) (Instruction: Here the institution needs to state how the budget was utilized during the last three
years.)
Table8.11: Fund Utilizations report
8.
5.
Li
brary (25)
8.5.1. Library space and ambience, timings and usage, availability of a qualified librarian and other
staff, library automation, online access, networking, etc. (5)
(Instruction: Provide information on the following items)
Carpet area of library (in m2) Reading space (in m2) Number of seats in reading space Number of users
(issue book) per day Number of users (reading space) per day Timings: During working day, weekend, and
vacation Number of library staff
Number of library staff with degree in Library Management Computerization for search,
indexing, issue/return records bar coding used Library services on Internet/Intranet INDEST or
other similar membership
Archives
Table 8.12: Details of Library
Carpet area of library (in sq. meters) 120
Reading space (in sq. meters) 95
Number of seats in reading space 100
Number of users (issue book) per day 250
Number of users (reading space) per day 100
Timings: During working day 8.00 AM 8.00 PM
Weekend 9.00 AM 4.00 PM
Vacation 9.00 AM 4.00 PM
Number of library staff 9
Number of library staff with degree in Library 3
Year Budgeted Expenses Utilization of
funds
Budgeted in CFY (2016-
2017) 795000 804332 100%
Budgeted in CFY (2015-
2016) 756000 745577 98.62%
Budgeted in CFY (2014-
2015) 652500 677099 100%
Budgeted in CFY1 (2013-
2014) 3033000 3155055 100%
183
Management Computerization for search, indexing, issue/return records
Bar coding used YES
Ambience: The library has good ventilation with both sides’ windows and to provide sufficient ventilation on
the top required number of lights and fans are fitted. We are maintaining SC, ST Book Bank Scheme separately
and separate technical Section is available for classification and cataloguing. We have Separate Digital Library
fore-resources. The books are arranged according to subject classification and arranged in the library in
systematic manner. We have a separate Newspaper section. We are conduction user orientation programme for
fresh students every year. Separate reference sections for textbooks are also available in the library.
Library services on Internet/Intranet INDEST or other similar membership Archives: YES;
8.5.2. Titles and volumes per title (4)
Number of titles 2525 Number of volumes 2705
Table 8.13: Details of Titles and Volumes in Library
A.Y Number of New
Titles Added
Number of New Editions
Added
Number of New Volumes
Added
2013-14 203 203 473
2014-15 90 65 155
2015-16 205 55 352
8.5.3. Scholarly journal subscription specific to the programme (8) Table 8.14: Scholarly journal subscription details
Details CAY CAYm1 CAYm2 CAYm3
2016-17 2015-16 2014-15 2013-14
Science
As soft
copy 103 103 103 103
As hard
copy -- -- -- --
Engg and
Tech
As soft
copy 150 140 135 200
As hard
copy 45 -- -- --
8.5.4. Digital Library (3)
Availability of digital library contents:
If available, then mention number of courses, number of books, etc. Availability of an exclusive server:
Availability over Intranet/Internet: Availability of exclusive space/room: Number of users per day:
Digital Library (3)
Table 8.15: Digital Library Details
Availability of digital library contents: YES
If available, then mention number of courses, 5100
Number of e-books, etc. 1181
Availability of an exclusive server: YES
Availability over Intranet/Internet: YES
Availability of exclusive space/room: YES
Number of users per day: 250
1.5.5. Library expenditure on books, magazines/journals, and miscellaneous contents (5)
Year
Expenditure (in Rs.)
Comments,
if any Book
Magazines/journals
(for hard copy
subscription)
Magazines/journals
(for soft copy
subscription)
Misc.
Contents. Rs
2013 - 14 1636966 NIL 784742 NIL Available in
Central Library
184
2014 - 15 356611 NIL 1399827 NIL Available in
Central Library
2015 - 16 318982 NIL 1651975 NIL Available in
Central library
2016-17 173228 535750 2319290 NIL
Books are
Available in
Dept library
8.6 Incubation facility (5)
(Instruction: Specify the details of incubation facility in terms of capacity, utilization terms and conditions, usage
by students
Innovative Research Center (IRC) established with all centralized research facilities, to support students and
inculcate industry oriented and innovative research on 24X7 bases in the college campus.
8.6. Internet (5)
(Instruction: The institute may report the availability of Internet In the campus and its quality ofservice.
Table 8.17: Internet Facility Details
Name of the Internet provider BSNL, Railtel
Available bandwidth 20 mbps (1:1) and 15mbps shared
Access speed Very Good
Availability in an exclusive lab for Internet use? Yes
Availability in most computing labs? Yes
Availability in departments and other units? Yes
Availability in faculty rooms? Yes
Institute’s own Email facility to faculty/students Yes
Security/privacy to e-mail/Internet users:
Yes- The college has an IT policy which provides
guidelines for usage of IT infrastructure and
addresses security & privacy issues of users.
8.7. Safety Norms and Checks (5)
8.7.1. Checks for wiring and electrical installations for leakage and earthlings (1)
As the some of the buildings are constructed six decades back, they are having metal conduit wiring. They are
replaced by PVC conduit concealed/surface wiring in almost all major places due to ageing and deteriorated
conditions. However all the newly constructed buildings PVC conduit concealed wiring is only preferred. The
wiring for lighting equipment and power equipment has been segmented and the protective distribution boards
are provided. The distribution boxes contain Isolators, MCB’s and ELCB’s for proper protection of short
circuits and earth leakage. These are provided in sufficient number in every floor of the multi stair building and
laboratories along with proper earthen. The sufficient numbers of earth pits are also provided for various
buildings and laboratories to protect equipment’s. Separate earth pits are erected for lighting equipment, power
equipment and laboratory equipment in every department.
The electrical maintenance section verifies various electrical installations, electric wiring and the status &
working conditions of the protective equipment’s. The staff of this section was repaired/replaced failed
electrical gadgets as and when required. They will maintain curing, rusting, junk clearance at joints, replacing
metallic links and etc at each earth pits. They will assure continuity test for proper earth connection.
In laboratories fire extinguishers are provided for emergency clearing of any electrical fire accidents.
8.7.2. Safety of civil structure (1)
The University has a separate directorate (Infrastructure Development), headed by a Professor of CE as
the Chief Engineer, and takes all precautions including soil and material testing, load testing, seismic
185
analysis etc., before constructing a building. The following measures get meticulously executed before,
during and after construction.
Processes of Construction
• University is having full-time engineers to support work on the construction.
• The plans are developed and taken care directorate.
• The site is inspected and necessary fortification gets done.
• The soil testing, environmental precautions will take care by the department.
• Necessary approvals are obtained by relevant government bodies
• All the norms laid down by the law-enforcing authorities are adhered to.
• Stability tests are carried out on in-house facilities.
Safety management of civil structures
• The college accords prime importance to safety of the constructions.
• The flooring is monitored on a periodic basis and whenever there is need it is
repaired.
• The ceiling is monitored and care is taken in order to see that there would not be
rashes.
• Window frames are checked and painted whenever there is a need.
• Buildings are white washed on a periodic basis.
• Doors are protected from white ants and painted on a periodic basis.
• Roofs of the buildings are maintained and steps are taken to prevent seepage.
• Proper drainage system is provided to prevent water logging.
• The Department of Civil Engineering maintains all these activities.
8.7.3. Handling of hazardous chemicals and such other activities (2) (Instruction: The institution may
provide evidences that it is taking enough measures for the safety of the civil structures, fire, electrical
installations, wiring, and safety of handling and disposal of hazardous substances. Moreover, the
institution needs to show the effectiveness of the measures that it has developed to accomplish these
tasks.)
The college takes all the care regarding the chemicals or other materials which may turnout be hazardous in
nature
• One of the places where chemicals are largely used is the Chemistry Laboratory. The
chemicals are given in diluted form to the students at the time of experiments
• In addition to diluting the chemicals teachers and supporting staff warn about the
possible dangers of mishandling or careless handling of those chemicals.
