Course Content

Episteme's YEP(Young Engineers Program) is an assisted learning to help young engineering graduates to get better at what they do professionally and to bridge the gap between engineering education and industry . We accomplish this by organizing workshops, helping to complete Mini and Major Projects and by internships.

Issues such as modularity and efficiency in the implementation of protocols are covered. The emphasis will be very much the design and implementation of high-performance, robust, and scalable network applications. Security and private data transmission techniques over public networks are covered. Client-Server applications are designed and implemented using the Secure Sockets Layer (SSL) API. An in-depth coverage of techniques used to design and develop secure code and robust applications will be provided.

We are offering Mini, Major Projects and internships on each subject for students pursuing B.Tech for the betterment of quality in education. Currently we are focusing on Embedded/Microcontroller, Matlab, VLSI, DSP, DIP, Embedded Linux (Raspberry Pi, BeagleBone), Android and Software based Student Projects.We are providing latest specially designed and developed Embedded Live Projects for Final year BE/B.Tech, ME/M.Tech, BSc/MSc Electronics and Polytechnic/Diploma Students. We prepare students for Project presentations, Interview skills and also assist students in developing Complete Project Hardware, Software Coding and Documentation. We make sure the students to succeed and get through the project.


B.TECH EMBEDDED MAJOR PROJECT BASED ON AVR , PIC , ARDUINO , ARM 7 , ARM 9 , RASPBERRY PI LIST FOR 2015-2016

  1. Sophisticated sign board power saving system scheduling by designing the calendar using ARM
  2. A wireless Data acquisition and transmission system design.
  3. The Electronic Passport and the Future of Government-Issued RFID-Based Identification.
  4. An Active Information Display System using SMS based on ARM7 processor.
  5. Design of Automatic Meteorological Data Acquisition System Based on ARM and CAN Bus - IEEE
  6. LPC2148 and GPS based data logger and real time vehicle tracking using GSM technology.
  7. Home Automation System based on ARM and Zigbee.
  8. Electronic voting system design for Rigging-free Governing using SMARTCARD & Biometric (Fingerprint)
  9. Development of Smart Notice Board using LPC2148 Active Information Display System on monitor.
  10. Advanced Electronic voting machine using ARM.
  11. Design of remote data monitoring and recording system Based on ARM (data recording to SD card) - IEEE
  12. Exploiting Bluetooth on android mobile devices for home security applications - IEEE
  13. Climate monitoring system based on ARM7 (LPC2148)
  14. Fingerprint Based Voting System for Rigging Free Governing.
  15. Biometric fingerprint based bank locker security system.
  16. Fingerprint based Authentication and Controlling System of Devices.
  17. Design of remote data monitoring and recording monitoring system based on ARM (data recording to SD card).
  18. Climate monitoring system based on ARM7(LPC2148).
  19. Design vehicle positioning system with exact location address based on ARM - IEEE
  20. MMC card interface to the ARM controller for data acquisition applications
  21. Gas leakage detection & monitoring system using WSN.
  22. Design and Implementation of ARM based data acquisition system.
  23. Sophisticated Multipurpose Card design using LPC2148 and smart card technology
  24. A wireless data collection system using ARM and GPRS
  25. Design and implementation of fingerprint based security system using LPC2148.
  26. ATM system design using LPC2148, Smart Card Reader/Writer and Fingerprint.
  27. Design of intelligent home system based on Zigbee and GPRS technology.
  28. Design of an embedded control and acquisition system for industrial local area networks based on ARM - IEEE
  29. Design Vehicle positioning system based on ARM.
  30. Advanced vehicle security system with theft control and accident notification.
  31. MMC card interface to the ARM controller for data acquisition applications.
  32. ARM7 based embedded web server.
  33. Random password generation and intimation to user through SMS for high security applications using ARM
  34. Drip Irrigation system to save Water and Enhance Crop Yields
  35. Three phase monitoring with SMS alert for industrial and commercial application
  36. 11. Application and Evaluation of High Power Zigbee Based Wireless Sensor Network in Water Irrigation Control Monitoring System.
  37. Design and development OF FPRS, keypad based atm security system.
  38. BIOMETRIC FINGER PRINT RECOGNITION BASED TIME AND ATTENDANCE SYSTEM.
  39. Bus detection device for the blind using passive RFID application.
  40. CONTROLLING ROBOT BY GSM SMS.
  41. DESIGN AND DEVELOPMENT OF A GSM BASED VEHICLE THEFT CONTROL SYSTEM.
  42. Design and Implementation of Ethernet based home security.
  43. DESIGN AND APPLICATION OF MOBILE EMBEDDED SYSTEMS FOR HOME CARE APPLICATIONS.
  44. MULTISENSOR STRATEGIES TO ASSIST BLIND PEOPLE A CLEAR PATH INDICATOR.
  45. RF Control system with robot car for spying operations.
  46. ROBUST AND EFFICIENT PASSWORD-AUTHENTICATED KEY AGREEMENT USING SMART CARDS FOR CAMPUS MANAGEMENT.
  47. DESIGN AND DEVELOPMENT OF FPRS,GSM BASED SCHOOL MANAGEMENT SYSTEM.
  48. TICKET WENDING MACHINE FOR UNDER GROUND TUBE STATION.
  49. Two-dimensional position detection system with MEMS accelerometer for mouse applications.
  50. LOCATION-AWARE FALL DETECTION SYSTEM FOR MEDICAL CARE QUALITY IMPROVEMENT.
  51. Sophisticated sign board power saving system scheduling by designing the calendar
  52. Study on the Embedded Can Bus Control System in the Vehicle - IEEE
  53. GSM based bore well water level monitor cum motor control
  54. E-safe system design for security applications using PIR and touch screen
  55. Design of integrated mine safety monitor system using ZIGBEE and CAN - IEEE
  56. Smart android based Multiple application robot
  57. A vehicle to vehicle communication protocol for co-OPERATIVE COLLISION warning.
  58. A DESIGN OF EMBEDDED SYSTEM FOR A FUTURE SMART CAR-FOCUSED ON SAFETY, SECURITY AND VEHICLE-VEHICLE COMMUNICATION.
  59. TRAFFIC LIGHT PRIORITY CONTROL FOR EMERGENCY VEHICLES.
  60. RFID AND GSM BASED ADVANCED VEHICLE PARKING SLOT BOOKING SYSTEM.
  61. Design and Implementation on the Intelligent Management System of Garage.
  62. ZIGBEE/BLUETOOTH AND TOUCH SCREEN CONTROLLED PC.
  63. ZIGBEE BASED WORELESS VOICE TO TEXT TRANSLATOR IN AIRLINES / HOSIPITAL ASSISTANT SYSTEM FOR BLIND / ILLITERATES.
  64. GPS-GSM INTEGRATION FOR ENHANCING PUBLIC TRANSPORTATION MANAGEMENT SERVICES.
  65. BUS DETECTION DEVICE FOR THE BLIND USING RFID APPLICATION (14,34 are similar).
  66. WIRELESS GESTURES CONTROLLED ROBOT WITH VOICE AND VIDEO CAMERA.
  67. The Design and Implementation of Remote Real Time Monitor System for Embedded Devices Based on GPRS - IEEE
  68. Eight channel data acquisition and logging system
  69. SMART Cursor Movement: Computer Cursor movement based on movement of your hand in the air or hand gestures.
  70. Computer cursor movement based on the TV remote.
  71. PC mouse controlled Robot movement.
  72. Microcontroller based single channel data acquisition with graph plotting on GLCD (temperature vs. time)
  73. Programmable industrial on-off timer with RF remote
  74. SMART CARD / RFID BASED DOOR OPEN/CLOSE.
  75. A SIMPLE STRATEGY OF POWER FACTOR CORRECTION BASED ON LOW & MICRO CONTROLLER UNIT.
  76. AN ONLINE PREPAID ENERGY METER.
  77. DESIGN OF SUBSTATION TEMPERATURE MONITORING SYSTEM.
  78. HOME ENERGY MANAGER A CONSUMER-ORIENTED INTERACTIVE TOOL TO OPTIMIZE ENERGY USING SCADA.
  79. The Design and Implement of Embedded Remote Control System in Industrial Robot - IEEE
  80. Design of remote intelligent home system based on ZigBee and GPRS technology - IEEE
  81. Student Data Logging System into College Website based on RFID
  82. Automatic travel bill generation system using passive RFID
  83. An integrated solution of Ultrasonic Obstacle Avoidance and Blind Navigation System using RFID for Indoor Environments.
  84. RFID based office attendance logger
  85. Payment Automation at Toll Gate using RFID with SMS alerts
  86. Sophisticated Multipurpose Card using RFID
  87. Library books Maintenance by RFID tags
  88. Accident detection and reporting system with exact address using GPS, GPRS and GSM technology - IEEE
  89. Design of Automatic Meteorological Data Acquisition System Based on AVR and CAN Bus - IEEE
  90. Design of an embedded control and acquisition system for industrial local area networks based on AVR - IEEE
  91. Design of an embedded control and acquisition system for industrial local area networks based on AVR - IEEE
  92. RFID based airport luggage management system
  93. RFID based ATM system design
  94. RFID based voting system design
  95. RFID based home/office security system
  96. Automatic speed control system using RFID
  97. Vision Based Robotic System for Military Applications
  98. Random password generation and intimation to user through SMS for high security applications
  99. Design and development of embedded live & motion detection system for military applications to target the position
  100. Touch screen based password entry for security applications based on fixed pattern mechanism and alert system
  101. Security Management System for Oilfield Based on ZIGBEE Wireless Communication
  102. War field spying robot with wireless camera
  103. Paperless E-Cash Management System by using Smart card Technology
  104. Smart card based Attendance System
  105. Unique ID Card Design for personal data transactions using smart card technology
  106. Electronic voting system design for Rigging Free Governing using Smartcard & Fingerprint
  107. SMART CARD Based Voting System for Rigging-free Governing
  108. SMART CARD based ATM system design
  109. Authentication and access control system for device using SMART CARD
  110. Smart card based Petrol card system
  111. Electronic toll collection system
  112. Location based vehicle speed control using RFID
  113. An embedded real time fingerprint recognition locker system for high security applications
  114. Touch screen based advanced menu display and ordering system for restaurants
  115. A LOW COST MICRO CONTROLLER IMPLEMENTATION OF NEURAL NETWORK BASED HURDLE AVOIDANCE CONTROLLER FOR A CAR-LIKE ROBOT
  116. ACTIVITY MONITORING SYSTEM USING DYNAMIC TIME WARPING FOR THE ELDERLY AND DISABLED PERSONS
  117. Design and Implementation on the Intelligent Management System of Garage
  118. EARTHQUAKES AND TSUNAMI ALERT THROUGH GSM NETWORK
  119. FRIENDLY HOME AUTOMATION SYSTEM USING CELL PHONE WITH FEEDBACK INSTANT VOICE MESSAGES
  120. RFID AND ZIGBEE BASED VOICE ENABLED CALLING BELL SYSTEM
  121. RFID BASED HUMAN OR VEHICLE IDENTIFICATION SYSTEM
  122. TOUCH PANEL BASED WIRELESS DISH ORDERING SYSTEM FOR RESTAURANTS
  123. Wireless smoke detection system using radio frequency
  124. DEVELOPMENT OF ADVANCED EMBEDDED SYSTEM FOR ACCIDENT AVOIDANCE
  125. GPS based GEO weather data logging into memory card (2GB / 4GB)
  126. Real-time atomization of agricultural environment for social modernization of Indian
  127. agricultural system - IEEE
