Computer Science and Engineering Department
Computer Science and Engineering Department
Computer Science and Engineering Department
SCHEME
III Semester
IV Semester
Course Subject Scheme of Studies Credits
Number Periods per week
L T P
CSE 221 Probability and Queuing 3 1 - 3
Theory
V Semester
Departmental Elective 2 3 1 - 3
Open Elective 1 3 1 - 3
VI Semester
Departmental Elective 3 3 1 - 3
Departmental Elective 4 3 1 - 3
Open Elective 2 3 1 - 3
Total Credit 23
VII Semester
Course Subject Scheme of Studies Credits
Number Periods per week
L T P
Departmental Elective 5 3 1 - 3
Departmental Elective 6 3 1 - 3
Open Elective 3 3 1 - 3
Open Elective 4 3 1 - 3
Total Credit 20
VIII Semester
L T P
Departmental Elective – 7 3 1 - 3
Departmental Elective – 8 3 1 - 3
Open Elective 5 3 1 - 3
Open Elective 6 3 1 - 3
Total Credit 20
SYLLABUS
I & II SEMESTER
CS 115-COMPUTER PROGRAMMING
Concepts, definitions, taxonomy and history of computer programming, operating
systems and program execution, Unix system, Input/output devices, Storage devices,
Flow chart and algorithm development, Computer program. C programming, Statements,
Arrays and functions
References:
1. Programming with C Gottfried
2. C programming Ritchie & Kernighan
3. UNIX programming Kernighan & Pike
III SEMESTER
Reference:
1. Higher Engineering Mathematics by Dr. B. S. Grewal.
Digital Communication (i) Learn about the basic concepts of how digital
data is transferred across various types of data
communication links.
IV SEMESTER SYLLABUS
References:
1. Introduction to automata theory, language & computations Hopcroaft & O.D.
Ullman, R Mothwani,
2. Theory of Computer Sc.(Automata, Languages and computation): K.L.P.
Mishra & N. Chandrasekaran,
3. Introduction to formal Languages & Automata Peter Linz,
4. Fundamentals of the Theory of Computation- Principles and Practice Ramond
Greenlaw and H. James Hoover
5. Introduction to the Theory of Computation Michael Sipser
Probability and Queuing Theory (i) Learn about basic theory of probability
and queuing theory.
V SEMESTER SYLLABUS
References:
1. Compilers Principle, Techniques & Tools Alfread V. AHO, RaviSethi& J.D.
Ullman
2. Theory and practice of compiler writing Tremblay & Sorenson
CSE-313 MICROPROCESSORS
Introduction of Microprocessor, Evolution of Microprocessor, Types of Microprocessor,
History of Computers, Memory, Memory organization, Classification of Memory.
8085: Pin Diagram of Microprocessor 8085, Architecture of 8085 and Operations of its
Component.
8086: Pin Diagram of Microprocessor 8086-88, Architecture of 8086, Difference between
8085 and 8086, Programming Model, Real mode memory addressing, Introduction to
protected mode memory addressing memory paging, Interrupts: hardware and software
interrupts.
Addressing modes: Data, program, Stack, memory-addressing modes
Assembly language programming: Instruction set of 8086, Memory Segmentation, Stack and
sub routine.
Interfacing: 8251(Universal Synchronous/Asynchronous Receiver/Transmitter), 8253 & 8254
(Programmable Interval Timer), 8255 (Programmable Peripheral Interface),
8259(Programmable Interrupt Controller), 8257(Direct Memory Access), 8279 (keyboard &
display, controller).
VI SEMESTER SYLLABUS
Clustering- Partitioning and hierarchical Methods Mining Social Network, spatial databases,
multidimensional databases, text databases and World Wide Web.
References:
1. Data Mining: Concepts and Techniques Jiawei Han, Micheline Kamber and
Jian Pei,
2. Data Mining Introduction and Advance Topic Margaret H. Dunham and S.
Sridhar
3. Next Generation of Data Mining Rajeev Motwani and Vipin Kumar
4. Data Ware Housing: Architecture & Implementation Michael W. Hawkins
5. Data Warehousing: Concepts, Techniques, Products & Applications C.S.R.
Prabhu
References:
1. Reusability and Software Construction: C and CJerry D. Smith.
2. Design Patterns: Elements of Reusable Object-Oriented Software Richard
Helm, Erich Gamma, John Vlissides and Ralph Johnson.
3. Reuse-Based Software Engineering: Techniques, Organizations, and
Controls Hafedh Mili and Sherif M. Yacoub.
4. Software Reusability Wilhelm Schafer, Diaz Prieto and Wilhelm Shafer .
CSE-337 CRYPTOGRAPHY
Introduction to cryptography. Security Attacks, Mechanism and Services. Cryptosystems,
Conventional encryption model and techniques, classical encryption techniques- substitution
ciphers and transposition ciphers, cryptanalysis, stream and block ciphers. Block ciphers
principals, fiestal structure, SPN, DES, triple DES, AES, IDEA encryption and decryption,
key distribution. Finite field: Introduction to graph, ring and field, modular arithmetic,
Fermat‗s and Euler‗s theorem, Euclid‗s Algorithm, Chinese Remainder theorem, Entropy
and huffman‘s coding, Comparison of symmetric and public-key cryptographic
systems, Modern Trend in asymmetric key Cryptography-Elliptic curve based
cryptography,Principals of public key crypto systems, RSA algorithm, Diffle-Hellman
key exchange algorithm, Message Authentication and Hash Function: security of hash
functions and MACS, MD5 message digest algorithm, secure hash algorithm (SHA). Digital
Signatures.
