List of B.TechCSE Engineering Laboratories
S.No |
Name of the Laboratory |
1. |
Analog and Digital Electronics Lab |
2. |
C++ Programming Lab |
3. |
Data Structures Lab |
4. |
IT Workshop Lab |
5. |
Database Management Systems Lab |
6. |
Java Programming Lab |
7. |
Operating Systems Lab |
8. |
Computer Networks and Web Technologies Lab |
9. |
Software Engineering Lab |
10. |
Compiler Designer Lab |
11. |
Concurrent Programming Lab |
12. |
Machine Learning Lab |
13. |
Mobile Application Development Lab |
14. |
Network Programming Lab |
15. |
Scripting Languages Lab |
16. |
Software Testing Methodologies Lab |
17. |
Data Mining Lab |
18. |
Internet of Things Lab |
19. |
Python Programming Lab |
20. |
Web Scripting Languages Lab |
Analog and Digital Electronics Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
RPS (0-30 V), CROs(0-20 Mhz), Function Generator (0-1 Mhz), Bread Boards, Full wave & Half wave rectified boards, Fixed 5v Power supply, general purpose analog digital IC trainee kits, Analog Components, Resistors, Capacitors, BJTs, FETs, Diodes, Cables, Ammeter (0-10ma), (0-200ma), Voltmeter (0-50V), Digital ICS 74xx |
60 |
1. Full Wave Rectifier with & without filters 2. Common Emitter Amplifier Characteristics 3. Common Base Amplifier Characteristics 4. Common Source amplifier Characteristics 5. Measurement of h-parameters of transistor in CB, CE, CC configurations 6. Input and Output characteristics of FET in CS configuration 7. Realization of Boolean Expressions using Gates 8. Design and realization logic gates using universal gates 9. generation of clock using NAND / NOR gates 10. Design a 4 – bit Adder / Subtractor 11. Design and realization a Synchronous and Asynchronous counter using flip-flops 12. Realization of logic gates using DTL, TTL, ECL, etc. |
C++ Programming Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with C++ installed |
60 |
1. Write a C++ Program to display Names, Roll No., and grades of 3 students who have appeared in the examination. Declare the class of name, Roll No. and grade. Create an array of class objects. Read and display the contents of the array. 2. Write a C++ program to declare Struct. Initialize and display contents of member variables. 3. Write a C++ program to declare a class. Declare pointer to class. Initialize and display the contents of the class member. 4. Given that an EMPLOYEE class contains following members: data members: Employee number, Employee name, Basic, DA, IT, Net Salary and print data members. 5. Write a C++ program to read the data of N employee and compute Net salary of each employee (DA=52% of Basic and Income Tax (IT) =30% of the gross salary). 6. Write a C++ to illustrate the concepts of console I/O operations. 7. Write a C++ program to use scope resolution operator. Display the various values of the same variables declared at different scope levels. 8. Write a C++ program to allocate memory using new operator. 9. Write a C++ program to create multilevel inheritance. (Hint: Classes A1, A2, A3) 10. Write a C++ program to create an array of pointers. Invoke functions using array objects. 11. Write a C++ program to use pointer for both base and derived classes and call the member function. Use Virtual keyword |
Data Structures Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with C compiler installed |
60 |
1. Write a program that uses functions to perform the following operations on singly linked list.: i) Creation ii) Insertion iii) Deletion iv) Traversal
2. Write a program that uses functions to perform the following operations on doubly linked list.: i) Creation ii) Insertion iii) Deletion iv) Traversal
3. Write a program that uses functions to perform the following operations on circular linked list.: i) Creation ii) Insertion iii) Deletion iv) Traversal
4. Write a program that implement stack (its operations) using i) Arrays ii) Pointers
5. Write a program that implement Queue (its operations) using i) Arrays ii) Pointers
6. Write a program that implements the following sorting methods to sort a given list of integers in ascending order i) Bubble sort ii) Selection sort iii) Insertion sort
7. Write a program that use both recursive and non recursive functions to perform the following searching operations for a Key value in a given list of integers: i) Linear search ii) Binary search
8. Write a program to implement the tree traversal methods.
9. Write a program to implement the graph traversal methods. |
IT Workshop Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
All Hardware Computer components for Demo and Assembly
Computer systems with internet connectivity and with C, MS Office/Open Office & latex installed |
60 |
Task 1: Identify the peripherals of a computer, components in a CPU and its functions. Draw the block diagram of the CPU along with the configuration of each peripheral and submit to your instructor.
Task 2: Every student should disassemble and assemble the PC back to working condition. Lab instructors shouldverify the work andfollow it up with a Viva. Also students need to go through the video which shows the process of assembling a PC. A video would be given as part of the course content.
Task 3: Every student should individually install MS windows on the personal computer. Lab instructor should verify the installation and follow it up with a Viva.
Task 4: Every student should install Linux on the computer. This computer should have windows installed. The system should be configured as dual boot with both windows and Linux. Lab instructors should verify the installation and follow it up with a Viva
Task 5: Hardware Troubleshooting: Students have to be given a PC which does not boot due to improper assembly or defective peripherals. They should identify the problem and fix it to get the computer back to working condition. The work done should be verified by the instructor and followed up with a Viva.
Task 6: Software Troubleshooting: Students have to be given a malfunctioning CPU due to system software problems. They should identify the problem and fix it to get the computer back to working condition. The work done should be verified by the instructor and followed up with a Viva.
Internet & World Wide Web Task1: Orientation & Connectivity Boot Camp: Students should get connected to their Local Area Network and access the Internet. In the process they configure the TCP/IP setting. Finally students should demonstrate, to the instructor, how to access the websites and email. If there is no internet connectivity preparations need to be made by the instructors to simulate the WWW on the LAN.
Task 2: Web Browsers, Surfing the Web: Students customize their web browsers with the LAN proxy settings, bookmarks, search toolbars and pop up blockers. Also, plug-ins like Macromedia Flash and JRE for applets should be configured.
Task 3: Search Engines & Netiquette: Students should know what search engines are and how to use the search engines. A few topics would be given to the students for which they need to search on Google. This should be demonstrated to the instructors by the student.
Task 4: Cyber Hygiene: Students would be exposed to the various threats on the internet and would be asked to configure their computer to be safe on the internet. They need to first install an antivirus software, configure their personal firewall and windows update on their computer. Then they need to customize their browsers to block pop ups, block active x downloads to avoid viruses and/or worms.
LaTeX and WORD Task 1 – Word Orientation: The mentor needs to give an overview of LaTeX and Microsoft (MS) office 2007/ equivalent (FOSS) tool word: Importance of LaTeX and MS office 2007/ equivalent (FOSS) tool Word as word Processors, Details of the four tasks and features that would be covered in each, Using LaTeX and word – Accessing, overview of toolbars, saving files, Using help and resources, rulers, format painter in word.