  128. Student Data Logging System into College Website based on NFC
  129. Automatic travel bill generation system using NFC
  130. An integrated solution of Ultrasonic Obstacle Avoidance and Blind Navigation System using NFC for Indoor Environments.
  131. NFC based office attendance logger
  132. Payment Automation at Toll Gate using NFC with SMS alerts
  133. Sophisticated Multipurpose Card using NFC
  134. Library books Maintenance by NFC tags
  135. NFC based airport luggage management system
  136. NFC based ATM system design
  137. NFC based voting system design
  138. NFC based home/office security system
  139. Automatic speed control system using NFC
  140. Design And Implementation Of Embedded Indoor Intelligent Temperature Control System - IEEE
  141. Design of monitoring system for coal mine safety based on wireless sensor network - IEEE
  142. Development on Gas Leak Detection and Location System Based on Wireless Sensor Networks - IEEE
  143. Embedded web server for wireless sensor networks - IEEE
  144. Touch screen based wheel chair implementation for physically challenged persons
  145. Automatic Touch Screen based vehicle Driving system
  146. Touch panel based Home Automation
  147. Touch screen based wireless mouse
  148. Touch screen based automation with password protection
  149. Touch screen based robot control
  150. Design of remote data monitoring and recording system Based on AVR (data recording to SD card) - IEEE
  151. Implementation of a CAN-Based Multi Controller Digital Driving System for a Vehicle - IEEE
  152. Next Generation A Secure E-Voting System Based On Biometric Fingerprint Method - IEEE
  153. Touch screen based wireless mouse
  154. Microcontroller based single channel data acquisition with graph plotting on GLCD (temperature vs time)
  155. Real time clock display on Graphical LCD
  156. Digital clock implementation on LED propeller display using Persistence of Vision MEDICAL AND HEALTHCARE
  157. Patient Health Monitoring and Alert System using Zigbee Technology
  158. Advanced Patient Monitoring and alert system using Zigbee and GSM for hospitals and old age homes
  159. Patient Health Monitoring and alert system using Zigbee Technology within the hospitals
  160. Environment Sensing using Smart phone - IEEE
  161. GPS bases warfare simulation for military applications
  162. GPS based Warfare Simulation
  163. GPS & GSM based Accident Alarm System (GSM, GPS & Accelerometer sensor)
  164. GPS based universal clock (Gets the time from satellites and displays on Graphical LCD)
  165. Advanced vehicle security system with theft control and accident notification
  166. Trace out the latitude, longitude, universal time and Altitude values using GPS
  167. Design of bus vehicle monitoring terminal design
  168. Embedded Microcontroller using GPS as a Security Resource for Disabled People
  169. Digital driving system with access control using CAN using finger print technology
  170. Electronic eye with security system using SMS alert and automatic door lock
  171. RF based Remote control robot
  172. PC Controlled Wireless Robot Using RF Module with Feedback Sensor To Detect Fire and Temperature
  173. Design and implementation of RF controlled Robotic arm for industrial and commercial applications
  174. PC Controlled Wireless Robot (RF + PC)
  175. Train and railway gate monitoring system
  176. In-building Lighting Management System with Wireless Communication
  177. PC Controlled Wireless Robot Using RF Module with Feedback Sensor To Detect Temperature
  178. Design and implementation of RF controlled Robotic arm for industrial and commercial applications
  179. Arduino based notification system design using data logger (with SD card)
  180. Arduino based Room Temperature Monitor
  181. Sending SMS in black spot area in an innovative manner
  182. GSM based instantaneous vehicle registration details extraction system very useful for Traffic police
  183. Student College Alert System to Parents by Entry at College Premises by Using GSM SMS
  184. A wireless data collection system using microcontroller and GPRS
  185. Automated System for Fault Analysis in Industries and intimation through SMS
  186. RFID And GSM Based Intelligent Mail Box
  187. Vehicle parking slot booking system using RFID and GSM
  188. Secured money transactions by providing a unique id using finger print and GSM technology
  189. GSM based digital notice board and voting system
  190. Embedded Automobile Engine Locking System Using GSM Technology
  191. Intelligent system for hazardous gas, Human detection and temperature monitor control using GSM technology
  192. GSM based industrial protection system using Temperature, Smoke sensors and Light Dependent Resistor
  193. Home Automation And Security Using GSM Modem With SMS
  194. Remote Motor Speed Control using Cell Phones
  195. Dam Water Level Intimation & Alerting System Using GSM
  196. Real-time industrial process monitoring & control using GSM phone
  197. Anti theft alert and auto arresting system for museums and jewelry shops
  198. GSM based Secured ATM Banking
  199. A remote measurement and control system for Greenhouse based on GSM-SMS
  200. Public Transportation using GPS and GSM
  201. A scheme for the application of Smart Message Language in a Wireless Meter Reading System
  202. IVRS for college data base management
  203. GSM based IVRS for industrial automation
  204. Advanced Prepaid Energy Metering System using GSM
  205. Embedded System for Home Automation Using SMS
  206. Design and Implementation of Vehicle Tracking System using GPS/GSM/GPRS Technology and Smartphone Application
  207. Freighter Fuel Level Detection and Overload Alarming System with Safety Notification via GSM
  208. Data Logger Project using an Arduino
  209. Arduino based GPS GEO weather data logging into 2GB memory card
  210. Arduino based automatic water tap control
  211. Ultrasonic based Path Planning for the Blind Person
  212. Position location and navigation aid for blind (Using RFID and Ultrasonic module)
  213. GSM based industrial protection system using Temperature, Smoke sensors and Light Dependent Resistor
  214. Design & Implementation of a Wireless Remote Data Acquisition System for Mobile Applications
  215. Automated System for Fault Analysis in Industries and intimation through SMS
  216. Microcontroller managed module for automatic ventilation of vehicle interior
  217. Microcontroller managed module for automatic ventilation of vehicle interior
  218. Design and Implementation of an Embedded Home Surveillance System by Use of Multiple Ultrasonic Sensors
  219. Arduino weather station system design
  220. Arduino based home automation
  221. Modern restaurants atomization using ZigBee technology
  222. ZigBee based street light automation system
  223. Design and Development of Agriculture System using Wireless Sensor Network
  224. ZigBee based automated irrigation system
  225. Forest Fire Detection System based on a ZigBee Wireless Sensor Network
  226. Development on Gas Leak Detection and Location System Based on Wireless Sensor Networks
  227. Low-cost Structural Health Monitoring Scheme Using Wireless devices
  228. Reliable transmission protocol for ZigBee based wireless patient monitoring
  229. Wireless sensor network based home monitoring system for wellness determination of elderly
  230. Smart helmet for coal mines using Zigbee
  231. Energy Efficient Environment Monitoring System based on the IEEE 802.15.4 standard for Low Cost Requirements
  232. Surveillance System with Light Sensor
  233. Multiple Device Controlling using Zigbee
  234. Home Appliance Control using Zigbee on ATMEGA128 Hardware Platform
  235. Arduino based remote data monitoring with SMS facility
  236. Arduino based automatic door bell
  237. Autonomous Auto navigation Robot using Arduino
  238. Arduino based wireless data acquisition system
  239. Making Robot Using Android and Arduino
  240. The design and implement of embedded remote control system in industrial robot
  241. Design and implementation of white board cleaning robot
  242. A Hands Gesture System of Control for an Intelligent Wheelchair
  243. Design and implementation of wireless bomb disposal robot
  244. Design and implementation of pc based robot control for industrial applications
  245. ZigBee based remote controlled robot with wireless video camera mounted on it (360 camera rotation)
  246. Design and implementation of RF controlled Robotic arm for industrial and commercial applications
  247. Bluetooth based robotic arm control (i/p from smart phone)
  248. Wireless path finder cum gas detection robot
  249. Automatic floor cleaning robot for household applications
  250. PC Controlled Wireless Robot Using RF Module with Feedback Sensor to Detect Fire and Temperature
  251. Implementation of Obstacle Avoidance and ZigBee Control Functions for Omni Directional Mobile Robot
  252. Accelerometer Based Robotic ARM (Using wireless communication )
  253. PICK and PLACE robot using TV remote
  254. The Design and Implement of Embedded Remote Control System in Industrial Robot
  255. Development of Vision-Based Sensor of Smart Robot for Industrial Applications
  256. Arduino based fault indication system
  257. Arduino based Tow vehicle
  258. Arduino based Robotic Hand
  259. Arduino RFID door lock
  260. Operation of DC motor to an exact speed entered by PC
  261. RF based speed control of a motor
  262. Bidirectional rotation of a single phase induction motor using remote
  263. PC based home automation system
  264. Soft start of induction motor
  265. Ammeter designing for various AC application
  266. Hidden cell phone detection in exam halls using RF with microcontroller
  267. Contact less digital tachometer with display on LCD
  268. Auto door operation for shopping malls using ultrasonic sensor
  269. Temperature dependent speed regulation of fan using fuzzy logic
  270. ZCS switching of an AC load
  271. Power factor correction
  272. On load tap changer
  273. Wireless energy meter with cross checking facility
  274. Electricity distribution system
  275. Embedded system integrated into a wireless sensor network for online dynamic torque and efficiency monitoring in induction motors
  276. Maximum demand controller
  277. Power control and logging system
  278. Soft start of 1 phase induction motor
  279. Distribution transformer parameter monitoring system (V,I&t monitoring)
  280. Bidirectional speed control of 1 phase induction motor (PWM based)
  281. Bidirectional speed control of 1 phased induction motor (ZVS based)
  282. Pure sine wave inverter implementation
  283. Electrical parameter based SCADA using wireless technology (4 channel)
  284. Auto tracking antenna using stepper motor control
  285. Mobile based tap changer
  286. Digital Capacitance Meter
  287. Microcontroller based Cycloconverter
  288. Power and Safety Management of Electrical Appliances in a Smart Power Distribution System
  289. Microcontroller-based multiple-platform PWM signal generation procedures for industrial use
  290. A Unique Model of Characterization & Performance Estimation of Various Solar Photovoltaic Cells/Modules using Microcontroller
  291. Arduino 7-Segment Thermometer
  292. Displaying images on GLCD using Arduino
  293. Arduino Control DC Motor via Bluetooth

