Batch 2017 6th Semester CSE
Batch 2017 6th Semester CSE
SCHEME
BE CSE
Batch 2017 – 2021
6th Semester
Professional Elective-I
6 CS*-3** DE 0 0 2 - 60 40 100 1
Lab
Network Operating
7 CST-365 DC 3 0 0 - 40 60 100 3
System
Institute Open
8 CSN-3** IOE 3 0 0 - 40 60 100 3
Elective-I
Total 12 2 9 5 21
Professional Electives*
Computational Intelligence
Subject
Subject Name
Code
CSA-361 Soft Computing
Elective I
CSA-362 Soft Computing Lab
CSA-4** Machine Learning
Elective II
CSA-4** Data Analytics
CSA-4** Computer Vision
Elective III
CSA-4** Augmented Reality & Virtual Reality
CSA-4** BlockChain Technology
Elective IV CSA-4** Robotic Process Automation
CSA-4** Devops
Professional Electives*
Cyber Security
Subject
Subject Name
Code
CSB-363 Information Security
Elective I
CSB-364 Information Security Lab
Elective CSB-4** Web Service Security
II CSB-4** Cyber Security
Elective CSB-4** Securing Windows and Linux
III CSB-4** Secured Network Protocols
CSB-4** Cryptography
Elective
CSB-4** Software Defined Networks
IV
CSB-4** Privacy Management
Marks-100
Internal-40 External-60
Course Objectives
To understand the concept of formal languages and their relation with finite automata.
To study and design different finite automata.
To study context free grammars and ambiguity related issues.
To gain familiarization with Push- Down Automata and Turing Machines.
To explore relationship between different classes of formal languages.
Unit Course Outcomes
UNIT –I
Introduction: Basic Terminology: Alphabet, Formal Language and operations on formal languages,
Examples of formal languages.
Finite automata : Concept of Basic Machines, Properties and Limitations of Finite State Machines,
Deterministic Finite Automata(DFA), Non-Deterministic Finite Automata(NFA), Equivalence of
DFA and NDFA , Non-Deterministic Finite automata with Λ-Transitions.
Regular expression: Regular Languages and Regular Expressions, Kleen’s Theorem. Arden’s
Method.
UNIT –II
Properties of Regular sets: The Pumping Lemma for Regular sets, Application of the Pumping
Lemma, Closure Properties of Regular Sets, Myhill- Nerode Theorem and Minimization of Finite
Automata, Minimization Algorithm.
Finite Automata with output: Moore and Mealy Machines. Equivalence of Moore and Mealy
Machines.
Context Free Grammars: Examples and Definitions, Derivation trees and ambiguity, An
Unambiguous CFG for Algebraic Expressions. Regular Grammar, Simplified forms and Normal
forms: Removal of useless symbols and unit production, Removal of Λ-moves, Chomsky Normal
Form (CNF), Griebach Normal Form (GNF).
UNIT –III
Context sensitive Language: Context sensitive Language and grammar, Relation between
languages of classes
Turing Machines: Definitions and Examples, Deterministic and Non- Deterministic Turing
Machines, Unsolvable Problems: A Non-recursive Language and an Unsolvable Problem, PCP
Problem and MPCP Problem.
More General Languages and Grammars: Recursively Enumerable and Recursive Languages,
Unrestricted grammars, Chomsky hierarchies of grammars.
Text Books:
1. Martin J.C., “Introduction to Languages and Theory of Computation”, Tata McGraw-Hill Publising
Company Limited, 3rd Edition.
2. Hopcroft J.E. and Ullman J.D., “Introduction to Automata Theory Languages and Computation”,
Narosa Publications.
Reference Books:
Department
Department of Computer Science and Engineering
Teaching the Subject
CO2 2 2 2 1 1 1 2 1 1 1 1 3
CO3 3 1 3 2 1 1 2 1 2 1 1 3
TOTAL 5 3 6 4 6 2 5 3 4 4 3 7
*Note: The content given in syllabus is 100% matched with the GATE 2020 syllabus
Marks-100
Internal-40 External-60
Course Objectives
Course Objective:
This course is indented for students to experience on the technologies included in the
Network Operating System.
