SHADAN

College of Engineering & Technology

(An ISO 9001:2015 Certified Institution)

Estd: 1995 |Approved By AICTE | Affiliated to JNTUH | Permitted by Govt of T.S | I S O Certified Institution| Registered with NSS| Member of National Digital Library| Institutional Member of Oracle Academy | Member of NPTEL(SWAYAM), MHRD | Enrolled in J-HUB |Applied for 2f(UGC)|Participated in N I R F, MHRD | Enrolled in Unnat Bharat Abhiyan.
Department of Computer Science & Engineering
Infrastructure Facilities

List of B.TechCSE Engineering Laboratories

S.No

Name of the Laboratory

1.       

Analog and Digital Electronics Lab

2.       

C++ Programming Lab

3.       

Data Structures Lab

4.       

IT Workshop Lab

5.       

Database Management Systems Lab

6.       

Java Programming Lab

7.       

Operating Systems Lab

8.       

Computer Networks and Web Technologies Lab

9.       

Software Engineering Lab

10.   

Compiler Designer Lab

11.   

Concurrent Programming Lab

12.   

Machine Learning Lab

13.   

Mobile Application Development Lab

14.   

Network Programming Lab

15.   

Scripting Languages Lab

16.   

Software Testing Methodologies Lab

17.   

Data Mining Lab

18.   

Internet of Things Lab

19.   

Python Programming Lab

20.   

Web Scripting Languages Lab

 Analog and Digital Electronics Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

RPS (0-30 V), CROs(0-20 Mhz), Function Generator (0-1 Mhz), Bread Boards, Full wave & Half wave rectified boards, Fixed 5v Power supply, general purpose analog digital IC trainee kits, Analog Components, Resistors, Capacitors, BJTs, FETs, Diodes, Cables, Ammeter (0-10ma), (0-200ma), Voltmeter (0-50V), Digital ICS 74xx

60

1.  Full Wave Rectifier with & without filters

2.  Common Emitter Amplifier Characteristics 

3.  Common Base Amplifier Characteristics

4.  Common Source amplifier Characteristics

5.  Measurement of h-parameters of transistor in CB, CE, CC configurations

6.  Input and Output characteristics of FET in CS configuration

7.  Realization of Boolean Expressions using Gates

8.  Design and realization logic gates using universal gates

9.  generation of clock using NAND / NOR gates

10.  Design a 4 – bit Adder / Subtractor 

11.  Design and realization a Synchronous and Asynchronous counter using flip-flops 

12.  Realization of logic gates using DTL, TTL, ECL, etc.


C++ Programming Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with C++ installed

60

1.  Write  a  C++  Program  to  display  Names,  Roll  No.,  and  grades  of  3  students  who  have appeared in the examination. Declare the class of name, Roll No. and grade. Create an array of class objects. Read and display the contents of the array.

2.  Write a C++ program to declare Struct. Initialize and display contents of member variables. 

3.  Write  a  C++  program  to  declare  a  class.  Declare  pointer  to  class.  Initialize  and  display  the contents of the class member. 

4.  Given  that  an  EMPLOYEE  class  contains  following  members:  data  members:  Employee number, Employee name, Basic, DA, IT, Net Salary and print data members. 

5.  Write  a  C++  program  to  read  the  data  of  N  employee  and  compute  Net  salary  of  each employee (DA=52% of Basic and Income Tax (IT) =30% of the gross salary). 

6.  Write a C++ to illustrate the concepts of console I/O operations.  7.  Write  a  C++  program  to  use  scope  resolution  operator.  Display  the  various  values  of  the same variables declared at different scope levels. 

8.  Write a C++ program to allocate memory using new operator. 

9.  Write a C++ program to create multilevel inheritance. (Hint: Classes A1, A2, A3)

 10.  Write a C++ program to create an array of pointers. Invoke functions using array objects. 

11.  Write a C++ program to use pointer for both base and derived classes and call the member function. Use Virtual keyword


Data Structures Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with C compiler installed

60

1.  Write  a  program that  uses  functions  to  perform the following  operations  on  singly  linked list.:       i) Creation    ii) Insertion    iii) Deletion     iv) Traversal 

 

2.  Write a program that uses functions to perform the following operations on doubly linked list.: i) Creation    ii) Insertion    iii) Deletion     iv) Traversal 

 

3.  Write a program that uses functions to perform the following operations on circular linked list.:       i) Creation    ii) Insertion     iii) Deletion    iv) Traversal 

 

4. Write a  program that implement stack (its operations) using        i) Arrays       ii) Pointers   

 

5. Write a program that implement Queue (its operations) using       i) Arrays       ii) Pointers   

 

6.  Write  a  program  that  implements  the  following  sorting  methods  to  sort  a  given  list  of integers in ascending order i) Bubble sort    ii) Selection sort    iii) Insertion sort

 

 7.  Write  a  program  that  use  both  recursive  and  non  recursive  functions  to  perform  the following searching operations for a Key value in a given list of integers:       i) Linear search      ii) Binary search

 

8.   Write a program to implement the tree traversal methods.

 

 9.  Write a program to implement the graph traversal methods.


IT Workshop Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

All Hardware Computer components for Demo and Assembly

 

Computer systems with internet connectivity and with C, MS Office/Open Office & latex installed

60

Task  1:  Identify  the  peripherals  of  a  computer,  components  in  a  CPU  and  its  functions.  Draw  the block  diagram  of  the  CPU  along  with  the  configuration  of  each  peripheral  and  submit  to  your instructor.  

 

Task  2:  Every  student  should  disassemble  and  assemble  the  PC  back  to  working  condition.  Lab instructors shouldverify the work andfollow it up with a Viva. Also  students  need  to  go through  the video  which  shows  the  process  of  assembling  a  PC.  A  video  would  be  given  as  part  of  the  course content. 

 

Task  3:  Every  student  should  individually  install  MS  windows  on  the  personal  computer.  Lab instructor should verify the installation and follow it up with a Viva. 

 

Task  4:  Every  student  should  install  Linux  on  the  computer.  This  computer  should  have  windows installed. The system should be configured as dual boot with both windows and Linux. Lab instructors should verify the installation and follow it up with a Viva 

 

Task  5:  Hardware  Troubleshooting:  Students  have  to  be  given  a  PC  which  does  not  boot  due  to improper  assembly  or  defective  peripherals.  They  should  identify  the  problem  and  fix  it  to  get  the computer back to working condition. The work done should be verified by the instructor and followed up with a Viva. 

 

Task 6: Software Troubleshooting: Students have to be given a malfunctioning CPU due to system software  problems.  They  should  identify  the  problem  and  fix  it  to  get  the  computer  back  to  working condition. The work done should be verified by the instructor and followed up with a Viva. 

 

Internet & World Wide Web

Task1: Orientation & Connectivity Boot Camp: Students should get connected to their Local Area Network  and  access  the  Internet.  In  the  process  they  configure  the  TCP/IP  setting.  Finally  students should  demonstrate,  to  the  instructor,  how  to  access  the  websites  and  email.  If  there  is  no  internet connectivity preparations need to be made by the instructors to simulate the WWW on the LAN. 

