Dav Cis R20 DS
Dav Cis R20 DS
(Autonomous)
Yallmanda(Post), Narasaraopet- 522601
Department of Computer Science and Engineering (AIML, CS, DS)
COURSE INFORMATION SHEET
COURSE CODE: R20DS3201 COURSE TYPE (CORE /ELECTIVE / BREADTH/ S&H): CORE
REGULATION: R20
COURSE AREA/DOMAIN: CSE PERIODS: 5 Per Week.
COURSE OUTCOMES:
C321.1 Interpreting the Importance of Data and its importance [K2] Understanding – [K2]
C321.2 Illustrating various ANOVA methods and Regression methods Understanding – [K2]
[K2]
C321.3 Analyze various data types and visualization types to extract Analyzing – [K4]
meaningful insights. [K4]
Apply visualization techniques to address specific problems using
C321.4 datasets and derive valuable insights, especially for large datasets. Applying – [K3]
[K3]
C321.5 Make use of power bi tool for applying various functions. [K3] Applying – [K3]
SYLLABUS:
UNIT DETAILS
Data and its importance, data analytic and its types, importance of data analytics, Python
I Fundamentals: Python Language Basics, Jupiter Notebook, Introduction to pandas, Data
Structures, Essential Functionality, Visual Representation of the Data, Measures of Central
Tendency, Dispersion
Introduction to ANOVA, one way ANOVA, two way ANOVA, Post-Hoc test, Simple Linear
II Regression, Multiple Linear Regression, Maximum Likelihood Estimation (MLE), Logistic
Regression, step-wise methods and algorithms.
Overview of data visualization, Data Abstraction Task Abstraction, Dimensions and Measures,
Analysis: Four Levels for Validation, Statistical charts (Bar Chart - stacked bar chart - Line Chart
III - Histogram - Pie chart - Frequency Polygon - Box plot - Scatter plot - Regression curves.)
Introduction to various data visualization tools, Scalar and point techniques, vector
IV visualization techniques, multidimensional techniques, visualizing cluster analysis K-means and
Hierarchical Cluster techniques.
Power BI, DAX Logical Functions, Date and Time Functions, Time Intelligence Functions,
V Information Functions, Logical Functions, Mathematical and Trigonometric Functions, Statistical
Functions, Text Functions, Parent-Child functions
TEXT BOOKS
T BOOK TITLE/AUTHORS/PUBLISHER
McKinney, W. (2012). Python for data analysis: Data wrangling with Pandas, NumPy, and IPython.
T1 "O'Reilly Media, Inc.".
David W. Hosmer, Stanley Lemeshow (2000). Applied logistic regression (Wiley Series in probability
T2 and statistics). "Wiley-Interscience Publication".
T3 Tamara Munzer, Visualization Analysis and Design, 1st edition, CRC Press, United States, 2015.”,
Michael Fry, Jeffrey Ohlmann, Jeffrey Camm, James Cochran, Data Visualization: Exploring and
T4 Explaining with Data, South-Western College Publishing, 2021
REFERENCE BOOKS
R BOOK TITLE/AUTHORS/PUBLISHER
Dr. Chun-hauh Chen, W. K. Hardle, A. Unwin, Handbook of Data Visualization, 1st edition, Springer
R1 publication, Germany, 2008
Ben Fry, Visualizing Data, 1st edition, O'Reilly Media, United States, 2008
R2 Avril Coghlan, A little book of R for multivariate analysis, 1st edition, Welcome Trust Sanger Institute,
United Kingdom, 2013
DELIVERY/INSTRUCTIONAL METHODOLOGIES:
☑Chalk & Talk ☑ PPT ☑Active Learning
☑Web Resources ☑ Students Seminars ☐Case Study
☐ Blended Learning ☐ Quiz ☐Tutorials
☐Project based learning ☐NPTEL/MOOCS ☐ Simulation
☑Flipped Learning ☐Industrial Visit ☑Collaborative Learning
☐Brain storming ☐Role Play ☑Virtual Labs
P01: Engineering Knowledge: Apply the knowledge of mathematics, science, engineering fundamentals, and
an engineering specialization to the solution of complex engineering problems.
P02: Problem Analysis: Identify, formulate, review research literature and analyse complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences and
engineering sciences.