UNIT –I [15h]
Introduction of Computer Networks: Reference Model: OSI Reference Model, TCP/IP reference
model, Core protocols of TCP/IP,IP routing,IP routers,Routing Tables.
Introduction to Microsoft Network Monitoring Tool: Introduction to netmon tool, Installation and
configuration of Netmon.
Unit-II [15h]
Installing windows server 2008: Plan for a server roles and installing windows server core,configure
server core,Add and configure server roles,add backup feature and migrate roles from previous
versions of windows server.
Unit-III [15h]
Install Active Directory Domains Services in Windows 2008 R2: Installing a new forest by using the
graphical user interface (GUI), Understanding active directory domain.Servicex functional Levels.
Text Books:
Subject Code
Department Teaching
Department of Computer Science and Engineering
the Subject
PO-CO mapping PO PO
PO3 PO4
PO
PO6 PO7
PO PO PO1 PO1 PO1
1 2 5 8 9 0 1 2
CO1 3 1 1 1 2 1 1 1 1 1 1 2
CO2 1 2 2 1 1 1 1 1 1 1 1 2
CO3 2 1 2 3 2 2 1 1 2 1 2 1
BS ES PD PC PE OE Project
CSA-361 3 0 0 3
Prerequisite:
Knowledge of basic concepts of Fuzzy logic
and genetic algorithms
Marks-100
Internal-40 External-60
Course Objectives
UNIT-I
Introduction to Soft Computing, Soft Computing vs. Hard Computing, Characteristics of soft
Computing.
Introduction to Fuzzy Logic, Fuzzy Sets and Membership functions, Operations on Fuzzy sets ,
Fuzzy Relations, Rules, Propositions Implications and Inferences, Defuzzification Techniques:
Lambda-cut method, weighted average method, Maxima method, Centroid method.
UNIT-II
Artificial Neural Network Introduction, Fundamental concept, Biological neuron and its working,
Evolution of Neural Networks, Basic Models of Artificial Neural Networks, Important
Terminologies of ANNs, Activation Functions, Architecture: Single layer feed forward architecture,
Multilayer feed forward architecture, McCulloch-Pitts Neuron, Supervised Learning vs.
Unsupervised Learning, Supervised Learning Networks: Back-Propagation Network, Unsupervised
Learning Networks: Hebb Network.
UNIT-III
Case Study: To implement FIS Editor. Use Fuzzy toolbox to model tip value that is given after a
dinner based on quality answers.
Text Books:
1. S.N. Shivanandam, Principle of soft computing, Wiley. ISBN13: 9788126527410 (2011)
2. Jyh-Shing Roger Jang, Chuen-Tsai Sun, Eiji Mizutani, “Neuro-Fuzzy and Soft Computing”,
PrenticeHall of India, 2003.
3. George J. Klir and Bo Yuan, “Fuzzy Sets and Fuzzy Logic-Theory and Applications”, Prentice Hall,
1995.
Reference Material
4. James A. Freeman and David M. Skapura, “Neural Networks Algorithms, Applications, and
Programming Techniques”, Pearson Edn., 2003.
5. Mitchell Melanie, “An Introduction to Genetic Algorithm”, Prentice Hall, 1998.
6. David E. Goldberg, Genetic Algorithms in Search, Optimization & Machine Learning, Addison
Wesley, 1997.
Please go through these instructions thoroughly and follow the same pattern while setting the paper as the
students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set Ten questions
in all, three questions from each unit and a compulsory question consisting of five sub parts and
based on the whole syllabus. The candidate will be required to attempt six questions including the
compulsory question number no 1 and not more than two questions from each unit.
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Internal-60 External-40
Course Objectives
I To introduce students to the basic concepts and techniques of soft computing and
fuzzy set theory
II To develop concepts of ANN.
List of Experiments
UNIT-I
5. Hebb Net to classify two dimensional input patterns in bipolar with given targets.
6. Perceptron net for an AND function with bipolar inputs and targets.
7. To calculate the weights for given patterns using hetero-associative neural net.
8. To store vector in an auto-associative net. Find weight matrix & test the net with input
9. To store the vector, find the weight matrix with no self-connection. Test this using a discrete
Hopfield net.