 

Task  2:  Web  Browsers,  Surfing  the  Web:  Students  customize  their  web  browsers  with  the  LAN proxy settings, bookmarks, search toolbars and pop up blockers. Also, plug-ins like Macromedia Flash and JRE for applets should be configured. 

 

Task 3: Search Engines & Netiquette: Students should know what search engines are and how to use the search engines. A few topics would be given to the students for which they need to search on Google. This should be demonstrated to the instructors by the student.  

 

Task 4: Cyber Hygiene: Students would be exposed to the various threats on the internet and would be asked to configure their computer to be safe on the internet. They need to first install an antivirus software, configure their personal firewall and windows update on their computer. Then they need to customize their browsers to block pop ups, block active x downloads to avoid viruses and/or worms. 

 

LaTeX and WORD

Task  1  –  Word  Orientation:  The  mentor  needs  to  give  an  overview  of  LaTeX  and  Microsoft  (MS) office  2007/  equivalent  (FOSS)  tool  word:  Importance  of  LaTeX  and  MS  office  2007/  equivalent (FOSS) tool Word as word Processors, Details of the four tasks and features that would be covered in each,  Using  LaTeX  and  word  –  Accessing,  overview  of  toolbars,  saving  files,  Using  help  and resources, rulers, format painter in word. 

 

Task  2:  Using  LaTeX  and  Word  to  create  project  certificate.  Features  to  be  covered:-  Formatting Fonts  in  word,  Drop  Cap  in  word,  Applying  Text  effects,  Using  Character  Spacing,  Borders  and Colors, Inserting Header and Footer, Using Date and Time option in both LaTeX and Word.

 

Task 3: Creating project abstract Features to be covered:-Formatting Styles, Inserting table, Bullets and Numbering, Changing Text Direction, Cell alignment, Footnote, Hyperlink, Symbols, Spell Check, Track Changes. 

 

Task  4  :  Creating  a  Newsletter  : Features  to  be  covered:-  Table  of  Content,  Newspaper  columns, Images  from  files  and  clipart,  Drawing  toolbar  and  Word  Art,  Formatting  Images,  Textboxes, Paragraphs and Mail Merge in word. 

 

 

Excel

Excel  Orientation:  The  mentor  needs  to  tell  the  importance  of  MS  office  2007/  equivalent  (FOSS) tool Excel as a Spreadsheet tool, give the details of the four tasks and features that would be covered in each. Using Excel – Accessing, overview of toolbars, saving excel files, Using help and resources.

 

 Task  1:  Creating  a  Scheduler  – Features  to  be  covered:  Gridlines,  Format  Cells,  Summation,  auto fill, Formatting Text  

 

Task 2 : Calculating GPA – .Features to be covered:- Cell Referencing, Formulae in excel – average, std.deviation,  Charts,  Renaming  and  Inserting  worksheets,  Hyper  linking,  Count  function, LOOKUP/VLOOKUP 

 

Task  3:  Performance  Analysis  –  Features  to  be  covered:-  Split  cells,  freeze  panes,  group  and outline, Sorting, Boolean and logical operators, Conditional formatting

 

LaTeX and MS/equivalent (FOSS) tool Power Point

Task 1: Students will be working on basic power point utilities and tools which help them create basic power point presentation. Topic covered during this week includes: – PPT Orientation, Slide Layouts, Inserting Text, Word Art, Formatting Text, Bullets and Numbering, Auto Shapes, Lines and Arrows in both  LaTeX  and  PowerPoint.  Students  will  be  given model  power  point  presentation  which  needs  to be replicated (exactly how it’s asked).

 

 Task 2: Second week helps students in making their presentations interactive. Topic covered during this week includes: Hyperlinks, Inserting –Images, Clip Art, Audio, Video, Objects, Tables and Charts. 

 

Task 3: Concentrating on the in and out of Microsoft power point and presentations in LaTeX. Helps them learn best practices in designing and preparing power point presentation. Topic covered during this week includes: – Master Layouts (slide, template, and notes), Types of views (basic, presentation, slide slotter, notes etc), and Inserting – Background, textures, Design Templates, Hidden slides.


Database Management Systems Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with OS & MYSQL installed

60

1.  Concept design with E-R Model

 

2.  Relational Model

 

3.  Normalization

 

4.  Practicing DDL commands 

 

5.  Practicing DML commands

 

6.  Querying (using ANY, ALL, IN, Exists, NOT EXISTS, UNION, INTERSECT, Constraints etc.)

 

7.  Queries  using  Aggregate  functions,  GROUP  BY,  HAVING  and  Creation  and  dropping  ofViews.

 

8.  Triggers (Creation of insert trigger, delete trigger, update trigger) 

 

9.  Procedures

 

10.  Usage of Cursors

 

 

 

 

 

Java Programming Lab

 

 

 

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with MYSQL & JDK installed

60

1.  Use Eclipse or Net bean platform and acquaint with the various menus. Create a test project, adda test class, and run it. See how you can use auto suggestions, auto fill. Try code formatter and code  refactoring  like  renaming  variables,  methods,  and  classes.  Try  debug  step  by  step  with  a small program of about 10 to 15 lines which contains at least one if else condition and a for loop.

 

2.  Write a Java program that works as a simple calculator. Use a grid layout to arrange buttons forthe  digits  and  for  the  +,  -,*,  %  operations.  Add  a  text  field  to  display  the  result.  Handle  any possible exceptions like divided by zero.

 

3.  a) Develop an applet in Java that displays a simple message. b)  Develop  an  applet  in  Java  that  receives  an  integer  in  one  text  field,  and  computes  its  factorialValue and returns it in another text field, when the button named “Compute” is clicked.  

 

4. Write  a Java  program  that creates  a  user interface to perform integer  divisions. The  user  enterstwo numbers in the text fields, Num1 and Num2. The division of Num1 and Num 2 is displayed in the  Result  field  when  the  Divide  button  is  clicked.  If  Num1  or  Num2  were  not  an  integer,  the program would throw a Number Format Exception. If Num2 were Zero, the program would throw an Arithmetic Exception. Display the exception in a message dialog box.

 

5.  Write  a  Java  program  that  implements  a  multi-thread  application  that  has  three  threads.  Firstthread  generates  random  integer  every  1  second  and  if  the  value  is  even,  second  thread computes  the  square  of  the  number  and  prints.  If the value is  odd,  the  third thread  will  print  the value of cube of the number.

 

6.  Write a Java program for the following:

Create a doubly linked list of elements.

Delete a given element from the above list.

Display the contents of the list after deletion.   

 

7.  Write a Java program that simulates a traffic light. The program lets the user select one of threelights:  red,  yellow,  or  green  with  radio  buttons.  On  selecting  a  button,  an  appropriate  message with “Stop” or “Ready” or “Go” should appear above the buttons in selected color. Initially, there is no message shown.  

 

8.  Write a Java program to create an abstract class named Shape that contains two integers and an empty method named print Area (). Provide three classes named Rectangle, Triangle, and Circle such that each one of the classes extends the class Shape. Each one of the classes contains only the method print Area () that prints the area of the given shape. 

 

9.  Suppose that a table named Table.txt is stored in a text file. The first line in the file is the header, and the remaining lines correspond to rows in the table. The elements are separated by commas. Write a java program to display the table using Labels in Grid Layout. 

