University of Mysore Directorate of Outreach and Online Programs
University of Mysore Directorate of Outreach and Online Programs
SEMESTER – II
Softcore courses
1. Linear Algebra and Probability Distribution
2. Cloud Computing
3. Data Mining and Data Warehousing
4. Cryptography and Network Security
II Semester
Hardcore Courses
Course Content:
Unit –I
Unit –II
Transmission Media - Guided Media – Twisted-Pair Cable, Coaxial Cable, Fiber-Optic Cable
Unguided Media – Radio Wave Transmission Systems, Microwave Transmission Systems,
Infrared Transmission Systems and Satellite Communication System.
Unit –III
The OSI Model – Functions of all the Seven Layers, Networking Devices – Functions and
Applications of Hub, Switches, Bridges, Repeaters Internetworking Devices – Functions and
Applications of Routers and Gateways, IP Addressing – Dynamic IP Addressing, Static IP
Addressing, Types of IP Addresses, Protocols –TCP, UDP, IP, IPV4, IPV6, TCP/IP Suite,
SMTP,ARP, RARP, OSPF, BGP, ALOHA.
Unit–IV
Packet Switching Networks – Network Services and Internal Network Operations, Packet
Network Topology, Datagrams and Virtual Circuits, Connectionless Packet Switching,
Virtual Circuit Packet Switching.
Routing Concepts – Routing Tables, Dijkstra’s Shortest Path Routing Algorithm, Flooding,
Distance Vector Routing, Congestion Control Algorithms-Leaky Bucket Algorithm.
Data Link Issues –Single bit error and Burst Error, concepts of Redundancy, Checksum,
Single Bit Error correction and Hamming Code correction method.
Reference Books:
Explain what constitutes "Artificial" Intelligence and how to identify systems with
Artificial Intelligence.
Explain how Artificial Intelligence enables capabilities that are beyond conventional
technology, for example, chess-playing computers, self-driving cars, robotic vacuum
cleaners.
Unit-I
Unit-II
Unit-III
Unit-IV
Reference Books
1. Artificial Intelligence, Elaine Rich, Kevin Knight, Shivashankar Nair, Tata McGraw Hill
Course Outcome:
Understand the composition, design, and implementation of embedded systems, the basics
of interfacing hardware and software.
Be familiar with both medium level and high level languages appropriate for embedded
systems development techniques; reading and understanding processor and component
datasheets; driving use contexts, including human‐computer interaction, environmental
sensing and actuation, etc.,
Be familiar with working on a team to create and apply embedded systems and be exposed
to history of embedded interfaces.
Course Content:
Unit –I
Unit –II
Unit –III
Unit–IV
RTOS Based Embedded System Design: Introduction to basic concepts of RTOS- Task,
process & threads, interrupt routines in RTOS, Multiprocessing and Multitasking,
Preemptive and non preemptive scheduling, Task communication shared memory,
message passing-, Inter process Communication – synchronization between processes-
semaphores, Mailbox, pipes, priority inversion, priorityinheritance, comparison of Real
time Operating systems: Vx Works, чC/OS-II, RT Linux. Embedded System Application
Development: Case Study of Washing Machine- Automotive Application- Smart card
System Application.
Reference Books:
7. Rajib Mall “Real-Time systems Theory and Practice” Pearson Education, 2007.
Course Outcome
Understand the .Net frame work and the features of C# programming language to design
and implement web-based applications as per the requirement.
Course Content:
Unit-I
Introduction: An overview of the .NET framework. CLR, FCL, ASP.NET to support Internet
development and ADO.NET to support database applications. Languages supported by
.NET, introduction to Visual Studio .NET.
Unit-II
Introduction to C#: Program structure, Basic IO, data types, operators and expressions,
relational and logical operations, control structures. Writing methods, Recursion and
overloading arrays and data representation. Class definitions. Properties, indexers, and access
Arrays control. Inheritance and polymorphism, delegates. Exception handling.
Unit-III
Reference Books
Softcore courses
Course Outcome
Understand the concept and applications of vector spaces, subspaces and linear
independence.
Understand various inner products and able to perform various inner product operations.