UNIT-III
Department Teaching
Department of Computer Science and Engineering
the Subject
Program Outcome a b c d E f g h i j k
Mapping of Course
outcome with Program
outcome
BS ES PD PC PE OE Project/Training
Category
Approval Date of meeting of the Board of Studies
Marks-100
Internal-40 External-60
Course Objectives
To familiarize the students with the basic concepts of services, attacks with its models and
concepts of encryption.
To conceptualize digital signature and different encryption algorithm.
To state the various authentication protocols and their requirements.
To elucidate an applications of security and their effects on security standards.
To comprehend IP security and their methods.
Unit
After studying this subject, the students will be able to:
Conceptualize the various forms of attacks, execute cipher models, and solve the
I problem based on different security models and encryption. Also, the students will be
able to apply number theory and encryption algorithms.
Apply authentication protocols that are used to develop digital signatures and perform
II
authentication for software security standards.
III Implement IP security with SSL and TLS.
UNIT-I
Introduction & Number Theory: Services, Mechanisms and attacks-the OSI security architecture-Network
security model-Classical Encryption techniques (Symmetric cipher model, substitution techniques,
transposition techniques, steganography).FINITE FIELDS AND NUMBER THEORY: Groups, Rings,
Fields-Modular arithmetic-Euclid‟s algorithm-Finite fields- Polynomial Arithmetic –Prime numbers-
Fermat‟s and Euler‟s theorem-Testing for primality -The Chinese remainder theorem- Discrete alogarithms.
Block Ciphers : Data Encryption Standard-Block cipher principles-block cipher modes of operation-
Advanced Encryption Standard (AES)-Triple DES-Blowfish-RC5 algorithm.
UNIT II
Public key cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management –
Diffie Hellman Key exchange
Hash Functions And Digital Signatures: Authentication requirement – Authentication function – MAC –
Hash function – Security of hash function and MAC – MD5–SHA512–HMAC – CMAC – Digital signature
and authentication protocols – DSS – EI Gamal – Schnorr.
UNIT III
Security Practice & System Security: Authentication applications – Kerberos – Authentication services –
Internet Firewalls for Trusted System: Roles of Firewalls – Firewall related terminology- Types of Firewalls –
Firewall designs –Intruder – Intrusion detection system – Virus and related threats.
E-mail Security: Security Services for E-mail-attacks possible through E-mail – establishing keys privacy-
authentication of the source-Message Integrity-Non-repudiation-Pretty Good Privacy-S/MIME.
Text Books:
1. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education, March
2013.
2. Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, Prentice Hall of India,
2002.
Reference Books:
1. Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata McGraw Hill.
2. Man Young Rhee, “Internet Security: Cryptographic Principles”, “Algorithms and Protocols”,
Wiley Publications.
3. Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India.
4. Ulysess Black, “Internet Security Protocols”, Pearson Education Asia.
5. Charlie Kaufman and Radia Perlman, Mike Speciner, “Network Security, Second Edition, Private
Communication in Public World”, PHI.
Marks-100
Internal-60 External-40
Course Objectives
List of Experiments
UNIT-I
UNIT-III
Marks-100
Internal-40 External-60
Course Objectives
I To gain knowledge of the structure and use the Java programming language for
various technologies
II Annotations and Databases usage in project development
Unit-I
Java Fundamentals: Introduction to Java. Difference between C++ and Java.Keywords, Tokens, Data
types. Use of public, private and protected.
OOPS using Java: Use of class and method in Java. Inheritance, Abstraction, Polymorphism,
Encapsulation and data privacy. Difference between method overloading and method overriding.
Exception Handing: Introduction to Exceptions. Difference between error and exception. Use of try,
catch and throw. Difference between throw and throws. Types of Exceptions, Exception handling in
Java.
Unit-II
Wrapper Classes, I/O Streams and Annotations: Use of wrapper classes in Java- Integer, Character,
Long, Boolean. Autoboxing and Unboxing. Byte stream, Character stream, Object serialization,
cloning. System defined annotations, Custom annotations, application of annotations, Testing using
JUnit.