• Exhaust fans and fuming cupboard are arranged in the chemistry Laboratory in order
to remove gasses and odorous chemicals from the Laboratory.
• In the Physics laboratory also, specific care is taken in order not get the students and
staff exposed to the LAZER beamer.
The following care is taken in work shop and in other labs
• Students are required to wear uniform/apron and shoes in order to protect them
from welding spark heat etc. Also, they will use black glass shield to protect their eyes
from ultraviolet rays liberated in the arc welding sparks.
• All the welding cables are properly insulated in order to avoid electric shock to the
186
students and insulation tape is widely fixed around cuts to the electrical wires, if any.
• All the tools have been periodically sharpened to have proper cutting at moderate
effort and the clamping of the work pieces has been done properly.
• Mains are switched off when electrical connections are in progress. Fuse wire is
provided in the circuit in order to eliminate burning of entire circuit, in the case of
over loads.
• Since scissors and G.I.Sheet, chisels have sharp edges; students are given instructions
that they should handle them properly in order to avoid cuts.
• All the rotating Hattie machines, milling machines, drilling machines are covered with
proper guards to avoid accidents when the operator is dealing with the change of belt
on the pulleys, etc.
• Petrol, Diesel and lubricants are kept in proper tins by sealing them with caps.
• Match sticks are not allowed to light in fuel lab to avoid explosion and fire accidents.
• Students are instructed to maintain minimum one meter distance from rotating
members like fly wheels, fans, pulleys of the I.C. Engines’.
• Exhaust manifold and silencer pipe are insulated properly to avoid injuries to the
students and staff.
• Exhaust gasses are left far away to avoid air pollution in the lab.
• Students have to wear hand glouse, masks for nose etc. While working with the
chemicals and proper ventilation is provided for the composite Laboratory.
• Freon gas leakage is arrested by using proper seals at the pipe joints and guards&
meshes are provided for safety.
8.8. Counseling and Emergency Medical Care and First-aid (5)
Availability of counseling facility Arrangement for emergency medical care Availability of first-aid unit
(Instruction: The institution needs to report the availability of the facilities discussed here.)
Availability of counseling facility:
The college has a multi layered Counseling mechanism.
General Counseling and Mentorship:
With the help of University, college has appointed two counselors (one for boys hostel and one for girls
hostel) to perform group counseling as well as individual counseling.
Behavioral Counseling:
The college invites experts in the field and arranges Lectures and orientation programmes to offer
training in several aspects related to organize and fruitful human behavior.
Qualifications of Counselors and Mechanisms Adopted:
• The members of faculty of the college who are Post graduates and above Guest
counselors are eminent or recognized trainers.
• General counseling goes on a regular basis and whenever there is any need a special
counseling is conducted. Records are maintained by the respective teacher counselors.
• Professional Ethics course for students: Since thought structuring is a core principle in
personality development, a course on Professional Ethics has been made mandatory
for all the students
• Life skills, Soft skills and up bringing one’s life: For this the courses in communication
skills have specifically been designed in order that the students acquire a thorough
187
understanding regarding the patterns of social and professional behaviors
Arrangement for emergency medical care
• The College has a hospital with Govt. medical officer, three nurses and other staff.
• Govt. medical officer is under deputation from Dist. Medical and Health Dept.
• As per OP register, on an average 7300 persons (staff/students) utilize the hospital.
• In general, at least 20 members (student/staff) per day and 650 members
(student/staff) per month utilize the hospital
• There is an availability of first Aid kit in the hospital
• Monthly expenditure of the hospital is Rs. 80,000/- to Rs. 90,000/- (drugs including
blankets and towels)
• Even though the hospital is located within the college campus, college is having an
Ambulance
188
9. Continuous Improvement (75)
This criterion essentially evaluates the improvement of the different indices that have already been discussed in earlier sections.
From 9.1 to 9.5 the assessment calculation can be done as follows.
If a, b, c are improvements in percentage during three successive years, assessment
can be calculated as
Assessment = (b-a)/ (100-min (b, a)) +(c-b)/ (100-min(c, b))
9.1 Improvement in Success Index of Students (5)
From4. 2
Items
L YG
LYGm1
L YGm2
LYGm3
Assessment
Success index 0.92 1 1 1 Success Index for last three years is 98%
9.2 Improvement in Academic Performance Index of Students (5)
From4. 3
Items LYG
(c) LYG1
(b) LYGm2
(a) Assessment
API 7.10 7.35 7.73 -0.229
Assessment = [(73.5 – 77.3) / (100 – 73.5)] +[ ( 71 – 73.5)/(100 – 71 )] =-0.229
9.3 Improvement in Student Teacher Ratio (5)
From5. 1
Items CAY
(C) CAYm1
(b) CAYm2
(a) Assessment
STR 12.09 12.57 12.90 -0.0091
Assessment = (12.57 –12.90)/ (100 – 12.57) + (12.09 – 12.57)/ (100 – 12.09)
= -0.0091
189
9.4 Enhancement of Faculty Qualification Index (5)
From5. 3
Items CAY
(C) CAYm1
(b) CAYm2
(a) Assessment
FQI 7.46 7.46 7.52 -0.00064
Assessment = (7.46– 7.52) / (100 -7.46) + (7.46-7.46)/ (100 – 7.46) =-0.00064
9.5 I m p r o v e m e n t in Faculty Research Publications, R&D Work, Consultancy and Testing Work (10)
From 5.7 and 5.9
Items LYG LYGm1 LYGm2 Assessment
FRP 8.1 11.1 5.7 0.025
FRDC
9.6 Continuing Education (10)
In this criterion, the institution needs to specify the contributory efforts made by the faculty members
by developing the course/laboratory modules, conducting short-term courses/workshops, etc., for
continuing education during the last three years.
Conducted workshops in the Department of CSE
Module description
Any
other
contribu
tory
institute/
industry
Developed/
organized by Duration Resource
persons Target audience
Usage and
citation,
etc.
One day workshop
on
“Microprocessors”
JNTUK association with Pearson Education
Smt.D.Neelima
29/4/2012 Prof .LylaB.Das Students & faculty
address and share the research issues.
190
One day workshop on “Outcome based Engineering Education”
JNTUK Dr.L.Sumalatha
05/02/2013
Prof P.G.Sastry Students & faculty
Can work in competing and open ended working environment.
One day workshop on “Big Data Analytics and Cloud Computing”
JNTUK Dr.L.Sumalatha 29/06/2013
Mr.Radhakrishna, Mr.Dakshina Murthy, Mr.Kishore
Students & faculty
To analyze and interpret data to lay a foundation for solving complex problems.
One day workshop on “Recent Trends in Data Analytics”
JNTUK Dr.M.H.M. Krishna Prasad
24/12/2013
Prof. M.N.Murthy, Dr.DharaKishore
Students & faculty
To analyze and interpret data to lay a foundation for solving complex problems.
One day workshop on “Software Project Management”
JNTUK Smt.A.Karuna 06/01/2014
Mr.Srinivasa Vivekanandha
Students & faculty
Can acquire leadership and communication skills and project management technologies to work in a team
Two day Workshop on “ Pattern recognition and Machine learning”
JNTUK E.Suneetha 23/08/2014, 24/08/2014
Dr. VCV Rao, Dr. CR rao, Dr.Arun Agarwal, Dr. Krishna Reddy
Students & faculty
To acquire basic concepts and research percespectives in Machine learning
Two day Workshop on “ Research Perspectives in Cloud Computing”
JNTUK A.Karuna 12/07/2014 13/07/2014
Prof Raj Kumar
Buyya,
Dr. K. Chandra
Sekaran,
Dr. K. Sudheer
Reddy,
Sri.
K.
