Preview

Binomial Heap

Satisfactory Essays
Open Document
Open Document
5409 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Binomial Heap
COURSE STRUCTURE AND SYLLABUS FOR 2-YEAR M. TECH. (COMPUTER SCIENCE & ENGINEERING) Approved by 83rd Academic Council Meeting held on 26 May, 2012

(YEAR 2012 ONWARDS)

INDIAN SCHOOL OF MINES DHANBAD- 826 004, JHARKHAND
1

2-YEAR M.TECH (CSE) COURSE STRUCTURE M. Tech (CSE) − I Semester Name of the Courses High Performance Computer Architecture Advanced Data Structures and Algorithms Discrete and Analytical Mathematics Elective−I Elective−II High Performance Computer Architecture Laboratory Advanced Data Structures and Algorithms Laboratory

Course No. CSC51101 CSC51102 CSC51103 CSE511xx CSE511xx CSC51201 CSC51202 TOTAL Contact Hours

L 3 4 3 3 3 0 0 16

T 1 0 1 0 0 0 0 2

P 0 0 0 0 0 3 3 6

Credit Hrs 7 8 7 6 6 3 3 40 24

Course No. CSE51101 CSE51102 CSE51103 CSE51104 CSE51105 CSE51106 CSE51107 CSE51108

List of Elective Subjects Elective−I & II Topics in Cryptography and Network Security Public Key Infrastructure and Network Security Web Technology Information Retrieval Techniques and Evaluation Advanced DBMS Bioinformatics Algorithms Computational Intelligence Grid Computing

L 3 3 3 3 3 3 3 3

T 0 0 0 0 0 0 0 0

P 0 0 0 0 0 0 0 0

Credit Hrs 6 6 6 6 6 6 6 6

2

Course No. CSC52101 CSC52102 CSE521xx CSE521xx CSE521xx CSC52201 CSC52202 TOTAL Contact Hours

M. Tech (CSE) − II Semester Name of the Courses L VLSI Design and Testing Advanced Computer Networks Elective–III Elective–IV Elective–V VLSI Design and Testing Laboratory Advanced Computer Networks Laboratory 3 3 3 3 3 0 0 15

T 1 1 0 0 0 0 0 2

P 0 0 0 0 0 3 3 6

Credit Hrs 7 7 6 6 6 3 3 38 23

Course No. CSE52101 CSE52102 CSE52103 CSE52104 CSE52105 CSE52106 CSE52107 CSE52108 CSE52109 CSE52110 CSE52111 CSE52112 CSE52113

Elective−III, IV & V Algorithmic Graph Theory Object Oriented Software Engineering Natural Language Processing Advances in Compiler Construction Advanced Operating Systems Interactive Computer Graphics Quantum Computing Soft Computing Technical

You May Also Find These Documents Helpful

  • Best Essays

    Peterson, L. L., & Davie, B. S. (2011). Computer Networks, Fifth Edition: A Systems Approach (The Morgan Kaufmann Series in Networking). Morgan Kaufmann.…

    • 968 Words
    • 5 Pages
    Best Essays
  • Powerful Essays

    0 0 0 "2 "2 0 0 0 0 0 1 0 0 1 2 0 0 3 3 0 1 0 0 0 0…

    • 2401 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Today’s lecture will be spent entirely in the computer lab. At the end of lab, submit this worksheet.…

    • 581 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1P01outline

    • 428 Words
    • 3 Pages

    This course introduces the basic concepts and terminology of computing. Its content is aimed at students…

    • 428 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HTC ChaCha

    • 8279 Words
    • 34 Pages

    A 5:0 - 6:30 MW 424 COMPUTER FUNDAMENTAL (BBA) A 2:0 - 3:30 ST 424 COMPUTER FUNDAMENTAL (BBA) B 3:30 - 5:0 MW 424 COMPUTER FUNDAMENTAL (BBA) C 5:0 - 6:30 ST 424 COMPUTER FUNDAMENTAL (CS) A 10:0 - 12:0 W 441 8:0 - 11:0 M CL2 8:0 - 10:0 W 432 8:0 - 11:0 M CL8 2:0 - 4:0 T 441 2:0 - 5:0 S CL4 LABORATORY COMPUTER NETWORKS…