References:
1. Cryptography and Network Security: Principles and Practice William Stallings,
2. Cryptography Theory and Practice Douglas R. Stinson.
3. Applied Cryptography: Protocols, Algorithms Bruice Schneier
Advance Computer Architecture (i) How high processing and multi core
machine works.
CAD of Digital Systems (i) Learn about how to design very large
scale processing unit.
Digital Image Processing (i) How to handle and process different types
of images in computers.
Parallel and Distributed Algorithm (i) How to design parallel algorithm from
serial.
CSE-351 MULTIMEDIA
Introduction to multimedia, Multimedia system design, data and file format standards, data
compression and decompression techniques, lossy and lossless compression.
Multimedia input and output technologies, storage and retrieval technologies.
Multimedia Communications, multimedia communication protocols (UDP, RTP, RTCP, XTP,
TELNET, IP Multicast etc), network performance parameters, streaming. Multimedia
Applications and Design issues, hypermedia message, integrated multimedia message
standards. Multimedia authoring system and tools user interface design.
References:
1. Multimedia system Design Prabhat K Andleigh and KiranThakrar
2. Multimedia Communications Fred Halsall
studied for systems like queuing systems, Production systems, Inventory systems,
maintenance and replacement systems and Investment analysis.
References:
1. System Simulation Geoffrey Gordon
2. System Simulation with Digital Computer Narsingh Deo
Convolution codes, sequential decoding. Video image compression: CITT H 261 Video
coding algorithm, audio (speech) compression. Cryptography and cipher.
References:
1. R Bose, ―Information Theory, Coding and Crptography‖, TMH 2007
2. Multimedia system Design by Prabhat K Andleigh and KiranThakrar(PHI
Publications).
3. Multimedia Communications by Fred Halsall(Pearson Publications).
Simulation & Modelling (i) Learn how to design a model for any real
life problem
UNIX internals & shell programming (i) Learn about internal architecture of UNIX
operating system.
VII SEMESTER
VIII SEMESTER
Task Management, Collaborating on Project Management Outside the Cloud: Other Ways to
Collaborate Online: Collaborating via Web-Based Communication Tools, Collaborating via
Social Networks and Groupware.
References:
1. Cloud Computing Michael Miller,
2. Implementing and Developing Cloud Computing Applications David E.,Y.
Sarna,
References:
1. Speech and Language Processing: An Introduction to Natural Language
Processing, Computational Linguistics, and Speech Recognition D. Jurafsky
and J. Martin
2. Foundations of Statistical Natural Language Processing C. Manning and H.
Schutze
bounds for searching, General black-box lower bounds, Classical error correction , Fault
tolerance, Quantum error correction.
References:
1. Quantum Computing V. Sahni,
2. An introduction to Quantum Computing P. Kaye, R. Laflamme, and M. Mosca,
References:
1. An introduction to Information Retrieval Christopher D. Manning, Prabhakar
Raghavan, and Hinrich Schütze, Cambridge University Press.
Big Data in Cloud: Introduction to cloud, Storage as a services in cloud, Use of big data in
cloud, Accessing big data in cloud using mobile device, Big data productive and prescriptive
analytics
Big Data Technology and Tools: Hadoop, MapReduce and YARN, HDFS, HBase, Open
source technology for big data analytics, Component of hadoop, Application development in
hadoop, Getting your data base in hadoop.
Developing Big Data Application: Parallelism, Application development framework,
MapReduce programming model, NoSQL data management for big data, Scheme-less
model, Graph analytics for big data.
Big Data Privacy and Ethics: Big data privacy, when data should and should not be used,
Fraud and big data, Risk and big data, Credit risk management, Big data ethics,
Transparency, Privacy and Identity.
References:
1. Big Data Analytics: From Strategic Planning to Enterprise Integration with
Tools, Techniques, NoSQL, and GraphBy David Loshin
2. Understanding Big Data: Analytics for Enterprise Class Hadoop and
Streaming Data: Analytics for Enterprise Class Hadoop and Streaming Data
By Paul Zikopoulos, Chris Eaton.
3. Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends
for Today's Businesses, By Michael Minelli, Michele Chambers, Ambiga
Dhira.
Web search and Mining (i) Learn about how to process data present
on World Wide Web.
References:
1. Principle of cyber-crime Jonathan Clough
2. Information warfare: Corporate attack and defence in digital world William
Hutchinson, Mathew Warren
2. Neural networks and fuzzy systems by Bart Kosko, Prentice Hall of India.
3. Fundamentals of artificial neural networks by Mohammad H. Hassoun,
Prentice Hall of India.
CSE-457 BIOMETRICS
Introduction and definitions of biometric. Traditional authenticated methods and
technologies. Biometric technologies: Fingerprint, Face, Iris, Hand Geometry, Gait
Recognition, Ear, Voice, Palmprint, On-Line Signature Verification, 3D Face Recognition,
Dental Identification and DNA. The Law and the use of Multibiometrics systems. Statistical
measurement of biometric. Biometrics in Government Sector and Commercial Sector. Case
Studies of biometric system., Biometric Transaction. Biometric System Vulnerabilities.
Reference:
1. Biometrics for network security, Paul Reid, hand book of Pearson
2. Handbook of Fingerprint Recognition, D. Maltoni, D. Maio, A. K. Jain, and S.
Prabhakar, Springer Verlag.
3. BIOMETRICS: Personal Identification in Networked,A. K. Jain, R. Bolle, S.
Pankanti (Eds.), Society, Kluwer Academic Publishers, 1999.
4. Biometric Systems: Technology, Design and Performance Evaluation, J.
Wayman, A.K. Jain, D. Maltoni, and D. Maio (Eds.), Springer.
Cyber crime and information warfare (i) Learn about different types of cyber
attacks.