JDBC: Database connectivity, Types of Drivers for connection, Connection Example. CRUD
operations using Database, Configuring various types of drivers for Java Database Connectivity,
MVC Model for project development, Sequence, Dual table , Date type management in Java.
Unit-III
Servlets and JSP: Servlet Lifecycle, Generic Servlet, Http Servlet, Linking Servlet to HTML,
HttpServlet Request and Response, Servlet with JDBC, Configuring project using servlet, Servlet
Config and Servlet Mapping JSP declaration, JSP directives, JSP Scriptlets, JSP include tag, JSP
page tag, JSTL.
XML and Web Services: Structure of XML, Elements of XML 1.0, 2.0, DTDs, XML parser, DOM
parser, Web services using REST and HTTP, Creating webservices for database access via remote
servers
Text books:
1. Herbert Schildt, Java : The Complete Reference, 9th Edition, Oracle Press.
2. Gary Cornell, Core Java Volume II Advanced Features, 8th Edition, Pearson Education.
3. Jim Keogh, J2ee : Complete Reference, 1st Edition, Tata McGraw Hill.
Reference books:
1. James Gosling, Ken Arnold and David Holmes, Java Programming Langauge, 5th Edition, Pearson
Education.
2. Gary Cornell, Core Java Volume I, 3rd Edition, Pearson Education.
Project Based Learning in Java
CST-358
Department Teaching
Department of CSE
the Subject
a b c d e f g h i j k
Program Outcome
Mapping of Course
outcome with Program
outcome
Project/
BS ES PD PC PE OE
Category Training
Please go through these instructions thoroughly and follow the same pattern while setting the paper
as the students have been prepared according to this format.
Weight age per unit = 20 marks (excluding over attempt weight age)
Marks-100
Internal-60 External-40
Course Objectives
List of Experiments
UNIT-I
UNIT-II
UNIT-III
8. Create a palindrome creator application for making a longest possible palindrome out of
given input string.
9. Create a Servlet/ application with a facility to print any message on web browser.
Department Teaching
Department of CSE
the Subject
a b c d e f g h i j k
Program Outcome
Mapping of Course
outcome with Program
outcome
Project/
BS ES PD PC PE OE
Category Training
SOFTWARE PROJECT
L T P C
Subject Code MANAGEMENT
Marks-100
Internal-40 External-60
Course Objectives
Introduces the concepts and methods required for the construction of large software systems.
Gain knowledge on the principles and techniques of software project management.
Provides an understanding of both theoretical and methodological issues involved in software
engineering project management.
Course Outcomes
UNIT-I
UNIT-II
UNIT-III
TEXT BOOK:
1. Bob Hughes, Mike Cotterell and Rajib Mall: Software Project Management – Fifth Edition, Tata McGraw
Hill, New Delhi, 2012.
REFERENCES:
3. Gopalaswamy Ramesh, “Managing Global Software Projects” – McGraw Hill Education (India),
Fourteenth Reprint 2013.
Department Teaching
Department of Computer Science and Engineering
the Subject
PO PO PO PO PO1 PO1
Program Outcome PO1 PO2 PO3 PO6 PO7 PO12
4 5 8 9 0 1
CO1 3 3 1 3 1 3 3 2 3 1 2 3
Mapping of CO2 3 1 3 2 1 2 3 2 1 1 1 3
Course outcome
with Program
outcome CO3 2 2 3 2 3 3 2 3 2 2 3 2
Total 8 6 6 7 5 8 8 7 6 4 6 8
MNG
Category
Marks-100
Internal-40 External-60
Course Objectives
Familiarization with the theory and architecture of central processing unit along with
I understanding of instruction set. Also to interpret the architecture and functionality of
central processing unit.
Analyze different processor architectures and exemplify in a better way memory and
II input/output mechanisms
UNIT-I
Basic concepts-Digital computer with its block diagram, computer hardware components - ALU,
registers, memory, system bus structure-data, address and control bus.
Instruction Set Architectures-Levels of programming Languages, Assembly Language
Instructions: instruction cycle, instruction types, addressing modes, RISC v/s CISC.