 

10.  Write a Java program that handles all mouse events and shows the event name at the center of the window when a mouse event is fired (Use Adapter classes).  

 

11.  Write  a  Java  program  that  loads  names  and  phone  numbers  from  a  text  file  where  the  data  is organized as    one line per record and each field in a record are separated by a tab (\t). It takes a name  or  phone  number  as  input  and  prints  the  corresponding  other  value  from  the  hash  table (hint: use hash tables).

 

12.  Write  a  Java  program  that  correctly  implements  the  producer  –  consumer  problem  using  the concept of interthread communication.

 

13.  Write  a  Java  program  to  list  all  the  files  in  a  directory  including  the  files  present  in  all  its subdirectories.

 

14.  Write  a  Java  program  that  implements  Quick  sort  algorithm  for  sorting  a  list  of  names  inascending order

 

15.  Write a Java program that implements Bubble sort algorithm for sorting in descending order and also shows the number of interchanges occurred for the given set of integers.


Operating System Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Linux & C  installed

60

1. Write C programs to simulate the following CPU Scheduling algorithms

a) FCFS b) SJF c) Round Robin d) priority

 

2. Write programs using the I/O system calls of UNIX/LINUX operating system

(open, read, write, close, fcntl, seek, stat, opendir, readdir)

 

3. Write a C program to simulate Bankers Algorithm for Deadlock Avoidance and Prevention.

 

4. Write a C program to implement the Producer – Consumer problem using semaphores using

UNIX/LINUX system calls.

 

5. Write C programs to illustrate the following IPC mechanisms

a) Pipes b) FIFOs c) Message Queues d) Shared Memory

 

6. Write C programs to simulate the following memory management techniques

a) Paging b) Segmentation


Computer Networks and Web Technologies Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with any one programming language software installed

 

NS2/NS3 installed

 

Linux, Apache, Tomcat Server, MYSQL, PHP, JAVA, JAVA Script, JSP installed

 

60

1. Implement the data link layer framing methods such as character, character-stuffing and bit

stuffing.

 

2. Write a program to compute CRC code for the polynomials CRC-12, CRC-16 and CRC CCIP

 

3. Develop a simple data link layer that performs the flow control using the sliding window protocol,

and loss recovery using the Go-Back-N mechanism.

 

4. Implement Dijsktra’s algorithm to compute the shortest path through a network

 

5. Take an example subnet of hosts and obtain a broadcast tree for the subnet.

 

6. Implement distance vector routing algorithm for obtaining routing tables at each node.

 

7. Implement data encryption and data decryption

 

8. Write a program for congestion control using Leaky bucket algorithm.

 

9. Write a program for frame sorting technique used in buffers.

 

10. Wireshark

i. Packet Capture Using Wire shark

ii. Starting Wire shark

iii. Viewing Captured Traffic

iv. Analysis and Statistics & Filters.

 

11. How to run Nmap scan

 

12. Operating System Detection using Nmap

 

13. Do the following using NS2 Simulator

i. NS2 Simulator-Introduction

ii. Simulate to Find the Number of Packets Dropped

iii. Simulate to Find the Number of Packets Dropped by TCP/UDP

iv. Simulate to Find the Number of Packets Dropped due to Congestion

v. Simulate to Compare Data Rate& Throughput.

vi. Simulate to Plot Congestion for Different Source/Destination

vii. Simulate to Determine the Performance with respect to Transmission of Packets

 

Web Technologies Experiments

1. Write a PHP script to print prime numbers between 1-50.

2. PHP script to

a. Find the length of a string.

b. Count no of words in a string.

c. Reverse a string.

d. Search for a specific string.

Software Engineering Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Rational Rose/Star UML/UML Graph/Top cased  installed

60

Do the following 8 exercises for any two projects given in the list of sample projects or any other

projects:

1) Development of problem statement.

2) Preparation of Software Requirement Specification Document, Design Documents and Testing

Phase related documents.

3) Preparation of Software Configuration Management and Risk Management related documents.

4) Study and usage of any Design phase CASE tool

5) Performing the Design by using any Design phase CASE tools.

6) Develop test cases for unit testing and integration testing

7) Develop test cases for various white box and black box testing techniques.

Sample Projects:

1. Passport automation System

2. Book Bank

3. Online Exam Registration

4. Stock Maintenance System

5. Online course reservation system

6. E-ticketing

7. Software Personnel Management System

8. Credit Card Processing

9. E-book management System.

10. Recruitment system


Compiler Designer Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Linux, C compiler, Lex and Yacc  installed

60

Compiler Design Experiments

1. Write a LEX Program to scan reserved word & Identifiers of C Language

2. Implement Predictive Parsing algorithm

3. Write a C program to generate three address code.

4. Implement SLR(1) Parsing algorithm

5. Design LALR bottom up parser for the given language

<program> ::= <block>

<block> ::= { <variabledefinition><slist> }

| { <slist> }

<variabledefinition> ::= int<vardeflist> ;

<vardeflist> ::= <vardec> | <vardec> , <vardeflist>

<vardec> ::= <identifier> | <identifier> [ <constant> ]

<slist> ::= <statement> | <statement> ; <slist>

<statement> ::= <assignment> | <ifstatement> | <whilestatement>

| <block> | <printstatement> | <empty>

<assignment> ::= <identifier> = <expression>

| <identifier> [ <expression> ] = <expression>

<ifstatement> ::= if <bexpression> then <slist> else <slist>endif

| if <bexpression> then <slist>endif

<whilestatement> ::= while <bexpression> do <slist>enddo

<printstatement> ::= print ( <expression> )

<expression> ::= <expression><addingop><term> | <term> | <addingop><term>

<bexpression> ::= <expression><relop><expression>

<relop> ::= < | <= | == | >= | > | !=

www.android.universityupdates.in | www.universityupdates.in | www.ios.universityupdates.in

www.android.universityupdates.in | www.universityupdates.in | www.ios.universityupdates.in

R18 B.TECH CSE III YEAR

<addingop> ::= + | –

<term> ::= <term><multop><factor> | <factor>

<multop> ::= * | /

<factor> ::= <constant> | <identifier> | <identifier> [ <expression>]

| ( <expression> )

<constant> ::= <digit> | <digit><constant>

<identifier> ::= <identifier><letterordigit> | <letter>

<letterordigit> ::= <letter> | <digit>

<letter> ::= a|b|c|d|e|f|g|h|i|j|k|l|m|n|o|p|q|r|s|t|u|v|w|x|y|z

<digit> ::= 0|1|2|3|4|5|6|7|8|9

<empty> has the obvious meaning

Comments (zero or more characters enclosed between the standard C/Java-style comment brackets

/*…*/) can be inserted. The language has rudimentary support for 1-dimensional arrays. The

declarationint a[3] declares an array of three elements, referenced as a[0], a[1] and a[2]. Note

also that you should worry about the scoping of names.