B.TECH EMBEDDED MAJOR PROJECT BASED ON ARM 9, ARM 11, RASPBERRY PI, INTEL I3, I5 RT-LINUX ADVANCED PROJECTS

  1. Anomaly Detection in IP Networks, With demonstration on Linux.
  2. RIP Protocol implementation in IP networks, with demonstration on Linux.
  3. Introduction to TCP/IP Network attacks, With demonstration on Linux.
  4. FTP protocol implementation in IP networks, with demonstration on Linux.
  5. VOIP security in IP networks, with demonstration on Linux.
  6. Temporal Traffic Dynamics Improve the Connectivity of Ad Hoc Cognitive Radio Networks
  7. Reliable and Timely Event Notification for Publish/Subscribe Services Over the Internet
  8. Max-Weight Scheduling in Queueing Networks With Heavy-Tailed Traffic
  9. Achieving Energy Efficiency and Reliability for Data Dissemination in Duty-Cycled WSNs
  10. Securing building management systems using named data networking
  11. DTN-Meteo: Forecasting the Performance of DTNProtocols Under Heterogeneous Mobility
  12. IPSec application in IP networks, with demonstration on Linux.
  13. DHCP Clint implementation in IP networks, with demonstration on Linux.
  14. Thesis on security firewalls.
  15. Thesis on ALGs.
  16. SIP protocol implementation in IP networks, with demonstration on Linux.
  17. NAT protocol implementation in IP networks, with demonstration on Linux.
  18. Thesis on IPSEC VPN.
  19. Thesis on VOIP protocols.
  20. Thesis on IP.
  21. Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
  22. Content Caching and Scheduling in Wireless Networks With Elastic and Inelastic Traffic
  23. Channel-Hopping-Based Communication Rendezvous in Cognitive Radio Networks
  24. On the Delay Performance of In-Network Aggregation in Lossy Wireless Sensor Networks
  25. Retransmission Delays With Bounded Packets: Power-Law Body and Exponential Tail
  26. PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
  27. AH protocol implementation in networks, with demonstration on Linux.
  28. ESP protocol implementation in IP networks, with demonstration on Linux.
  29. IKE protocol implementation in IP networks, with demonstration on Linux.
  30. SNMP protocol implementation in IP networks, with demonstration on Linux.
  31. L2TP protocol implementation in IP networks, with demonstration on Linux.
  32. PPTP protocol implementation in IP networks, with demonstration on Linux.
  33. ARP protocol implementation in IP networks, with demonstration on Linux.
  34. Thesis on TCP congestion.
  35. Study on ICMP.
  36. Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks
  37. Asymptotic Analysis on Secrecy Capacity in Large-Scale Wireless Networks
  38. Broadcasting Delay-Constrained Traffic Over Unreliable Wireless Links With Network Coding
  39. An Economic Framework for Routing and Channel Allocation in Cognitive Wireless Mesh Networks
  40. Joint Routing and Medium Access Control in Fixed Random Access Wireless Multihop Networks
  41. CSMA-Based Robust AP Throughput Guarantee Under User Distribution Uncertainty
  42. DHCP protocol implementation in IP networks, with demonstration on Linux.
  43. FTP Client implementation in IP networks, with demonstration on Linux.
  44. FTP Server implementation in IP networks, with demonstration on Linux.
  45. TELNET protocol implementation in IP networks, with demonstration on Linux.
  46. ARP protocol implementation in IP networks, with demonstration on Linux Embedded controllers.
  47. Implementation of Mobile Phone.
  48. Converts the light energy from the sun into electrical energy.
  49. Message Scrolling on LCD using Alarm.
  50. Exact and Heuristic Algorithms for Data-Gathering Cluster-Based Wireless Sensor Network Design Problem
  51. Maximizing P2P File Access Availability in Mobile Ad Hoc Networks Though Replication for Efficient File Sharing
  52. Certification Authorities Under Attack: A Plea for Certificate Legitimation
  53. Cost-Effective Resource Allocation of Overlay Routing Relay Nodes
  54. A Dynamically Reconfigurable System for Closed-Loop Measurements of Network Traffic
  55. SWIM: A Switch Manager for Datacenter Networks
  56. Design and Implementation on the Intelligent Management system of Garage.
  57. Wireless Gestures controlled Robot with Voice and Video Camera(Zigbee).
  58. Power generation using Footsteps.
  59. 12C protocol implementation.
  60. TFTP Client implementation in IP networks, with demonstration on Linux.
  61. TFTP Server implementation in IP networks, with demonstration on Linux.
  62. Implementation of code for Packet capturing by using NETLINK Sockets.
  63. Client - Server implementation for connection oriented communication using unix domain sockets.
  64. Implementation of Linux user space to Kernel space communication using IOCTL.
  65. Implementation of Packet Tracker on linux.
  66. HTTP Client implementation on Linux.
  67. HTTP Server implementation on Linux.
  68. HTTPS Client implementation on Linux.
  69. HTTPS Server implementation on Linux.
  70. A Hybrid Hardware Architecture for High-Speed IP Lookups and Fast Route Updates
  71. On the Network Sharing of Mixed Network Coding and Routing Data Flows in Congestion Networks
  72. High-Throughput and Memory-Efficient Multi-Match Packet Classification Based on Distributed and Pipelined Hash Tables
  73. Exploiting Multichannel Diversity for Cooperative Multicast in Cognitive Radio Mesh Networks
  74. Capacity Allocation Games for Network-Coded Multicast Streaming
  75. Implementation of Encryption by using DES.
  76. Implementation of Encryption by using 3DES.
  77. Implementation of code for Packet capturing by using Raw Sockets.
  78. Implementation of Decryption by using DES.
  79. Implementation of Decryption by using 3DES.
  80. Peer-to-Peer Content Sharing Based on Social Identities and Relationships
  81. Detecting k-Balanced Trusted Cliques in Signed Social Networks
  82. Implementation of Authentication by using MD5.
  83. Implementation of Authentication by using SHA1.
  84. Reporting Offensive Content in Social Networks: Toward a Reputation-Based Assessment Approach
  85. Mobile Data Offloading: A Host-Based Distributed Mobility Management Approach
  86. Implementation of Encryption by using TEA.
  87. Implementation of Decryption by using TEA.
  88. Minimum-Delay Multicast Algorithms for Mesh Overlays
  89. Receiver-Based Flow Control for Networks in Overload
  90. Workload-Aware Provisioning in Public Clouds
  91. DNS Protocol implementation in IP networks, with demonstration on Linux.

MORE PROJECTS COMMING SOON, KEEP LOOKING............

Interested students or college management can request us to visit their college by contacting us at info@epistemesoft.com

Episteme believes that youth are the key to creating a thriving and vital community to build our country. Episteme's YEP Projects provides career exploration, workforce training, supplemental education, and supportive services to create models of youth success while improving the overall health and wealth of the community.

Our focus is open source software and embedded system development, interested students can select any one course from the list below for Mini, Major Projects and internships.

C Language: (common to all Branches in 1st Year)

  • Introduction
  • Basics of C
  • Bit-Wise Operators
  • Strings
  • Arrays
  • Functions-Modular Programming
  • Pointers
  • Enumerated, Structure and Union Types
  • File Handling
  • Computer programming Lab
  • Mini or Major Project in C

JNTUA Computer Programming Lab Problems Solved Questions with Answers

Week-1

  1. Write an algorithm and draw a flowchart to make the following exchange between the variables
    a-> a-> b -> c->d - > a
  2. Write an algorithm and draw a flowchart to generate the first n terms of the sequence. A Fibonacci sequence is defined as follows: the first and second terms in the sequence are 0 and 1. Subsequent terms are found by adding the preceding two terms in the sequence.

Week-2

  1. Write an algorithm and draw a flowchart to carry out the arithmetic operations addition, subtraction, multiplication, and division between two variables
  2. Write an algorithm and draw a flowchart for printing prime numbers between 1 and n.