Computer Organization- CPU organization, Memory Subsystem Organization: Types of memory,
Internal Chip Organization, memory subsystem configuration.
UNIT-II
Design of control unit - Hardwired control unit, Micro-Programmed control unit and comparative
study.
Memory organization-Memory hierarchy, Cache Memory Associative Memory, Cache memory
with associative memory, Virtual Memory: Paging, Segmentation.
Input output organization –Asynchronous Data transfer: Source Initiated, Destination Initiated,
Handshaking, Programmed I/O, Interrupts DMA, IOP
UNIT-III
Reference Books:
1. J.P. Hayes, “Computer Architecture and Organization”, Third Edition.
2. Mano, M., “Computer System Architecture”, Third Edition, Prentice Hall.
3. Stallings, W., “Computer Organization and Architecture”, Eighth Edition, Pearson Education.
Course
Code-
Computer Organization and Architecture
CSN-351
Departmen
t Teaching Department of Computer Science and Engineering
the Subject
P P011 PO12
Program PO PO PO PO PO PO PO1
PO4 O PO7
Outcome 1 2 3 6 8 9 0
5
CO1 3 1 1 1 2 1 2 1 1 1 1 1
CO2 3 2 1 1 1 1 2 1 1 1 1 1
CO3 2 1 1 2 1 1 2 1 1 1 1 1
Project/Trainin
BS ES PD PC PE OE IOE
Category g
Please go through these instructions thoroughly and follow the same pattern while setting the paper
as the students have been prepared according to this format.
The syllabus has been divided into three equal units. The paper setter is required to set ten questions
in all, three questions from each unit and a compulsory question consisting of five sub parts and
based on the whole syllabus. The candidate will be required to attempt six questions including the
compulsory question number no 1 and not more than two questions from each unit.
Engineering Encapsulation/Technical
L T P C
Subject Code Training
Marks-100
Internal-60 External-40
Course Objectives
2-dimensional-array/
https://www.hackerrank.com/challenges/equal-stacks/problem
https://www.hackerrank.com/challenges/maximum-element/problem
Arrays,
Stacks & https://www.hackerearth.com/fr/practice/data-
Queues structures/queues/basics-of-queues/practice-problems/algorithm/disk-
tower-b7cc7a50/
https://www.hackerrank.com/challenges/queue-using-two-
stacks/problem
https://www.hackerrank.com/challenges/print-the-elements-of-a-
linked-list/problem
https://www.hackerrank.com/challenges/insert-a-node-at-the-tail-of-
a-linked-list/problem
https://www.hackerrank.com/challenges/compare-two-linked-
lists/problem
https://www.hackerrank.com/challenges/reverse-a-linked-list/problem
https://www.hackerrank.com/challenges/insert-a-node-into-a-sorted-
Linked List doubly-linked-list/problem
https://www.hackerrank.com/challenges/reverse-a-doubly-linked-
list/problem
https://www.hackerrank.com/challenges/insertionsort1/problem
https://www.hackerrank.com/challenges/insertionsort2/problem
https://www.hackerrank.com/challenges/quicksort1/problem
https://www.hackerearth.com/practice/algorithms/sorting/bubble-
sort/practice-problems/algorithm/min-max-difference/
https://www.hackerearth.com/practice/algorithms/sorting/selection-
sort/practice-problems/algorithm/old-keypad-in-a-foreign-land-24/
https://www.hackerearth.com/practice/algorithms/searching/linear-
search/practice-problems/
https://www.hackerearth.com/practice/algorithms/searching/binary-
Sorting & search/practice-problems/
Searching
https://www.hackerrank.com/challenges/countingsort1/problem
https://www.hackerrank.com/challenges/countingsort2/problem
Graphs https://www.hackerrank.com/challenges/bfsshortreach/problem
https://www.hackerearth.com/practice/algorithms/graphs/breadth-
first-search/practice-problems/algorithm/monk-and-the-islands/
https://www.hackerearth.com/practice/algorithms/graphs/depth-first-
search/practice-problems/algorithm/anupam-graph/
https://www.hackerrank.com/challenges/kruskalmstrsub/problem