A simple program written in this language is:

{ int a[3],t1,t2;

t1=2;

a[0]=1; a[1]=2; a[t1]=3;

t2=-(a[2]+t1*6)/(a[2]-t1);

if t2>5 then

print(t2);

else {

int t3;

t3=99;

t2=-25;

print(-t1+t2*t3); /* this is a comment

on 2 lines */

}

endif

}

Concurrent Programming Lab

 

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Windows/Linux OS, C/C++/Java softwares  installed

60

1. Design and implement Two-thread mutual exclusion algorithm (Peterson’s Algorithm) using

multithreaded programming.

2. Design and implement Filter Lock algorithm and check for deadlock-free and starvation-free

conditions using multithreaded programming.

3. Design and implement Lamport’s Bakery Algorithm and check for deadlock-free and starvationfree

conditions using multithreaded programming.

4. Design and implement Lock-based concurrent FIFO queue data structure using multithreaded

programming.

5. Design a consensus object using read–write registers by implementing a deadlock-free or

starvation-free mutual exclusion lock. (Use CompareAndSet( ) Primitive).

6. Design and implement concurrent List queue data structure using multithreaded programming.

(Use Atomic Primitives)

7. Design and implement concurrent Stack queue data structure using multithreaded

programming. (Use Atomic Primitives)

8. Design and implement concurrent FIFO queue data structure using multithreaded

programming. (Use Atomic Primitives)

 

Machine Learning Lab

 

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with any Python/IDE software  installed

60

1. The probability that it is Friday and that a student is absent is 3 %. Since there are 5 school

days in a week, the probability that it is Friday is 20 %. What is theprobability that a student is

absent given that today is Friday? Apply Baye’s rule in python to get the result. (Ans: 15%)

2. Extract the data from database using python

3. Implement k-nearest neighbors classification using python

4. Given the following data, which specify classifications for nine combinations of VAR1 and VAR2

predict a classification for a case where VAR1=0.906 and VAR2=0.606, using the result of kmeans

clustering with 3 means (i.e., 3 centroids)

VAR1 VAR2 CLASS

1.713 1.586 0

0.180 1.786 1

0.353 1.240 1

0.940 1.566 0

1.486 0.759 1

1.266 1.106 0

1.540 0.419 1

0.459 1.799 1

0.773 0.186 1

5. The following training examples map descriptions of individuals onto high, medium and low

credit-worthiness.

medium skiing design single twenties no ->highRisk

high golf trading married forties yes ->lowRisk

low speedway transport married thirties yes ->medRisk

medium football banking single thirties yes ->lowRisk

high flying media married fifties yes ->highRisk

low football security single twenties no ->medRisk

medium golf media single thirties yes ->medRisk

medium golf transport married forties yes ->lowRisk

high skiing banking single thirties yes ->highRisk

low golf unemployed married forties yes ->highRisk

R18 B.TECH CSE III YEAR

Input attributes are (from left to right) income, recreation, job, status, age-group, home-owner. Find the

unconditional probability of `golf’ and the conditional probability of `single’ given `medRisk’ in the

dataset?

6. Implement linear regression using python.

7. Implement Naïve Bayes theorem to classify the English text

8. Implement an algorithm to demonstrate the significance of genetic algorithm

9. Implement the finite words classification system using Back-propagation algorithm


Mobile Application Development Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Android studio  installed

60

1. Create an Android application that shows Hello + name of the user and run it on an emulator.

(b) Create an application that takes the name from a text box and shows hello message along

with the name entered in text box, when the user clicks the OK button.

2. Create a screen that has input boxes for User Name, Password, Address, Gender (radio

buttons for male and female), Age (numeric), Date of Birth (Date Picket), State (Spinner) and a

Submit button. On clicking the submit button, print all the data below the Submit Button. Use

(a) Linear Layout (b) Relative Layout and (c) Grid Layout or Table Layout.

3. Develop an application that shows names as a list and on selecting a name it should show the

details of the candidate on the next screen with a “Back” button. If the screen is rotated to

landscape mode (width greater than height), then the screen should show list on left fragment

and details on right fragment instead of second screen with back button. Use Fragment

transactions and Rotation event listener.

4. Develop an application that uses a menu with 3 options for dialing a number, opening a website

and to send an SMS. On selecting an option, the appropriate action should be invoked using

intents.

5. Develop an application that inserts some notifications into Notification area and whenever a

notification is inserted, it should show a toast with details of the notification.

6. Create an application that uses a text file to store user names and passwords (tab separated

fields and one record per line). When the user submits a login name and password through a

screen, the details should be verified with the text file data and if they match, show a dialog

saying that login is successful. Otherwise, show the dialog with Login Failed message.

7. Create a user registration application that stores the user details in a database table.

8. Create a database and a user table where the details of login names and passwords are stored.

Insert some names and passwords initially. Now the login details entered by the user should

be verified with the database and an appropriate dialog should be shown to the user.

9. Create an admin application for the user table, which shows all records as a list and the admin

can select any record for edit or modify. The results should be reflected in the table.

10. Develop an application that shows all contacts of the phone along with details like name, phone

number, mobile number etc.

11. Create an application that saves user information like name, age, gender etc. in shared

preference and retrieves them when the program restarts.

12. Create an alarm that rings every Sunday at 8:00 AM. Modify it to use a time picker to set alarm

time.

13. Create an application that shows the given URL (from a text field) in a browser.


Network Programming Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems Linux OS and C software  installed

60

1. Implement programs for Inter Process Communication using PIPE, Message Queue and

Shared Memory.

2. Write a program to create an integer variable using shared memory concept and increment

the variable simultaneously by two processes. Use semaphores to avoid race conditions.

3. Design TCP iterative Client and server application to reverse the given input sentence

4. Design TCP iterative Client and server application to reverse the given input sentence

5. Design TCP client and server application to transfer file

6. Design a TCP concurrent server to convert a given text into upper case using multiplexing

system call “select”

7. Design a TCP concurrent server to echo given set of sentences using poll functions

8. Design UDP Client and server application to reverse the given input sentence

9. Design UDP Client server to transfer a file

10. Design using poll client server application to multiplex TCP and UDP requests for converting a

given text into upper case.

11. Design a RPC application to add and subtract a given pair of integers


Scripting Languages Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems Linux OS and Ruby, PCL, Pearl software  installed

60

1. Write a Ruby script to create a new string which is n copies of a given string where n is a nonnegative

integer

2. Write a Ruby script which accept the radius of a circle from the user and compute the parameter

and area.

3. Write a Ruby script which accept the user’s first and last name and print them in reverse order

with a space between them

4. Write a Ruby script to accept a filename from the user print the extension of that

5. Write a Ruby script to find the greatest of three numbers

6. Write a Ruby script to print odd numbers from 10 to 1

7. Write a Ruby script to check two integers and return true if one of them is 20 otherwise return

their sum

8. Write a Ruby script to check two temperatures and return true if one is less than 0 and the other

is greater than 100

9. Write a Ruby script to print the elements of a given array

10. Write a Ruby program to retrieve the total marks where subject name and marks of a student

stored in a hash

11. Write a TCL script to find the factorial of a number

12. Write a TCL script that multiplies the numbers from 1 to 10

13. Write a TCL script for Sorting a list using a comparison function

14. Write a TCL script to (i)create a list (ii )append elements to the list (iii)Traverse the list

(iv)Concatenate the list

15. Write a TCL script to comparing the file modified times.

16. Write a TCL script to Copy a file and translate to native format.

17. a) Write a Perl script to find the largest number among three numbers.

b) Write a Perl script to print the multiplication tables from 1-10 using subroutines.