Task 2: Using LaTeX and Word to create project certificate. Features to be covered:- Formatting Fonts in word, Drop Cap in word, Applying Text effects, Using Character Spacing, Borders and Colors, Inserting Header and Footer, Using Date and Time option in both LaTeX and Word.
Task 3: Creating project abstract Features to be covered:-Formatting Styles, Inserting table, Bullets and Numbering, Changing Text Direction, Cell alignment, Footnote, Hyperlink, Symbols, Spell Check, Track Changes.
Task 4 : Creating a Newsletter : Features to be covered:- Table of Content, Newspaper columns, Images from files and clipart, Drawing toolbar and Word Art, Formatting Images, Textboxes, Paragraphs and Mail Merge in word.
Excel Excel Orientation: The mentor needs to tell the importance of MS office 2007/ equivalent (FOSS) tool Excel as a Spreadsheet tool, give the details of the four tasks and features that would be covered in each. Using Excel – Accessing, overview of toolbars, saving excel files, Using help and resources.
Task 1: Creating a Scheduler – Features to be covered: Gridlines, Format Cells, Summation, auto fill, Formatting Text
Task 2 : Calculating GPA – .Features to be covered:- Cell Referencing, Formulae in excel – average, std.deviation, Charts, Renaming and Inserting worksheets, Hyper linking, Count function, LOOKUP/VLOOKUP
Task 3: Performance Analysis – Features to be covered:- Split cells, freeze panes, group and outline, Sorting, Boolean and logical operators, Conditional formatting
LaTeX and MS/equivalent (FOSS) tool Power Point Task 1: Students will be working on basic power point utilities and tools which help them create basic power point presentation. Topic covered during this week includes: – PPT Orientation, Slide Layouts, Inserting Text, Word Art, Formatting Text, Bullets and Numbering, Auto Shapes, Lines and Arrows in both LaTeX and PowerPoint. Students will be given model power point presentation which needs to be replicated (exactly how it’s asked).
Task 2: Second week helps students in making their presentations interactive. Topic covered during this week includes: Hyperlinks, Inserting –Images, Clip Art, Audio, Video, Objects, Tables and Charts.
Task 3: Concentrating on the in and out of Microsoft power point and presentations in LaTeX. Helps them learn best practices in designing and preparing power point presentation. Topic covered during this week includes: – Master Layouts (slide, template, and notes), Types of views (basic, presentation, slide slotter, notes etc), and Inserting – Background, textures, Design Templates, Hidden slides. |
Database Management Systems Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with OS & MYSQL installed |
60 |
1. Concept design with E-R Model
2. Relational Model
3. Normalization
4. Practicing DDL commands
5. Practicing DML commands
6. Querying (using ANY, ALL, IN, Exists, NOT EXISTS, UNION, INTERSECT, Constraints etc.)
7. Queries using Aggregate functions, GROUP BY, HAVING and Creation and dropping ofViews.
8. Triggers (Creation of insert trigger, delete trigger, update trigger)
9. Procedures
10. Usage of Cursors |
Java Programming Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with MYSQL & JDK installed |
60 |
1. Use Eclipse or Net bean platform and acquaint with the various menus. Create a test project, adda test class, and run it. See how you can use auto suggestions, auto fill. Try code formatter and code refactoring like renaming variables, methods, and classes. Try debug step by step with a small program of about 10 to 15 lines which contains at least one if else condition and a for loop.
2. Write a Java program that works as a simple calculator. Use a grid layout to arrange buttons forthe digits and for the +, -,*, % operations. Add a text field to display the result. Handle any possible exceptions like divided by zero.
3. a) Develop an applet in Java that displays a simple message. b) Develop an applet in Java that receives an integer in one text field, and computes its factorialValue and returns it in another text field, when the button named “Compute” is clicked.
4. Write a Java program that creates a user interface to perform integer divisions. The user enterstwo numbers in the text fields, Num1 and Num2. The division of Num1 and Num 2 is displayed in the Result field when the Divide button is clicked. If Num1 or Num2 were not an integer, the program would throw a Number Format Exception. If Num2 were Zero, the program would throw an Arithmetic Exception. Display the exception in a message dialog box.
5. Write a Java program that implements a multi-thread application that has three threads. Firstthread generates random integer every 1 second and if the value is even, second thread computes the square of the number and prints. If the value is odd, the third thread will print the value of cube of the number.
6. Write a Java program for the following: Create a doubly linked list of elements. Delete a given element from the above list. Display the contents of the list after deletion.
7. Write a Java program that simulates a traffic light. The program lets the user select one of threelights: red, yellow, or green with radio buttons. On selecting a button, an appropriate message with “Stop” or “Ready” or “Go” should appear above the buttons in selected color. Initially, there is no message shown.
8. Write a Java program to create an abstract class named Shape that contains two integers and an empty method named print Area (). Provide three classes named Rectangle, Triangle, and Circle such that each one of the classes extends the class Shape. Each one of the classes contains only the method print Area () that prints the area of the given shape.
9. Suppose that a table named Table.txt is stored in a text file. The first line in the file is the header, and the remaining lines correspond to rows in the table. The elements are separated by commas. Write a java program to display the table using Labels in Grid Layout.
10. Write a Java program that handles all mouse events and shows the event name at the center of the window when a mouse event is fired (Use Adapter classes).
11. Write a Java program that loads names and phone numbers from a text file where the data is organized as one line per record and each field in a record are separated by a tab (\t). It takes a name or phone number as input and prints the corresponding other value from the hash table (hint: use hash tables).
12. Write a Java program that correctly implements the producer – consumer problem using the concept of interthread communication.
13. Write a Java program to list all the files in a directory including the files present in all its subdirectories.
14. Write a Java program that implements Quick sort algorithm for sorting a list of names inascending order
15. Write a Java program that implements Bubble sort algorithm for sorting in descending order and also shows the number of interchanges occurred for the given set of integers. |
Operating System Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Linux & C installed |
60 |
1. Write C programs to simulate the following CPU Scheduling algorithms a) FCFS b) SJF c) Round Robin d) priority
2. Write programs using the I/O system calls of UNIX/LINUX operating system (open, read, write, close, fcntl, seek, stat, opendir, readdir)
3. Write a C program to simulate Bankers Algorithm for Deadlock Avoidance and Prevention.
4. Write a C program to implement the Producer – Consumer problem using semaphores using UNIX/LINUX system calls.
5. Write C programs to illustrate the following IPC mechanisms a) Pipes b) FIFOs c) Message Queues d) Shared Memory
6. Write C programs to simulate the following memory management techniques a) Paging b) Segmentation |
Computer Networks and Web Technologies Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with any one programming language software installed
NS2/NS3 installed
Linux, Apache, Tomcat Server, MYSQL, PHP, JAVA, JAVA Script, JSP installed
|
60 |
1. Implement the data link layer framing methods such as character, character-stuffing and bit stuffing.
2. Write a program to compute CRC code for the polynomials CRC-12, CRC-16 and CRC CCIP
3. Develop a simple data link layer that performs the flow control using the sliding window protocol, and loss recovery using the Go-Back-N mechanism.