Raghavendran,
Students & faculty
Useful to address and share the research issues in Cloud Computing
191
One Day Workshop on “ Wireless Sensor Networks”
JNTUK Dr. O. SrinivasaRao 6/9/2014 Dr. Pallam Setty
Sri. Garimella
Rammurthy
Students & faculty
Useful to address and share the research issues in Wireless Sensor Network
Two Day WorkShop on “Cuda Programming for High Performance Computing”
JNTUK Dr. MHM Krishna Prasad
Expert from
NVIDIA Students & faculty
Useful to model the real world problems to address and share the research issues in Cuda Programming
One day WorkShop on “Agile Software and Cloud computing”
JNTUK Dr. JVR Murthy 8/8/2014 Sri. NM Butta Students & faculty
Useful to model the real world problems to address and share the research issues in Agile Software and Cloud computing
One day Workshop on “Image Processing and Pattern Recognition”
JNTUK Dr.D.Haritha 17/4/2014 Dr. Prathap
Reddy,
Dr. VijayaKumar
Dr.
K SrinivasaRao
Students & faculty
Useful to model the real world problems to address and share the research issues in Image Processing and Pattern Recognition
Two day workshop
on “Research
Conducted
Perspectives in
Cloud Computing
(RPCC-14)”
JNTUK Dr.L.Sumalatha 12-7-2014
to
23-8-2014
From Industry and Academy
Students & faculty
Awareness on research challenges in cloud computing
192
Conducted Two day
Workshop on
“Pattern
Recognition and
machine
learning(PRML)”
JNTUK Dr.L.Sumalatha 22-8-2014
to
23-8-2014
From Industry
and Academy Students & faculty
Discussion on machine learning solution in pattern recognition
guest lecture on "Research Possibilities in HPC and multi-Core computing"
JNTUK Dr.MHM Krishna Prasad
2nd February, 2015
Dr.V.C.V.Rao,
Associate
Director HPC-
FTE Goup C-
DAC, Pune
University
Campus and
formerly visiting
Prof. of
University of
Minnesota,
Minneapolis.
Students & faculty
Useful to model the real world problems to address and share the research issues in multi-Core computing
Expert lecture on "To guide some of our faculty in preparing self assessment reports for applying National Board Accreditation to PG Courses of the College/ University"
JNTUK Dr.MHM Krishna Prasad
16-17th March, 2015
Dr.A.Koteswara
Rao, Prof. of
Information
Technology,
Noted person in
guiding NBA
accreditation
process in ESCI
Anna University.
faculty Useful to model the accreditation
Guest Lecture on "HPC and Multi core computing and Interaction on National supercomputing mission project"
JNTUK Dr.MHM Krishna Prasad
13th July, 2015
Dr.VCV.Rao, Head of Division, High perf. Comp. Frontier Technologies exploration grouop C-DAC, Pune University.
Students & faculty
Useful to model the real world problems to address and share the research issues in supercomputing mission project
193
Guest Lecture on " Research oriented expert lecture the Big data Analytics"
JNTUK Dr.MHM Krishna Prasad
13th August, 2015
Dr.R.B.V.Subrahmanyam, NIT, Warangal.
Students & faculty
Useful to model the real world problems to address and share the research issues in Big data Analytics
Guest Lecture on "Research oriented expert lecture on Digital India Project Proposals"
JNTUK Dr.MHM.Krishna Prasad
27.08.2015
Prof.C.Raghavendra Rao, Central University and University of Hyderabad, Hyderabad.
Students & faculty
Useful to model the real world problems to address and share the research issues in Digital India Project Proposals
guest lecture on "Research oriented expert lecture on large scale Metric Learning using locality sensitive hashing and SMARTS"
JNTUK Dr.MHM Krishna Prasad
14th September, 2015
Prof. Rama Mohana Rao, University of Melbourn, Australia.
Students & faculty
Useful to model the real world problems to address and share the research issues in locality sensitive hashing and SMARTS
Industry Expert Lecture during September, 2015 on "To Train to work on latest Technology aiming to enhance research & Implementing real time solutions on cloud"
JNTUK Smt.Ratna Kumari Challa
In the month of September, 2015 in 2 sessions.
Microsoft Students & faculty
Useful to model the real world problems to address and share the research issues in cloud computing
194
guest lecture on "Research Possibilities in HPC and multi-core computing"
JNTUK Dr.MHM Krishna Prasad
5-6th October, 2015
Dr.VCV.Rao, Head of division, High Perf. Comp. Frontier Technologies exploration group C-DAC, Pune University.
Students & faculty
Useful to model the real world problems to address and share the research issues in multi-core computing
expert lecture on "Network Traffic Classification"
JNTUK Dr.MHM Krishna Prasad
16th December, 2015
Dr.T.Venkatesh, IIT Guwahathi, and expert in the field of "Performance analysis of high speed communication networks".
Students & faculty
Useful to model the real world problems to address and share the research issues in Network Traffic Classification
1-Day workshop on "Startups and entrepreneurship orientation"
JNTUK Dr.JVR.Murthy & Dr.MHM Krishna Prasad
10th March, 2016
Teams from software industry
Students & faculty
Useful to model the real world problems to address and share the issues in Startups and entrepreneurship orientation
TEQIP-II meeting on 13th Screening Committee Meeting and SPFU Inspection Team Visiting
JNTUK Dr. MHM Krishna Prasad
14th April, 2016
TEQIP-II Team
faculty Awareness on SPFU Inspection
1 Week Research Oriented Workshop on "Cloud+/GPU Computing"
JNTUK Dr. MHM Krishna Prasad
8-12th August, 2016
Dr. Raj Kumar Buyya, Dr. V.C.V. Rao, Dr. N.B. Venkateswarlu and other experts in the area Cloud and GPU Computing
Students & faculty
Useful to model the real world problems to address and share the research issues in Cloud+/GPU Computing
195
1-Day workshop on "Research Concepts and Incubating ideas on Internet of Things"
JNTUK Dr. MHM Krishna Prasad
3rd August, 2016
Mr. N.S.S. Sai Baba, Dr. E. Sreenivas Reddy, Mr. Krishna Kumar Thiagarajan, Mr. Basanta Patro
Students & faculty
Useful to model the real world problems to address and share the research issues in IOT
Expert Lecture on "Possible Research Collaboration on Recent Trends, Mobile & Cloud Centric IOT
JNTUK Dr. MHM Krishna Prasad
3rd December, 2016
Dr. Satish Sreerama, Mobile Computing Division, University of Tartu, Estonia
UG, PG, Ph.D and Faculty
Useful to model the real world problems to address and share the research issues Recent Trends, Mobile & Cloud Centric IOT
Expert Lecture on "Research Oriented Expert Lecture"
JNTUK Dr. MHM Krishna Prasad
07th December, 2016
Prof. C. Raghavendra Rao, Professor, School of Mathematics & Computer Sciences, University of Hyderabad
UG, PG, Ph.D and Faculty
Useful to model the real world problems to address and share the research issues
Expert Lecture on "Research Oriented Expert Lecture"
JNTUK Dr. MHM Krishna Prasad
30th December, 2016
Dr. Rakesh Chandra Balabantaray, IIT, Bhubaneswar
UG, PG, Ph.D. and Faculty
Useful to model the real world problems to address and share the research issues
5 Day Short Term Course on “Smart Electric Power Grid with Emphasis on Embedded Systems and Cyber Security”
JNTUK Smt. E. Suneetha
21 – 25th February, 2017
From Industry and Academy
Students & faculty
Useful to model the real world problems to address and share the research issues in Cyber Security
196
1-Day Workshop on “Agile Development Methodologies”
JNTUK Dr. J.V.R. Murthy & Sri. S. Chandra Sekhar
15th March, 2017
Dr. N.M. Bhatta, IIM-Indore
Students & faculty
Useful to model the real world problems to address and share the research issues in Agile Development Methodologies
1-Day Workshop on “Internet of Things. - A Research Perspective”
JNTUK Dr. O. Srinivasa Rao & Sri. S. Chandra Sekhar
18th March, 2017
Dr. Pallam Setty, Professor in AU.