18. Write a Perl program to implement the following list of manipulating functions

a)Shift

b)Unshift

c) Push

19. a) Write a Perl script to substitute a word, with another word in a string.

b) Write a Perl script to validate IP address and email address.

20. Write a Perl script to print the file in reverse order using command line arguments


Software Testing Methodologies Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Winrunner/Selenium installed

60

1. Recording in context sensitive mode and analog mode

2. GUI checkpoint for single property

3. GUI checkpoint for single object/window

4. GUI checkpoint for multiple objects

5. a) Bitmap checkpoint for object/window

a) Bitmap checkpoint for screen area

6. Database checkpoint for Default check

7. Database checkpoint for custom check

8. Database checkpoint for runtime record check

9. a) Data driven test for dynamic test data submission

b) Data driven test through flat files

c) Data driven test through front grids

d) Data driven test through excel test

10. a) Batch testing without parameter passing

b) Batch testing with parameter passing

11. Data driven batch

12. Silent mode test execution without any interruption

13. Test case for calculator in windows application


Data Mining Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Data Mining Tool like Weka installed

60

Task 1: Credit Risk Assessment

Description:

The business of banks is making loans. Assessing the credit worthiness of an applicant is of

crucial importance. You have to develop a system to help a loan officer decide whether the

credit of a customer is good, or bad. A bank’s business rules regarding loans must consider

two opposing factors. On the one hand, a bank wants to make as many loans as possible.

Interest on these loans is the banks profit source. On the other hand, a bank cannot afford to

make too many bad loans. Too many bad loans could lead to the collapse of the bank. The

bank’s loan policy must involve a compromise: not too strict, and not too lenient.

To do the assignment, you first and foremost need some knowledge about the world of credit.

You can acquire such knowledge in a number of ways.

1. Knowledge Engineering. Find a loan officer who is willing to talk. Interview her and

try to represent her knowledge in the form of production rules.

2. Books. Find some training manuals for loan officers or perhaps a suitable textbook on

finance. Translate this knowledge from text form to production rule form.

3. Common sense. Imagine yourself as a loan officer and make up reasonable rules

which can be used to judge the credit worthiness of a loan applicant.

4. Case histories. Find records of actual cases where competent loan officers correctly

judged when, and when not to, approve a loan application.

The German Credit Data:

Actual historical credit data is not always easy to come by because of confidentiality rules.

Here is one such dataset, consisting of 1000 actual cases collected in Germany. Credit dataset

(original) Excel spreadsheet version of the German credit data.

In spite of the fact that the data is German, you should probably make use of it for this

assignment. (Unless you really can consult a real loan officer!)

A few notes on the German dataset

1. DM stands for Deutsche Mark, the unit of currency, worth about 90 cents Canadian

(but looks and acts like a quarter).

2. owns_telephone. German phone rates are much higher than in Canada so fewer

people own telephones.

3. foreign_worker. There are millions of these in Germany (many from Turkey). It is

very hard to get German citizenship if you were not born of German parents.

4. There are 20 attributes used in judging a loan applicant. The goal is to classify the

applicant into one of two categories, good or bad.

Subtasks: (Turn in your answers to the following tasks)

1. List all the categorical (or nominal) attributes and the real-valued attributes separately.

(5 marks)

2. What attributes do you think might be crucial in making the credit assessment? Come

up with some simple rules in plain English using your selected attributes. (5 marks)

3. One type of model that you can create is a Decision Tree – train a Decision Tree using

the complete dataset as the training data. Report the model obtained after training. (10

marks)

4. Suppose you use your above model trained on the complete dataset, and classify credit

good/bad for each of the examples in the dataset. What % of examples can you

classify correctly? (This is also called testing on the training set) Why do you think

you cannot get 100 % training accuracy? (10 marks)

5. Is testing on the training set as you did above a good idea? Why or Why not ? (10

marks)

6. One approach for solving the problem encountered in the previous question is using

cross-validation? Describe what is cross-validation briefly. Train a Decision Tree

again using cross-validation and report your results. Does your accuracy

increase/decrease? Why? (10 marks)

7. Check to see if the data shows a bias against “foreign workers” (attribute 20), or

“personal-status” (attribute 9). One way to do this (perhaps rather simple minded) is to

remove these attributes from the dataset and see if the decision tree created in those

cases is significantly different from the full dataset case which you have already done.

To remove an attribute, you can use the preprocess tab in Weka’s GUI Explorer. Did

removing these attributes have any significant effect? Discuss. (10 marks)

8. Another question might be, do you really need to input so many attributes to get good

results? Maybe only a few would do. For example, you could try just having attributes

2, 3, 5, 7, 10, 17 (and 21, the class attribute (naturally)). Try out some combinations.

(You had removed two attributes in problem 7. Remember to reload the arff data file

to get all the attributes initially before you start selecting the ones you want.) (10

marks)

9. Sometimes, the cost of rejecting an applicant who actually has a good credit (case 1)

might be higher than accepting an applicant who has bad credit (case 2). Instead of

counting the misclassifications equally in both cases, give a higher cost to the first case

(say cost 5) and lower cost to the second case. You can do this by using a cost matrix

inWeka. Train your Decision Tree again and report the Decision Tree and cross validation

results. Are they significantly different from results obtained in problem 6

(using equal cost)? (10 marks)

10. Do you think it is a good idea to prefer simple decision trees instead of having long

complex decision trees? How does the complexity of a Decision Tree relate to the bias

of the model? (10 marks)

11. You can make your Decision Trees simpler by pruning the nodes. One approach is to

use Reduced Error Pruning – Explain this idea briefly. Try reduced error pruning for

training your Decision Trees using cross-validation (you can do this in Weka) and

report the Decision Tree you obtain? Also, report your accuracy using the pruned

model. Does your accuracy increase? (10 marks)

12.(Extra Credit): How can you convert a Decision Trees into “if-then-else rules”. Make

up your own small Decision Tree consisting of 2-3 levels and convert it into a set of

rules. There also exist different classifiers that output the model in the form of rules –

one such classifier in Weka is rules. PART, train this model and report the set of rules

obtained. Sometimes just one attribute can be good enough in making the decision,

yes, just one ! Can you predict what attribute that might be in this dataset ?OneR

classifier uses a single attribute to make decisions (it chooses the attribute based on

minimum error). Report the rule obtained by training a one R classifier. Rank the

performance of j48, PART and oneR. (10 marks)

Task 2: Hospital Management System

Data Warehouse consists Dimension Table and Fact Table.

REMEMBER The following

Dimension

The dimension object (Dimension):

_ Name

_ Attributes (Levels) , with one primary key

_ Hierarchies

One time dimension is must.

About Levels and Hierarchies

Dimension objects (dimension) consist of a set of levels and a set of hierarchies defined over

those levels. The levels represent levels of aggregation. Hierarchies describe parent-child

relationships among a set of levels.