4. Implement Dijsktra’s algorithm to compute the shortest path through a network
5. Take an example subnet of hosts and obtain a broadcast tree for the subnet.
6. Implement distance vector routing algorithm for obtaining routing tables at each node.
7. Implement data encryption and data decryption
8. Write a program for congestion control using Leaky bucket algorithm.
9. Write a program for frame sorting technique used in buffers.
10. Wireshark i. Packet Capture Using Wire shark ii. Starting Wire shark iii. Viewing Captured Traffic iv. Analysis and Statistics & Filters.
11. How to run Nmap scan
12. Operating System Detection using Nmap
13. Do the following using NS2 Simulator i. NS2 Simulator-Introduction ii. Simulate to Find the Number of Packets Dropped iii. Simulate to Find the Number of Packets Dropped by TCP/UDP iv. Simulate to Find the Number of Packets Dropped due to Congestion v. Simulate to Compare Data Rate& Throughput. vi. Simulate to Plot Congestion for Different Source/Destination vii. Simulate to Determine the Performance with respect to Transmission of Packets
Web Technologies Experiments 1. Write a PHP script to print prime numbers between 1-50. 2. PHP script to a. Find the length of a string. b. Count no of words in a string. c. Reverse a string. d. Search for a specific string. |
Software Engineering Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Rational Rose/Star UML/UML Graph/Top cased installed |
60 |
Do the following 8 exercises for any two projects given in the list of sample projects or any other projects: 1) Development of problem statement. 2) Preparation of Software Requirement Specification Document, Design Documents and Testing Phase related documents. 3) Preparation of Software Configuration Management and Risk Management related documents. 4) Study and usage of any Design phase CASE tool 5) Performing the Design by using any Design phase CASE tools. 6) Develop test cases for unit testing and integration testing 7) Develop test cases for various white box and black box testing techniques. Sample Projects: 1. Passport automation System 2. Book Bank 3. Online Exam Registration 4. Stock Maintenance System 5. Online course reservation system 6. E-ticketing 7. Software Personnel Management System 8. Credit Card Processing 9. E-book management System. 10. Recruitment system |
Compiler Designer Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Linux, C compiler, Lex and Yacc installed |
60 |
Compiler Design Experiments 1. Write a LEX Program to scan reserved word & Identifiers of C Language 2. Implement Predictive Parsing algorithm 3. Write a C program to generate three address code. 4. Implement SLR(1) Parsing algorithm 5. Design LALR bottom up parser for the given language <program> ::= <block> <block> ::= { <variabledefinition><slist> } | { <slist> } <variabledefinition> ::= int<vardeflist> ; <vardeflist> ::= <vardec> | <vardec> , <vardeflist> <vardec> ::= <identifier> | <identifier> [ <constant> ] <slist> ::= <statement> | <statement> ; <slist> <statement> ::= <assignment> | <ifstatement> | <whilestatement> | <block> | <printstatement> | <empty> <assignment> ::= <identifier> = <expression> | <identifier> [ <expression> ] = <expression> <ifstatement> ::= if <bexpression> then <slist> else <slist>endif | if <bexpression> then <slist>endif <whilestatement> ::= while <bexpression> do <slist>enddo <printstatement> ::= print ( <expression> ) <expression> ::= <expression><addingop><term> | <term> | <addingop><term> <bexpression> ::= <expression><relop><expression> <relop> ::= < | <= | == | >= | > | != www.android.universityupdates.in | www.universityupdates.in | www.ios.universityupdates.in www.android.universityupdates.in | www.universityupdates.in | www.ios.universityupdates.in R18 B.TECH CSE III YEAR <addingop> ::= + | – <term> ::= <term><multop><factor> | <factor> <multop> ::= * | / <factor> ::= <constant> | <identifier> | <identifier> [ <expression>] | ( <expression> ) <constant> ::= <digit> | <digit><constant> <identifier> ::= <identifier><letterordigit> | <letter> <letterordigit> ::= <letter> | <digit> <letter> ::= a|b|c|d|e|f|g|h|i|j|k|l|m|n|o|p|q|r|s|t|u|v|w|x|y|z <digit> ::= 0|1|2|3|4|5|6|7|8|9 <empty> has the obvious meaning Comments (zero or more characters enclosed between the standard C/Java-style comment brackets /*…*/) can be inserted. The language has rudimentary support for 1-dimensional arrays. The declarationint a[3] declares an array of three elements, referenced as a[0], a[1] and a[2]. Note also that you should worry about the scoping of names. A simple program written in this language is: { int a[3],t1,t2; t1=2; a[0]=1; a[1]=2; a[t1]=3; t2=-(a[2]+t1*6)/(a[2]-t1); if t2>5 then print(t2); else { int t3; t3=99; t2=-25; print(-t1+t2*t3); /* this is a comment on 2 lines */ } endif } |
Concurrent Programming Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Windows/Linux OS, C/C++/Java softwares installed |
60 |
1. Design and implement Two-thread mutual exclusion algorithm (Peterson’s Algorithm) using multithreaded programming. 2. Design and implement Filter Lock algorithm and check for deadlock-free and starvation-free conditions using multithreaded programming. 3. Design and implement Lamport’s Bakery Algorithm and check for deadlock-free and starvationfree conditions using multithreaded programming. 4. Design and implement Lock-based concurrent FIFO queue data structure using multithreaded programming. 5. Design a consensus object using read–write registers by implementing a deadlock-free or starvation-free mutual exclusion lock. (Use CompareAndSet( ) Primitive). 6. Design and implement concurrent List queue data structure using multithreaded programming. (Use Atomic Primitives) 7. Design and implement concurrent Stack queue data structure using multithreaded programming. (Use Atomic Primitives) 8. Design and implement concurrent FIFO queue data structure using multithreaded programming. (Use Atomic Primitives) |
Machine Learning Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with any Python/IDE software installed |
60 |
1. The probability that it is Friday and that a student is absent is 3 %. Since there are 5 school days in a week, the probability that it is Friday is 20 %. What is theprobability that a student is absent given that today is Friday? Apply Baye’s rule in python to get the result. (Ans: 15%) 2. Extract the data from database using python 3. Implement k-nearest neighbors classification using python 4. Given the following data, which specify classifications for nine combinations of VAR1 and VAR2 predict a classification for a case where VAR1=0.906 and VAR2=0.606, using the result of kmeans clustering with 3 means (i.e., 3 centroids) VAR1 VAR2 CLASS 1.713 1.586 0 0.180 1.786 1 0.353 1.240 1 0.940 1.566 0 1.486 0.759 1 1.266 1.106 0 1.540 0.419 1 0.459 1.799 1 0.773 0.186 1 5. The following training examples map descriptions of individuals onto high, medium and low credit-worthiness. medium skiing design single twenties no ->highRisk high golf trading married forties yes ->lowRisk low speedway transport married thirties yes ->medRisk medium football banking single thirties yes ->lowRisk high flying media married fifties yes ->highRisk low football security single twenties no ->medRisk medium golf media single thirties yes ->medRisk medium golf transport married forties yes ->lowRisk high skiing banking single thirties yes ->highRisk low golf unemployed married forties yes ->highRisk R18 B.TECH CSE III YEAR Input attributes are (from left to right) income, recreation, job, status, age-group, home-owner. Find the unconditional probability of `golf’ and the conditional probability of `single’ given `medRisk’ in the dataset? 6. Implement linear regression using python. 7. Implement Naïve Bayes theorem to classify the English text 8. Implement an algorithm to demonstrate the significance of genetic algorithm 9. Implement the finite words classification system using Back-propagation algorithm |