Students & faculty
Useful to model the real world problems to address and share the research issues in IOT
Delivered an online expert lecture on Technology in Education (Ed-Tech Tools)
Andhra University
14-07-2017
Dr.A.S.N Chakravarthy
Students & faculty
Awareness on Ed-Tech Tools
One day Student Workshop on “International Institute of Entrepreneurship development(I2E)”
JNTUK Dr. L.Sumalatha 8-08-2017 From Industry Students Entrepreneurship initiatives
Two day national Level Awareness Program on “Establishing Incubation-Innovation Centres”
JNTUK Dr. J.V.R. Murthy
15th -16th June 2017
From Industry Administrators and faculty
Awareness on Establishing Incubation center and its prominence
One day workshop on “Empowering Teaching Excellence Through E-Learning Platforms”
JNTUK Dr.A.S.N .Chakravarthy
8th July 2017
From Industry and Academy
Faculty Awareness on E-Learning tools
197
Faculty attended workshops, Short term courses, training programs Module description Any
other
contribu
tory
institute
/
industry
Developed/
organized by
Duration Attended
persons
Target
audience
Usage and citation,
etc.
Two day workshop on
“Wireless Sensor
Networks Applications
for Environemental
Monitoring”
JNTUK
Andhra
University
Visakhapatna
m
25th
&26th
March
2013
S.Chandra
Sekhar
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field.
Three day workshop
on “Research
Methodology”
JNTUK Society for
Educational
&
Entrepreneurs
hip, Chennai
27th -29th
Jan 2014
A. Krishna
Mohan
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field.
“Incorporatiojn of
Pedagogy in
Engineering
Education”
JNTUK IISC
Bangalore
3rd t-7th
Feb 2014
Dr.M.H.M.
Krishna
Prasad
Faculty/S
tudents/
Research
Scholars
Useful to model the real
world problems to
address and share the
research issues.
“Networking Routers
and Firewalls”
JNTUK Octel
Institute of
Technology
Bangalore
18th -28th
Dec 2013
A.Venata Rao
Technical staff
Can flourish
professionally both in
academics and IT field.
“Creativity and
Innovation
Management in
Research”
DST
sponsore
d
Program
ESCI
Campus,
Hyderabad
11th–15th
Nov 2013
Ch.Ratna
Kumari
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field.
“Professional
Development and
Educational
Leadership”
JNTUK IIT
Kharagpur
9th-11th
May 2013
K.Sahadevaia
h
Faculty/S
tudents/
Research
Scholars
Can acquire leadership
and communication
skills and project
management
technologies to work in
a team “Predictive Analytics” JNTUK IIT
Hyderabad
17th-21st
July 2013
Dr.M.H.M.
Krishna
Prasad
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field.
“Multivariate Data
Analytics”
JNTUK IIT
Kharagpur
2nd -8th
June 2013
Dr.M.H.M.
Krishna
Prasad
Faculty/S
tudents/
Research
Scholars
Useful to model the real
world problems to
address and share the
research issues.
“Ïntroduction to
Research”
JNTUK IIT Indore 6th &7th
July 2013
N.Ramakrishn
aiah
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field. “Ïntroduction to
Research”
JNTUK IIT Indore 6th &7th
July 2013
S.Chandra
Sekar
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field.
“Öracle 10 G
Database:
Development using
SQL &PLSQL
JNTUK ÏIT Kanpur 29th-31st
Aug 2013
Dr.M.H.M.
Krishna
Prasad
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field.
“Advanced Wireless &
Mobile Network
Technologies”
JNTUK NIT
Warangal
3rd-7th
Oct 2013
N.Ramakrishn
aiah
Faculty/S
tudents/
Research
Scholars
To share their
knowledge and
express/present their
idea in any technical
forum to educate or
guide others. “Intelligent
Informatics”
JNTUK IIT Kanpur 15th-19th
July 2013
K.Sahadevaia
h
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field.
198
“Wireless Sensor
Networks”
JNTUK IIT Kanpur “22nd-
24th July
2013
K.Sahadevaia
h
Faculty/S
tudents/
Research
Scholars
To share their
knowledge and
express/present their
idea in any technical
forum to educate or
guide others.
“Information Security” JNTUK PSG College
of
Technology,
Coimbatore,
TamilNadu
4th-10th
Nov 2013
A.Karuna &
E.Suneetha
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field.
“Foundations of
Predictive Analytics”
JNTUK IIT,
Hyderabad
25th-29th
Dec 2013
SSSN Usha
Devi
Faculty/S
tudents/
Research
Scholars
Can flourish
professionally both in
academics and IT field.
“Advanced Wireless &
Mobile Network
Technologies”
JNTUK NIT
Warangal
3rd -7th
Oct 2013
S.Chandra
Sekar
Faculty/S
tudents/
Research
Scholars
To share their
knowledge and
express/present their
idea in any technical
forum to educate or
guide others.
“Financial
Management aspects
as per the world bank
guidelines”
JNTUK Osmania
University,
Hyderabad
8th & 9th
march
2013
Dr.M.H.M.
Krishna
Prasad
Faculty/S
tudents/
Research
Scholars
To realize professional
and ethical
responsibility and act in
accordance to social
welfare. “National Cyber
Safety and Security
Standards Summit”
JNTUK Dept of
Electronics,
Govt of India,
CHENNAI
27th&
28th April
2013
Dr.O.Srinivas
a Rao
Faculty/S
tudents/
Research
Scholars
To realize professional
and ethical
responsibility and act in
accordance to social
welfare.
Faculty attending
international training
& study networking
tour for starting joint
MS Programme
JNTUK United States
of America
20-28th
Oct 2013
Prof. J.V.R.
Murthy
Faculty/S
tudents/
Research
Scholars
For starting joint MS
program& collaboration
with local industries in
USA
Faculty attending 5
day workshop
JNTUK IIT
Hyderabad
17-21st
July 2013
Sri A. Krishna
Mohan
Faculty/S
tudents/
Research
Scholars
Training on Data
Analytics
Faculty attending 3
day workshop
JNTUK ‘GLOBAL
BIG DATA’
Conference
2-4th
Aug.
2013
Prof. J.V.R.
Murthy
Faculty/S
tudents/
Research
Scholars
Projecting ideas an
discussion on Big data
Faculty on deputation
to attend MDT
program
JNTUK Commissione
r of Technical
Education
A.P Hyd.
2-3rd
Sept 2013
Dr.
L..Sumalatha
Faculty/S
tudents/
Research
Scholars
Management
development prog. For
Directors/Principals/Seni
or Faculty
Faculty training prog.
to attend 5 FSIT Tech.
Skills
JNTUK NASSCOM
MASTER
training FSIT
Tech. Skills
21-28th
Oct 2013
Smt.
D.Neelima,
Faculty/S
tudents/
Research
Scholars
Training the faculty in
Tech. Skills
Faculty attending
workshop
JNTUK NPIU
Bangalore
24-26th
Sept.
2013
Dr. M.H.M.
Krishna
Prasad
Faculty/S
tudents/
Research
Scholars
Faculty development
program
Faculty attending
International
Conference at Las
Vegas,USA
JNTUK Las Vegas,
USA,
International
Conference
on
“INFORMA
TION AND
KNOWLED
GE
ENGINEERI
NG”
22-25th
July 2013
Dr. D. Haritha Faculty/S
tudents/
Research
Scholars
To participate in
International Conference
on “Face Recognition
System on doubly
truncated Multi Variate
Gaussian Mixture
Model” Faculty attending
workshop at IIT
Hyderabad
JNTUK IIT
Hyderabad
17-21st
July 2013
Sri A. Krishna
Mohan
Faculty/S
tudents/
Research
Scholars
To cover fundamental
topics in predictive
analytics using excel
miner
199
Invited talk on “ROLE
OF BUSINESS
ANALYTICS IN
TRAINING
ENTERPRISES AND
SOCIETY”
JNTUK JNTUK CSE
Dept
4th July
2013
Staff and
students of
CSE Dept
Faculty/S
tudents/
Research
Scholars
To understand the role
of business analytics in
the society
Faculty attending
workshop on
“OUTCOME BASED
ACCREDIATION
PROCESS &
PARAMETERS”
JNTUK Organised by
NBA at
Jaipur
18th-19th
Feb 2013
Dr. J.V.R.
