Seventh / Eightth Semester
Seventh / Eightth Semester
EIGHTTH
SEMESTER
Course Code: BTCS 701-18 Course Title : Network Security and 3L:0T:0P 3Credits
Cryptography
Detailed Contents:
UNIT 1: Introduction (3 Hours)
[5hrs] (CO 1)
Modular Arithmetic, Euclidean and Extended Euclidean algorithm, Prime numbers, Fermat
and Euler’s Theorem [5hrs]
(CO 1)
UNIT 3: Cryptography
[12hrs] (CO 2)
[6hrs] (CO 3)
[7hrs] (CO 4)
Course Outcomes:
CO1: Understand the fundamental principles of access control models and techniques,
authentication and secure system design
CO2: Have a strong understanding of different cryptographic protocols and techniques and
be able to use them.
CO3: Apply methods for authentication, access control, intrusion detection and prevention.
1. Cryptography And Network Security Principles And Practice Fourth Edition, William
Stallings, Pearson Education
2. Modern Cryptography: Theory and Practice, by Wenbo Mao, Prentice Hall PTR
---------------------------------------------------------------------------------------------------------
---------
Course Code: BTCS Course Title: Data Warehousing and 3L: 0T: 0P Credits: 3
-702-18 Data Mining
Detailed Contents:
UNIT 1:
Data Warehousing Introduction: design guidelines for data warehouse implementation,
Multidimensional Models; OLAP- introduction, Characteristics, Architecture, Multidimensional view
Efficient processing of OLAP Queries, OLAP server Architecture ROLAP versus MOLAP Versus
HOLAP and data cube, Data cube operations, data cube computation.
Data mining: What is data mining, Challenges, Data Mining Tasks, Data: Types of Data, Data
Quality, Data Pre-processing, Measures of Similarity and Dissimilarity
[10hrs]
UNIT 2:
Data mining: Introduction, association rules mining, Naive algorithm, Apriori algorithm, direct hashing
and pruning (DHP), Dynamic Item set counting (DIC), Mining frequent pattern without candidate
generation (FP, growth), performance evaluation of algorithms
Classification: Introduction, decision tree, tree induction algorithms – split algorithm based on
information theory, split algorithm based on Gini index; naïve Bayes method; estimating predictive
accuracy of classification method
[10 hrs]
UNIT 3:
Cluster analysis: Introduction, partition methods, hierarchical methods, density based methods, dealing
with large databases, cluster software
Search engines: Characteristics of Search engines, Search Engine Functionality, Search Engine
Architecture, Ranking of web pages, The search engine history, Enterprise Search, Enterprise Search
Engine Software.
[10 hrs]
UNIT 4:
Web data mining: Web Terminology and Characteristics, Locality and Hierarchy in the web, Web
Content Mining, Web Usage Mining, Web Structure Mining, Web mining Software.[8 hrs]
1. Carlo Vercellis, Business Intelligence: Data mining and Optimization for Decision Making, WILEY.
2. Han J., Kamber M. and Pei J. , b Data mining concepts and techniques, Morgan Kaufmann Publishers
(2011) 3rd ed.
3. Pudi V., Krishana P.R., Data Mining, Oxford University press, (2009) 1st ed.
4. Adriaans P., Zantinge D., Data mining, Pearsoneducation press (1996), 1st ed.
5. Pooniah P. , Data Warehousing Fundamentals, Willey interscience Publication, (2001), 1st ed.
ELECTIVE IV
Course Code: BTCS 704-18 Course Title : Deep Learning 3L:0T:0P 3Credits
Detailed Contents:
[4hrs] (CO 2)
Course Outcomes:
CO2: Compare and explain various deep learning architectures and algorithms.
1. Goodfellow L., Bengio Y. and Courville A., Deep Learning, MIT Press (2016).
2. Patterson J. and Gibson A., Deep Learning: A Practitioner's Approach, O’Reilly
(2017), 1st
ed.
Reference Books:
1. Haykin S., Neural Network and Machine Learning, Prentice Hall Pearson (2009), 3rd
ed.