Mobile Application Development Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Android studio installed |
60 |
1. Create an Android application that shows Hello + name of the user and run it on an emulator. (b) Create an application that takes the name from a text box and shows hello message along with the name entered in text box, when the user clicks the OK button. 2. Create a screen that has input boxes for User Name, Password, Address, Gender (radio buttons for male and female), Age (numeric), Date of Birth (Date Picket), State (Spinner) and a Submit button. On clicking the submit button, print all the data below the Submit Button. Use (a) Linear Layout (b) Relative Layout and (c) Grid Layout or Table Layout. 3. Develop an application that shows names as a list and on selecting a name it should show the details of the candidate on the next screen with a “Back” button. If the screen is rotated to landscape mode (width greater than height), then the screen should show list on left fragment and details on right fragment instead of second screen with back button. Use Fragment transactions and Rotation event listener. 4. Develop an application that uses a menu with 3 options for dialing a number, opening a website and to send an SMS. On selecting an option, the appropriate action should be invoked using intents. 5. Develop an application that inserts some notifications into Notification area and whenever a notification is inserted, it should show a toast with details of the notification. 6. Create an application that uses a text file to store user names and passwords (tab separated fields and one record per line). When the user submits a login name and password through a screen, the details should be verified with the text file data and if they match, show a dialog saying that login is successful. Otherwise, show the dialog with Login Failed message. 7. Create a user registration application that stores the user details in a database table. 8. Create a database and a user table where the details of login names and passwords are stored. Insert some names and passwords initially. Now the login details entered by the user should be verified with the database and an appropriate dialog should be shown to the user. 9. Create an admin application for the user table, which shows all records as a list and the admin can select any record for edit or modify. The results should be reflected in the table. 10. Develop an application that shows all contacts of the phone along with details like name, phone number, mobile number etc. 11. Create an application that saves user information like name, age, gender etc. in shared preference and retrieves them when the program restarts. 12. Create an alarm that rings every Sunday at 8:00 AM. Modify it to use a time picker to set alarm time. 13. Create an application that shows the given URL (from a text field) in a browser. |
Network Programming Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems Linux OS and C software installed |
60 |
1. Implement programs for Inter Process Communication using PIPE, Message Queue and Shared Memory. 2. Write a program to create an integer variable using shared memory concept and increment the variable simultaneously by two processes. Use semaphores to avoid race conditions. 3. Design TCP iterative Client and server application to reverse the given input sentence 4. Design TCP iterative Client and server application to reverse the given input sentence 5. Design TCP client and server application to transfer file 6. Design a TCP concurrent server to convert a given text into upper case using multiplexing system call “select” 7. Design a TCP concurrent server to echo given set of sentences using poll functions 8. Design UDP Client and server application to reverse the given input sentence 9. Design UDP Client server to transfer a file 10. Design using poll client server application to multiplex TCP and UDP requests for converting a given text into upper case. 11. Design a RPC application to add and subtract a given pair of integers |
Scripting Languages Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems Linux OS and Ruby, PCL, Pearl software installed |
60 |
1. Write a Ruby script to create a new string which is n copies of a given string where n is a nonnegative integer 2. Write a Ruby script which accept the radius of a circle from the user and compute the parameter and area. 3. Write a Ruby script which accept the user’s first and last name and print them in reverse order with a space between them 4. Write a Ruby script to accept a filename from the user print the extension of that 5. Write a Ruby script to find the greatest of three numbers 6. Write a Ruby script to print odd numbers from 10 to 1 7. Write a Ruby script to check two integers and return true if one of them is 20 otherwise return their sum 8. Write a Ruby script to check two temperatures and return true if one is less than 0 and the other is greater than 100 9. Write a Ruby script to print the elements of a given array 10. Write a Ruby program to retrieve the total marks where subject name and marks of a student stored in a hash 11. Write a TCL script to find the factorial of a number 12. Write a TCL script that multiplies the numbers from 1 to 10 13. Write a TCL script for Sorting a list using a comparison function 14. Write a TCL script to (i)create a list (ii )append elements to the list (iii)Traverse the list (iv)Concatenate the list 15. Write a TCL script to comparing the file modified times. 16. Write a TCL script to Copy a file and translate to native format. 17. a) Write a Perl script to find the largest number among three numbers. b) Write a Perl script to print the multiplication tables from 1-10 using subroutines. 18. Write a Perl program to implement the following list of manipulating functions a)Shift b)Unshift c) Push 19. a) Write a Perl script to substitute a word, with another word in a string. b) Write a Perl script to validate IP address and email address. 20. Write a Perl script to print the file in reverse order using command line arguments |
Software Testing Methodologies Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Winrunner/Selenium installed |
60 |
1. Recording in context sensitive mode and analog mode 2. GUI checkpoint for single property 3. GUI checkpoint for single object/window 4. GUI checkpoint for multiple objects 5. a) Bitmap checkpoint for object/window a) Bitmap checkpoint for screen area 6. Database checkpoint for Default check 7. Database checkpoint for custom check 8. Database checkpoint for runtime record check 9. a) Data driven test for dynamic test data submission b) Data driven test through flat files c) Data driven test through front grids d) Data driven test through excel test 10. a) Batch testing without parameter passing b) Batch testing with parameter passing 11. Data driven batch 12. Silent mode test execution without any interruption 13. Test case for calculator in windows application |
Data Mining Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Data Mining Tool like Weka installed |
60 |