Week-3

  1. The packing department of a television set manufacturer has to prepare a requisition note listing the number of different boxes required for the different TV models that it has received from the production department. The list prepared has to be forwarded to the stores department so that the required boxes are issued to the packing department. The category and the number of boxes required for each type of TV model is given as follows:
  2. Write a program that reads 10 integers and prints the first and last on one line, the second and the ninth on the next line, the third and the seventh on the next line, and so forth. Sample input and the results are shown below. Please enter 10 numbers :
    10 31 2 73 24 65 6 87 18 9
    Your numbers are : 10 9
    31 18
    2 87
    73 6
    24 65

Week-4

  1. Write a program that prompts the user to enter an integer and then prints the integer first as a character and then as a decimal and finally as a float. Use separate print statements. Expected output
    The number as a character : K
    The number as a decimal : 75
    The number as a float : 0.000000
  2. Write a program to read two floating point numbers add these two numbers and assign the result to an integer. Finally display the value of all the three variables. 3) Write a program to demonstrate the results obtained by using the increment and decrement operators(++, --) along-with logical operators(&&, ||) on operands 21

Week-5

  1. Write a program to demonstrate the results obtained by using the arithmetic operators for addition, subtraction, multiplication and division on integer data.
  2. Write a program to evaluate the following expression

Week-6

  1. Write a C program to construct a multiplication table for a given number.
  2. Write a program to reverse the digit of a given integer.
  3. Write a C program to calculate the factorial of a given number

Week-7

  1. Write a program to calculate tax, given the following conditions:
    1. If income is less than 1,50,000 then no tax.
    2. If taxable income is in the range 1,50,001 - 300,000 then charge 10% tax
    3. If taxable income is in the range 3,00,001 - 500,000 then charge 20% tax
    4. If taxable income is above 5,00,001 then charge 30% tax

Week-8

  1. Write a program to print the calendar for a month given the first Week- day of the month. Input the first day of the month (Sun=0,Mon=1,Tue=2,Wed=3,.....) :: 3
    Total number of days in the month : 31
    Expected output
    Sun Mon Tue Wed Thu Fri Sat
    - - - 1 2 3 4
    5 6 7 8 9 10 11
    12 13 14 15 16 17 18
    19 20 21 22 23 24 25
    25 26 27 28 29 30 31

Week-9

  1. Write a program to print the Pascal triangle for a given number
  2. Write a program to calculate the following expression for given x value

Week-10

  1. Write C code to define a function, median, that takes 3 numbers as its inputs, and returns the median.
  2. Write a function to find the sum of the digit of a given number
  3. Write a program to perform simple calculator operations(use functions: addition, subtraction, multiplication and division)

Week-11

  1. Write C code to define a function cash_dispense, which takes an amount as its input, and returns the number of 1000, 500, 100, 50, 20, 10, 5, 2, 1 rupee denomination that make up the given amount.
  2. Write C code to reverse the contents of the array. For example, [1,2,3,4,5] should become [5,4,3,2,1]
  3. Write a program that will search and find out the position where the given key element exist in a user chosen array and print it as output. 22

Week-12

  1. Write a program that uses the binary search algorithm to find out the position where the given key element exist in a user chosen array and print it as output
  2. Write a program perform matrix multiplication between two matrices.

Week-13

  1. Write C code to compute the frequency table of survey responses given by 20 users. The survey responses range from 1 to 5 and are stored in an array. For example,10 responses are stored in the array [1,1,5,2,3,3,5,5,2,2]. The frequency table will be as shown below:
    a. 1 = 2
    b. 2 = 3
    c. 3 = 2
    d. 4 = 0
    e. 5 = 3
  2. Write a program to define a function to sort an array of integers in ascending order by using exchange sort.

Week-14

  1. Write a c program to define a function to find the largest and smallest numbers in list of integers.
  2. Write a C program that uses a recursive function for generating the Fibonacci numbers.

Week-15

  1. Write a C program to check whether a given string is a palindrome or not, without using any built-in functions
  2. Write a function that accepts a string and delete the first character.
  3. Write a function that accepts a string and delete all the leading spaces.

Week-16

  1. Write a program to accept a string from user and display number of vowels, consonants, digits and special characters present in each of the words of the given string.

Week-17

  1. Write a C program that uses functions to perform the following operations:
    a) Reading a complex number
    b) Writing a complex number
    c) Addition of two complex numbers
    d) Multiplication of two complex numbers
    (Note: represent complex numbers using structures)

Week-18

  1. Write a C program to define a union and structure both having exactly the same numbers using the sizeof operators print the sizeof structure variables as well as union variable
  2. Declare a structure time that has three fields hr, min, secs. Create two variables, start_time and end_time. Input there values from the user. Then while start_time is not equal to end_time display GOOD DAY on screen.

Week-19

  1. Write a function that flips the bits in an 16-bit unsigned integer.
  2. Write a function that changes the first(leftmost) hexadecimal digit in a 32-bit unsigned integer. The function is to have two parameters. The first is the integer to be manipulated, the second the replacement digit.

Week-20

  1. Write a program to read in an array of names and to sort them in alphabetical order. Use sort function that receives pointers to the functions strcmp, and swap, sort in turn should call these functions via the pointers.
  2. Write a program to read and display values of an integer array. Allocate space dynamically for the array using the malloc().

Week-21

  1. Write a program to calculate area of a triangle using function that has the input parameters as pointers as sides of the triangle.

Week-22

  1. Two text files are given with the names text1 and text2. These files have several lines of text. Write a program to merge (first line of text1 followed by first line of text2 and so on until both the files reach the end of the file) the lines of text1 and text2 and write the merged text to a new file text3.
  2. Write a program to split a given text file into n parts. Name each part as the name of the original file followed by .part where n is the sequence number of the part file.

Week-23

  1. Write a program in C using structures which stores the code, name and price of an item stored in a file and perform the following operations:
    a) Append item
    b) Modify an item
    c) Display all items
    d) Delete n item

Week-24

  1. Write a program that uses the functions to perform the following operations on a single linked list a. Creation b.Insertion c. Deletion d.Traversal

SVU Computer Programming Problems Solved Questions with Answers

Week-1

  1. Let a and b are two integer variables whose values are 10 and 13 respectively. Write a program to evaluate the following arithmetic expressions.
    i) a + b
    ii) a - b
    iii) a * b
    iv) a / b v) a % b

Week-2

  1. Write a program evaluate the following algebraic expressions after reading necessary values from keyword.
    i) (ax + b)/(ax - b)
    ii) 2.5 log x + Cos 320+ | x2 + y2| + v2xy
    iii) x5 + 10 x4 + 8, x3 + 4 x + 2
    iv) aekt

Week-3

  1. Mr. Gupta deposited Rs.1000 in a bank. The bank gives simple interest at the rate of 15% per annum. Write a program to determine the amount in Mr. Gupta's account at the end of 5 years. (Use the formula I = P T R / 100)
  2. A cashier has currency notes of denominations Rs.10, Rs. 50 and Rs. 00. If the amount to be withdrawn is input in hundreds, find the total number of notes of each denomination the cashier will have to give to the withdrawer.
  3. In a town, the percentage of men is 52. The percentage of total literacy is 48.If total percentage of literate men is 35 of the total population; write a program to find the total number of illiterate men and women if the population of the town is 8000.

Week-4

  1. Write a program that prints the given 3 integers in ascending order using if - else.
  2. In a town, the percentage of men is 52. The percentage of total literacy is 48.If total percentage of literate men is 35 of the total p o p u l a t i o n ; write a program to find the total number of illiterate men and w o m e n if the population of the town is 8000.
  3. Write a program to calculate commission for the input value of sales amount. Commission is calculated as per the following rules:
    i) Commission is NIL for sales amount Rs. 5000.
    ii) Commission is 2% for sales when sales amount is >Rs. 5000 and <= Rs. 10000.
    iii) Commission is 5% for sales amount >Rs. 10000.
  4. A character is entered through keyboard. Write a program to determine whether the Character entered is a capital letter, a small case letter, a digit or a special symbol. The following table shows the range of ASCII values for various characters. Characters ASCII values A - Z 65 - 90
    a - z 97- 122
    0 - 9 48 - 57
    Special Symbols 0 - 47, 58 - 64, 91- 96, 123 - 127

Week-5

  1. If cost price and selling price of an item is input through the keyboard, write program to determine whether the seller has made profit or incurred loss. Also determine how much profit or loss he incurred in percentage.
  2. An insurance company calculates premium as follows:
    i) If a person's health is excellent and the person is between 25 and 35 years of age and lives in a city and is a male then premium is Rs.4 per thousand and the policy amount cannot exceed Rs.2 lacks.
    ii) If a person satisfies all the above conditions and is female then the premium is Rs.3 per thousand and the policy amount cannot exceed Rs.1 lack.
    iii) If a person's health is poor and the person is between 25 and 35 years of age and lives in a village and is a male then premium is Rs.6 per thousand and the policy cannot exceed Rs. 10000.
    iv) In all other cases the person is not insured. Write a program to determine whether the person should be insured or not, his/her premium rate and maximum amount for which he/ she can be insured.

Week-6

  1. Write a program, which takes two integer operands and one operator as input from the user, performs the operation and then prints the result. (Consider the operators +,-,*, /, %. Use switch statement)
  2. Write a program to find the grace marks for a student using switch. The user should enter the class obtained by the student and the number of subjects he has failed in. Use the following rules:
    i) If the student gets first class and the number of subjects failed is >3, then no grace marks are awarded. If the number of subjects failed is less than or equal to '3' then the grace is 5 marks per subject.
    ii) If the student gets second class and the number of subjects failed in is >2, then no grace marks are awarded. If the number of subjects failed in less than or equal to '3' then the grace is 4 marks per subject.
    iii) If the student gets third class and the number of subjects failed in is >1, then no grace marks are awarded. If the number of subjects failed in is equal to '1' then the grace is 5 marks per subject.

Week-7

  1. Write a program to find the sum of individual digits of a positive integer.
  2. A Fibonacci sequence is defined as follows: The first and second terms in the sequence are 0 and 1. Subsequent terms are found by adding the preceding two terms in the sequence. Write a program to generate the first N terms of the sequence.
  3. Write a program to generate all the prime numbers between 1 and N, where N is a value supplied by the user.

Week-8

  1. Write a program to calculate the following: Sum=1-x2/2!+ x4/4!-x 6!+x8/8!-x10/10!
    i) A perfect number is a number that is the sum of all its divisors except itself. Six is the perfect number. The only numbers that divide 6 evenly are 1,2,3 and 6 (i.e., 1+2+3=6).
    ii) An abundant number is one that is less than the sum of its divisors (Eg: 12 <1+2+3+4+6).
    iii) A deficient number is one that is greater than the sum of its divisors (Ex: 9 > 1+3). Write a program to classify N integers (Read N from keyboard) each as perfect, abundant or deficient.

Week-9

  1. Write a program to find the largest and smallest number in a given list of integers.
  2. Write a program to perform the following:
    i) Addition of two matrices.
    ii) Multiplication of two matrices.

Week-10

  1. Write a program to perform the following:
    i) Linear search
    ii) Binary search

Week-11

  1. Write a program to perform the following:
    i) Bubble sort
    ii) Selection sort
    iii) Insertion sort

Week-12

  1. Write a program to convert a given octal number into binary form.
  2. Write a program to convert a given decimal number into binary form.
  3. Write a program to convert a given decimal number into octal form.

Week-13

  1. Write a program that uses functions to perform the following operations:
    i) To insert a sub-string in main string at a specified position.
    ii) To delete N characters from a given string from a specified position.
  2. Write a program to determine whether the given string is palindrome or not.