P03: Design/development of solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration for the public
health and safety and the cultural, societal and environmental considerations.
P04: Conduct investigations of complex problems: Use research based knowledge and research methods
including design of experiments, analysis and interpretation of data and synthesis of the information to
provide valid conclusions.
P05: Model tool usage: Create, select and apply appropriate techniques, resources and modern engineering
and IT tools including prediction and modelling to complex engineering activities with an understanding
of the limitations.
P06: The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal,
health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional
engineering practice.
P07: Environment and sustainability: Understand the impact of the professional engineering solutions in
societal and environmental contexts, and demonstrate the knowledge of, and need for sustainable
development.
PO8: Ethics: Apply ethical principles and commit to professional ethics and responsibilities and norms of the
engineering practice.
PO9: Individual and team work: Function effectively as an individual and as a member or leader in diverse
teams, and in multidisciplinary settings.
PO10: Communication: Communicate effectively on complex engineering activities with the engineering
community and with society at large, such as, being able to comprehend and write effective reports and
design documentation, make effective presentations and give and receive clear instructions.
PO11: Project management and finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to manage
projects and in multidisciplinary environments.
PO12: Life-long learning: Recognize the need for and have the preparation and ability to engage in independent
and life-long learning in the broad test context of technological change.
(B) PROGRAM SPECIFIC OUTCOMES (PSOs) :
PSO1: Apply a range of Cyber Security techniques and measures to protect digital systems effectively and
mitigate security risks.
PSO2: Demonstrate to conduct research in the field of Cyber Security, contributing to the development of
new knowledge, algorithms, and approaches for enhanced security.
PSO3: Analyze and develop proficiency in the areas of network security, cyberlaws and ethics.
Cognitive
LEVEL Key words
Domain
Defines, describes, identifies, knows, labels, lists, matches, names,
Remembering K1
outlines, recalls, recognizes, reproduces, selects, states.
Comprehends, converts, defends, distinguishes, estimates, explains,
Understanding K2 extends, generalizes, gives an example, infers, interprets, paraphrases,
predicts, rewrites, summarizes, translates.
Applies, changes, computes, constructs, demonstrates, discovers,
Applying K3 manipulates, modifies, operates, predicts, prepares, produces, relates,
shows, solves, uses.
Analyzes, breaks down, compares, contrasts, diagrams, deconstructs,
Analysing K4 differentiates, discriminates, distinguishes, identifies, illustrates, infers,
outlines, relates, selects, separates.
Appraises, compares, concludes, contrasts, criticizes, critiques,
Evaluating K5 defends, describes, discriminates, evaluates, explains, interprets,
justifies, relates, summarizes, supports
Categorizes, combines, compiles, composes, creates, devises, designs,
explains, generates, modifies, organizes, plans, rearranges,
Creating K6
reconstructs, relates, reorganizes, revises, rewrites, summarizes, tells,
write
UNIT WISE SAMPLE ASSESSMENT QUESTIONS
KNOWLED
S NO QUESTION GE CO
LEVEL
UNIT 1
1 K2 CO1
2 K1 CO1
3 K1 CO1
4 K4 CO1
5 K1 CO1
6 K1 CO1
UNIT 2
1 K1 CO2
2 K2 CO2
3 K1 CO2
4 K3 CO2
5 K2 CO2
6 K1 CO2
UNIT 3
1 K2 CO3
2 K1 CO3
3 K3 CO3
4 K1 CO3
5 K3 CO3
6 K2 CO3
7 K2 CO3
UNIT 4
1 K1 CO4
2 K1 CO4
3 K2 CO4
4 K1 CO4
5 K2 CO4
6 K3 CO4
7 K2 CO4
UNIT 5
1 K1 CO5
2 K2 CO5
3 K5 CO5
4 K2 CO5
5 K3 CO5
3 a) Explain the process of opening and attaching to processes for debugging [14]
OR
b) Explain DLL export enumeration, execution, and debugging.
[14]
UNIT-IV
a) Explain the overview and key features of the Volatility framework [14]
4
OR
b) Explain the techniques to detect and capture suspicious loaded DLLs in memory
[14]
UNIT-V
5 a) Explain the process of DNS hostname resolution and passive DNS querying [14]
OR
b) Discuss the tools and techniques for creating static and interactive maps for domain/IP
research