Task 1: Credit Risk Assessment Description: The business of banks is making loans. Assessing the credit worthiness of an applicant is of crucial importance. You have to develop a system to help a loan officer decide whether the credit of a customer is good, or bad. A bank’s business rules regarding loans must consider two opposing factors. On the one hand, a bank wants to make as many loans as possible. Interest on these loans is the banks profit source. On the other hand, a bank cannot afford to make too many bad loans. Too many bad loans could lead to the collapse of the bank. The bank’s loan policy must involve a compromise: not too strict, and not too lenient. To do the assignment, you first and foremost need some knowledge about the world of credit. You can acquire such knowledge in a number of ways. 1. Knowledge Engineering. Find a loan officer who is willing to talk. Interview her and try to represent her knowledge in the form of production rules. 2. Books. Find some training manuals for loan officers or perhaps a suitable textbook on finance. Translate this knowledge from text form to production rule form. 3. Common sense. Imagine yourself as a loan officer and make up reasonable rules which can be used to judge the credit worthiness of a loan applicant. 4. Case histories. Find records of actual cases where competent loan officers correctly judged when, and when not to, approve a loan application. The German Credit Data: Actual historical credit data is not always easy to come by because of confidentiality rules. Here is one such dataset, consisting of 1000 actual cases collected in Germany. Credit dataset (original) Excel spreadsheet version of the German credit data. In spite of the fact that the data is German, you should probably make use of it for this assignment. (Unless you really can consult a real loan officer!) A few notes on the German dataset 1. DM stands for Deutsche Mark, the unit of currency, worth about 90 cents Canadian (but looks and acts like a quarter). 2. owns_telephone. German phone rates are much higher than in Canada so fewer people own telephones. 3. foreign_worker. There are millions of these in Germany (many from Turkey). It is very hard to get German citizenship if you were not born of German parents. 4. There are 20 attributes used in judging a loan applicant. The goal is to classify the applicant into one of two categories, good or bad. Subtasks: (Turn in your answers to the following tasks) 1. List all the categorical (or nominal) attributes and the real-valued attributes separately. (5 marks) 2. What attributes do you think might be crucial in making the credit assessment? Come up with some simple rules in plain English using your selected attributes. (5 marks) 3. One type of model that you can create is a Decision Tree – train a Decision Tree using the complete dataset as the training data. Report the model obtained after training. (10 marks) 4. Suppose you use your above model trained on the complete dataset, and classify credit good/bad for each of the examples in the dataset. What % of examples can you classify correctly? (This is also called testing on the training set) Why do you think you cannot get 100 % training accuracy? (10 marks) 5. Is testing on the training set as you did above a good idea? Why or Why not ? (10 marks) 6. One approach for solving the problem encountered in the previous question is using cross-validation? Describe what is cross-validation briefly. Train a Decision Tree again using cross-validation and report your results. Does your accuracy increase/decrease? Why? (10 marks) 7. Check to see if the data shows a bias against “foreign workers” (attribute 20), or “personal-status” (attribute 9). One way to do this (perhaps rather simple minded) is to remove these attributes from the dataset and see if the decision tree created in those cases is significantly different from the full dataset case which you have already done. To remove an attribute, you can use the preprocess tab in Weka’s GUI Explorer. Did removing these attributes have any significant effect? Discuss. (10 marks) 8. Another question might be, do you really need to input so many attributes to get good results? Maybe only a few would do. For example, you could try just having attributes 2, 3, 5, 7, 10, 17 (and 21, the class attribute (naturally)). Try out some combinations. (You had removed two attributes in problem 7. Remember to reload the arff data file to get all the attributes initially before you start selecting the ones you want.) (10 marks) 9. Sometimes, the cost of rejecting an applicant who actually has a good credit (case 1) might be higher than accepting an applicant who has bad credit (case 2). Instead of counting the misclassifications equally in both cases, give a higher cost to the first case (say cost 5) and lower cost to the second case. You can do this by using a cost matrix inWeka. Train your Decision Tree again and report the Decision Tree and cross validation results. Are they significantly different from results obtained in problem 6 (using equal cost)? (10 marks) 10. Do you think it is a good idea to prefer simple decision trees instead of having long complex decision trees? How does the complexity of a Decision Tree relate to the bias of the model? (10 marks) 11. You can make your Decision Trees simpler by pruning the nodes. One approach is to use Reduced Error Pruning – Explain this idea briefly. Try reduced error pruning for training your Decision Trees using cross-validation (you can do this in Weka) and report the Decision Tree you obtain? Also, report your accuracy using the pruned model. Does your accuracy increase? (10 marks) 12.(Extra Credit): How can you convert a Decision Trees into “if-then-else rules”. Make up your own small Decision Tree consisting of 2-3 levels and convert it into a set of rules. There also exist different classifiers that output the model in the form of rules – one such classifier in Weka is rules. PART, train this model and report the set of rules obtained. Sometimes just one attribute can be good enough in making the decision, yes, just one ! Can you predict what attribute that might be in this dataset ?OneR classifier uses a single attribute to make decisions (it chooses the attribute based on minimum error). Report the rule obtained by training a one R classifier. Rank the performance of j48, PART and oneR. (10 marks) Task 2: Hospital Management System Data Warehouse consists Dimension Table and Fact Table. REMEMBER The following Dimension The dimension object (Dimension): _ Name _ Attributes (Levels) , with one primary key _ Hierarchies One time dimension is must. About Levels and Hierarchies Dimension objects (dimension) consist of a set of levels and a set of hierarchies defined over those levels. The levels represent levels of aggregation. Hierarchies describe parent-child relationships among a set of levels. For example, a typical calendar dimension could contain five levels. Two hierarchies can be defined on these levels: H1: YearL>QuarterL>MonthL>WeekL>DayL H2: YearL>WeekL>DayL The hierarchies are described from parent to child, so that Year is the parent of Quarter, Quarter the parent of Month, and so forth. About Unique Key Constraints When you create a definition for a hierarchy, Warehouse Builder creates an identifier key for each level of the hierarchy and a unique key constraint on the lowest level (Base Level) Design a Hospital Management system data warehouse (TARGET) consists of Dimensions Patient, Medicine, Supplier, Time. Where measures are ‘NO UNITS’, UNIT PRICE. Assume the Relational database (SOURCE) table schemas as follows TIME (day, month, year), PATIENT (patient_name, Age, Address, etc.,) MEDICINE ( Medicine_Brand_name, Drug_name, Supplier, no_units, Uinit_Price, etc.,) SUPPLIER 🙁 Supplier_name, Medicine_Brand_name, Address, etc., ) If each Dimension has 6 levels, decide the levels and hierarchies, Assume the level names suitably. Design the Hospital Management system data warehouse using all schemas. Give the example4-D cube with assumption names. |