Week-14

  1. Any number x is called colored number if it does not contain any substring y with the property that the product z of all the digits of y is not equal to any of the substrings of x (for example, take x=263, then its substrings are 2,6,3,26,63,263 only. Now, take any substring y= 26 then z=2*6=12 or y=63 then z=6*3=18. Neither z is the substring of 263) . Wri te a C program to check whether the given any three digit number is colored number or not.

Week-15

  1. Write a program to display the position or index in the main string S where the sub string T begins. Display -1 if S does not contain T.
  2. Write a program to count the number of lines, words and characters in a given text.

Week-16

  1. Write a program to read list of student names and perform the following operations using functions.
    i) to print list of names
    ii) to sort them in ascending order
    iii) to print the list after sorting.
  2. Write a menu driven program to read list of student names and perform the following operations using array of character pointers.
    i) to insert a student name
    ii) to delete a name
    iii) to print the name

Week-17

  1. Two's complement of a number is obtained by scanning it from right to left and complementing all the bits after the first appearance of 1. Eg: 2's complement of 11100 is 00100. Write a program to find the 2's complement of a given binary number using functions.
  2. Write a program to convert a roman number (Eg: I,II,III) in to its decimal equivalent using functions

Week-18

  1. Write programs to perform the following using recursion
    i) To find the factorial of a given integer.
    ii)To solve Towers of Hanoi problem.

Week-19

  1. Write a program that uses functions to perform the following operations:
    i) Reading a complex number
    ii) Writing a complex number
    iii) Addition of two complex numbers
    iv) Multiplication of two complex numbers
    (Note: Represent complex number using a structure.)

Week-20

  1. Write a program to implement the following
    i) Call by value
    ii) Call by reference.

Week-21

  1. Write a program to swap the given two numbers without using additional variable. (using pointers)

Week-22

  1. Write a program which copies one 'text file' to another 'text file'.
  2. Write a program to reverse the first N characters of a given text file. Note: The file name and N are specified through command line.

Week-23

  1. Write a program to implement stack operations using arrays.

Week-24

  1. Write a program to implement linear queue operations using arrays.

Data Structures: (2-1CSE), (2-1 IT)

  • Recursion and Linear Search
  • Sorting Techniques
  • Stacks and Queues
  • Queues
  • Linked Lists
  • Trees
  • Advanced concepts of Trees
  • Graphs
  • Sets
  • Mini or Major Project in Data Structures

JNTU ANANTAPUR Data Structures Lab Problems Solved Questions with Answers

Week-1

  1. Write a Program to Implement Stack Operations by using Array and Linked Lists.
  2. Write a Program to Implement the Operations of Double Linked Lists

Week-2

  1. Write a C program that uses stack operations to convert a given infix expression into its postfix
  2. Write a Program to Implement Queue Operations by using Array and Linked Lists.

Week-3

  1. Write a Program to Implement Circular Queue Operations by using Array and Linked Lists.

Week-4

  1. Write a Program to Sort the set of elements by using
    i) Quick Sort
    ii) Heap Sort.
    iii) Merge Sort

Week-5

  1. Write a Program to Implement the Binary Search Tree Operations.

Week-6

  1. Write a Program to Perform the Tree Traversal Techniques by using the Iterative Method

Week-7

  1. Write C programs for implementing the following graph traversal algorithms:
    a)Depth first traversal
    b)Breadth first traversal

Week-8

  1. Write a Program to Implement All functions of a Dictionary by using Hashing

Week-9

  1. Write a Program to Implement Skip List Operations.

    Week-9

Week-10

  1. Write a Program to Implement Insertion, Deletion and Search Operations on SPLAY Trees.

Week-11

  1. Write a program to Implement Insertion and Deletion Operations on AVL Trees

Week-12

  1. Write a Program to Implement Insertion and Deletion Operations on B -Trees

SVEC Data Structures Lab Problems Solved Questions with Answers

  1. Write program to implement the following data structures: i) Single linked list.
    ii) Double linked list.
    iii) Circular linked list.
  2. Write a program to implement stack and queue using linked list.
  3. Write a program to evaluate a given postfix expression using stack.
  4. Write a program to convert a given infix expression to postfix form using stacks.
  5. Write a program to implement
    (a) stack using two queues.
    (b) queue using two stacks.
  6. Write a program to implement In-order, pre-order, post-order tree traversal of binary trees.
  7. Write a program to perform operations on a binary search tree(BST) .
  8. Write programs for implementation of graph traversals by applying:
    (a) Breadth First Search.
    (b) Depth First Search.
  9. Implement the following sorting algorithms: (a) Merge sort. (b) Heap sort. (c) Quick Sort. (d)Radix Sort.
  10. Write a program to implement hashing with (a) Separate Chaining (b) Open addressing methods.

Computer Networks: (3-1CSE), (ECE 3-2), (3-1 IT)

  • Introduction
  • The OSI models
  • Physical layer and overview of PL Switching
  • Framing
  • Sliding Window Protocol
  • Random Access
  • IEEE Standards
  • Blue tooth
  • Data Link Layer Switching-Bridges
  • Internet working
  • Mini or Major Project in Computer networks

Data Communications: (2-2 ECE), (2-1 IT), (4-1 EIE)

  • Fundamentals of Data Communication
  • Metallic Cable Transmission Media
  • Optical Fiber Transmission Media
  • Digital Transmission
  • Wireless Communications Systems
  • Telephone Instruments and Signals
  • The Telephone Circuit
  • Cellular Telephone Concepts and Systems
  • Mini or Major Project in Data Communications

Operating System: (4-2 ECE), (3-1 CSE)

  • Computer System and Operating System Overview
  • Process Management
  • Concurrency
  • Memory Management
  • Virtual Memory Management
  • File system Interface
  • Mass-storage structure overview of Mass-storage structure
  • Mini or Major Project in Operating System

JNTU UNIX Programming Unit Wise Important Questions With Answers For External Examinations

Unit 1 Important Questions

  1. What is a process. List and Explain various process utilities with suitable examples.
  2. Explain basic file attributes. Discuss the appropriate commands associated with these attributes.
  3. "Operating systems like UNIX provide services both for programs and users". Jus- tify this statement with suitableexamples.
  4. Explain the significance of the following commands. i. ls - ld ii. ls - l.
  5. Give a note on vi editor.
  6. What is an operating system? Explain How UNIX fulfills more than that role. Discuss suitable examples.
  7. What is an operating system? Explain How UNIX fulfills more than that role. Discuss suitable examples.
  8. Explain various commands available in UNIX for networking. Discuss suitable examples.
  9. Write short notes on:
    (a) Unix system services
    (b) Shell responsibilities? Inode block.
  10. Define Shell and kernel. Differentiate them.
  11. Illustrate the cycle of command execution by Unix. 1. (a) What is the difference between the text editing provided by ‘ed’ & ‘vi’ text editors.
  12. What are the two operational modes of vi editor? What is the use of each?

Unit 2 Important Questions

  1. Explain the different approach taken by diff command to display file differences.
  2. Describe 'comm’ command. Explain the output with -1,-2, or -3 options in 'comm' command.
  3. Which is the command used for ordering a file? Discuss all the options available for this command. For every option Explain with an example.
  4. What is a filter in UNIX? Explain any four filters in detail with examples.
  5. How to remove duplicate lines from a file using sort?
  6. How to count the number of ordinary files in home directory tree?
  7. Select lines 5 to 10 of a file in two ways.
  8. Discuss the various backup utilities available in UNIX. Ilustrate with suitable ex- amples.
  9. Which is the command used for ordering a file? Discuss all the options available for this command. For every option Explain with an example.
  10. Explain awk, tar, cpio with necessary examples.
  11. What is the usage of filters?
  12. Explain the following filters. more, cmp, tr, uniq.
  13. Explain the following Unix shell commands with examples. cut, paste, egrep, fgrep.
  14. What is the purpose of cat?
  15. What is the purpose of cat?
  16. When using cat>abc, What happens if abc already contains something?
  17. What happens when you use cat abc>abc?
  18. Is the output of the following command be directed to the standard output. Cat abc xyz >/dev/tty.

Unit 3 Important Questions

  1. Explain about the usage of multiple commands on the shell command line with example.
  2. Write a menu driven shell script Which has following options.
    i. Contents of /etc/passwd.
    ii. List of users who have currently logged in.
    iii. Present working directory.
    iv. Exit. .
    Make use of case statement. The menu should be placed appropriately in the centre of the screen and should be displayed in bold using the tput command. .
  3. While executing a shell script either the LOGNAME or the UID is supplied at the command prompt. Write a shell script to find out at How many terminals has this user logged in?
  4. Write a shell script to display first n numbers of Fibonacci series.
  5. If x has the value 5, and you reassign it with x="expr $x+10", What is the new value of x? What would have been the value if single quotes were used? What’s wrong with all this anyway?
  6. Devise a script that accept 2 directory names bar1 and bar2, and deletes those files in bar2 whose contents are identical to their namespaces in bar1.
  7. Write a shell script Which reports names and sizes of all files in a directory (directory would be supplied as an argument to the shell script) whose size is exceeding 1000 bytes. The filename should be printed in descending order of their sizes. The total number of such files should also be reported.
  8. Write a C program to search for the word ‘exam’ in a Given file, using Com- mand line arguments.
  9. Write a shell script to accept a string from the terminal and use ‘case’ to echo a suitable message if the string does not have at least 10 characters using: i. case ii. expr
  10. Write a shell script to display the processes in the system five times every 30 seconds using: i. while loop ii. for loop.
  11. Write a shell script for the following task. The word ‘unix’ is present in only some of the files supplied as arguments to the shell script. Your shell script should searched each of these files in turn and stop at the first file that it encounters containing the word ‘unix’. This filename should be displayed on the screen.
  12. Write a C program Which receives file names as command line arguments and display those filenames in ascending order according to their sizes.
  13. Write a shell script Which will receive any number of filenames as arguments. The shell script should check whether every argument supplied is a file or a directory. If it is a directory it should be appropriately reported. If it is a Filename then name of the file as well as the number of lines present in it should be reported.
  14. Write a C program to simulate 'tail' command.
  15. Write short notes on:
    (a) program development & debugging commands
    (b) necessary commands to carry on day to day activities.
  16. Write a shell script to simulate cp command.
  17. Write short notes on shell script arguments.
  18. Write a shell script to check whether a Given file is a directory. If so, empty the contents of the directory and remove the directory.
  19. How do you clean the screen and place the cursor at row 15 and column 20?
  20. Write a shell script to find the decimal equivalent of 1101001.