Murthy
Faculty/S
tudents/
Research
Scholars
Accreditation Practices.
Workshop by NBA
nodal canter, for
training resource
person on
“OUTCOME BASED
ACCREDITATION”
JNTUK Registrar,
JNTUK
29th
APRIL
2013
Dr. MHM
Krishna
prasad
Faculty/S
tudents/
Research
Scholars
Accreditation Practices.
Staff attending 28th
Indian Engineering
congress IE-ITR
session
“INNOVATIVE
TEACHING
RESEARCH
LEARNING &
ACCREDITATION
PRACTICES”
JNTUK Indian
Engineering
congress IE-
ITR, at hotel
Leela palace,
Chennai
20th -
22nd
DEC
DR. J.V.R .
Murthy
Faculty Accreditation Practices.
Participated in
Training Resource
Persons on “Outcome
Based Accreditation-
Phase I” workshop
JNTUK JNTUK 29-4-2013 Dr.L.Sumalat
ha
Faculty Accreditation Practices.
Attended Advanced
Faculty Training
Program “Think
Parallel: Parallel
Programming for
Engineers
&Scientists”
JNTUK CDAC,
Bangalore
10-20
June 2013
Dr.L.Sumalat
ha
Faculty To practice parallel
programming
Guest Lecturer in
computer Science
&Engineering
Department
JNTUK Computer
Science &
Engineering
Department,
JNTUK
(Dr.MHM.Kr
ishna Prasad)
18th JAN
2014
Dr. V.C.V
Rao, Assoc.
Director, HPC
Frontier Tech
Exploration
group, PUNE
Students To know latest tools &
technology in computer
Science & Engineering
Department
200
2nd international conference on "Computing for sustainable Global development" research paper "1D:714 A survey on community detection algorithms in large scale real world networks".
JNTUK IEEE, Delhi, Bharathi Vidyapeeth, New Delhi.
11-13th March, 2015
Mr.Ch.S.Rao_13022P0504
Research
Scholars
To gain in depth
knowledge of Research
on Computing for
sustainable Global
development
Electrical, Computer and Communication Technologies (IEEE ICE CCT-2015) Conference .
JNTUK SVS College of Engineering, Coimbatore.
5-7th March, 2015
Ms.Ch.Ratna Kumari Assistant Professor
Faculty/S
tudents/
Research
Scholars
To gain in depth
knowledge of Research
on Electrical, Computer
and Communication
Elsevier 3rd International conference on "Recent trends in computing"
JNTUK SRM University, Ghaziabad, Uttar Pradesh.
12-13th March, 2015
Dr.K.Sahadevaiah
Faculty/S
tudents/
Research
Scholars
To gain knowledge of
Research on Recent
trends in computing
2nd International conference on Computer & Communication Technologies-IC3T.2015".
JNTUK Hyderabad
24-26th July, 2015
Dr.MHM.Krishna Prasad
Faculty/S
tudents/
Research
Scholars
To gain knowledge of
Research on Computer
& Communication
2nd International conference on "Computer & Communication Technologies (IC3T-2015)"
JNTUK CMR, Technical Campus, Hyderabad
24-26th July, 2015
Mr.Ch.S.Rao_13022P0504 Ph.D Student
Faculty/S
tudents/
Research
Scholars
To expose learners in
online question
answering systems
Short term course "Wireless Network Protocols & Algorithms and their MATLAB stimulations".
JNTUK Indian School of Mines, Dhanbad, Jharkhand
8-12th June, 2015
Dr.K. Sahadevaiah
Faculty/S
tudents/
Research
Scholars
To learn various
Wireless Network
Protocols through
MATLAB stimulations
5-Day workshop at Udaipur
JNTUK Udaipur, Rajasthan
8-13th June, 2015
Dr.A.Krishna Mohan
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning
2-Day workshop on "BIG DATA ANALYTICS"
JNTUK National Association of Software & Service Companies, Hyderabad
25-26th June, 2015
Dr.J.V.R. Murthy
Faculty/S
tudents/
Research
Scholars
Research Learning &
Gives new research
problems BIG DATA
ANALYTICS
4th International conference on Advances in computing, Communications and Informatics (ICACCI-2015).
JNTUK SCMS, Kochi
10-13th August, 2015
Smt.SSSN. Usha Devi
Faculty/S
tudents/
Research
Scholars
Gives new research
problems in computing,
Communications and
Informatics
201
Short term course on “INTERNET OF THINGS: CONVERGENCE OF SENSING: CLOUD AND BIG DATA NETWORKING".
JNTUK Indian Institute of Technology, Kharagpur.
13-26th July, 2015
Dr.MHM. Krishna Prasad
Faculty/S
tudents/
Research
Scholars
To find real time
problem relevant to IOT.
Workshop titled "DATA SCIENCE AND BIG DATA ANALYTICS (DSBDA-2015)".
JNTUK Centre for Development of Advanced computing, Bangalore supported by IEEE & CSI SIG-BDA.
5-7th August, 2015
Mr.Ch.S.Rao_13022P0504
Faculty/S
tudents/
Research
Scholars
To expose Research
Learning
14th Batch Training on "MANAGEMENT CAPACITY ENHANCEMENT FOR THE ADMINISTRATORS OF TEQIP-II INSTITUTIONS"
JNTUK Indian Institute of Technology, Luck now(Noida Campus)
27-31st July, 2015
Dr.MHM Krishna Prasad
Faculty/S
tudents/
Research
Scholars
To enhance
MANAGEMENT
CAPACITY.
3-Day workshop on "DATA SCIENCE & BIG DATA ANALYTICS (DSBDA-15)".
JNTUK Centre for Development of Advanced computing(C-DAC), Bangalore.
5-7th August, 2015
Dr.A Krishna Mohan
Faculty/S
tudents/
Research
Scholars
Gives training to expose
Data Science & Big
Data Analytics
11Days Faculty Development Programme on "DATA BASE MANAGEMENT SYSTEMS"
JNTUK National Institute of Technology, Warangal.
17-27th August, 2015
Mr.B. Suraj Aravind
Faculty/S
tudents/
Research
Scholars
Train people through
Hands-on experience on
Data Base Management
Systems.
1-Day workshop "Curricular/Content development plan related to Analytics Subjects"
JNTUK Andhra Pradesh State Skill development corporation and National Association of Software and service Cos., Hyderabad
3rd September, 2015
Dr.MHM Krishna Prasad
Faculty/S
tudents/
Research
Scholars
Development plan
related to Analytics
Subjects
International Training programme PlUM Training at Singapore
JNTUK National University of Singapore, Singapore.
28th September-2nd October, 2015
TEQIP-II Coordinator
Faculty/S
tudents/
Research
Scholars
Gives training to
expertise research.
202
2-Day workshop on "Security Issues in wireless networks & Hands on training using opnet"
JNTUK Sri Ramakrishna College, Coimbatore.
16-17th October, 2015
Sri.S. Chandra Sekhar
Faculty/S
tudents/
Research
Scholars
It helps to learn Security
Issues in wireless
networks & Hands on
training
International Conference on Information and Communication Technology for intelligent systems(ICTIS-2015).
JNTUK Springer International conference at VICT Ahmedabad, Gujarat.
28-29th November, 2015
Dr.K. Sahadevaiah
Faculty/S
tudents/
Research
Scholars
Gives research
experience on real world
problems
International Conference on Information and Communication Technology for intelligent systems (ICTIS-2015).
JNTUK Springer International conference at VICT Ahmadabad, Gujarat.
28-29th November, 2015
Mr.N. Ramakrishnaiah
Faculty/S
tudents/
Research
Scholars
Gives research
experience on real world
problems
Curricular/Content development plan related to Data Analytics.
JNTUK Andhra Pradesh State Skill development corporation and National Association of software and service cos.