For example, a typical calendar dimension could contain five levels. Two hierarchies can be

defined on these levels:

H1: YearL>QuarterL>MonthL>WeekL>DayL

H2: YearL>WeekL>DayL

The hierarchies are described from parent to child, so that Year is the parent of Quarter,

Quarter the parent of Month, and so forth.

About Unique Key Constraints

When you create a definition for a hierarchy, Warehouse Builder creates an identifier key for

each level of the hierarchy and a unique key constraint on the lowest level (Base Level)

Design a Hospital Management system data warehouse (TARGET) consists of Dimensions

Patient, Medicine, Supplier, Time. Where measures are ‘NO UNITS’, UNIT PRICE.

Assume the Relational database (SOURCE) table schemas as follows

TIME (day, month, year),

PATIENT (patient_name, Age, Address, etc.,)

MEDICINE ( Medicine_Brand_name, Drug_name, Supplier, no_units, Uinit_Price, etc.,)

SUPPLIER 🙁 Supplier_name, Medicine_Brand_name, Address, etc., )

If each Dimension has 6 levels, decide the levels and hierarchies, Assume the level names

suitably.

Design the Hospital Management system data warehouse using all schemas. Give the

example4-D cube with assumption names.


Internet of Things Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Python installed

 

Raspberry Pi

 

Required Sensors & Components

60

1 Start Raspberry Pi and try various Linix commands in command terminal window:

ls, cd, touch, mv, rm, man, mkdir, rmdir, tar, gzip, cat, more, less, ps, sudo, cron, chown,

chgrp, ping etc.

2. Run some python programs on Pi like:

Read your name and print Hello message with name

Read two numbers and print their sum, difference, product and division.

Word and character count of a given string

Area of a given shape (rectangle, triangle and circle) reading shape and appropriate values

from standard input

Print a name ‘n’ times, where name and n are read from standard input, using for and while

loops.

Handle Divided by Zero Exception.

Print current time for 10 times with an interval of 10 seconds.

Read a file line by line and print the word count of each line.

3. Light an LED through Python program

4. Get input from two switches and switch on corresponding LEDs

5. Flash an LED at a given on time and off time cycle, where the two times are taken from a

file.

6. Flash an LED based on cron output (acts as an alarm)

7. Switch on a relay at a given time using cron, where the relay’s contact terminals are

connected to a load.

8. Get the status of a bulb at a remote place (on the LAN) through web.

The student should have hands on experience in using various sensors like temperature,

humidity, smoke, light, etc. and should be able to use control web camera, network, and

relays connected to the Pi.


Python Programming Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Python installed

60

1. Write a program to demonstrate different number data types in Python.

2. Write a program to perform different Arithmetic Operations on numbers in Python.

3. Write a program to create, concatenate and print a string and accessing sub-string

from a given string.

4. Write a python script to print the current date in the following format “Sun May 29

02:26:23 IST 2017”

5. Write a program to create, append, and remove lists in python.

6. Write a program to demonstrate working with tuples in python.

7. Write a program to demonstrate working with dictionaries in python.

8. Write a python program to find largest of three numbers.

9. Write a Python program to convert temperatures to and from Celsius, Fahrenheit.

[ Formula: c/5 = f-32/9]

10. Write a Python program to construct the following pattern, using a nested for loop

*

* *

* * *

* * * *

* * * * *

* * * *

* * *

* *

*

11. Write a Python script that prints prime numbers less than 20.

12. Write a python program to find factorial of a number using Recursion.

13. Write a program that accepts the lengths of three sides of a triangle as inputs. The

program output should indicate whether or not the triangle is a right triangle (Recall

from the Pythagorean Theorem that in a right triangle, the square of one side equals

the sum of the squares of the other two sides).

14. Write a python program to define a module to find Fibonacci Numbers and import the

module to another program.

15. Write a python program to define a module and import a specific function in that

module to another program.

16. Write a script named copyfile.py. This script should prompt the user for the names of

two text files. The contents of the first file should be input and written to the second

file.

17. Write a program that inputs a text file. The program should print all of the unique

words in the file in alphabetical order.

18. Write a Python class to convert an integer to a roman numeral.

19. Write a Python class to implement pow(x, n)

20. Write a Python class to reverse a string word by word.


Web Scripting Languages Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer Systems with Python installed

60

1. Write a Ruby script to create a new string which is n copies of a given string where n

is a non-negative integer

2. Write a Ruby script which accept the radius of a circle from the user and compute the

parameter and area.

3. Write a Ruby script which accept the user’s first and last name and print them in

reverse order with a space between them

4. Write a Ruby script to accept a filename from the user print the extension of that

5. Write a Ruby script to find the greatest of three numbers

6. Write a Ruby script to print odd numbers from 10 to 1

7. Write a Ruby script to check two integers and return true if one of them is 20

otherwise return their sum

8. Write a Ruby script to check two temperatures and return true if one is less than 0 and

the other is greater than 100

9. Write a Ruby script to print the elements of a given array

10. Write a Ruby program to retrieve the total marks where subject name and marks of a

student stored in a hash

11. Write a TCL script to find the factorial of a number

12. Write a TCL script that multiplies the numbers from 1 to 10

13. Write a TCL script for Sorting a list using a comparison function

14. Write a TCL script to (i)create a list (ii )append elements to the list (iii)Traverse the

list (iv)Concatenate the list

15. Write a TCL script to comparing the file modified times.

16. Write a TCL script to Copy a file and translate to native format.

17. a) Write a Perl script to find the largest number among three numbers.

b) Write a Perl script to print the multiplication tables from 1-10 using subroutines.

18. Write a Perl program to implement the following list of manipulating functions

a) Shift

b) Unshift

c) Push

19. a) Write a Perl script to substitute a word, with another word in a string.

b) Write a Perl script to validate IP address and email address.

20. Write a Perl script to print the file in reverse order using command line arguments


List of M.Tech CSE Engineering Laboratories

S.No

Name of the Laboratory

1

Advanced Data Structures Lab

2

Machine Learning Lab

3

Advanced Algorithms Lab

4

Data Science Lab


Advanced Data Structures Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with C/C++/JAVA installed

20

1. Write a program to perform the following operations:

a) Insert an element into a binary search tree.

b) Delete an element from a binary search tree.

c) Search for a key element in a binary search tree.

2. Write a program for implementing the following sorting methods:

a) Merge sort b) Heap sort c) Quick sort

3. Write a program to perform the following operations:

a) Insert an element into a B- tree.

b) Delete an element from a B- tree.

c) Search for a key element in a B- tree.

4. Write a program to perform the following operations:

a) Insert an element into a Min-Max heap

b) Delete an element from a Min-Max heap

c) Search for a key element in a Min-Max heap

5. Write a program to perform the following operations:

a) Insert an element into a Lefiist tree

b) Delete an element from a Leftist tree

c) Search for a key element in a Leftist tree

6. Write a program to perform the following operations:

a) Insert an element into a binomial heap

b) Delete an element from a binomial heap.

c) Search for a key element in a binomial heap

7. Write a program to perform the following operations:

a) Insert an element into a AVL tree.

b) Delete an element from a AVL search tree.

c) Search for a key element in a AVL search tree.

8. Write a program to perform the following operations:

a) Insert an element into a Red-Black tree.

b) Delete an element from a Red-Black tree.

c) Search for a key element in a Red-Black tree.

9. Write a program to implement all the functions of a dictionary using hashing.

10. Write a program for implementing Knuth-Morris-Pratt pattern matching algorithm.

11. Write a program for implementing Brute Force pattern matching algorithm.

12. Write a program for implementing Boyer pattern matching algorithm.


Machine Learning Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with C/C++/JAVA installed

20

1. The probability that it is Friday and that a student is absent is 3 %. Since there are 5 school

days in a week, the probability that it is Friday is 20 %. What is theprobability that a student is

absent given that today is Friday? Apply Baye’s rule in python to get the result. (Ans: 15%)

2. Extract the data from database using python

3. Implement k-nearest neighbours classification using python

4. Given the following data, which specify classifications for nine combinations of VAR1 and

VAR2 predict a classification for a case where VAR1=0.906 and VAR2=0.606, using the

result of k-means clustering with 3 means (i.e., 3 centroids)

VAR1 VAR2 CLASS

1.713 1.586 0

0.180 1.786 1

0.353 1.240 1

0.940 1.566 0

1.486 0.759 1

1.266 1.106 0

1.540 0.419 1

0.459 1.799 1

0.773 0.186 1

5. The following training examples map descriptions of individuals onto high, medium and low

credit-worthiness.

medium skiing design single twenties no ->highRisk

high golf trading married forties yes ->lowRisk

low speedway transport married thirties yes ->medRisk

medium football banking single thirties yes ->lowRisk

high flying media married fifties yes ->highRisk

low football security single twenties no ->medRisk

medium golf media single thirties yes ->medRisk

medium golf transport married forties yes ->lowRisk

high skiing banking single thirties yes ->highRisk

low golf unemployed married forties yes ->highRisk

Input attributes are (from left to right) income, recreation, job, status, age-group, home-owner. Find

the unconditional probability of `golf’ and the conditional probability of `single’ given `medRisk’ in the

dataset?

6. Implement linear regression using python.

7. Implement Naïve Bayes theorem to classify the English text

8. Implement an algorithm to demonstrate the significance of genetic algorithm

9. Implement the finite words classification system using Back-propagation algorithm

 

 

Advanced Algorithms Lab

 

 

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with C/C++/JAVA installed

20

1. Implement assignment problem using Brute Force method

2. Perform multiplication of long integers using divide and conquer method.

3. Implement solution for knapsack problem using Greedy method.

4. Implement Gaussian elimination method.

5. Implement LU decomposition

6. Implement Warshall algorithm

7. Implement Rabin Karp algorithm.

8. Implement KMP algorithm.

9. Implement Harspool algorithm

10. Implement max-flow problem.


Data Science Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with R Studio and Scala installed

20

Write an R program to evaluate the following expression ax+b/ax-b.

2. Write an R program to read input from keyboard (hint: readLine()).

3. Write an R program to find the sum of n natural numbers: 1+2+3+4+….n

4. Write an R program to read n numbers.

(i) Sum of all even numbers (ii) Total number of even numbers.

5. Write an R program to read n numbers.

(i) Total number of odd numbers (ii) Sum of all odd numbers

6. Write an R program to obtain

(i)sum of two matrices A and B (ii) subtraction of two matrices A and B

(iii) Product of two matrices.

7. Write an R program for “declaring and defining functions “

8. Write an R program that uses functions to add n numbers reading from keyboard

9. Write an R program uses functions to swap two integers.

10. Write an R program that use both recursive and non-recursive functions for implementing the

Factorial of a given number, n.

11. Write an R program to reverse the digits of the given number {example 1234 to be written as

4321}

12. Write an R program to implement

(i)Linear search (ii) Binary Search.

13. Write an R program to implement

(i)Bubble sort (ii) selection sort.

14. Write a R program to implement the data structures

(i) Vectors (ii) Array (iii) Matrix (iv) Data Frame (v) Factors

15. Write a R program to implement scan(), merge(), read.csv() and read.table() commands.

16. Write an R program to implement “Executing Scripts” written on the note pad, by

calling to the R console.

17. Write a R program, Reading data from files and working with datasets

(i) Reading data from csv files, inspection of data.

(ii) Reading data from Excel files.

18. Write a R program to implement Graphs

(i) Basic high-level plots (ii)Modifications of scatter plots

(iii) Modifications of histograms, parallel box plots.


List of M.Tech CS Engineering Laboratories

S.No

Name of the Laboratory

1

Advanced Data Structures Lab

2

Machine Learning Lab

3

Advanced Algorithms Lab

4

Data Science Lab


Advanced Data Structures Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with C/C++/JAVA installed

20

1. Write a program to perform the following operations:

a) Insert an element into a binary search tree.

b) Delete an element from a binary search tree.

c) Search for a key element in a binary search tree.

2. Write a program for implementing the following sorting methods:

a) Merge sort b) Heap sort c) Quick sort

3. Write a program to perform the following operations:

a) Insert an element into a B- tree.

b) Delete an element from a B- tree.

c) Search for a key element in a B- tree.

4. Write a program to perform the following operations:

a) Insert an element into a Min-Max heap

b) Delete an element from a Min-Max heap

c) Search for a key element in a Min-Max heap

5. Write a program to perform the following operations:

a) Insert an element into a Lefiist tree

b) Delete an element from a Leftist tree

c) Search for a key element in a Leftist tree

6. Write a program to perform the following operations:

a) Insert an element into a binomial heap

b) Delete an element from a binomial heap.

c) Search for a key element in a binomial heap

7. Write a program to perform the following operations:

a) Insert an element into a AVL tree.

b) Delete an element from a AVL search tree.

c) Search for a key element in a AVL search tree.

8. Write a program to perform the following operations:

a) Insert an element into a Red-Black tree.

b) Delete an element from a Red-Black tree.

c) Search for a key element in a Red-Black tree.

9. Write a program to implement all the functions of a dictionary using hashing.

10. Write a program for implementing Knuth-Morris-Pratt pattern matching algorithm.

11. Write a program for implementing Brute Force pattern matching algorithm.

12. Write a program for implementing Boyer pattern matching algorithm.


Machine Learning Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with C/C++/JAVA installed

20

1. The probability that it is Friday and that a student is absent is 3 %. Since there are 5 school

days in a week, the probability that it is Friday is 20 %. What is theprobability that a student is

absent given that today is Friday? Apply Baye’s rule in python to get the result. (Ans: 15%)

2. Extract the data from database using python

3. Implement k-nearest neighbours classification using python

4. Given the following data, which specify classifications for nine combinations of VAR1 and

VAR2 predict a classification for a case where VAR1=0.906 and VAR2=0.606, using the

result of k-means clustering with 3 means (i.e., 3 centroids)

VAR1 VAR2 CLASS

1.713 1.586 0

0.180 1.786 1

0.353 1.240 1

0.940 1.566 0

1.486 0.759 1

1.266 1.106 0

1.540 0.419 1

0.459 1.799 1

0.773 0.186 1

5. The following training examples map descriptions of individuals onto high, medium and low

credit-worthiness.

medium skiing design single twenties no ->highRisk

high golf trading married forties yes ->lowRisk

low speedway transport married thirties yes ->medRisk

medium football banking single thirties yes ->lowRisk

high flying media married fifties yes ->highRisk

low football security single twenties no ->medRisk

medium golf media single thirties yes ->medRisk

medium golf transport married forties yes ->lowRisk

high skiing banking single thirties yes ->highRisk

low golf unemployed married forties yes ->highRisk

Input attributes are (from left to right) income, recreation, job, status, age-group, home-owner. Find

the unconditional probability of `golf’ and the conditional probability of `single’ given `medRisk’ in the

dataset?