Internet of Things Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Python installed
Raspberry Pi
Required Sensors & Components |
60 |
1 Start Raspberry Pi and try various Linix commands in command terminal window: ls, cd, touch, mv, rm, man, mkdir, rmdir, tar, gzip, cat, more, less, ps, sudo, cron, chown, chgrp, ping etc. 2. Run some python programs on Pi like: Read your name and print Hello message with name Read two numbers and print their sum, difference, product and division. Word and character count of a given string Area of a given shape (rectangle, triangle and circle) reading shape and appropriate values from standard input Print a name ‘n’ times, where name and n are read from standard input, using for and while loops. Handle Divided by Zero Exception. Print current time for 10 times with an interval of 10 seconds. Read a file line by line and print the word count of each line. 3. Light an LED through Python program 4. Get input from two switches and switch on corresponding LEDs 5. Flash an LED at a given on time and off time cycle, where the two times are taken from a file. 6. Flash an LED based on cron output (acts as an alarm) 7. Switch on a relay at a given time using cron, where the relay’s contact terminals are connected to a load. 8. Get the status of a bulb at a remote place (on the LAN) through web. The student should have hands on experience in using various sensors like temperature, humidity, smoke, light, etc. and should be able to use control web camera, network, and relays connected to the Pi. |
Python Programming Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Python installed |
60 |
1. Write a program to demonstrate different number data types in Python. 2. Write a program to perform different Arithmetic Operations on numbers in Python. 3. Write a program to create, concatenate and print a string and accessing sub-string from a given string. 4. Write a python script to print the current date in the following format “Sun May 29 02:26:23 IST 2017” 5. Write a program to create, append, and remove lists in python. 6. Write a program to demonstrate working with tuples in python. 7. Write a program to demonstrate working with dictionaries in python. 8. Write a python program to find largest of three numbers. 9. Write a Python program to convert temperatures to and from Celsius, Fahrenheit. [ Formula: c/5 = f-32/9] 10. Write a Python program to construct the following pattern, using a nested for loop * * * * * * * * * * * * * * * * * * * * * * * * * 11. Write a Python script that prints prime numbers less than 20. 12. Write a python program to find factorial of a number using Recursion. 13. Write a program that accepts the lengths of three sides of a triangle as inputs. The program output should indicate whether or not the triangle is a right triangle (Recall from the Pythagorean Theorem that in a right triangle, the square of one side equals the sum of the squares of the other two sides). 14. Write a python program to define a module to find Fibonacci Numbers and import the module to another program. 15. Write a python program to define a module and import a specific function in that module to another program. 16. Write a script named copyfile.py. This script should prompt the user for the names of two text files. The contents of the first file should be input and written to the second file. 17. Write a program that inputs a text file. The program should print all of the unique words in the file in alphabetical order. 18. Write a Python class to convert an integer to a roman numeral. 19. Write a Python class to implement pow(x, n) 20. Write a Python class to reverse a string word by word. |
Web Scripting Languages Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer Systems with Python installed |
60 |
1. Write a Ruby script to create a new string which is n copies of a given string where n is a non-negative integer 2. Write a Ruby script which accept the radius of a circle from the user and compute the parameter and area. 3. Write a Ruby script which accept the user’s first and last name and print them in reverse order with a space between them 4. Write a Ruby script to accept a filename from the user print the extension of that 5. Write a Ruby script to find the greatest of three numbers 6. Write a Ruby script to print odd numbers from 10 to 1 7. Write a Ruby script to check two integers and return true if one of them is 20 otherwise return their sum 8. Write a Ruby script to check two temperatures and return true if one is less than 0 and the other is greater than 100 9. Write a Ruby script to print the elements of a given array 10. Write a Ruby program to retrieve the total marks where subject name and marks of a student stored in a hash 11. Write a TCL script to find the factorial of a number 12. Write a TCL script that multiplies the numbers from 1 to 10 13. Write a TCL script for Sorting a list using a comparison function 14. Write a TCL script to (i)create a list (ii )append elements to the list (iii)Traverse the list (iv)Concatenate the list 15. Write a TCL script to comparing the file modified times. 16. Write a TCL script to Copy a file and translate to native format. 17. a) Write a Perl script to find the largest number among three numbers. b) Write a Perl script to print the multiplication tables from 1-10 using subroutines. 18. Write a Perl program to implement the following list of manipulating functions a) Shift b) Unshift c) Push 19. a) Write a Perl script to substitute a word, with another word in a string. b) Write a Perl script to validate IP address and email address. 20. Write a Perl script to print the file in reverse order using command line arguments |
List of M.Tech CSE Engineering Laboratories
S.No |
Name of the Laboratory |
1 |
Advanced Data Structures Lab |
2 |
Machine Learning Lab |
3 |
Advanced Algorithms Lab |
4 |
Data Science Lab |
Advanced Data Structures Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with C/C++/JAVA installed |
20 |
1. Write a program to perform the following operations: a) Insert an element into a binary search tree. b) Delete an element from a binary search tree. c) Search for a key element in a binary search tree. 2. Write a program for implementing the following sorting methods: a) Merge sort b) Heap sort c) Quick sort 3. Write a program to perform the following operations: a) Insert an element into a B- tree. b) Delete an element from a B- tree. c) Search for a key element in a B- tree. 4. Write a program to perform the following operations: a) Insert an element into a Min-Max heap b) Delete an element from a Min-Max heap c) Search for a key element in a Min-Max heap 5. Write a program to perform the following operations: a) Insert an element into a Lefiist tree b) Delete an element from a Leftist tree c) Search for a key element in a Leftist tree 6. Write a program to perform the following operations: a) Insert an element into a binomial heap b) Delete an element from a binomial heap. c) Search for a key element in a binomial heap 7. Write a program to perform the following operations: a) Insert an element into a AVL tree. b) Delete an element from a AVL search tree. c) Search for a key element in a AVL search tree. 8. Write a program to perform the following operations: a) Insert an element into a Red-Black tree. b) Delete an element from a Red-Black tree. c) Search for a key element in a Red-Black tree. 9. Write a program to implement all the functions of a dictionary using hashing. 10. Write a program for implementing Knuth-Morris-Pratt pattern matching algorithm. 11. Write a program for implementing Brute Force pattern matching algorithm. 12. Write a program for implementing Boyer pattern matching algorithm. |