Unit 4 Important Questions

  1. Explain about different conditional exp?ressions available in Bourne shell.
  2. Write a shell script Which receives two filenames as arguments. It should check whether the two file’s contents are same or not. If they are same then second file should be deleted. Use ‘cmp’ command to compare files.
  3. What is metacharacter? List and Explain about any 7 metacharacters available in unix.
  4. Write a shell script Which will receive either the filename or the filename with it’s full path during execution.this script should obtain information about this file as Given by ls - l and display in proper format.
  5. What is a shell? What are the responsibilities of a shell?
  6. What are the different types of shells available in unix.
  7. Write a shell script Which gets executed the moment the user logs in. It should display the message "good morning/good afternoon/good evening" depending upon the time at Which the user logs in.
  8. Explain about here documents with an example.
  9. Explain following
    (a) Shell meta characters
    (b) Shell types in Unix
  10. What is a loop? Compare and contrast while and until loops.
  11. How for loop is used with command line arguments? Explain with a suitable example
  12. Write short notes on following commands Trap, export, exit, expr, break, continue
  13. Define Unix shell. Explain shell environment.
  14. Briefly Explain Different shells available in Unix.

Unit 5 Important Questions

  1. Write a C program to print the type of specified file (Regular, device, directory)
  2. Write and Explain about hard and symbolic links.. give an example for each.
  3. Explain about file descriptors & i-node?
  4. Write the difference between fgetc and getc system calls.
  5. Write the syntax of fflush system call give an example.
  6. Write about ulink system call and give an example.
  7. Write about Write system call and illustrate with an example.
  8. Explain the differences between fgets, gets system call.
  9. Explain link, unlink, remove and rename functions with syntaxes.
  10. What are fflush and fseek functions? Explain.
  11. Explain in detail about lseek function.
  12. What is fcntl function? What is the purpose of using it?
  13. Write the syntax of creat function. Explain, how this function is equivalent to open function.
  14. Explain in detail, how an opened file can be positioned.
  15. What are stat, fstat and lstat functions? Explain.
  16. Give the syntaxes for chmod and fchmod functions and state their importance.

  17. Write the syntax of following system calls.
    i) open
    ii) reat
    iii)read
    iv)Write
    v)chmod
    vi)chown
    vii)unlink
    viii) link

Unit 6 Important Questions

  1. Write a program to illustrate the vfork function call.
  2. Write a program for signal implementation.
  3. Write a program which used both kill and raise functions.
  4. Write a program which uses abort function.
  5. Write a program which used both kill and raise functions.
  6. Write the differences between wait and waitpid system calls.
  7. Explain threads.
  8. Write the system calls for process termination in detail.
  9. Explain process creation and process termination in detail.
  10. What is a process? Explain waiting for a process in detail.
  11. What are the uses of fork function?
  12. Write a short note on zombie process.
  13. What are the different properties that are inherited by the child from its parent. Explain.
  14. What are the differences between parent and child processes.
  15. What are the differences between sleep and abort functions? Explain.
  16. What is a zombie process? Explain.
  17. What are the various properties that are inherited by the child from their parent?
  18. Differentiate between parent and child processes.
  19. Write the syntax of following functions. Explain each argument.
    i)kill
    ii)raise
    iii)alarm
    iv)exit

Unit 7 Important Questions

  1. Write a comparative study of adversary and mandatory locking.
  2. Write in detail about locking regions.
  3. Explain the concept of requesting and releasing a lock.
  4. Write in detail about locking regions.
  5. Write about different Unix locking techniques.
  6. Write a C program to use a function lock test to test for a lock.
  7. Write about lockf function.
  8. Write the differences between fcntl function and flock function.
  9. Write and Explain locking routines using a create( ) system call. i)Explain with examples, competing locks and locking regions in detail.
    ii)Write a short note on competing locks.
    iii)Explain the usage of read and Write functions with locking.
    iv)State the importance of file locking and Explain locking regions in detail.
    v) What is a null pointer? Explain with example, What happens when we try to access a null pointer.

Unit 8 Important Questions

  1. Write about system call pipe . Give an example which uses pipe system call.
  2. Explain the logic for opening or creating an IPC channel
  3. Explain the following concepts about pipes
  4. Pipes between two process
  5. Pipes among three process in a shell
  6. Explain the concept of IPC between two processes on a single system. Give Example
  7. What is the data stored by the kernel when a semaphore is created.
  8. What is the system call that is used to create a shared memory segment and Explain each field in detail. [8+8]
  9. The syntax of msgget system call is int msgget(key t key, int flag)
  10. Explain type of key
  11. Explain What value it returns
  12. What is the use of flag
  13. Explain the following concepts
    i)Pipes in single process
    ii)Pipes in single process, immediately after fork
  14. Explain the concept of IPC between two processes on a single system. Give Example
  15. What are the advantages and disadvantages of system v IPC?
  16. What is a FIFO? Why FIFOs are called as named pipes? Explain
  17. Write a program to create a pipe and to execute it on the client.
  18. Mention the rules for writing information into the pipe.
  19. Compare the IPC functionality provided by pipes and message queues. What are the advantages and drawbacks of each? When is one more suitable than the other.
  20. Define Inter Process Communication? Explain IPC between two processes on different systems.
  21. What is a pipe? Using pipe, how IPC can be implemented.

Operating System Lab Problems Solved Questions with Answers

  1. Simulate the following CPU scheduling algorithms a) Round Robin
    b) SJF
    c) FCFS
    d) Priority
  2. Simulate all file allocation strategies a) Sequential
    b) Indexed
    c) Linked
  3. Simulate MVT and MFT
  4. Simulate all File Organization Techniques a) Single level directory
    b) Two level
    c) Hierarchical
    d) DAG
  5. Simulate Bankers Algorithm for Dead Lock Avoidance
  6. Simulate Bankers Algorithm for Dead Lock Prevention
  7. Simulate all page replacement algorithms a) FIFO
    b) LRU
    c) LFU Etc...
  8. Simulate Paging Technique of memory management.

Linux Programming Problems Solved Lab Questions with Answers

  1. write a shell script that accepts a name from the user and displays whether it is a file, directory or something else.
  2. write a shell script that creates users.
  3. write a shell script that searches for a given string in a file.
  4. write a shell script that compiles all c files in your directory 7 creates executable files.
  5. write a shell script that given a filename as argument , deletes all even files in a file.
  6. Implement the grep command in c language.
  7. Write a shell script that removes duplicate lines from a file.
  8. write a shell script that enhances find command by adding error messages that explain why the command failed.
  9. write a shell script to backup the files in a specified directory.
  10. write a shell script that finds all links to a file.
  11. write an awk script to count the number of lines in a file that do not contain vowels.
  12. write an awk script to count the number of characters,words & lines in a file.
  13. Write a c program that illustrates communication between 2 unrelated processes using named pipe(fifo).
  14. Write a c program in which a parent writes a message to a pipe & the child reads the message.
  15. Write a c program(sender.c) to create a message queue with read and write permissions to write 3 messages to it with different priorities.
  16. Write a c program (receiver.c) that receives the messages (from the above message queue) & display them.
  17. Configure Mail server & File server.
  18. Write client & server programs in c for connection oriented communication between server & client process using unix domain sockets to perform the following: client process sends a message to the server, the server receives the message, reverses it & send it back to the client.The client will then display the message to the standard output device.

JNTU HYDERABAD Linux Programming Problems Solved Lab Questions with Answers

  1. Write a shell script that accepts a file name, starting and ending line numbers as arguments and displays all the lines between the given line numbers.
  2. Write a shell script that deletes all lines containing a specified word in one or more files supplied as arguments to it.
  3. Write a shell script that displays a list of all the files in the current directory to which the user has read, write and execute permissions.
  4. Write a shell script that receives any number of file names as arguments checks if every argument supplied is a file or a directory and reports accordingly. Whenever the argument is a file, the number of lines on it is also reported.
  5. Write a shell script that accepts a list of file names as its arguments, counts and reports the occurrence of each word that is present in the first argument file on other argument files.
  6. Write a shell script to list all of the directory files in a directory.
  7. Write a shell script to find factorial of a given integer.
  8. Write an awk script to count the number of lines in a file that do not contain vowels.
  9. Write an awk script to find the number of characters, words and lines in a file.
  10. Write a C program that makes a copy of a file using standard I/O and system calls.
  11. Implement in C the following Unix commands using System calls.
    a)cat
    b) mv
  12. Write a C program to list directory files in a directory.
  13. Write a C program to emulate the Unix ls - l command.
  14. Write a C program to list for every file in a directory, its inode number and file name.
  15. Write a C program that redirects standard output to a file.Ex: ls > f1.
  16. Write a C program to create a child process and allow the parent to display “parent” and the child to display “child” on the screen.
  17. Write a C program to create a Zombie process.
  18. Write a C program that illustrates how an orphan is created.
  19. Write a C program that illustrates how to execute two commands concurrently with a command pipe. Ex:- ls - l | sort
  20. Write C programs that illustrate communication between two unrelated processes using named pipe.
  21. Write a C program in which a parent writes a message to a pipe and the child reads the message.
  22. Write a C program (sender.c) to create a message queue with read and write permissions to write 3 messages to it with different priority numbers.
  23. Write a C program (receiver.c) that receives the messages (from the above message queue as specified in (22)) and displays them.
  24. Write C programs to transfer a large amount of data between processes, using a) a pipe b)a FIFO c)a message queue.

JNTU KAKINADA UNIX Programming Lab Problems Solved Questions with Answers

  1. Write a shell script to generate a multiplication table.
  2. Write a shell script that copies multiple files to a directory.
  3. Write a shell script which counts the number of lines and words present in a given file.
  4. Write a shell script which displays the list of all files in the given directory.
  5. Write a C program that counts the number of blanks in a text file.
  6. Implement in C the following Unix commands using system calls.
    a)cat
    b) ls
    c) mv
  7. Write a program that takes one or more file/directory names as command line input and reports the following information on the file:
    a) File type.
    b) Number of links. c) Time of last access.
    d) Read, Write and Execute permissions.
  8. Write a C program that illustrates how to execute two commands concurrently with a command pipe.
  9. Write a C program that illustrates the creation of child process using fork system call.
  10. Write a C program that displays the real time of a day every 60 seconds.
  11. Write a C program that illustrates the following.
  12. Creating a message queue.
  13. Writing to a message queue.
  14. Reading from a message queue.
  15. Write a C program that illustrates inter process communication using shared memory system calls.