Course Content
Unit-I
Vector Spaces: General Vector Spaces, Subspaces, Linear Independence, Basis and
Dimension, Span, Some Fundamental Theorems, Row Space, Column Space, Nullspace,
Rank and Nullity, Four Fundamental Spaces,
Unit-II
Inner Product Spaces: General Inner Products, Euclidean and Weighted Inner Product,
Length, Distance, Norm, Angle and Orthogonality in Inner Product Spaces, Caucy-Schwarz
Inequality, Orthogonal Complement, Orthonormal Bases, Gram-Schmidt Procedure, QR-
decomposition.
Unit-III
Unit-IV
Probability Theory: Basics of Probability theory, Discrete Random Variables and Probability
Distributions, Mean and Variance, Moments of a Discrete Random Variable, Uniform
Distribution, Binomial Distribution, Poisson Distribution, Functions of Random Variables,
Continuous Random Variables and Probability Distributions
Text Books/References:
1. Howard Anton and Chris Rorres, "Elementary Linear Algebra", John Wiley and Sons, 9th
Edition, 2008.
2. Douglas C. Montgomery and George C. Runger, "Applied Statistics and Probability for
Engineers", John Wiley and Sons, 3rd Edition, 2003.
Course Outcome:
Define Cloud Computing and memorize the different Cloud service and deployment
models.
Analyze the components of open stack & Google Cloud platform and understand Mobile
Cloud Computing.
Design & develop backup strategies for cloud data based on features.
Course Content
Unit–I
Unit–II
Cloud Infrastructure: Architectural Design of Compute and Storage Clouds – Layered Cloud
Architecture Development – Design Challenges - Inter Cloud Resource Management –
Resource Provisioning and Platform Deployment – Global Exchange of Cloud Resources.
Unit–III
Security in the Cloud: Security Overview – Cloud Security Challenges – Access control
mechanisms – Security Governance – Risk Management – Security Monitoring – Security
Architecture Design – Virtual Machine Security.
Unit–IV
Reference Books
1. Kai Hwang, Geoffrey C Fox, Jack G Dongarra, Distributed and Cloud Computing, From
2. Parallel Processing to the Internet of Things, 2012, 1st Edition, Morgan Kaufmann
Publishers.
5. Toby Velte, Anthony Velte, Robert Elsenpeter, Cloud Computing, A Practical Approach,
2009, TMH.
Course Outcome
Acquire the knowledge of data preprocessing and data quality; modeling and design of
data warehouses and algorithms for data mining.
Be able to design data warehouses and apply acquired knowledge for understanding data
and select suitable methods for data analysis.
Course Content
Unit-I
Introduction to data mining and Data Warehousing, Modeling: Data Cube and OLAP, Data
Warehouse Implementation, Data Mining – types of data, types of patterns, Data cleaning,
Data integration.
Unit-II
Data Reduction, Wavelet Transforms, Attribute Subset Selection, Histogram, Clustering,
Sampling, Data Cube Aggregation Data Transformation: Strategies Overview, Data
Transformation by Normalization.
UNIT-III
Mining Frequent Patterns, Associations & Correlations: pattern evaluation methods.
Classification, Decision tree Induction, Attribute Selection Measures, Tree Pruning, Bayes
Classification Methods.
Unit-IV
Cluster Analysis: Requirement for Cluster Analysis, clustering methods Data Mining
Applications & Trends: Mining Sequence Data; Time Series, Symbolic, Statistical Data
Mining, Visual Data Mining, Data Mining Applications.
Reference Books:
1. Jiawei Micheline Kamber, ‘Data Mining Concepts and Techniques’, Morgan Kauf Mann
Publishers.
4. Mastering Data Mining – Michael J.A. Berry & Gordon S. Linoff (Wiley Pub.).
Course Outcome
Analyze the vulnerabilities in any computing system and hence be able to design a security
solution.
Compare and Contrast different IEEE standards and electronic mail security.
Course Content
Unit–I
Unit–II
Unit–III
RSA, Diffie Hellman key exchange, random number generation, Data integrity and
authentication Hash functions; MAC; Digital signatures;
Unit–IV
Key management; Authentication, Web and system security, Web security; IP security; E
mail security; System security-intruders, malicious software, firewalls
References Books