Machine Learning Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with C/C++/JAVA installed |
20 |
1. The probability that it is Friday and that a student is absent is 3 %. Since there are 5 school days in a week, the probability that it is Friday is 20 %. What is theprobability that a student is absent given that today is Friday? Apply Baye’s rule in python to get the result. (Ans: 15%) 2. Extract the data from database using python 3. Implement k-nearest neighbours classification using python 4. Given the following data, which specify classifications for nine combinations of VAR1 and VAR2 predict a classification for a case where VAR1=0.906 and VAR2=0.606, using the result of k-means clustering with 3 means (i.e., 3 centroids) VAR1 VAR2 CLASS 1.713 1.586 0 0.180 1.786 1 0.353 1.240 1 0.940 1.566 0 1.486 0.759 1 1.266 1.106 0 1.540 0.419 1 0.459 1.799 1 0.773 0.186 1 5. The following training examples map descriptions of individuals onto high, medium and low credit-worthiness. medium skiing design single twenties no ->highRisk high golf trading married forties yes ->lowRisk low speedway transport married thirties yes ->medRisk medium football banking single thirties yes ->lowRisk high flying media married fifties yes ->highRisk low football security single twenties no ->medRisk medium golf media single thirties yes ->medRisk medium golf transport married forties yes ->lowRisk high skiing banking single thirties yes ->highRisk low golf unemployed married forties yes ->highRisk Input attributes are (from left to right) income, recreation, job, status, age-group, home-owner. Find the unconditional probability of `golf’ and the conditional probability of `single’ given `medRisk’ in the dataset? 6. Implement linear regression using python. 7. Implement Naïve Bayes theorem to classify the English text 8. Implement an algorithm to demonstrate the significance of genetic algorithm 9. Implement the finite words classification system using Back-propagation algorithm |
Advanced Algorithms Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with C/C++/JAVA installed |
20 |
1. Implement assignment problem using Brute Force method 2. Perform multiplication of long integers using divide and conquer method. 3. Implement solution for knapsack problem using Greedy method. 4. Implement Gaussian elimination method. 5. Implement LU decomposition 6. Implement Warshall algorithm 7. Implement Rabin Karp algorithm. 8. Implement KMP algorithm. 9. Implement Harspool algorithm 10. Implement max-flow problem. |
Data Science Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with R Studio and Scala installed |
20 |
Write an R program to evaluate the following expression ax+b/ax-b. 2. Write an R program to read input from keyboard (hint: readLine()). 3. Write an R program to find the sum of n natural numbers: 1+2+3+4+….n 4. Write an R program to read n numbers. (i) Sum of all even numbers (ii) Total number of even numbers. 5. Write an R program to read n numbers. (i) Total number of odd numbers (ii) Sum of all odd numbers 6. Write an R program to obtain (i)sum of two matrices A and B (ii) subtraction of two matrices A and B (iii) Product of two matrices. 7. Write an R program for “declaring and defining functions “ 8. Write an R program that uses functions to add n numbers reading from keyboard 9. Write an R program uses functions to swap two integers. 10. Write an R program that use both recursive and non-recursive functions for implementing the Factorial of a given number, n. 11. Write an R program to reverse the digits of the given number {example 1234 to be written as 4321} 12. Write an R program to implement (i)Linear search (ii) Binary Search. 13. Write an R program to implement (i)Bubble sort (ii) selection sort. 14. Write a R program to implement the data structures (i) Vectors (ii) Array (iii) Matrix (iv) Data Frame (v) Factors 15. Write a R program to implement scan(), merge(), read.csv() and read.table() commands. 16. Write an R program to implement “Executing Scripts” written on the note pad, by calling to the R console. 17. Write a R program, Reading data from files and working with datasets (i) Reading data from csv files, inspection of data. (ii) Reading data from Excel files. 18. Write a R program to implement Graphs (i) Basic high-level plots (ii)Modifications of scatter plots (iii) Modifications of histograms, parallel box plots. |
List of M.Tech CS Engineering Laboratories
S.No |
Name of the Laboratory |
1 |
Advanced Data Structures Lab |
2 |
Machine Learning Lab |
3 |
Advanced Algorithms Lab |
4 |
Data Science Lab |
Advanced Data Structures Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with C/C++/JAVA installed |
20 |
1. Write a program to perform the following operations: a) Insert an element into a binary search tree. b) Delete an element from a binary search tree. c) Search for a key element in a binary search tree. 2. Write a program for implementing the following sorting methods: a) Merge sort b) Heap sort c) Quick sort 3. Write a program to perform the following operations: a) Insert an element into a B- tree. b) Delete an element from a B- tree. c) Search for a key element in a B- tree. 4. Write a program to perform the following operations: a) Insert an element into a Min-Max heap b) Delete an element from a Min-Max heap c) Search for a key element in a Min-Max heap 5. Write a program to perform the following operations: a) Insert an element into a Lefiist tree b) Delete an element from a Leftist tree c) Search for a key element in a Leftist tree 6. Write a program to perform the following operations: a) Insert an element into a binomial heap b) Delete an element from a binomial heap. c) Search for a key element in a binomial heap 7. Write a program to perform the following operations: a) Insert an element into a AVL tree. b) Delete an element from a AVL search tree. c) Search for a key element in a AVL search tree. 8. Write a program to perform the following operations: a) Insert an element into a Red-Black tree. b) Delete an element from a Red-Black tree. c) Search for a key element in a Red-Black tree. 9. Write a program to implement all the functions of a dictionary using hashing. 10. Write a program for implementing Knuth-Morris-Pratt pattern matching algorithm. 11. Write a program for implementing Brute Force pattern matching algorithm. 12. Write a program for implementing Boyer pattern matching algorithm. |
Machine Learning Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with C/C++/JAVA installed |
20 |
1. The probability that it is Friday and that a student is absent is 3 %. Since there are 5 school days in a week, the probability that it is Friday is 20 %. What is theprobability that a student is absent given that today is Friday? Apply Baye’s rule in python to get the result. (Ans: 15%) 2. Extract the data from database using python 3. Implement k-nearest neighbours classification using python 4. Given the following data, which specify classifications for nine combinations of VAR1 and VAR2 predict a classification for a case where VAR1=0.906 and VAR2=0.606, using the result of k-means clustering with 3 means (i.e., 3 centroids) VAR1 VAR2 CLASS 1.713 1.586 0 0.180 1.786 1 0.353 1.240 1 0.940 1.566 0 1.486 0.759 1 1.266 1.106 0 1.540 0.419 1 0.459 1.799 1 0.773 0.186 1 5. The following training examples map descriptions of individuals onto high, medium and low credit-worthiness. medium skiing design single twenties no ->highRisk high golf trading married forties yes ->lowRisk low speedway transport married thirties yes ->medRisk medium football banking single thirties yes ->lowRisk high flying media married fifties yes ->highRisk low football security single twenties no ->medRisk medium golf media single thirties yes ->medRisk medium golf transport married forties yes ->lowRisk high skiing banking single thirties yes ->highRisk low golf unemployed married forties yes ->highRisk Input attributes are (from left to right) income, recreation, job, status, age-group, home-owner. Find the unconditional probability of `golf’ and the conditional probability of `single’ given `medRisk’ in the dataset? 6. Implement linear regression using python. 7. Implement Naïve Bayes theorem to classify the English text 8. Implement an algorithm to demonstrate the significance of genetic algorithm 9. Implement the finite words classification system using Back-propagation algorithm |