    • 8279 Words
    • 34 Pages
    Satisfactory Essays
  • Good Essays

    Peaceful action allows a community to not only highlight the injustices of society, but to create a solution to the problem. To ensure the success of a nonviolent campaign, one must consider the sources of power of the opponent and the need for unity among the protesters. For example, in her Ted Talk, “The Secret to Effective Nonviolent Protest,” Jamila Raqib employs a graphic of a block tower, representing ISIS, with each block representing a necessary component of ISIS’s power, such as skilled labor. As these blocks are removed one by one, the structure of the tower crumbles, and ultimately collapses. Raqib uses a cause-and-effect relationship to illustrate how depriving opponents of their vital resources and institutions allows protesters to attack the oppressors at their foundation to break them from the ground up.…

    • 486 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Lights Out Linear Algebra

    • 1112 Words
    • 5 Pages

    The purpose of this project is to solve the game of Light’s Out! by using basic knowledge of Linear algebra including matrix addition, vector spaces, linear combinations, and row reducing to reduced echelon form.…

    • 1112 Words
    • 5 Pages
    Better Essays
  • Good Essays

    It210 Syllabus

    • 2333 Words
    • 10 Pages

    College of Information Systems & Technology IT/210 Version 5 Fundamentals of Programming With Algorithms and Logic…

    • 2333 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    The Computer Engineering curriculum teaches students about computer hardware, software, integration, interfacing, and applications, with a strong emphasis on analysis and design. In their first two years, students obtain a solid foundation in mathematics and sciences. In their third year, students are introduced to a broad spectrum of computer engineering disciplines. In their senior year, students gain in-depth knowledge in elective areas of electrical engineering and computer science. In addition to solving technical problems, engineers must also be responsible and respected members of the community. Therefore, the curriculum includes a range of general education courses to round out the students university education.…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lobos

    • 942 Words
    • 4 Pages

    Computer Science & Engg. & Information Science & Engg. III Sem. 9.30 a.m. - 12.30 p.m. MATDIP301–Advanced Mathematics–I 10MAT31–Engineering Mathematics–III 10CS32–Electronic Circuits 10CS33–Logic Design 10CS34–Discrete Mathematical Structures 10CS35–Data Structures with C 10CS36–Object Oriented Programming with C++…

    • 942 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    References: [1] An Effective Log Mining Approach for Database Intrusion Detection, Yi Ru, Alina Campan, James Walden, Irina…

    • 2609 Words
    • 11 Pages
    Better Essays
  • Better Essays

    Nor Ayu Hidayah Binti Mohd Safri (31743) Department of Electronic Engineering (Computer) Universiti Malaysia Sarawak, Malaysia Kuching, Sarawak, Malaysia Email : nor_ayu92@yahoo.com…

    • 2493 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Unix Programming

    • 877 Words
    • 4 Pages

    This type of course work is very helpful to the IT students especially to those students who want to build their future milestone in computing.…

    • 877 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    CSE115 Chapter 1

    • 1631 Words
    • 7 Pages

    CSE115 Computing Concepts Monday, May 28, 2012 CSE115: Lecture 1 1 Chapter 1: Introduction Overview: Misconception about Computer Science what’s Computer Science algorithms the importance of algorithmic problem solving Pseudocode Monday, May 28, 2012 CSE115: Lecture 1 2 Misconception about Computer Science: What it is not There is a lot of misconception about this area of study Unlike physics, chemistry or biology, most of us do not have an intuitive feeling for Computer Science It is not the study of Computers how to write programs the uses and applications of computers and software These are not necessarily incorrect; rather incomplete definition of Computer Science Monday, May 28, 2012 CSE115: Lecture 1 3 Computer Science: What it is not…

    • 1631 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    hola

    • 329 Words
    • 2 Pages

    The research is intended to improve hardware (physical sciences and semiconductors research), services (business modelling, consulting, and operations research), software (programming languages, security, speech recognition, data management, and collaboration tools), and systems (operating systems and server design), as well as to extend the mathematics and science that support the information technology industry.…

    • 329 Words
    • 2 Pages
    Satisfactory Essays