JNTU ANANTAPUR Operating System Lab Problems Solved Questions with Answers

  1. Practice session: practice use of some basic Linux commands. Document the syntax and semantics of those commands. Practice programs on shell variables, control statements etc.
  2. Practice session: Study the features of Linux environment and submit a report on it.
  3. Write a shell script that accepts a name from the user and displays whether it is a file, directory or something else.
  4. Write a shell script that creates users
  5. Write a shell script that searches for a given string in a file
  6. Write a shell script that compiles all C files in your home directory and creates executable files
  7. Write a shell script that given a filename as argument, deletes all even lines in a file
  8. Implement the grep command in C language
  9. Write a shell script that removes duplicate lines from a file
  10. Write a shell script that enhances find command by adding error messages that explain why the command failed.
  11. Write a shell script to backup files in a specified directory
  12. Write a shell script that finds all links to a file
  13. Write an awk script to count the number of lines in a file that do not contain vowels.
  14. Write an awk script to find the number of characters, words and lines in a file.
  15. Write C programs that illustrate communication between two unrelated processes using named pipe(FIFO File).
  16. Write a C program in which a parent writes a message to a pipe and the child reads the message.
  17. Write a C program (sender.c) to create a message queue with read and write permissions to write 3 messages to it with different priority numbers.
  18. Write a C program (receiver.c) that receives the messages (from the above message queue and displays them.
  19. Configure mail server and file server.
  20. Write Client and Server programs in C for connection oriented communication between Server and Client processes using Unix Domain sockets to perform the following: Client process sends a message to the Server Process. The Server receives the message, reverses it and sends it back to the Client. The Client will then display the message to the standard output device.

SVEC UNIX Operating System Lab Problems Solved Questions with Answers

Exercise 1

  1. Create two files source.txt and dest.txt using vi editor which contains some text and practice the following commands on that files. cat, tail, head , sort, nl, uniq, grep, egrep, fgrep, cut, paste, join, tee, pg, comm, cmp, diff,cp, mv, ln, rm, unlink, tty, script, clear, date, cal, mkdir, rmdir, du, df, find, umask, ps,who, w.

Exercise 2

  1. )Write a shell script that takes a command line argument and reports on whether it is directory, a file, or something else.
  2. Write a shell script that accepts one or more file names as arguments and converts all of them to uppercase, provided they exist in the current directory.
  3. Write a shell script that takes a command line argument and reports on whether it is directory, a file, or something else.
  4. Write a shell script that accepts one or more file names as arguments and converts all of them to uppercase, provided they exist in the current directory.

Exercise 3

  1. Write a shell script that accepts a file name,starting and ending line numbers as arguments and displays all the lines between the given line numbers.
  2. Write a shell script that deletes all lines containing a specified word in one or more files supplied as arguments to it.

Exercise 4

  1. Write an interactive file-handling shell program. Let it offer the user the choice of copying, removing, renaming, or linking files. Once the user has made a choice, have the program ask the user for the necessary information, such as the file name, new name and so on.
  2. Write a shell script that takes a login name and reports when that person logs in
  3. Write a shell script to read two file names and it should check whether the two file contents are same or not. If they are same then second file should be deleted.

Exercise 5

  1. Simulate Uniq command using C.
  2. Simulate grep command using C.

Exercise 6

  1. Write a C program that takes one or more file or directory names as input and reports the following information on the file:
    i)File type
    ii)Number of links
    iii)Read, write and execute permissions
    iv)Time of last access
    (Note : Use stat/fstat system calls)

Exercise 7

  1. Write a C Program to display Environment variables.
  2. Write a C Program to implement Different types of exec functions.

Exercise 8

  1. Write a Program to handle the Signals like SIGINT, SIGQUIT, and SIGFPE.
  2. Write a Program to create a Zombie Process.
  3. Create a Process using fork() and display Child and Parent Process Id's.

Exercise 9

  1. Implement the Following IPC Forms
    a)FIFO
    b)PIPE

Exercise 10

  1. Write a program to
    a) Create the semaphores
    b) Set values to semaphores
    c) Get the values from the semaphores
    d)Remove semaphore

Exercise 11

  1. Implement file transfer using Message Queue form of IPC
  2. Write a program to create an integer variable using shared memory concept and increment the variable simultaneously by two processes. Use semaphores to avoid race conditions

Exercise 12

  1. Perform client and server socket Programming for exchanging of data Using System calls.

Network security And Cryptography: (4-2 ECE), (4-1 CSE), (4-1 IT)

  • Introduction
  • Secrete key cryptography
  • Number theory
  • Public key cryptography
  • Cryptographic Hash Functions
  • Authentication Applications
  • IP-Security
  • System Security
  • Mini or Major Project in Network security and cryptography

Computer Networks Lab Solved Questions Available:

  1. Implement the data link layer framing methods such as character, character stuffing and bit stuffing.
  2. Implement on a data set of characters the three CRC polynomials – CRC 12, CRC 16 and CRC CCIP .
  3. Implement Dijkstra 's algorithm to compute the Shortest path thru a graph.
  4. Take an example subnet graph with weights indicating delay between nodes. Now obtain Routing table art each node using distance vector routing algorithm
  5. Take an example subnet of hosts . Obtain broadcast tree for it.
  6. Take a 64 bit playing text and encrypt the same using DES algorithm .
  7. Write a program to break the above DES coding.
  8. Using RSA algorithm Encrypt a text data and Decrypt the same .

JNTU KAKINADA Computer Networks Lab Problems Solved Questions with Answers

  1. Implement a data link framing method for counting characters in a given frame.
  2. Implement a data link framing methods for the bit stuffing & character stuffing in a frame.
  3. Implement a data link framing methods for even and odd parity.
  4. Implement the CRC-12, CRC-16 in data link layer.
  5. Implement the data link protocols : Unrestricted simplex protocol.
  6. Implement of one bit sliding window protocol.
  7. Implement Dijkstra 's algorithm to compute the shortest path thru a graph.
  8. Take an example subnet graph with weights indicating delay between nodes. Now obtain Routing table each node using distance vector routing algorithms.
  9. Implement a Hierarchial routing algorithm.
  10. Take an example subnet of hosts. Obtain broadcast tree for it.
  11. Implement the Token Bucket Congestion control algorithm.
  12. Implement the Leaky Bucket Congestion control algorithm.

JNTU ANANTAPUR Computer Networks & Network Security Lab Problems Solved Questions with Answers

  1. submit a report on the computer network facility available in the college including the devices used, topology used, specification of all the equipment used
  2. submit a report on the Internet facility available in the college including the specification of the devices used and logical configuration
  3. Implement the algorithm for parity method for error control
  4. Implement the algorithm on hamming method for error correction (both single and block errors)
  5. Implement the algorithm for check sum computation
  6. Implement the distance vector routing algorithm
  7. Implement the link state routing algorithm
  8. Study any simulator available in the market and submit a report containing executive summary of it and detail description of the features

PART-B (Network Security)

  1. Working with Sniffers for monitoring network communication (Ethereal)
  2. Understanding of cryptographic algorithms and implementation of the same in C or C++
  3. Using openssl for web server - browser communication
  4. Using GNU PGP
  5. Performance evaluation of various cryptographic algorithms
  6. Using IPTABLES on Linux and setting the filtering rules
  7. Configuring S/MIME for e-mail communication
  8. Understanding the buffer overflow and format string attacks
  9. Using NMAP for ports monitoring
  10. Implementation of proxy based security protocols in C or C++ with features like confidentiality, integrity and authentication

Embedded Systems: (4-1 ECE), (4-2 CSE), (4-1 IT), (3-2 EIE)

  • Introduction to Embedded Systems
  • Embedded System-Characteristics and Quality attributes
  • Embedded Hardware Design
  • Embedded Firmware Design
  • Real Time Operating System
  • Hard ware and Software co-design
  • Embedded System Development
  • Embedded System Implementation and Testing
  • Mini or Major Project in Embedded Systems

Microcontroller (8051): (3-2 ECE), (3-2 EEE), (3-2 EIE)

  • Introductions
  • Cross compilers
  • Embedded c programming
  • Embedded c debugging
  • Memory models
  • Library reference
  • On chip peripherals
  • Ports: Input/Out put
  • Timers /Counters
  • Interrupt, UART
  • Externals interface
  • LED, LCD, Switches
  • Seven segment Display
  • I2c Protocols
  • SPI Protocols
  • Mini or Major Project in Microcontroller

Computer Programming Lab Problems Solved Questions with Answers

  1. A program for electricity bill taking different categories of users, different slabs in each category. (Using nested if else statement). Domestic Customer: Consumption Units Rate of Charges(Rs.) 0 - 200 0.50 per unit 201 - 400 100 plus 0.65 per unit 401 - 600 230 plus 0.80 per unit 601 and above 390 plus 1.00 per unit Commercial Customer: Consumption Units Rate of Charges(Rs.) 0 - 50 0.50 per unit 100 - 200 50 plus 0.6 per unit 201 - 300 100 plus 0.70 per unit 301 and above 200 plus 1.00 per unit
  2. Write a C program to evaluate the following (using loops):
    a) 1 + x 2 /2! + x 4 / 4!+ -upto ten terms
    b) x +x3 /3! + x 5 /5!+ - upto 7 digit accuracy
  3. Write a C program to check whether the given number is
    a) Prime or not.
    b) Perfect or Abundant or Deficient.
  4. Write a C program to display statistical parameters (using one -dimensional array).
    a) Mean
    b) Mode
    c) Median
    d) Variance
    NOTE: Use functions for each subtask in the following programs
  5. Write a C program to read a list of numbers and perform the following operations a) Print the list.
    b) Delete duplicates from the list.
    c) Reverse the list.
    Page 36 of 36 Department of Computer Science & Engineering
  6. Write a C program to read a list of numbers and search for a given number using Binary search algorithm and if found display its index otherwise display the message "Element not found in the List".
  7. Write a C program to read two matrices and compute their sum and product.
  8. A menu driven program with options (using array of character pointers).
    a) To insert a student name
    b) To delete a name
    c) To print the names
  9. Write a C program to read list of student names and perform the following operations
    a) To print the list of names.
    b) To sort them in ascending order.
    c) To print the list after sorting.
  10. Write a C program that consists of recursive functions to
    a) Find factorial of a given number
    b) Solve towers of Hanoi with three towers ( A, B & C) and three disks initially on tower A.
  11. A Bookshop maintains the inventory of books that are being sold at the shop. The list includes details such as author, title, price,publisher and stock position. Whenever a customer wants a book the sales person inputs the title and the author and the system searches the list and displays whether it is available or not. If it is not an appropriate message is displayed, if it is then the system displays the book details and request for the number of copies  required, if the requested copies are available the total cost of the requested copies is displayed otherwise the message "required copies not in stock" is displayed. Write a program for the above in structures with suitable functions.
  12. Write a C program to read a data file of student’s records with fields( Regno, Name, M1,M2,M3,M4,M5) and write the successful students data (percentage > 40% ) to a data file.