6. Implement linear regression using python.

7. Implement Naïve Bayes theorem to classify the English text

8. Implement an algorithm to demonstrate the significance of genetic algorithm

9. Implement the finite words classification system using Back-propagation algorithm


Advanced Algorithms Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with C/C++/JAVA installed

20

1. Implement assignment problem using Brute Force method

2. Perform multiplication of long integers using divide and conquer method.

3. Implement solution for knapsack problem using Greedy method.

4. Implement Gaussian elimination method.

5. Implement LU decomposition

6. Implement Warshall algorithm

7. Implement Rabin Karp algorithm.

8. Implement KMP algorithm.

9. Implement Harspool algorithm

10. Implement max-flow problem.


Data Science Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with R Studio and Scala installed

20

Write an R program to evaluate the following expression ax+b/ax-b.

2. Write an R program to read input from keyboard (hint: readLine()).

3. Write an R program to find the sum of n natural numbers: 1+2+3+4+….n

4. Write an R program to read n numbers.

(i) Sum of all even numbers (ii) Total number of even numbers.

5. Write an R program to read n numbers.

(i) Total number of odd numbers (ii) Sum of all odd numbers

6. Write an R program to obtain

(i)sum of two matrices A and B (ii) subtraction of two matrices A and B

(iii) Product of two matrices.

7. Write an R program for “declaring and defining functions “

8. Write an R program that uses functions to add n numbers reading from keyboard

9. Write an R program uses functions to swap two integers.

10. Write an R program that use both recursive and non-recursive functions for implementing the

Factorial of a given number, n.

11. Write an R program to reverse the digits of the given number {example 1234 to be written as

4321}

12. Write an R program to implement

(i)Linear search (ii) Binary Search.

13. Write an R program to implement

(i)Bubble sort (ii) selection sort.

14. Write a R program to implement the data structures

(i) Vectors (ii) Array (iii) Matrix (iv) Data Frame (v) Factors

15. Write a R program to implement scan(), merge(), read.csv() and read.table() commands.

16. Write an R program to implement “Executing Scripts” written on the note pad, by

calling to the R console.

17. Write a R program, Reading data from files and working with datasets

(i) Reading data from csv files, inspection of data.

(ii) Reading data from Excel files.

18. Write a R program to implement Graphs

(i) Basic high-level plots (ii)Modifications of scatter plots

(iii) Modifications of histograms, parallel box plots.


List of M.Tech CN Engineering Laboratories

S.No

Name of the Laboratory

1

Advanced Data Structures Lab

2

Information Security Lab

3

Internet of Things Lab

4

Web & Database Security Lab


Advanced Data Structures Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with C/C++/JAVA installed

 

20

1. Write a program to perform the following operations:

a) Insert an element into a binary search tree.

b) Delete an element from a binary search tree.

c) Search for a key element in a binary search tree.

2. Write a program for implementing the following sorting methods:

a) Merge sort b) Heap sort c) Quick sort

3. Write a program to perform the following operations:

a) Insert an element into a B- tree.

b) Delete an element from a B- tree.

c) Search for a key element in a B- tree.

4. Write a program to perform the following operations:

a) Insert an element into a Min-Max heap

b) Delete an element from a Min-Max heap

c) Search for a key element in a Min-Max heap

5. Write a program to perform the following operations:

a) Insert an element into a Lefiist tree

b) Delete an element from a Leftist tree

c) Search for a key element in a Leftist tree

6. Write a program to perform the following operations:

a) Insert an element into a binomial heap

b) Delete an element from a binomial heap.

c) Search for a key element in a binomial heap

7. Write a program to perform the following operations:

a) Insert an element into a AVL tree.

b) Delete an element from a AVL search tree.

c) Search for a key element in a AVL search tree.

8. Write a program to perform the following operations:

a) Insert an element into a Red-Black tree.

b) Delete an element from a Red-Black tree.

c) Search for a key element in a Red-Black tree.

9. Write a program to implement all the functions of a dictionary using hashing.

10. Write a program for implementing Knuth-Morris-Pratt pattern matching algorithm.

11. Write a program for implementing Brute Force pattern matching algorithm.

12. Write a program for implementing Boyer pattern matching algorithm.


Information Security Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with C/C++/JAVA installed

 

20

List of Experiments:

1. Implementation of symmetric cipher algorithm (AES and RC4)

2. Random number generation using a subset of digits and alphabets.

3. Implementation of RSA based signature system

4. Implementation of Subset sum

5. Authenticating the given signature using MD5 hash algorithm.

6. Implementation of Diffie-Hellman algorithm

7. Implementation EIGAMAL cryptosystem.

8. Implementation of Goldwasser-Micali probabilistic public key system

9. Implementation of Rabin Cryptosystem. (Optional).

10. Implementation of Kerberos cryptosystem

11. Firewall implementation and testing.

12. Implementation of a trusted secure web transaction.

13. Cryptographic Libraries-Sun JCE/Open SSL/Bouncy Castle JCE.

14. Digital Certificates and Hybrid (ASSY/SY) encryption, PKI.

15. Message Authentication Codes.

16. Elliptic Curve cryptosystems (Optional)

17. PKCS Standards (PKCS1, 5, 11, 12), Cipher modes.


Internet of Things Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with Python installed

 

Arduino, Raspberry Pi, Node MCU micro controller Kits, LEDs Temparature and Distance sensors and other supporting components

 

20

List of Experiments

1. Using raspberry pi

a. Calculate the distance using distance sensor.

b. Basic LED functionality.

2. Using Arduino

a. Calculate the distance using distance sensor.

b. Basic LED functionality.

c. Calculate temperature using temperature sensor.

3. Using Node MCU

a. Calculate the distance using distance sensor.

b. Basic LED functionality.

Calculate temperature using temperature sensor.


Web & Database Security Lab

EQUIPMENT DETAIL

NOS.

LIST OF EXPERIMENTS

 

Computer System with C/C++/JAVA and MYSQL installed

 

20

1. Creation and manipulation of database using SQL scripts and graphical interfaces.

2. Implementing DAC: Implementation of database security policies using DAC in oracle

10g/SQL server

3. Implementing of MAC to ensure confidentiality and control information flow using either

Oracle 10g or SQL server. This provides exposure to understand the concepts of MAC and

Trojan hose

4. Implementation of Virtual Private Database using View using Oracle 10g or SQL server

5. Design a method to simulate the HTML injections and cross-site scripting (XSS) to exploit the

attackers.

6. Determine HTML injection bugs and possible measures to prevent HTML injection exploits.

7. Implement Secure coding for buffer flow heap attacks.

8. Implementation of Design methods to break authentication schemes

9. Implementation of methods for abusing Design Deficiencies against web sites