2. Geron A., Hands-on Machine Learning with Sci-kit and TensorFlow, O’Reilly Media
(2017)
Course Code: BTCS 705-18 Course Title: Deep Learning Lab L:0;T:0; Credits;1
2P:
Detailed Contents:
Unit 1:
SEMANTICS DATA CONTROL: View management; Data security; Semantic Integrity Control.
Unit 3:
Unit 4:
COURSE OUTCOMES
References:
1. Principles of Distributed Database Systems, M.T. Ozsu and P. Valduriez, Prentice-Hall, 1991.
2. Distributed Database Systems, D. Bell and J. Grimson, Addison-Wesley, 1992.
Expt. 2: Creating and managing database objects (Tables, views, indexes etc.)
Expt. 6: Implement various Transaction concurrency control methods [i.e. lock’s] by executing
multiple update and queries.
Mini Project: Student has to do a project assigned from course contents in a group of two or three
students. The team will have to demonstrate as well as have to give a presentation of the same.
Detailed Contents:
Unit 1: Overview, computer imaging systems, lenses, Image formation and sensing, Image analysis, pre-
processing and Binary image analysis. 6 hrs., CO1
Unit 2:
Edge detection, Edge detection performance, Hough transform, corner detection. 4 hrs., CO1
Unit 3:
Unit 4:
Feature extraction, shape, histogram, color, spectral, texture, using CVIP tools, Feature analysis, feature
vectors, distance /similarity measures, data pre- processing. 8
hrs., CO2
Unit 5:
COURSE OUTCOMES
CO2: Identify features to recognize object , scene and categorization from images.
References:
1. Computer Vision: Algorithms and Applications by Richard Szeliski.
2. Deep Learning, by Goodfellow, Bengio, and Courville.
3. Dictionary of Computer Vision and ImageProcessing, by Fisheretal.
a. Log
b. Power law
c. Negation
Expt. 2: Implementation the following:
a. Histogram processing
b. Histogram equalization/matching
Expt. 3: Implementation of piecewise linear transformations
a. Contrast stretching
b. Grey level slicing
c. Bit plane slicing
Expt. 4: Implementation of image enhancement/smoothing using
a. Laplacian operators
b. Sobel’s operators
c. Robert’s cross operators
Expt. 6: Implement the 2D-DFT to obtain Fourier coefficients and reconstruct the image, i.e., IDFT.
a. Ideal
b. Butterworth
c. Gaussian
a. Point
b. Line
c. Boundary
Mini Project: Student has to do a project assigned from course contents in a group of two or three
students. The team will have to demonstrate as well as have to give a presentation of the same.
Course Code: BTCS 710-18 Course Title : Agile Software Development 3L:0T:0P 3Credits
Detailed Contents:
UNIT 1: Introduction
Need of Agile software development, History of Agile, Agile context– manifesto, principles,
methods, values. The benefits of agile in software development.
[6hrs] (CO 1)
UNIT 2: Agile Design Methodologies
UNIT 3: Scrum
Introduction to scrum framework, Roles: Product owner, team members and scrum master,
Events: Sprint, sprint planning, daily scrum, sprint review, and sprint retrospective, Artifacts:
Product backlog, sprint backlog and increments. User stories- characteristics and contents.
[8hrs] (CO 3)
UNIT 4: Kanban
Introduction to Kanban framework, Workflow, Limit the amount of work in progress, pulling
work from column to column, Kanban board, Adding policies to the board, Cards and their
optimization. [6hrs] (CO 4)
UNIT 5: Extreme Programming
Basic values and principles, Roles, Twelve practices of XP, Pair programming, XP team, Life
cycle and tools for XP.
[6hrs] (CO 5)
The Agile lifecycle and its impact on testing, Test driven development– Acceptance tests and
verifying stories, writing a user acceptance test, Developing effective test suites, Continuous
integration, Code refactoring. Risk based testing, Regression tests, Test automation. [6hrs]
(CO 6)
Course Outcomes:
CO1: Understand concept of agile software engineering and its advantages in software
development.
CO5 Describe implications of functional testing, unit testing, and continuous integration.
CO6 Understand the various tools available to agile teams to test the project.
1. Ken Schawber, Mike Beedle, “Agile Software Development with Scrum”, Pearson.
2. Robert C. Martin, “Agile Software Development, Principles, Patterns and Practices”,
Prentice Hall.