Data Structures Lab Problems Solved Questions with Answers

  1. Code the following list ADT operations using array, single linked list, double linked list.
    (a) voidis_emptyList(List L)
    (b) List makeNullList(size n)
    (c) Position firstPost(List L)
    (d) Position endPost(List L)
    (e) Position nextPost(List L, Position p)
    (f) Position prevPos(List L, position p)
    (g) Position find(List L, Element x)
    (h) Position findKth(List L, int k)
    (i) void insert(List L, Position p)
    (j) void delete(List L, Position p)
    (k) void append(List L, Element x)
    (l) intcmp(List L, Position p1, Position p2)
    (m) int cmp2(List L, List L, Position p1, Position p2)
    (n) void swap(List L, Position p1, Position p2)
    (o) Element retrieveElement(List L, Position p)
    (p) void printelement(List L, Position p)
  2. Using the above List ADT operations, Write a menu driven program to support following higher level list operations:
    (a) Create null list
    (b) Read a list of elements into the list.
    (c) Insert an element in the Kth position of the list
    (d) Delete an element in the Kth position of the list
    (e) Delete a given element from the list
    (f) Find whether given element is present in the list
    (g) Display the elements of the list
  3. Write a program that reads two lists of elements, prints them, reverses them, prints the reverse list, sort the lists, print the sorted lists, merges the list, prints merge list.
  4. Implement a polynomial ADT and write a program to read two polynomials and print them, adds the polynomials, prints the sum, multiply the polynomials and print the product.
  5. Implement stack ADT and write a program that reads an infix arithmetic expression of variables, constants, operators (+,  -, *, /) and converts it into the corresponding postfix form.  Extend the program to handle parenthesized expression also.
  6. Implement Queue ADT and write a program that performs Radix sort on a given set of elements.
  7. Implement the following sorting operations:-  (a)Shell Sort
    (b) Heap Sort
    (c) Merge Sort
    (d) Quick Sort
  8. Implement Binary Tree ADT and write a program that reads postfix Arithmetic expression form, builds the expression tree and performs tree Traversal on it.
  9. Implement Binary search ADT and write a program that interactively allows
    (a) Insertion
    (b) Deletion
    (c) Find_min
    (d) Find_max
    (e) Find operations
  10. Implement AVL Tree ADT and Write a program that interactively allows
    (a) Insertion
    (b) Deletion
    (c) Find_min
    (d) Find_max
  11. Implement Hashing and Write a program to find a element using Open Addressing

Computer Hardware and Software Lab Problems Solved Questions with Answers

  1. Identifying external ports and interfacing.
  2. Identifying PCI cards and interfacing.
  3. Explore Mother Board components and Layouts.
  4. Partitioning and formatting Hard disks.
  5. Install and Uninstall system and application software.
  6. Understand BIOS configuration.
  7. Connect computers in a network
  8. Types of input/output devices.
  9. Assemble a Computer.
  10. Troubleshoot a Computer.
  11. Operating system commands
    a. Directory Related Utilities.
    b. File and Text Processing Utilities.
    c. Disk, Compress and Backup Utilities.
    d. Networking Utilities and
    e. Vi editor

Microprocessor and Microcontroller Lab Problems Solved Questions with Answers

  1. Write a 8086 assembly language program to arrange the given numbers in ascending order.
  2. Write a 8086 assembly language program to count number of +ve elements,  -ve elements, zeros in the given array.
  3. Write a 8086 assembly language program to find the square of a number using look- up-table.
  4. Write a 8086 assembly language program to move a sting byte from a memory location to another memory location.
  5. Write a 8086 assembly language program to calculate the maximum and minimum in an array.
  6. Write a 8086 assembly language program to convert BCD to binary using near procedures.
  7. Write a8086 assembly language program to calculate nCr by using near procedures.
  8. Write a program to display a string of characters (use Keyboard/Display Interfacing)
  9. Write a program to generate an interrupt using 8259 Interrupt Controller.  Assume two sources are connected to the IR lines of the 8269.    Of these key board has highest priority and printer has the lowest priority.
  10. Assume that 5 BCD data items are stored in RAM locations starting at 40H.  Write a program to find the sum of all the numbers. The result must be in BCD.
  11. Write a program with three sub-routine to transfer the data from on-chip ROM to RAM  location starting at  40H b)add them and save in 60Hc)find the average of the data and store it in R7.notice that  data is stored in a code space of on-chip ROM.
  12. Program the 8051 timers to generate time delay.

Unix Programming Lab Problems Solved Questions with Answers

AWK Programming

  1. Design a command “wishme” that will greet you “goodmorning”, “good afternoon” according to current time.
  2. Design a command “verbosedate” that displays day and month completely spelled.
  3. Design a command “fages” that will list the files and their ages, to date.
  4. Design a command “word-freq” that will print the words and number of occurrences of that word in the given text.
  5. Design a command “reminders” that will print the events happening today, where events and their dates are edited in the file “events”.
  6. Design a command “backwards” that will prints the line and reverse order.
  7. Design a command “sales-totals” that will consolidate the sales made by salespersons, from the file sales where each line contains the name of sales person and sales made.
  8. Design a command “wcount” that will count the number of words in a file.
  9. Design a command “sqeeze” that will convert tabs or more than one blank space to one blank one blank space.
  10. Design a command “replaceover” that will replace the variable with the specified variable in a file.

Shell scripts and Programming

  1. Design a command which, that prints the path of the command (file) given as argument.
  2. Design a command search that prints the path of the given as argument located in your home directory.
  3. Design a command filelist [- c < char >] which prints all filenames beginning with the character specified as argument to the command, if the option is not specified it should print all the file names.
  4. Design a command monthly-file [-m < month >] which lists the files created in a given month where month is argument to be command .if the option is not specified ,it lists the files in all the months.
  5. Design a command getline [-f < filename >-n < lineno >] which prints the line number lineno in the file specified with –f option. If the line number is not specified it should list all the lines in the given file.
  6. Design a command listlines [-f < filename >-v < varname >] which prints the line from the given file filename, which containing the variable varname. If varname is not specified it should list all the lines.
  7. Design a command avg [-n < colon >-f < filename >] which prints the average of the given column in a file where colon and filename are arguments to the command.
  8. Program which takes two file names as arguments, if their contents are same then remove the second file.

File & Process Management Programming

  1. Write a C program for copy data from source file to destination file, where the file names are provided as command-line arguments.
  2. Write a C program that reads every 100th byte from the file, where the file name is given as command-line argument.
  3. Write a C program to display information of a given file which determines type of file and inode information, where the file name is given as command-line argument.
  4. Write a C program to display information about the file system.
  5. Write a C program for demonstrating dup and dup2 system calls.
  6. Write a C program that prints entries in a directory.
  7. Write a C program that prints files recurcively in a given directory.
  8. Write a C program to create a process by using fork()system call.
  9. Write a C program to create an Orphan Process.
  10. Write a C program to demonstarate Zombie process.
  11. Write a C program to demonstrate a parent process that use wait() system call to catch child's exit code.
  12. Write a C program to Overlay child address space by a program, where the program name is given as command-line argument.
  13. Program that demonstrates both child and parent processes writes data to the same file.

Signal and IPC Programming

  1. Write a C program for Requesting an alarm signal to executes user defined alarm handler.
  2. Write a C program to demonstate terminal signals (control-c & control-z).
  3. Write a C program to Override child termination signal by the parent process.
  4. Write a C program to demonstrate Suspending and Resuming Processes.
  5. Write a C program for Un-named pipes to send data from first process to the second process.
  6. Write two C programs that demonstrates Named pipes, Reader and Writer Processes.
  7. Write C program that demonstrates IPC through shared memory.

Implement the following Client & Server Programs using C' Language

  1. Simple Web Server (TCP/UDP).
  2. Concurrent Server (using Child Process/Threads) (TCP/UDP).
  3. Simple FTP Server (TCP).

ARM (Advanced RISC Machine): (4-1) ECE

  • Introduction
  • Core Features
  • Version History
  • Data Flow Model
  • Registers
  • CPU Modes
  • Memory Organization
  • Interrupts
  • Pipelining
  • ARM Assembly Language
  • ARM 7 Instruction Set
  • Usage of KEIL IDE Software
  • ARM Embedded Language
  • Semiconductors
  • On Chip System Peripherals Bus
  • Memory Map
  • Phase Locked Loop
  • On Chip user Peripherals
  • General Purpose I/O: Demo
  • External Interrupts: Demo
  • Mini or Major Project in ARM

RTOS RT-LINUX: (CSE, ECE, EEE, EIE IT)

  • RT-Linux
  • Different types Operating Systems
  • RTOS Basics-Linux as Real Time
  • RTOS Introduction (Hard & Soft RT)
  • Latency in Linux, Priority Inheritance
  • Linux 2.6 Features for Real time
  • 2.6 Kernel Compilation
  • RT Linux Patching
  • Linux RTPREEMPT Patches
  • Configuring the Kernel with RT-PATCH
  • Implementation of Real Time Application
  • Linux Real Time API
  • Porting RT-LINUX on ARM and Application Development
  • Mini or Major Project in RT-LINUX

Wireless/Mobile Communication and Networks: (4-2) ECE

  • Multiple Access Techniques for Wireless Communication
  • Introduction to Wireless Networking
  • Wireless Data Services
  • Mobile IP and Wireless Access Protocol
  • Wireless LAN Technology
  • Bluetooth
  • Mobile Data Networks
  • Wireless ATM & HIPER LAN
  • Mini or Major Project in Wireless/Mobile Communication and Networks