Advanced Algorithms Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with C/C++/JAVA installed |
20 |
1. Implement assignment problem using Brute Force method 2. Perform multiplication of long integers using divide and conquer method. 3. Implement solution for knapsack problem using Greedy method. 4. Implement Gaussian elimination method. 5. Implement LU decomposition 6. Implement Warshall algorithm 7. Implement Rabin Karp algorithm. 8. Implement KMP algorithm. 9. Implement Harspool algorithm 10. Implement max-flow problem. |
Data Science Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with R Studio and Scala installed |
20 |
Write an R program to evaluate the following expression ax+b/ax-b. 2. Write an R program to read input from keyboard (hint: readLine()). 3. Write an R program to find the sum of n natural numbers: 1+2+3+4+….n 4. Write an R program to read n numbers. (i) Sum of all even numbers (ii) Total number of even numbers. 5. Write an R program to read n numbers. (i) Total number of odd numbers (ii) Sum of all odd numbers 6. Write an R program to obtain (i)sum of two matrices A and B (ii) subtraction of two matrices A and B (iii) Product of two matrices. 7. Write an R program for “declaring and defining functions “ 8. Write an R program that uses functions to add n numbers reading from keyboard 9. Write an R program uses functions to swap two integers. 10. Write an R program that use both recursive and non-recursive functions for implementing the Factorial of a given number, n. 11. Write an R program to reverse the digits of the given number {example 1234 to be written as 4321} 12. Write an R program to implement (i)Linear search (ii) Binary Search. 13. Write an R program to implement (i)Bubble sort (ii) selection sort. 14. Write a R program to implement the data structures (i) Vectors (ii) Array (iii) Matrix (iv) Data Frame (v) Factors 15. Write a R program to implement scan(), merge(), read.csv() and read.table() commands. 16. Write an R program to implement “Executing Scripts” written on the note pad, by calling to the R console. 17. Write a R program, Reading data from files and working with datasets (i) Reading data from csv files, inspection of data. (ii) Reading data from Excel files. 18. Write a R program to implement Graphs (i) Basic high-level plots (ii)Modifications of scatter plots (iii) Modifications of histograms, parallel box plots. |
List of M.Tech CN Engineering Laboratories
S.No |
Name of the Laboratory |
1 |
Advanced Data Structures Lab |
2 |
Information Security Lab |
3 |
Internet of Things Lab |
4 |
Web & Database Security Lab |
Advanced Data Structures Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with C/C++/JAVA installed
|
20 |
1. Write a program to perform the following operations: a) Insert an element into a binary search tree. b) Delete an element from a binary search tree. c) Search for a key element in a binary search tree. 2. Write a program for implementing the following sorting methods: a) Merge sort b) Heap sort c) Quick sort 3. Write a program to perform the following operations: a) Insert an element into a B- tree. b) Delete an element from a B- tree. c) Search for a key element in a B- tree. 4. Write a program to perform the following operations: a) Insert an element into a Min-Max heap b) Delete an element from a Min-Max heap c) Search for a key element in a Min-Max heap 5. Write a program to perform the following operations: a) Insert an element into a Lefiist tree b) Delete an element from a Leftist tree c) Search for a key element in a Leftist tree 6. Write a program to perform the following operations: a) Insert an element into a binomial heap b) Delete an element from a binomial heap. c) Search for a key element in a binomial heap 7. Write a program to perform the following operations: a) Insert an element into a AVL tree. b) Delete an element from a AVL search tree. c) Search for a key element in a AVL search tree. 8. Write a program to perform the following operations: a) Insert an element into a Red-Black tree. b) Delete an element from a Red-Black tree. c) Search for a key element in a Red-Black tree. 9. Write a program to implement all the functions of a dictionary using hashing. 10. Write a program for implementing Knuth-Morris-Pratt pattern matching algorithm. 11. Write a program for implementing Brute Force pattern matching algorithm. 12. Write a program for implementing Boyer pattern matching algorithm. |
Information Security Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with C/C++/JAVA installed
|
20 |
List of Experiments: 1. Implementation of symmetric cipher algorithm (AES and RC4) 2. Random number generation using a subset of digits and alphabets. 3. Implementation of RSA based signature system 4. Implementation of Subset sum 5. Authenticating the given signature using MD5 hash algorithm. 6. Implementation of Diffie-Hellman algorithm 7. Implementation EIGAMAL cryptosystem. 8. Implementation of Goldwasser-Micali probabilistic public key system 9. Implementation of Rabin Cryptosystem. (Optional). 10. Implementation of Kerberos cryptosystem 11. Firewall implementation and testing. 12. Implementation of a trusted secure web transaction. 13. Cryptographic Libraries-Sun JCE/Open SSL/Bouncy Castle JCE. 14. Digital Certificates and Hybrid (ASSY/SY) encryption, PKI. 15. Message Authentication Codes. 16. Elliptic Curve cryptosystems (Optional) 17. PKCS Standards (PKCS1, 5, 11, 12), Cipher modes. |
Internet of Things Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with Python installed
Arduino, Raspberry Pi, Node MCU micro controller Kits, LEDs Temparature and Distance sensors and other supporting components
|
20 |
List of Experiments 1. Using raspberry pi a. Calculate the distance using distance sensor. b. Basic LED functionality. 2. Using Arduino a. Calculate the distance using distance sensor. b. Basic LED functionality. c. Calculate temperature using temperature sensor. 3. Using Node MCU a. Calculate the distance using distance sensor. b. Basic LED functionality. Calculate temperature using temperature sensor. |
Web & Database Security Lab
EQUIPMENT DETAIL |
NOS. |
LIST OF EXPERIMENTS |
Computer System with C/C++/JAVA and MYSQL installed
|
20 |
1. Creation and manipulation of database using SQL scripts and graphical interfaces. 2. Implementing DAC: Implementation of database security policies using DAC in oracle 10g/SQL server 3. Implementing of MAC to ensure confidentiality and control information flow using either Oracle 10g or SQL server. This provides exposure to understand the concepts of MAC and Trojan hose 4. Implementation of Virtual Private Database using View using Oracle 10g or SQL server 5. Design a method to simulate the HTML injections and cross-site scripting (XSS) to exploit the attackers. 6. Determine HTML injection bugs and possible measures to prevent HTML injection exploits. 7. Implement Secure coding for buffer flow heap attacks. 8. Implementation of Design methods to break authentication schemes 9. Implementation of methods for abusing Design Deficiencies against web sites |