3. Mike Cohn, “User Stories Applied: For Agile Software Development”, Addison Wesley
Signature Series.
4. Lisa Crispin, Janet Gregory, “Agile Testing: A Practical Guide for Testers and Agile
Teams”, Addison Wesley.
5. Paul VII, “Agile: The Complete Overview of Agile Principles and Practices (Agile
Product Management)”.
6. Robert Martin, “Agile Software Development, Principles, Patterns, and Practices”,
Pearson New International Edition.
7. Greene Jennifer,” Learning Agile”, O’Reilly Series.
Course Code: Course Title : Agile Software Development Lab L:0T:2P Credits:1
BTCS 711-18
Detailed Contents:
INTRODUCTION TO BLOCKCHAIN
Blockchain- Public Ledgers, Blockchain as Public Ledgers -Bitcoin, Blockchain 2.0, Smart Contracts,
Block in a Blockchain, Transactions-Distributed Consensus, The Chain and the Longest Chain -
Cryptocurrency to Blockchain 2.0 - Permissioned Model of Blockchain, Cryptographic -Hash Function,
Properties of a hash function-Hash pointer and Merkle tree
A basic crypto currency, Creation of coins, Payments and double spending, FORTH – the precursor for
Bitcoin scripting, Bitcoin Scripts , Bitcoin P2P Network, Transaction in Bitcoin Network, Block Mining,
Block propagation and block relay, Consensus introduction, Distributed consensus in open environments-
Consensus in a Bitcoin network
BITCOIN CONSENSUS
Bitcoin Consensus, Proof of Work (PoW)- Hashcash PoW , Bitcoin PoW, Attacks on PoW ,monopoly
problem- Proof of Stake- Proof of Burn - Proof of Elapsed Time - Bitcoin Miner, Mining Difficulty,
Mining Pool-Permissioned model and use cases, Design issues for Permissioned Blockchains, Execute
contracts- Consensus models for permissioned blockchain-Distributed consensus in closed environment
Paxos
DISTRIBUTED CONSENSUS
Architecture of Hyperledger fabric v1.1-Introduction to hyperledger fabric v1.1, chain code- Ethereum:
Ethereum network, EVM, Transaction fee, Mist Browser, Ether, Gas, Solidity, Smart contracts, Truffle
Design and issue Crypto currency, Mining, DApps, DAO
BLOCKCHAIN APPLICATIONS
Internet of Things-Medical Record Management System-Block chain in Government and Block chain
Security-Block chain Use Cases –Finance
COURSE OUTCOMES
CO4: Apply hyperledger Fabric and Etherum platform to implement the Block chain Application.
REFERENCES
1. Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and popular
Blockchain frameworks by Bashir, Imran,2017.
2. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. Bitcoin
and cryptocurrency technologies: a comprehensive introduction. Princeton University Press, 2016.
3. Joseph Bonneau et al, SoK: Research perspectives and challenges for Bitcoin and cryptocurrency,
IEEE Symposium on security and Privacy, 2015.
Detailed Contents:
Introduction: Paradigms of parallel computing: Synchronous - vector/array, SIMD, Systolic;
Asynchronous - MIMD, reduction paradigm.
Parallel Processors: Taxonomy and topology - shared memory mutliprocessors, distributed memory
networks. Processor organization - Static and dynamic interconnections. Embeddings and simulations.
1. M. J. Quinn. Parallel Computing: Theory and Practice , McGraw Hill, New York, 1994.
2. T. G. Lewis and H. El-Rewini. Introduction to Parallel Computing , Prentice Hall, New Jersey,
1992.
3. T. G. Lewis. Parallel Programming: A Machine-Independent Approach , IEEE Computer Society
Press, Los Alamitos, 1994.
Research articles.
Detailed Contents:
UNIT 1:
{07hrs}(CO1)
Wireless Sensor Networks (WSNs): concepts and architectures - Applications of Ad Hoc and Sensor
Networks - Design Challenges in Ad hoc and Sensor Networks. Wireless Networks, Issues in Ad hoc
wireless networks, Routing Protocol for Ad Hoc Wireless Networks, Classifications of Routing Protocols,
Table Driven Routing Protocols – Destination Sequenced Distance Vector (DSDV), On–Demand Routing
protocols –Ad hoc On–Demand Distance Vector Routing (AODV).