14th November, 2015
Dr.MHM Krishna Prasad
Faculty/S
tudents/
Research
Scholars
To development plan
related to Data Analytics
A Review of Addressing Protocols in Mobile Ad-Hoc Networks
JNTUK
December,2015
Mr.N. Ramakrishnaiah
Faculty/S
tudents/
Research
Scholars
To learning various
addressing protocols
used in Mobile ad-hoc
networks
An Addressing Mechanism for Network Partitioning and Merging In Wireless Ad hoc Netwoks
JNTUK 2015 Mr.N. RamaKrishnaiah
Faculty/S
tudents/
Research
Scholars
Discussion on
addressing mechanisms
for network partitioning
and merging in wireless
sensor ad-hoc networks
IPV6 address auto-Configuration protocol for mobile Ad Hoc Networks
JNTUK 2015 Mr.N. RamaKrishnaiah
Faculty/S
tudents/
Research
Scholars
Discussion on auto
configuration protocol
for mobile ad-hoc
networks
"7th International conference on "Technology for education T4E-2015"
JNTUK National Institute of Technology, Warangal, Telangana.
10-12th December, 2015
Ms.V.Sireesha_13022P0512 Ph.D student
Faculty/S
tudents/
Research
Scholars
Gives experience of
conference on
Technology for
education
Training on "Intellectual Property Rights(IPR) conducted by "Engineering Staff College of India, Hyderabad"
JNTUK Sri Venkateswara University, College of Engg. Tirupati.
18-20th November, 2015
Mr.K.Raghuram Assistant Professor
Faculty/S
tudents/
Research
Scholars
To train people
effectively
In Intellectual Property
Rights(IPR)
203
Training programme on “Non-Teaching and Administrative staff" conducted by Engineering Staff College of India, Hyderabad.
JNTUK UCEK-JNTUK Kakinada
25-27th November, 2015
Sri.N.S.R.Murthy Mechanic/SK
Non-
Teaching
and
Administ
rative
staff
To train people
effectively
For good goverence
Training program on "Data Analytics" to the Engineering Faculty" conducted by National Association of Software and services companies (NASSCOM).
JNTUK C.R.Rao Institute Campus, Hyderabad
7-11th December, 2015
Dr.A. Krishna Mohan
Faculty/S
tudents/
Research
Scholars
To train people
effectively
In Data Analytics
Training program on "Data Analytics" to the Engineering Faculty" conducted by National Association of Software and services companies (NASSCOM).
JNTUK C.R.Rao Institute Campus, Hyderabad
7-11th December, 2015
Dr.MHM Krishna Prasad
Faculty/S
tudents/
Research
Scholars
To train people
effectively
In Data Analytics
10 Days program on "Machine learning and Soft Computing".
JNTUK National Institute of Technology, Warangal.
28th Dec, 2015 to 9th Jan, 2016
Mr.K.Raghuram Assistant Professor
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning to
identify new real-time
applications
"5th International Conference on Information Computer Application"-(ICICA-2016)
JNTUK Knowledge-Discovery Laboratory, University of Melbourne, Melbourne, Australia.
18-19th January, 2016 and his visiting period
Dr.MHM Krishna Prasad
Faculty/S
tudents/
Research
Scholars
Expose different
algorithm techniques
Big Data Using Map
Reduce
"3rd International conference on computing for sustainable Global Development (INDIACOM-2016)"
JNTUK Bharathi Vidyapeeth, New Delhi.
16-18th March, 2016
Mr.Ch.S.Rao Ph.D _13022P0504
Faculty/S
tudents/
Research
Scholars
Explore different
algorithms techniques
Finding Research groups
3-Day workshop on "Quality Initiatives in Technical & Higher educational Institutions (In compliance with NBA & NAAC Accreditations).
JNTUK Engineering Staff College of India, Hyderabad.
23-25th February, 2016
Mr.S.Chandra Sekhar
Faculty/S
tudents/
Research
Scholars
Accreditation Practices.
International conference on Computational Intelligence and Informatics (ICC11-2016)
JNTUK JNTUH, Hyderabad
28-30th May, 2016
Ms.V.Sireesha 13022O0512, Ph.D Student
Faculty/S
tudents/
Research
Scholars
Gives experience of
conference on
Computational
Intelligence and
Informatics
204
TEQIP-II meeting on "Focused Group Discussion"
JNTUK BRKR Bhavan, Tank Bund Road, Hyderabad.
30th April, 2016
TEQIP-II Coordinator
Faculty/S
tudents/
Research
Scholars
Meeting on Focused
Group Discussion
5-Day Certificate Course on "Advanced Business Analytics using R as part of Executive Educations in Business Analytics and Predictions"
JNTUK IIT, Hyderabad
6-10th July, 2016
Ms. Eluri Suneetha
Faculty/S
tudents/
Research
Scholars
Certificate Course on
Advanced Business
Analytics using R.
Training of NASSCOM
JNTUK Nagarjuna University, Guntur
6-10th July, 2016
Dr. Krishna Mohan
Faculty/S
tudents/
Research
Scholars
Gives Training of NASSCOM & Research Learning
experience.
2-Day International Conference on "Electronics and Communication Engineering - 2016 (ICE CE - 2016)"
JNTUK UCEV, JNTUK, Vijayanagaram
29-30th July, 2016
Dr. O. Srinivasa Rao
Faculty/S
tudents/
Research
Scholars
Gives experience on
Conference on
Electronics and
Communication
Engineering
An Empirical Study of a Cryptographic Scheme for Secure Communication in Mobile Ad Hoc Networks
JNTUK Springer International Publishing, Switzerland
2016 Mr.N. RamaKrishnaiah
Faculty/S
tudents/
Research
Scholars
Discussion on various
cryptographic schemes
Tree Based Variable Length Address Auto configuration Protocol For Mobile Ad Hoc Networks
JNTUK IEEE 2016 Mr.N. RamaKrishnaiah
Faculty/S
tudents/
Research
Scholars
Getting knowledge on
auto configuration
protocols for mobile ad-
hoc networks
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Ms. D. Jyothi 14021D0505, PG Student
Faculty/S
tudents/
Research
Scholars
Get Expertise through
Hands-on-Training on
Network Simulator
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Ms. G. Bhavya 14021D0507, PG Student
Faculty/S
tudents/
Research
Scholars
Get Expertise through
Hands-on-Training on
Network Simulator.
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Mr. I. Devaraju 14021D0508, PG Student
Faculty/S
tudents/
Research
Scholars
Get Expertise through
Hands-on-Training on
Network Simulator
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Ms. M. Anuradha 14021D0509, PG Student
Faculty/S
tudents/
Research
Scholars
Get Expertise through
Hands-on-Training on
Network Simulator
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Mr. Ch. Sai Kumar 14021D0510, PG Student
Faculty/S
tudents/
Research
Scholars
Get Expertise through
Hands-on-Training on
Network Simulator
205
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Mr. P. Koteswara Rao 14021D0517, PG Student
Faculty/S
tudents/
Research
Scholars
To Expertise through
Hands-on-Training on
Network Simulator
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Ms. K. Saraswathi 14021D2203, PG Student
Faculty/S
tudents/
Research
Scholars
To Expertise through
Hands-on-Training on
Network Simulator
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Ms. J. Geetha Mounica 14021D2213, PG Student
Faculty/S
tudents/
Research
Scholars
To Expertise through
Hands-on-Training on
Network Simulator
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Mr. S. Kiran Kumar 14021D2220, PG Student
Faculty/S
tudents/
Research
Scholars
Get Expertise through
Hands-on-Training on
Network Simulator
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Ms. A.S. Rupa Vani 14021D2221, PG Student
Faculty/S
tudents/
Research
Scholars
To Expertise through
Hands-on-Training on
Network Simulator
3 Day workshop on "Hands-on-Training on Network Simulator"
JNTUK Kongu Engineering College, Chennai
5-7th August, 2016
Ms. S. Lalitha 14021D2223, PG Student
Faculty/S
tudents/
Research
Scholars
To Expertise through
Hands-on-Training on
Network Simulator
IEEE 2nd International Conference on "Advances in Computing Communication & Automation (ICACCA 2016)"
JNTUK MJP Rohilkhand University, Bareilly, UP
30th September- 1st October, 2016
Sri. N. Ramakrishnaiah
Faculty/S
tudents/
Research
Scholars
Research Learning in
configuration protocol
for MANETS.
5-Day Workshop on "Web Development using PHP and MYSQL"
JNTUK Engineering Staff College of India, Hyderabad
26-30th September, 2016
Dr. A. Krishna Mohan
Faculty/S
tudents/
Research
Scholars
Gives Hands on
experience in Web
Development using
PHP.
A workshop on Good Governance
JNTUK India Habitat Centre, New Delhi
30th August, 2016
TEQIP-II Coordinator
Faculty/S
tudents/
Research
Scholars
To know about Good Governance.
42nd International Conference on "Very Large Data Bases (VLDB-2016)"
JNTUK VLDB, New Delhi
5-9th September, 2016
Dr. MHM. Krishna Prasad
Faculty/S
tudents/
Research
Scholars
Identify new real time
applications in Very
Large Data Bases
5-Day Short Term Course on "Applied Machine Learning"
JNTUK IIT, Kharagpur
12-16th September, 2016
Ms. NSSSN Usha Devi
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning &
Hands on experience
Applied Machine
Learning 24th World Congress on "Engineering and Computer Science (WCECS 2016)
JNTUK San Francisco, USA
19-21st October, 2016
Dr. A. Krishna Mohan
Faculty/S
tudents/
Research
Scholars
Skill-Set Estimate using
HDFS, Mapreduce and
R
Workshop on "Lab Management & Maintenance for Lab Technicians"
JNTUK UCEK, JNTUK
19-23rd September, 2016
Sri. T. Vijay Kumar Technical Staff
Faculty/S
tudents/
Research
Scholars
To familiar about
Management &
Maintenance for Lab
Technicians.
206
Management Development Program for "Improved Research & Development and Industry Institute Interaction"
JNTUK Administrative staff college of India, Hyderabad.
19-23rd September, 2016
Dr. A. Krishna Mohan
Faculty/S
tudents/
Research
Scholars
Motivate towards
research Learning and
interaction with
industries
6-day Short Term Course on "Internet of Things using Arduino and Raspberry Pi"
JNTUK Shri Vishnu Engineering Collge for Women, Bhimavaram.
17-22nd October, 2016
Ms. PSV. Sunayana 15021D0523, PG Student
Faculty/S
tudents/
Research
Scholars
Gives Hands on
experience
Internet of Things using
Arduino and Raspberry
Pi
6-day Short Term Course on "Internet of Things using Arduino and Raspberry Pi"
JNTUK Shri Vishnu Engineering Collge for Women, Bhimavaram.
17-22nd October, 2016
Ms. PS. Sowjanya 15021D0526, PG Student
Faculty/S
tudents/
Research
Scholars
Gives Hands on
experience
Internet of Things using
Arduino and Raspberry
Pi
3rd International Conference on "Computer & Communication Technologies" IC3T 2016
JNTUK MIC College of Technology, Vijayawada
5-6th November, 2016
Ms. V. Sireesha 13022P0512, PhD Student
Faculty/S
tudents/
Research
Scholars
Research Learning in
Computer &
Communication
Technologies
Digital India Initiatives: Effective Utilization of Cloud Technology, Big Data & e-Governance
JNTUK Engineering Staff College of India, Information Technology Division
25-28th October, 2016
Dr. L. Sumalatha
Faculty/S
tudents/
Research
Scholars
Initiatives of e-Governance Of cloud technology
3 day Workshop on "Internet of Things"
JNTUK Gayatri Vidya Parishad College of Engineering, Visakhapatnam
21-23rd October, 2016
Mr. B. Suraj Aravind Assistant Professor ( C )
Faculty/S
tudents/
Research
Scholars
Research Learning with
real world applications
in Internet of Things
Professional Development Programme on "Big Data Analytics using Hadoop & R Tool"
JNTUK Engineering Staff College of India, Information Technology Division at Ooty, Tamilnadu
21-24th November, 2016
Dr. L. Sumalatha
Faculty/S
tudents/
Research
Scholars
Innovative teaching
,Learn new tools and R
language
Faculty Development Programme on "Big Data Analytics using Hadoop & R Tool"
JNTUK Engineering Staff College of India, Information Technology Division at Ooty, Tamilnadu
21-24th November, 2016
Dr. A. Krishna Mohan
Faculty/S
tudents/
Research
Scholars
Innovative teaching
,Learn new tools and R
language
Professional Development Program on Digital India Initiatives: Effective Utilization of Cloud Technology Big Date & E governance
JNTUK 25-28 OCT 2016
Dr.L.Sumalatha
Faculty/S
tudents/
Research
Scholars
To know the applicability of Big data for E governance
207
Professional Development Program on Big Data Analytics Using Hadoop and R Tool
JNTUK 21-24 Nov 2016
Dr.L.Sumalatha
Faculty/S
tudents/
Research
Scholars
To get trained on tools
for Big data
International Conference on "Internet of Things Data and Cloud Computing (ICC-2017)"
JNTUK Churchill College, University of Cambridge, UK
22-23rd March, 2017
Dr. MHM. Krishna Prasad
Faculty/S
tudents/
Research
Scholars
Motivate towards
research in Internet of
Things Data and Cloud
Computing
6 Day Faculty Development Programme on "Data Science and Big Data Analysis"
JNTUK NIT, Warangal at Audisankara College of Engineering & Technology, Gudur
25-30th November, 2016
Ms. N. Mounika, 15021D0514 P.G Student
Faculty/S
tudents/
Research
Scholars
To know real world
Research problems in
Data Science and Big
Data Analysis
6 Day Faculty Development Programme on "Data Science and Big Data Analysis"
JNTUK NIT, Warangal at Audisankara College of Engineering & Technology, Gudur
25-30th November, 2016
Ms. AHBN. Radhika, 15021D0502 P.G Student
Faculty To know real world
Research problems in
Data Science and Big
Data Analysis
5-Day Workshop on “Deep Learning and Applications”
JNTUK IIT Kanpur
12-16th January, 2017
Ms. NSSSN Usha Devi
Faculty/S
tudents/
Research
Scholars
To learn different
algorithm and
applications towards
research.
2nd International Conference on “Sustainable Computing Techniques in Engineering, Management and Sciences” (SCESM-2017)
JNTUK Jain Engineering College, Belgaum, near Goa
27-28th January, 2017
Mr. Ch.S.Rao, 13022P0504 Ph.D. Student
Faculty/S
tudents/
Research
Scholars
To familiar about
conferences, Research
Learning
2nd International Conference on “Sustainable Computing Techniques in Engineering, Management and Sciences” (SCESM-2017)
JNTUK Jain Engineering College, Belgaum, near Goa
27-28th January, 2017
Dr. MHM. Krishna Prasad
Faculty/S
tudents/
Research
Scholars
To secure Graph
Computations based on
Graph Partitioning
Techniques.
Faculty Development Program on “Data Science and Big Data Analytics”
JNTUK Sri Vasavi Engineering College, Tadepalligudem and NIT, Warangal at Tadepalligudem
20-25th January, 2017
Dr. O. Srinivasa Rao
Faculty/S
tudents/
Research
Scholars
To know about Research
Learning in Data
Science and Big Data
Analytics
Performance Analysis of Matrix and Graph Computations using Data Compression Techniques in MPI and Hadoop MapReduce in Big Data Framework
JNTUK IEEE 2017 Mr.N. RamaKrishnaiah
Faculty/S
tudents/
Research
Scholars
Training on Hadoop,
Data compression
techniques
208
International Conference on Smart Technology and management for computing, communication, controls, Energy and Materials
JNTUK ICSTM 2017 Mr.N. RamaKrishnaiah
Faculty/S
tudents/
Research
Scholars
Projecting ideas an
discussion on smart
technology
Faculty Development Program on “Data Science and Big Data Analytics”
JNTUK Sri Vasavi Engineering College, Tadepalligudem and NIT, Warangal at Tadepalligudem
20-25th January, 2017
Sri. S. Chandra Sekhar
Faculty/S
tudents/
Research
Scholars
To learn various
analytical methods in
Big Data Analytics
3 Day 4th International Conference on “Computing for Sustainable Global Development”
JNTUK IEEE Delhi Section at Bharati Vidyapeeth, New Delhi
01-03rd March, 2017
Mr. B. Suraj Aravind Asst. Prof. (C)
Faculty/S
tudents/
Research
Scholars
To familiar about
different algorithmic
techniques in
Association Rule Mining
Workshop on "TRYST - 2017"
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Ms. Ch. Divya Teja, 15021F0005
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology
Workshop on "TRYST - 2017"
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Ms. M. Priya Jyothirmai, 15021F0021
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology.
Workshop on "TRYST - 2017"
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Mr. T. Ram Praveen, 15021F0017
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology
Workshop on "TRYST - 2017"
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Mr. A. Suresh Babu, 15021F0026
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology
3 Day Short Term Course on “Data Analytics with SAS”
JNTUK Indian Institute of Technology, Kharagpur
22 – 24th March, 2017
Mr. B. Suraj Aravind Asst. Prof. (C)
Faculty/S
tudents/
Research
Scholars
To learn various
analytical methods in
Data Analytics
10th International Conference on “Advances in Science, Management and Engineering” (ICASME-2017)
JNTUK International Organisation of Scientific Research and Development, Chennai
10 – 11th February, 2017
Mr. Ch.S.Rao, 13022P0504 Ph.D. Student
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning
3 Day Global Summit on “Telecom, ICT and IOT”
JNTUK ICT Research & Development at HITEX, Hyderabad
13 – 15th February, 2017
Dr. L. Sumalatha
Faculty/S
tudents/
Research
Scholars
To know various
Research Learning in
Telecom, ICT and IOT
One week Interdisciplinary Short term course on “Smart Electric Power Grid With Emphasis On Embedded Systems and Cyber Security”
JNTUK UCEK-JNTUK 21-25 Fed 2017
Dr. L. Sumalatha
Faculty/S
tudents/
Research
Scholars
Cyber Security
challenges for embedded
systems
209
One day National level workshop on Internet of Things- A Research Perspective
JNTUK UCEK-JNTUK Kakinada
18-3-2017 Dr. L. Sumalatha
Faculty/S
tudents/
Research
Scholars
Discussion on research
perspective of IOT
TRYST - 2017
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Mr. Sk. Farook, 15021F0007 MCA Student
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology
TRYST - 2017
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Mr. N. Bhaskar Reddy, 15021F0018 MCA Student
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology
TRYST - 2017
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Mr. N. Bhaskar Reddy, 15021F0018 MCA Student
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology
TRYST - 2017
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Mr. Sk. Fareed, 15021F0025 MCA Student
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology
TRYST - 2017
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Mr. T. Sharieff, 15021F0022 MCA Student
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology
TRYST - 2017
JNTUK Indian Institute of Technology, Delhi
24 – 27th February, 2017
Mr. K. Govardhan Rao, 15021F0023 MCA Student
Faculty/S
tudents/
Research
Scholars
Innovative teaching,
Research Learning in
Android Technology
IEEE International conference on science , technology & Management –(ICSTEM)- 2017 in KIT Coimbatore paper
JNTUK KIT Coimbatore
3-4th March 2017
Smt.E.Suneetha
Faculty/S
tudents/
Research
Scholars
Research Learning in
science , technology &
Management
One day national level
workshop on
“AGILEMETHODOLOGI
ES”
JNTUK JNTUK 14th March 2017
Dr.N. Ramakrishnaiah
Faculty/S
tudents/
Research
Scholars
Discussion on Agile
methodology techniques
Celebrating Higher
Education:
Accomplishments and
Achievements
JNTUK Sri Venkateswara University, Tirupati.
February 5th -7 th , 2017
Dr.A.S.N Chakravarthy
Faculty/S
tudents/
Research
Scholars
Sharing achievements of
Higher education
Two day National level
Awareness on
Programme
Establishing
Incubation-Innovation
Centers
JNTUK JNTUK 15th - 16th June 2017.
Dr.A.S.N Chakravarthy
Faculty Awareness on
Establishing Incubation
center and its
prominence
210
One day workshop on
“Empowering
Teaching Excellence
through E-Learning
platform”
JNTUK JNTUK 8th JULY 2017
Dr. L.Sumalatha
Faculty/S
tudents/
Research
Scholars
To learn various E-
Learning tools
Remote Internship
Programme
JNTUK TCS 9th DEC 2016– 11th April 2017
Dr. L.Sumalatha
Internal
Mentor
Research Guidance with
Industry
Assessment =
9.7 New Facility Created (15)
Specify new facilities created during the last three years for strengthening the curriculum
and/or meeting the POs:
• Student is sponsored financial support to attend workshops and conferences.
• CSI Student Chapter initiative to organize various technical events.
• Established Advanced Computing Lab with High Performance Computing facilities
185 High end Personal Computers Workstations equipped with GPU cards (CUDA SERVER) IBM DUAL XEON Processor Server with 320 GB HD, 4GB RAM WINDOWS 2003/Red Hat Linux OS IBM P520 SERVER with 2 x 1.5 GHz CPUs,4GB Memory, 4 x 146 GB HD,DVD ROM, AIX OS
• Students are being trained for national level competitive exams.
• Students are involving as organizers in conducting various co-curricular activities like Technical
Fests/events in the department
• Special Campus Recruitment Training (CRT) sessions are provided for motivating students and make them
to be ready for placements..
• Students are able to acquire leadership and communication skills and project management technologies to
work in a team (Inter personal Skills).
9.8 Overall Improvements since last accreditation, if any, otherwise, since the commencement of the
programme (20)
Specify the overall improvement:
Specify
the
strengths
/
weakness
Improveme
nts brought
in
Contribut
e d by
List the PO(s),
which are
strengthene
d
Comments
, if any
CAY Established Advanced
Computing Lab with
High Performance
Facility
JNTUK PO2, PO3, PO4 Students able to
use and practice
advanced
Computing
Techniques and
tools
211
Inclusion of Seminar
to the Curriculum
JNTUK PO8, PO10 Students are able to
improve
presentations and
Self learning
abilities CAYm1 Conduct of Campus
Recruitment Training
classes for Students
JNTUK PO6, PO7, PO8, PO10 To improve the
interpersonal skills
and professional
behavior
Organizing Technical
Fest in the
Department
JNTUK PO6, PO7, PO8, PO10 To improve the
interpersonal skills
CAYm2 Provides E-Class
Rooms with LCD
projector, PC with
Internet connection
JNTUK PO1, PO2, PO10 To create
qualitative
Teaching – learning
environment
212
Declaration The head of the institution needs to make a declaration as per the format given
below:
This Self- Assessment Report (SAR) is prepared for the current academic year ( ) and the current
financial year ( ) on behalf of the institution.
I certify that the information provided in this SAR is extracted from the records and to the best of my
knowledge, is correct and complete.
I understand that any false statement/information of consequence may lead to rejection of the
application for the accreditation for a period of two or more years. I also understand that the National
Board of Accreditation (NBA) or its sub-committees will have the right to decide on the basis of the
submitted SAR whether the institution should be considered for an accreditation visit.
If the information provided in the SAR is found to be wrong during the visit or subsequent to grant of
accreditation, the NBA has right to withdraw the grant of accreditation and no accreditation will be
allowed for a period of next two years or more and the fee will be forfeited.
I undertake that the institution shall co-operate with the visiting accreditation team, shall
provide all desired information during the visit and arrange for the meeting as required for
accreditation as per the NBA’s provision.
I undertake that, the institution is well aware of the provisions in the NBA’s
accreditation manual concerned for this application, rules, regulations and notifications in force as
on date and the institute shall fully abide by them.
Place: Signature, Name, and Designation of the
Date: Head of the Institution with seal