https://www.hackerrank.com/challenges/primsmstsub/problem
https://www.hackerrank.com/challenges/dijkstrashortreach/problem
https://www.hackerrank.com/challenges/minimum-mst-
graph/problem
https://www.hackerrank.com/challenges/clique/problem
https://www.hackerrank.com/challenges/crab-graphs/problem
https://www.hackerrank.com/challenges/the-quickest-way-
up/problem
https://www.hackerrank.com/challenges/tree-preorder-
traversal/problem
https://www.hackerrank.com/challenges/tree-postorder-
traversal/problem
https://www.hackerrank.com/challenges/tree-inorder-
traversal/problem
https://www.hackerrank.com/challenges/tree-height-of-a-binary-
tree/problem
https://www.hackerrank.com/challenges/tree-level-order-
traversal/problem
Trees
https://www.hackerrank.com/challenges/binary-search-tree-
insertion/problem
https://www.hackerrank.com/challenges/binary-search-tree-lowest-
common-ancestor/problem
https://www.hackerrank.com/challenges/self-balancing-tree/problem
https://www.hackerrank.com/contests/hourrank-
19/challenges/maximal-tree-diameter/problem
https://www.hackerrank.com/contests/101hack33/challenges/longest-
path
Algorithms https://www.hackerearth.com/practice/algorithms/string-
algorithm/string-searching/practice-problems/algorithm/string-4-
d1093b86/
https://www.hackerearth.com/practice/algorithms/string-
algorithm/string-searching/practice-problems/algorithm/palindrome-
String string-22/
Algorithms
https://www.hackerearth.com/practice/algorithms/string-
algorithm/basics-of-string-manipulation/practice-
problems/algorithm/palindrome-124/
https://www.hackerearth.com/practice/algorithms/string-
algorithm/basics-of-string-manipulation/practice-
problems/algorithm/conversion-11/
https://www.hackerearth.com/practice/algorithms/string-
Scheme Applicable to BE CSE Batch 2017 onwards
Department of Computer Science & Engineering
algorithm/basics-of-string-manipulation/practice-
problems/algorithm/print-first-occurence/
https://www.hackerrank.com/challenges/camelcase/problem
https://www.hackerrank.com/challenges/strong-password/problem
https://www.hackerrank.com/challenges/dynamic-programming-
classics-the-longest-common-subsequence/problem
https://www.hackerrank.com/challenges/unbounded-
knapsack/problem
https://www.hackerrank.com/challenges/longest-increasing-
subsequent/problem
https://www.hackerrank.com/challenges/travel-around-the-
world/problem
https://www.hackerrank.com/challenges/extremum-
permutations/problem
Dynamic
Programming https://www.hackerrank.com/challenges/coin-change/problem
https://www.hackerearth.com/practice/algorithms/dynamic-
programming/introduction-to-dynamic-programming-1/practice-
problems/algorithm/win-the-game/
https://www.hackerrank.com/challenges/sherlock-and-cost/problem
https://www.hackerrank.com/contests/srin-aadc03/challenges/classic-
01-knapsack
https://www.hackerrank.com/contests/bitsg-ai-lab-
Branch and 2/challenges/travelling-salesman-problem
Bound
https://www.hackerrank.com/challenges/assignment/problem
https://www.hackerearth.com/practice/basic-
programming/recursion/recursion-and-backtracking/practice-
problems/algorithm/n-queensrecursion-tutorial/
https://www.hackerrank.com/challenges/subset-sum/problem
https://www.hackerrank.com/challenges/queens-on-board/problem
https://www.hackerearth.com/practice/basic-
programming/recursion/recursion-and-backtracking/practice-
Backtracking problems/algorithm/biggest-forest-700592dd/
https://www.hackerearth.com/practice/basic-
programming/recursion/recursion-and-backtracking/practice-
problems/algorithm/simran-and-stairs/
https://www.hackerearth.com/practice/basic-
programming/recursion/recursion-and-backtracking/practice-
problems/algorithm/a-tryst-with-chess/
https://www.hackerearth.com/practice/basic-
programming/recursion/recursion-and-backtracking/practice-
problems/algorithm/hack-the-money/