UNIT2:
{09hrs}(CO2)
UNIT 3:
{06hrs}(CO3)
Routing Protocol: Issues in designing a routing protocol for Ad hoc networks - Classification- proactive
routing - reactive routing (on-demand) - hybrid routing - Transport Layer protocol for Ad hoc networks -
Design Goals of a Transport Layer Protocol for Ad Hoc Wireless Networks -Classification of Transport
Layer solutions-TCP over Ad hoc wireless ,
UNIT4:
{06hrs}(CO4)
Challenges for Wireless Sensor Networks, Enabling Technologies for Wireless Sensor Networks, WSN
application examples, Single-Node Architecture – Hardware Components, Energy Consumption of
Sensor Nodes, Network Architecture – Sensor Network Scenarios, Transceiver Design Considerations.
UNIT 5:
{07hrs}(CO5)
Security in Ad Hoc Wireless Networks - Network Security Requirements. Network Security requirements
issues and Challenges in security provisioning Network, Security Attacks. Layer wise attack in wireless
sensor networks, possible solutions for Jamming, tampering black hole attack, Flooding attack, Key
distribution and Management, Secure Routing -SPINS reliability requirements in sensors Networks.
Sensor Network Platforms and Tools
Course Outcomes:
CO1 Explain the Fundamental Concepts and applications of ad hoc and wireless sensor
networks and apply this knowledge to identify the suitable routing algorithm based
on the network.
CO2 Apply the knowledge to identify appropriate physical and MAC layer protocols
CO3: Understand the transport layer and Describe routing protocols for ad hoc wireless
networks with respect to TCP design issues
CO 4 Be familiar with the OS used in Wireless Sensor Networks and build basic modules
CO 5:
CO 5 Understand the Challenges in security provisioning ,Security Attacks and security issues
possible in Adhoc and Sensors Networks
Text Books:
1. C. Siva Ram Murthy, and B. S. Manoj, "Ad Hoc Wireless Networks: Architectures and Protocols ",
Pearson Education, 2008.
2. Labiod. H, “Wireless Adhoc and Sensor Networks”, Wiley, 2008.
3. 3. Li, X, “Wireless ad -hoc and sensor Networks: theory and applications”, Cambridge University
Press, 2008.
Reference Books
1. Carlos De Morais Cordeiro, Dharma Prakash Agrawal “Ad Hoc & Sensor Networks: Theory and
Applications”, world Scientific Publishing Company, 2nd edition, 2011.
2. Feng Zhao and Leonides Guibas, "Wireless Sensor Networks", Elsevier Publication
3. Holger Karl and Andreas Willig “Protocols and Architectures for Wireless Sensor Networks”, Wiley,
2005 (soft copy available) .
4. Kazem Sohraby, Daniel Minoli, & Taieb Znati, “Wireless Sensor Networks Technology, Protocols,
and Applications”, John Wiley, 2007. (soft copyavailable).
5. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, 2003.(soft copy available)
Online Resources:
1. www.wirelessnetworksonline.com
2. www.securityinwireless.com
3. www.ida.liu.se/~petel71/SN/lecture-notes/sn.pdf Practice Aspects 1. NS2 Simulator tool
BTCS 717-18 Adhoc and Wireless Sensor Networks Lab L:0, T:0, P: 2 Credits: 1
List of Experiments :
5 Implementation of routing protocol in NS2 for AODV protocol for TORA protocol
UNIT-V Quantum Error Correction: Introduction, Shor code, Theory of Quantum Error
–Correction, Constructing Quantum Codes, Stabilizer codes, Fault – Tolerant Quantum
Computation, Entropy and information – Shannon Entropy, Basic properties of Entropy,
Von Neumann, Strong Sub Additivity, Data Compression, Entanglement as a physical
resource . 8
Hrs.
Course Outcomes;
CO1: understand the quantum model of computation and the basic principles of
quantum mechanics;
CO2: be familiar with basic quantum algorithms and their analysis;
CO3: be familiar with basic quantum protocols such as teleportation and super dense
coding;
CO4: see how the quantum model relates to classical models of deterministic and
probabilistic computation.
Text books: