Computer Science and Engineering
Computer Science and Engineering
(Group A)
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Random variables, Discrete random variables and their probability
distributions, Cumulative distribution function, Expectation, Mean and
variance, the Binomial probability distribution, the Poisson probability
distribution, Poisson distribution as a limit of the binomial distribution, Joint
1 9
pmf of two discrete random variables, Marginal pmf, Independent random
variables, Expected value of a function of two discrete variables.
[Text 1: Relevant topics from sections 3.1 to 3.4, 3.6, 5.1, 5.2]
[Text 1: Relevant topics from sections 3.1, 4.1, 4.2, 4.3, 4.4, 5.1, 5.2]
Limit theorems : Markov’s Inequality, Chebyshev’s Inequality, Strong Law
of Large Numbers (Without proof), Central Limit Theorem (without proof),
Stochastic Processes: Discrete-time process, Continuous-time process,
3 Counting Processes, The Poisson Process, Interarrival times (Theorems 9
without proof)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 - 2 - - - - - - - 2
CO2 3 3 - 2 - - - - - - - 2
CO3 3 3 - 2 - - - - - - - 2
CO4 3 3 - 2 - - - - - - - 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
THEORY OF COMPUTATION
(Common to CS/CA/CM/CD/CN/CC)
PCCST302
Course Code CIE Marks 40
Teaching Hours/Week 3:1:0:0 ESE Marks 60
(L: T:P: R)
Credits 4 Exam Hours 2 Hrs 30 Mins
PCCST205
Prerequisites (if any) Course Type Theory
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Computability (Kozen)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Classify formal languages into regular, context-free, context-sensitive,
CO1 K2
and unrestricted languages.
Develop finite state automata, regular grammar, and regular
CO2 K3
expression.
Model push-down automata and context-free grammar representations
CO3 K3
for context-free languages.
Construct Turing Machines to accept recursive and recursively
CO4 K3
enumerable languages.
Describe the notions of decidability and undecidability of problems,
CO5 K2
the Halting problem.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
3 3 3 3 3
CO1
3 3 3 3 3
CO2
3 3 3 3 3
CO3
3 3 3 3 3
CO4
3 3 3 3 3
CO5
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
An Introduction to Formal Peter Linz and Susan H. Jones and Bartlett
1 7/e, 2022
Languages and Automata Rodger Publishers, Inc
Introduction to Automata
John E.Hopcroft, Rainbow Book
2 Theory Languages And 3/e, 2015
Jeffrey D.Ullman Distributiors
Computation
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to the Theory of Cengage India Private 3/e, 2014
1 Michael Sipser
Computation Limited
Theory of Computation: A
Kavi Mahesh Wiley 1/e, 2012
3 Problem-Solving Approach
https://archive.nptel.ac.in/courses/106/104/106104148/
3
https://nptel.ac.in/courses/106106049
https://archive.nptel.ac.in/courses/106/104/106104148/
4
https://nptel.ac.in/courses/106106049
SEMESTER S3
Teaching Hours/Week
3:1:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basic Concepts of Data Structures
Definitions; Data Abstraction; Performance Analysis - Time & Space
Complexity, Asymptotic Notations; Polynomial representation using
1 11
Arrays, Sparse matrix (Tuple representation); Stacks and Queues - Stacks,
Multi-Stacks, Queues, Circular Queues, Double Ended Queues; Evaluation
of Expressions- Infix to Postfix, Evaluating Postfix Expressions.
Linked List and Memory Management
Singly Linked List - Operations on Linked List, Stacks and Queues using
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Identify appropriate data structures for solving real world problems. K3
Describe and implement linear data structures such as arrays, linked K3
CO2
lists, stacks, and queues.
Describe and Implement non linear data structures such as trees and K3
CO3
graphs.
Select appropriate searching and sorting algorithms to be used in K3
CO4
specific circumstances.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Universities
Ellis Horowitz, Sartaj Sahni
1 Fundamentals of Data Structures in C press, 2/e, 2007
and Susan Anderson-Freed,
Thomas H Cormen, Charles
2 Introduction to Algorithms Leisesrson, Ronald L PHI 3/e, 2009
Rivest, Clifford Stein
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Prentice Hall
1 Classic Data Structures Samanta D. 2/e, 2018
India.
Aho A. V., J. E.
Pearson
2 Data Structures and Algorithms Hopcroft and J. D. 1/e, 2003
Publication.
Ullman
Introduction to Data Structures with Tremblay J. P. and P. G. Tata McGraw
3 2/e, 2017
Applications Sorenson Hill.
Theory and Problems of Data
4 Lipschuts S. Schaum’s Series 2/e, 2014
Structures
Teaching Hours/Week
3:0:0:1 ESE Marks 40
(L:T:P:R)
Course Objectives:
1. To teach the core object-oriented principles such as abstraction, encapsulation, inheritance, and
polymorphism, robust error-handling using exception mechanisms to ensure program
reliability.
2. To equip the learner to develop object oriented programs encompassing fundamental
structures, environments, and the effective utilization of data types, arrays, strings, operators,
and control statements for program flow in Java.
3. To enable the learner to design and develop event-driven graphical user interface (GUI)
database applications using Swing and database connection components.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Java:
Structure of a simple java program; Java programming Environment and
Runtime Environment (Command Line & IDE); Java compiler; Java Virtual
Machine; Primitive Data types and Wrapper Types; Casting and Autoboxing;
Arrays; Strings; Vector class; Operators - Arithmetic, Bitwise, Relational,
Boolean Logical, Assignment, Conditional (Ternary); Operator Precedence;
1 Control Statements - Selection Statements, Iteration Statements and Jump 10
Statements; Functions; Command Line Arguments; Variable Length
Arguments; Classes; Abstract Classes; Interfaces. [Use proper naming
conventions]
OOP Concepts :-
Data abstraction, encapsulation, inheritance, polymorphism, Procedural and
object oriented programming paradigm; Microservices.
Student should Identify a topic to be implemented as project having the following nature
i. It must accept a considerable amount of information from the user for processing.
ii. It must have a considerable amount of data to be stored permanently within the computer -
as plain files / using databases..
iii. It must process the user provided data and the stored data to generate some output to
be displayed to the user.
Examples : -
1. Design and implement the Circulation function in a Library Management System using
Object-Oriented Programming (OOP) principles in Java and limited use of SQL. The system
should manage the operations of a library, such as book & user management, borrowing and
returning books.
Requirements
I. Class Design
● Book: Attributes like title, author, ISBN, genre, and status (available/borrowed).
● User: Attributes like user ID, name, contact information, and a list of borrowed
books.
● Library: Attributes like a list of books and a list of users.
● Librarian: Inherits from User, with additional functionalities like adding/removing
books and managing users.
● BorrowTransaction: Attributes like transaction ID, book, user, borrow date, and
return date
II. Functionalities
a. Book Management:
● Add, remove, and update book details.
● Search books by title, author, ISBN, and genre.
b. User Management:
● Register new users.
● Search users by user ID and name.
c. Borrowing and Returning:
● Borrow a book: Check if the book is available and if the user can borrow
more books.
● Return a book: Update the book’s status and remove it from the user’s
borrowed list.
III. Deliverables
1. Design Document: Describe the classes, their attributes, methods and relationships.
3. User Manual: Instructions on how to set up, run and use the system.
4. Test Cases: A suite of test cases demonstrating the functionality of the system.
Requirements
a. Class Design
● Payment: An abstract base class with common attributes and an abstract method for
processing payments.
● CreditCardPayment: Inherits from Payment, with specific implementation for processing
credit card payments.
● PayPalPayment: Inherits from Payment, with specific implementation for processing
PayPal payments.
● BankTransferPayment: Inherits from Payment, with specific implementation for
processing bank transfer payments.
● PaymentProcessor: A class to manage and process different types of payments.
b. Functionalities
● Add Payment Method: Add new payment methods (CreditCardPayment, PayPalPayment,
BankTransferPayment) to the system.
● Process Payment: Demonstrate dynamic polymorphism by processing payments using
different methods.
c. Deliverables
● Design Document: Describe the classes, their attributes, methods and relationships.
● Source Code: Well-documented Java code implementing the described functionalities.
● User Manual: Instructions on how to set up, run and use the system.
● Test Cases: A suite of test cases demonstrating the functionality of the system.
5 30 12.5 12.5 60
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain the process of writing, compiling, and executing basic Java programs,
CO1 including their structure and components, to demonstrate proficiency.
K2
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Java: The Complete Reference Herbert Schildt Tata McGraw Hill 13/e, 2024
Introduction to Java Programming,
2 Y Daniel Liang Pearson 10/e, 2014
Comprehensive Version
Eric Freeman, Elisabeth O'Reilly Media
Head First Design Patterns
3 Robson, Bert Bates, 1/e, 2004
Kathy Sierra
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Head First Java: A Brain
Kathy Sierra & Bert
1 O’Reilly 3/e, 2022
Friendly Guide Bates
Teaching Hours/Week
3:1:0:0 ESE Marks 60
(L:T:P: R)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to digital Systems :- Digital abstraction
Number Systems – Binary, Hexadecimal, grouping bits, Base conversion;
Binary Arithmetic – Addition and subtraction, Unsigned and Signed
numbers; Fixed-Point Number Systems; Floating-Point Number Systems
Basic gates- Operation of a Logic circuit; Buffer; Gates - Inverter, AND gate,
OR gate, NOR gate, NAND gate, XOR gate, XNOR gate; Digital circuit
Verilog (Part 1) :-
HDL Abstraction; Modern digital design flow - Verilog constructs: data
types, the module, Verilog operators.
Combinational Logic Design: –
Boolean Algebra - Operations, Axioms, Theorems; Combinational logic
analysis - Canonical SOP and POS, Minterm and Maxterm equivalence;
Logic minimization - Algebraic minimization, K-map minimization, Dont
Structural design and hierarchy - lower level module instantiation, gate level
primitives, user defined primitives, adding delay to primitives.
Sequential Logic Design :- Latches and Flip-Flops- SR latch, SR latch with
enable, JK flipflop, D flipflop, Register Enabled Flip-Flop, Resettable Flip-
Flop. Sequential logic timing considerations; Common circuits based on
sequential storage devices - toggle flop clock divider, asynchronous ripple
counter, shift register.
Verilog (Part 2) : -
Procedural assignment; Conditional Programming constructs; Test benches;
Modeling a D flipflop in Verilog; Modeling an FSM in Verilog.
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Summarize the basic concept of different number systems and perform
CO1 K2
conversion and arithmetic operations between different bases.
Interpret a combinational logic circuit to determine its logic expression, truth
CO2 table, and timing information and to synthesize a minimal logic circuit through K2
algebraic manipulation or with a Karnaugh map.
Illustrate the fundamental role of hardware description languages in modern
CO3 digital design and be able to develop the hardware models for different digital K3
circuits.
Develop MSI logic circuits using both the classical digital design approach and
CO4 K3
the modern HDL-based approach.
Develop common circuits based on sequential storage devices including
CO5 counter, shift registers and a finite state machine using the classical digital K3
design approach and an HDL-based structural approach.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Name of the Edition
Title of the Book
No Author/s Publisher and Year
Introduction to Logic Circuits & Logic Springer International
1 Brock J. LaMeres 2/e, 2017
Design with Verilog Publishing
Digital Design and Computer Sarah L. Harris,
2 Morgan Kaufmann 1/e, 2022
Architecture - RISC-V Edition David Harris
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Digital Design with an Introduction to the M Morris Mano,
1 Pearson 6/e, 2018
Verilog HDL, VHDL, and System Verilog Michael D Ciletti
2 Digital Fundamentals Thomas Floyd Pearson 11/e, 2015
Fundamentals of Digital Logic with Verilog Stephen Brown,
3 McGrawHill 3/e, 2014
Design Zvonko Vranesic
Zvi Kohavi Cambridge
4 Switching and Finite Automata Theory 3/e, 2010
Niraj K. Jha University Press
Video Links (NPTEL, SWAYAM…)
No. Link ID
1 https://nptel.ac.in/courses/117105080
2 https://onlinecourses.nptel.ac.in/noc21_ee39/
3 https://onlinecourses.nptel.ac.in/noc24_cs61/
SEMESTER S3
Teaching Hours/Week
2:0:0:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. Understanding of finance and costing for engineering operation, budgetary planning and control
2. Provide fundamental concept of micro and macroeconomics related to engineering industry
3. Deliver the basic concepts of Value Engineering.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Cost concepts – Social cost, private cost – Explicit and implicit cost – Sunk
cost - Opportunity cost - short run cost curves - Revenue concepts
Value Analysis and value Engineering - Cost Value, Exchange Value, Use
Value, Esteem Value - Aims, Advantages and Application areas of Value
4 Engineering - Value Engineering Procedure - Break-even Analysis - Cost-
6
Internal Internal
Assignment/ Case
Attendance Examination-1 Examination- 2 Total
study/Microproject
(Written) (Written)
10 15 12.5 12.5 50
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 - - - - - 1 - - - - 1 -
CO2 - - - - - 1 1 - - - 1 -
CO3 - - - - 1 - - - - - 2 -
CO4 - - - - 1 1 - - - - 2 -
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Geetika, Piyali Ghosh
1 Managerial Economics Tata McGraw Hill, 2015
and Chodhury
H. G. Thuesen, W. J.
2 PHI 1966
Engineering Economy Fabrycky
Course Objectives:
1. Equip with the knowledge and skills to make ethical decisions and implement gender-
sensitive practices in their professional lives.
2. Develop a holistic and comprehensive interdisciplinary approach to understanding
engineering ethics principles from a perspective of environment protection and sustainable
development.
3. Develop the ability to find strategies for implementing sustainable engineering solutions.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of ethics - Personal vs. professional ethics, Civic Virtue,
Respect for others, Profession and Professionalism, Ingenuity, diligence
and responsibility, Integrity in design, development, and research domains,
Plagiarism, a balanced outlook on law - challenges - case studies,
Technology and digital revolution-Data, information, and knowledge,
Cybertrust and cybersecurity, Data collection & management, High
1 6
technologies: connecting people and places-accessibility and social
impacts, Managing conflict, Collective bargaining, Confidentiality, Role
of confidentiality in moral integrity, Codes of Ethics.
Basic concepts in Gender Studies - sex, gender, sexuality, gender
spectrum: beyond the binary, gender identity, gender expression, gender
stereotypes, Gender disparity and discrimination in education,
employment and everyday life, History of women in Science & Technology,
Gendered technologies & innovations, Ethical values and practices in
connection with gender - equity, diversity & gender justice, Gender policy
and women/transgender empowerment initiatives.
Continuous internal evaluation will be based on individual and group activities undertaken throughout
the course and the portfolio created documenting their work and learning. The portfolio will include
reflections, project reports, case studies, and all other relevant materials.
The students should be grouped into groups of size 4 to 6 at the beginning of the semester.
These groups can be the same ones they have formed in the previous semester.
Activities are to be distributed between 2 class hours and 3 Self-study hours.
The portfolio and reflective journal should be carried forward and displayed during the 7th
Semester Seminar course as a part of the experience sharing regarding the skills developed
through various courses.
Sl. Item Particulars Group/I Marks
No. ndividu
al (G/I)
3 Activities 2. One activity* each from Module II, Module III & Module G 15
IV
Total Marks 50
Evaluation Criteria:
● Depth of Analysis: Quality and depth of reflections and analysis in project reports and
case studies.
● Application of Concepts: Ability to apply course concepts to real-world problems and
local contexts.
● Creativity: Innovative approaches and creative solutions proposed in projects and reflections.
● Presentation Skills: Clarity, coherence, and professionalism in the final presentation.
Course Outcomes (COs)
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 3 3 2 2
CO2 1 3 2 3 3 2 2
CO3 3 3 2 3 2 2
CO4 1 3 3 2 3 2 2
CO5 3 3 2 3 2 2
Reference Books
Edition and
Sl. No Title of the Book Name of the Author/s Name of the Publisher
Year
2nd edition
Ethics in Engineering Practice Cambridge University
1 Caroline Whitbeck & August
and Research Press & Assessment
2011
2nd edition
Cambridge University &
3 Bert J. M. de Vries
Sustainability Science Press & Assessment December
2023
Cambridge University
4 Sustainable Engineering Bhavik R. Bakshi, 2019
Principles and Practice Press & Assessmen
M Govindarajan, S
PHI Learning Private
5 Natarajan and V S 2012
Engineering Ethics Ltd, New Delhi
Senthil Kumar
Suggested Activities/Projects:
Module-II
● Write a reflection on a local environmental issue (e.g., plastic waste in Kerala
backwaters or oceans) from different ethical perspectives (anthropocentric, biocentric,
ecocentric).
● Write a life cycle analysis report of a common product used in Kerala (e.g., a coconut,
bamboo or rubber-based product) and present findings on its sustainability.
● Create a sustainability report for a local business, assessing its environmental, social, and
economic impacts
● Presentation on biodiversity in a nearby area (e.g., a local park, a wetland, mangroves,
college campus etc) and propose conservation strategies to protect it.
● Develop a conservation plan for an endangered species found in Kerala.
● Analyze the green spaces in a local urban area and propose a plan to enhance urban
ecology using native plants and sustainable design.
● Create a model of a sustainable urban landscape for a chosen locality in Kerala.
Module-III
● Study a local water body (e.g., a river or lake) for signs of pollution or natural flow disruption and
suggest sustainable management and restoration practices.
● Analyse the effectiveness of water management in the college campus and propose improvements -
calculate the water footprint, how to reduce the footprint, how to increase supply through rainwater
harvesting, and how to decrease the supply-demand ratio
● Implement a zero waste initiative on the college campus for one week and document the challenges
and outcomes.
● Develop a waste audit report for the campus. Suggest a plan for a zero-waste approach.
● Create a circular economy model for a common product used in Kerala (e.g., coconut oil, cloth etc).
● Design a product or service based on circular economy and degrowth principles and present a
business plan.
● Develop a plan to improve pedestrian and cycling infrastructure in a chosen locality in Kerala
Module-IV
● Evaluate the potential for installing solar panels on the college campus including cost-benefit analysis
and feasibility study.
● Analyse the energy consumption patterns of the college campus and propose sustainable alternatives
to reduce consumption - What gadgets are being used? How can we reduce demand using energy-
saving gadgets?
● Analyse a local infrastructure project for its climate resilience and suggest improvements.
● Analyse a specific environmental regulation in India (e.g., Coastal Regulation Zone) and its impact
on local communities and ecosystems.
● Research and present a case study of a successful sustainable engineering project in Kerala/India
(e.g., sustainable building design, water management project, infrastructure project).
● Research and present a case study of an unsustainable engineering project in Kerala/India
highlighting design and implementation faults and possible corrections/alternatives (e.g., a housing
complex with water logging, a water management project causing frequent floods, infrastructure
project that affects surrounding landscapes or ecosystems).
SEMESTER S3
(Common to CS/CA/CM/CD/CR/AI/AM/AD/CB/CN/CC/CU/CI/CG)
Course Objectives:
To give practical experience for learners on implementing different linear and non linear data
structures, and algorithms for searching and sorting.
Expt.
Experiments
No.
1 Find the sum of two sparse polynomials using arrays
2 Find the transpose of a sparse matrix and sum of two sparse matrices.
3 Convert infix expression to postfix (or prefix) and then evaluate using stack,
Implement backward and forward navigation of visited web pages in a web browser (i.e.
5
back and forward buttons) using doubly linked list operations.
6 Implement addition and multiplication of polynomials using singly linked lists.
Create a binary tree for a given simple arithmetic expression and find the prefix / postfix
7
equivalent.
8 Implement a dictionary of word-meaning pairs using binary search trees.
9 Find the shortest distance of every cell from a landmine inside a maze.
We have three containers whose sizes are 10 litres, 7 litres, and 4 litres, respectively. The
7-litre and 4-litre containers start out full of water, but the 10-litre container is initially
10 empty. We are allowed one type of operation: pouring the contents of one container into
another, stopping only when the source container is empty or the destination container is
full. We want to know if there is a sequence of pourings that leaves exactly 2 litres in the 7
or 4-litre container. Model this as a graph problem and solve.
14 Ordinary. The customers are to be given preference in the decreasing order - Differently
abled, Senior citizen, Defence personnel, Normal person. Generate the possible sequence
of completion.
Implement a spell checker using a hash table to store a dictionary of words for fast
15 lookup. Implement functions to check if a word is valid and to suggest corrections for
misspelled words.
16 Simulation of a basic memory allocator and garbage collector using doubly linked list
The CSE dept is organizing a tech fest with so many exciting events. By participating
in an event, you can claim for activity points as stipulated by KTU. Each event i gives
17
you A[i] activity points where A is an array. If you are not allowed to participate in more
than k events, what’s the max number of points that you can earn?
Merge K sorted lists into a single sorted list using a heap. Use a min-heap to keep track of
18 the smallest element from each list. Repeatedly extract the smallest element and insert the
next element from the corresponding list into the heap until all lists are merged.
5 25 20 50
End Semester Examination Marks (ESE):
● Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
Model a real world problem using suitable data structure and implement the
CO1 K3
solution.
Compare efficiency of different data structures in terms of time and space
CO2 K4
complexity.
CO3 Evaluate the time complexities of various searching and sorting algorithms. K5
Differentiate static and dynamic data structures in terms of their advantages
CO4 K3
and application.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Universities
Fundamentals of Data Ellis Horowitz, Sartaj Sahni and Susan Press,
1 2/e, 2007
Structures in C Anderson-Freed,
Reference Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Classic Data Structures Samanta D. Prentice Hall India. 2/e, 2018
No. Link ID
1 https://nptel.ac.in/courses/106102064
2 https://ocw.mit.edu/courses/6-851-advanced-data-structures-spring-2012/
Continuous Assessment (25 Marks)
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
● Oral Examination: Ability to explain the experiment, results and underlying principles
during a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
● Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
Teaching Hours/Week
0:0:3:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. To enable the learner to design and implement basic digital logic circuits using logic
gates and ICs.
2. To familiarize digital system design using HDL.
EXPERIMENTS
(All HDL based experiments should be done using Verilog HDL. At Least three experiments
Expt. of PART A & B together should be implemented on a breadboard . Use any open source
No. circuit simulation software or web based logic simulator softwares for the rest of the
experiments (refer to https://circuitverse.org, https://simulator.io,
https://www.logiccircuit.org)
Part A
(All experiments in this part are mandatory. These experiments give an introduction to the
digital design by familiarising the basic gates and combinational circuits on breadboard /
circuit simulation softwares along with their HDL based realisation.)
Study of basic digital ICs and verification of Boolean theorems using digital logic
A1.
gates.
Familiarisation of the working of circuit simulation software.
a. Realize the basic logic gates and analyze their waveforms
A2..
b. Realize a given Boolean function using basic gates and verify the
waveform with the truth table.
c. structural modelling
d. dataflow modelling
Realization of an SOP and its corresponding POS expression using NAND gates alone and NOR
A4.
gates alone (to be do on breadboard and simulated using software)
Model a given Boolean function (SOP and POS) in Verilog using
a. continuous assignment with logical operators
Part B
(All experiments to be done using any circuit simulation softwares.)
Design and implement a combinational logic circuit for arbitrary functions (any two)
a) Code converters
B1.
b) Half adder, full adder, half subtractor, full subtractor
c) Multiplexer, Demultiplexer,Encoder, Decoder
Design and implement combinational circuits using MSI devices: (any three)
1. 4-bit adder and subtractor using MSI device IC 7483.
B2. 2. Parity generator / checker using MSI device IC 74180
3. Magnitude Comparator using MSI device IC 7485
4. Implement a boolean function using MUX IC
B3. Study of D flip flop and JK flip flops using ICs
To design and implement the following shift registers using D flip flops
(i) Serial in serial out
B4. (ii) Serial in parallel out
(iii) Parallel in serial out
(iv) Parallel in parallel out
Design and implement an asynchronous counter - 3 bit up counter, 3-bit down counter, 3 bit up
B5.
down counter with mode control, mod-N counter
Design and implement a synchronous counter - 3 bit up counter, 3-bit down counter, sequence
B6.
generator.
PART C
using Verilog HDL
For the all the experiments in part C:
1. Write Verilog program code in the IDE/Software (Other open source or online softwares
such as Icarus Verilog / EDAplayground may be used)
2. Simulate the code using a test bench or by giving input values.
Model a 4:1 MUX, 1:4 DEMUX, 4 to 2 encoder, and 2 to 4 decoder and a 7-Segment Display
Decoder in Verilog using
C1. a. continuous assignment with logical operators
C2. Design and synthesize the behavioural model for a D flip flop in Verilog HDL
C3. Design and synthesize the behavioural model for a synchronous counter in Verilog
Design a Verilog HDL behavioral model to implement a finite-state machine - a serial bit sequence
C4.
detector
5 25 20 50
● Submission of Record: Students shall be allowed for the end semester examination only upon
submitting the duly certified record.
● Endorsement by External Examiner: The external examiner shall endorse the record
Course Outcomes (COs)
At the end of the course students should be able to:
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Model and construct combinational logic circuits. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO- PO Mapping (Mapping of Course Outcomes with Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to Logic Circuits Springer International
1 Brock J. LaMeres 2/e, 2017
& Logic Design with Verilog Publishing
Digital Design and Computer Sarah L. Harris, David
2 Morgan Kaufmann 1/e, 2022
Architecture - RISC-V Edition Harris
Verilog HDL Synthesis: A
3 J Bhasker Star Galaxy Publishing 1/e, 1998
Practical Primer
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Digital Design with an Introduction to the
M Morris Mano,
1 Verilog HDL, VHDL, and System Pearson 6/e, 2018
Michael D Ciletti
Verilog
Fundamentals of Digital Logic with Stephen Brown,
2 McGrawHill 3/e, 2014
Verilog Design Zvonko Vranesic
No. Link ID
1 https://nptel.ac.in/courses/117105080
2 https://archive.nptel.ac.in/courses/108/103/108103179/
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
4. Viva Voce (5 Marks)
● Oral Examination: Ability to explain the experiment, results and underlying principles
during a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
Evaluation Pattern for End Semester Examination (50 Marks)
1. Procedure/Preliminary Work/Design/Algorithm (10 Marks)
● Setup and Execution: Proper setup and accurate execution of the experiment or programming task.
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
(Group A)
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Graphs - Basic definition, Application of graphs, finite and
infinite graphs, Incidence and Degree, Isolated vertex, Pendant vertex and
Null graph. Isomorphism, Sub graphs, Walks, Paths and circuits, Connected
1 9
graphs, Disconnected graphs and components.
[Text 1: Relevant topics from sections 1.1, 1.2, 1.3, 1.4, 1.5, 2.1, 2.2, 2.4,
2.5. Proofs of theorems 2.5, 2.7 are excluded.]
Euler graphs, Operations on Graphs, Hamiltonian paths and circuits,
Travelling Salesman Problem, Connectivity, Edge connectivity, Vertex
2 connectivity, Directed graphs, Types of directed graphs. 9
[Text 1: Relevant topics from sections 2.6, 2.7, 2.8, 2.9, 2.10, 4.1, 4.2, 4.5,
9.1, 9.2. Proofs of theorems 4.6, 4.11, 4.12 are excluded.]
Trees- properties, Pendant vertices, Distance and centres in a tree, Rooted
and binary trees, Counting trees, Spanning trees, Prim's algorithm and
3 9
Kruskal's algorithm, Dijkstra's shortest path algorithm, Floyd-Warshall
shortest path algorithm.
[Text 1: Relevant topics from sections 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.10,
11.5. Proofs of theorems 3.10, 3.16 are excluded.]
[Text 1: Relevant topics from sections 7.1, 7.3, 7.8, 7.9, 8.1, 8.3. Proofs of
theorems 7.4, 7.7, 7.8, 8.2, 8.3, 8.5, 8.6 are excluded.]
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Micro project
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can
choose any one full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 2 - - - - - - - - 2
CO2 3 3 2 - - - - - - - - 2
CO3 3 3 2 2 - - - - - - - 2
CO4 3 3 2 2 - - - - - - - 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Graph Theory with Prentice Hall India
1 1st edition,
Applications to Engineering Narsingh Deo Learning Private
1979
and Computer Science Limited
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Introduction to Graph Theory Douglas B. West Pearson Education 2nd edition,
2e India 2015
2 Introduction to Graph Theory Robin J. Wilson Longman Group Ltd. 5th edition,
2010
3 Graph Theory with J.A. Bondy and U.S.R. Elsevier Science
1976
Applications Murty Publishing Co., Inc
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://onlinecourses.nptel.ac.in/noc22_ma10/preview
2 https://onlinecourses.nptel.ac.in/noc22_ma10/preview
3 https://onlinecourses.nptel.ac.in/noc21_cs48/preview
4 https://onlinecourses.nptel.ac.in/noc21_cs48/preview
SEMESTER S4
DATABASE MANAGEMENT SYSTEMS
(Common to CS/CD/CA/CR/AD/AI/CB/CN/CC/CU/CI/CG)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to Databases :- Database System Concepts and Architecture-
Data Models, Schemas and Instances, Three-Schema Architecture and Data
Independence, Database Languages and Interfaces, Centralized and
Client/Server Architectures for DBMSs.
1
Conceptual Data Modelling and Database Design:- Data Modelling Using the 11
Entity, Relationship (ER) Model - Entity Types, Entity Sets, Attributes, and Keys,
Relationship Types, Relationship Sets, Roles, and Structural Constraints, Weak
Entity Types. Refining the ER Design for the COMPANY Database.
The Relational Data Model and SQL - The Relational Data Model and Relational
Database Constraints-Relational Algebra and Relational Calculus - Structured
2 Query Language (SQL)-Data Definition Language, Data Manipulation Language,
Assertions, Triggers, views, Relational Database Design Using ER-to-Relational 11
Mapping.
Database Design Theory & Normalization - Functional Dependencies -
Basic definition; Normalization- First, Second, and Third normal forms.
3 Transaction Management - Transaction Processing : Introduction, problems and 11
failures in transaction, Desirable properties of transaction, Characterizing
schedules based on recoverability and serializability; Concurrency Control
with Two-Phase Locking Techniques- Database Recovery management:
Deferred update-immediate update- shadow paging.
Introduction To NoSQL Concepts - types of NoSQL databases- CAP
Theorem- BASE properties- Use Cases and limitations of NoSQL.
4
SQL architectural Patterns - Key value Stores, Graph Stores, Column 11
Family stores and Document Stores.
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Summarize and exemplify the fundamental nature and characteristics of
CO1 K2
database systems
Model and design solutions for efficiently representing data using the
CO2 K3
relational model or non-relational model
Discuss and compare the aspects of Concurrency Control and Recovery in
CO3 K3
Database systems
Construct advanced SQL queries to effectively retrieve, filter, and
CO4 K3
manipulate data from relational databases.
CO5 Experiment with NoSQL databases in real world applications K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 2 2 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Fundamentals of Database Systems
1 Elmasri, Navathe Pearson 7/e,
[Module 1,2,3,4]
Making the Sense of NoSQL : A guide Dan McCreary and
2 Manning 2014
for Managers and rest of us [Module 4] Ann Kelly
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Sliberschatz A., H. F. Korth
A., H. F. Korth and S.
and S. Sudarshan, Database
1 Sudarshan, Database System McGraw
System Concepts, 6/e, 7/e, 2011
Concepts, Hill,
McGraw
Hill, 2011.
2 Beginning Database Design
Rod Stephens Wiley 2/e, 2023
Solutions
2 Pramod J. Sadalage, Martin Addison-
NoSQL Distilled 1/e, 2012
Fowler Wesley
NoSQL Data Models: Trends
and Challenges (Computer
3 Engineering: Databases and Olivier Pivert Wiley 2018
Big
Data),
OPERATING SYSTEMS
(Common to CS/CD/CM/CR/CA/AD/AI/CB/CN/CC/CU/CI/CG)
Teaching Hours/Week
3:1:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To introduce the structure of a typical operating system and its core functionalities
2. To impart to the students, a practical understanding of OS implementation nuances based on
the Linux operating system
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Operating Systems (Book 1 Ch 2 introductory part),
Operating System Services (Book 3 Ch 2) Overview of Operating Systems
and Kernels, Linux Versus Classic Unix Kernels (Book 2 Ch 1)
Going beyond physical memory - Swap space, page fault and its control flow,
page replacement policies, Thrashing (Book 1 Ch 21, 22)
Case study: Linux I/O schedulers - Elevator, Complete Fair Queuing (Book
4 10
2 Ch 14)
Files and Directories: The File System Interface - File descriptor, reading
and writing files (sequential and random access), Removing files - Hard links
and Symbolic links, Creating, reading and deleting directories, Permission
bits and Access Control Lists, Mounting a file system (Book 1 Ch 39)
File Organization: The Inode, The Multi-Level Index (Book 1 Ch 40)
Case study: VFS Objects and Their Data Structures - The Inode Object, Inode
Operations (Book 2 Ch 13)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Micro project
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Apply the concepts of process management and process scheduling
CO1 K3
mechanisms employed in operating systems.
Choose various process synchronization mechanisms employed in
CO2 K3
operating systems.
Use deadlock prevention and avoidance mechanisms in operating
CO3 K3
systems.
CO4 Select various memory management techniques in operating systems. K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Operating Systems: Three Easy Andrea Arpaci-Dusseau,
1 Pieces Remzi Arpaci-Dusseau CreateSpace 1/e, 2018
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Andrew S. Tanenbaum
1 Modern Operating Systems Pearson 5/e, 2012
Herbert Bos
The Design of the UNIX
2 Maurice J. Bach Prentice Hall of India 1/e, 1994
Operating System
3 The Little Book of Semaphores Allen B. Downey Green Tea Press 1/e, 2016
Teaching Hours/Week
3:0:0:1 ESE Marks 40
(L: T:P: R)
1. Introduce principles of computer organization and the basic architectural concepts using
RISC.
2. Introduce the concepts of microarchitecture, memory systems, and I/O systems.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basic Structure of computers :– Functional units - Basic operational
concepts; Memory map; Endianness.
CISC vs RISC architectures:- RISC Introduction - Assembly Language,
Assembler directives, Assembling.
1 11
Programming concepts - Program flow, Branching, Conditional statements,
Loops, Arrays, Function calls; Instruction execution cycle.
Machine language - Instructions, addressing modes, Stored program
concept. Evolution of the RISC Architecture.
Microarchitecture - Introduction; Performance analysis; Single-Cycle
Processor - Single Cycle Datapath, Single Cycle Control; Pipelined
2 11
Processor - Pipelined Data Path, Pipelined Control: Hazards, Solving
Data/Control Hazards, Performance Analysis.
Memory Systems: Introduction; performance analysis; Caches - basic
concepts, Cache mapping, Cache replacement, Multiple-Level Caches,
3 11
Reducing Miss Rate, Write Policy; Virtual Memory - Address Translation;
Page Table; Translation Lookaside Buffer; Memory Protection.
Input / Output - External Devices; I/O Modules; Programmed I/O,
5 30 12.5 12.5 60
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Identify the basic structure and functional units of a digital computer and the K2
CO1
features of RISC architecture.
Experiment with the single cycle processor, pipelining, and the associated K3
CO2
problems.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Digital Design and Computer Sarah L. Harris, David
1 Morgan Kaufmann 1/e, 2022
Architecture - RISC-V Edition Harris
Computer Organization
2 and Architecture William Stallings Pearson 9/e, 2013
Designing for Performance
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Computer Organization and Design : David A. Patterson
Morgan
1 The Hardware/Software Interface: John L. Hennessy 1/e,2018
Kaufaman
RISC-V Edition
Carl Hamacher,
Computer Organization Zvonko Vranesic,
2 McGraw Hil 6/e, 2012
and Embedded Systems Safwat Zaky,
Naraig Manjikian
Modern Computer Architecture and
3 Jim Ledin Packt Publishing 1/e,2020
Organization
SOFTWARE ENGINEERING
(Common to CS/CD/CM/CR/CA/AD/AM/CB/CN/CU/CI)
Module Contact
Syllabus Description Hours
No.
Introduction to Software Engineering and Process Models - Software
engineering, Software characteristics and types, Layers of Software
Engineering-Process, Methods, Tools and Quality focus. Software Process
models – Waterfall, Prototype, Spiral, Incremental, Agile model – Values and
Principles.
1 9
Requirement engineering - Functional, Non-functional, System and User
requirements. Requirement elicitation techniques, Requirement validation,
Feasibility analysis and its types, SRS document characteristics and its
structure.
Case study: SRS for College Library Management Software
Software design - Software architecture and its importance, Software
architecture patterns: Component and Connector, Layered, Repository, Client-
Server, Publish-Subscribe, Functional independence – Coupling and Cohesion
Case study: Ariane launch failure
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Micro project
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Plan the system requirements and recommend a suitable software process
CO1 K3
model
CO2 Model various software patterns based on system requirements K3
Apply testing and maintenance strategies on the developed software
CO3 K3
product to enhance quality
CO4 Develop a software product based on cost, schedule and risk constraints K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Software Engineering: A McGraw-Hill
1 Roger S. Pressman 8/e, 2014
practitioner's approach International edition
2 Software Engineering Ian Sommerville Addison-Wesley 10/e, 2015
Erich Gamma,Richard Pearson Education
Design Patterns, Elements of
3 Helm, Ralph Addison-Wesley 1/e, 2009
Reusable Object Oriented Software
Johnson,John Vlissides
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Pankaj Jalote’s Software Engineering:
1 Pankaj Jalote Wiley India 1/e, 2024
With Open Source and GenAI
Waman S
2 Software Engineering: A Primer Tata McGraw-Hill 1/e, 2008
Jawadekar
Object-Oriented Modeling Michael Blaha, Pearson Education.
3 2/e, 2007
and Design with UML James Rumbaugh
Software Engineering Foundations : A Auerbach
4 Yingux Wang 1/e, 2008
Software Science Perspective Publications
5 Object-Oriented Design and Patterns Cay Horstmann Wiley India 2/e, 2005
Engineering Software Products: An
1/e, 2020
6 Introduction to Modern Software Ian Sommerville Pearson Education
Engineering
https://www.youtube.com/watch?v=1xUz1fp23TQ
2
http://digimat.in/nptel/courses/video/106105150/L01.html
3
https://www.youtube.com/watch?v=v7KtPLhSMkU
4
SEMESTER S4
PATTERN RECOGNITION
(Common to CS/CM/CA/AM/CN/CI)
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Foundations of Pattern Recognition
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Micro project
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3 3
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Pattern Recognition and
1 Christopher M. Bishop SPRINGER 1/e, 2009
Machine Learning
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Springer-Verlag New
1 The Nature of Statistical Vladimir Vapnik 2/e, 2010
Learning Theory York Inc.
S.Theodoridis and
3 Pattern Recognition Academic Press 4/e, 2009
K.Koutroumbas
2 https://archive.nptel.ac.in/courses/117/105/117105101/
3 https://archive.nptel.ac.in/courses/117/105/117105101/
4 https://archive.nptel.ac.in/courses/117/105/117105101/
SEMESTER S4
FUNCTIONAL PROGRAMMING
(Common to CS/CD/CM/CR/CA/AD/AM/CB/CN/CU/CG)
Course Objectives:
1. To enable the learner write programs in a functional style and reason formally about
functional programs;
2. To give the concepts of polymorphism and higher-order functions in Haskell to solve the
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introducing Functional Programming; Getting Started with Haskell and
GHCi; Basic Types and Definitions; Designing and Writing Programs; Data
1 Types, Tuples and Lists. 9
[Text Ch. 1, 2, 3, 4, 5]
Programming with Lists; Defining Functions over Lists; Playing the Game:
I/O in Haskell; Reasoning about Programs;
2 9
[Text Ch. 6, 7, 8, 9]
Algebraic Types; Case Study - Huffman Codes; Abstract Data Types; Lazy
Programming; Time and Space Behaviour.
4 9
[Text Ch. 15, 16, 17, 20]
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Write computer programs in a functional style.
CO1 K2
Reason formally about functional programs and develop programs
CO2 K3
using lists.
Use patterns of computation and higher-order functions.
CO3 K3
CO4 Reason informally about the time and space complexity of programs. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
HASKELL : The Craft of
1 Functional Programming Simon Thompson Addison Wesley 3/e, 2023
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Cambridge
1 Thinking Functionally with Haskell Richard Bird 1/e, 2015
University Press
Cambridge
2 Programming in Haskell Graham Hutton 2/e, 2023
University Press
Bryan O'Sullivan,
3 Real World Haskell John Goerzen, Donald O’Reilly 1/e, 2008
Bruce Stewart
No. Link ID
1 https://archive.nptel.ac.in/courses/106/106/106106137/
SEMESTER S4
CODING THEORY
(Common to CS/CM/AM/CI)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Binary block codes, Minimum distance, Error-detecting capability and error-
correcting capability.
Introduction to linear block codes, generator matrix and parity check matrix.
1 9
Properties of linear block codes: Syndrome, error detection. Distance
properties of linear block codes. Single parity check codes, Hamming codes,
Reed Muller codes.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Construct the encoder and decoder of linear block codes
CO1 K3
Understand the concept of error correction coding
CO2 K2
Understand the implementation of cyclic codes
CO3 K2
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2
CO2 3 3 3 2 2
CO3 3 3 3 2 2
CO4 3 3 3 2
CO5 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Shu Lin and Daniel J.
1 Error Control Coding Costello, Jr. PHI 2/e, 2004
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
F. J. MacWilliams, N. J. North-Holland,
The Theory of Error-Correcting
1 A. Sloane Amsterdam 1/e, 1977
Codes
Algebraic Codes for Data R. E. Blahut Cambridge University 1/e, 2003
2
Transmission Press
Cary W. Huffman, Vera
Fundamentals of Error- Cambridge University 1/e, 2003
3 Pless
Correcting Codes Press
3 https://archive.nptel.ac.in/courses/108/104/108104092/
4 https://archive.nptel.ac.in/courses/108/104/108104092/
SEMESTER S4
Course Objectives:
1. To teach the concept of a Discrete Time (DT) signal
2. To enable the learner to analyze the spectral information of any DT signal and its
transformed version.
3. To provide the learner the concepts of a DT system, how it behaves to an arbitrary input,
and also to analyze the behaviour of a given DT system based on z-transform
SYLLABUS
Module Contact
Syllabus Description Hours
No.
1D Signals - A general introduction to real time signals - CT and DT signals,
Sinusoids, Spectrum representation, Sampling and Aliasing (Concept only),
Analog frequency and Digital frequency.
Elementary sequences- Real Sinusoidal Sequences, Complex Exponential
Sequences. - Unit impulse, step and ramp sequences, Representation of
discrete time signals- (Graphical representation, Functional representation,
Sequence representation)
Properties of DT Signals - Even and Odd, Periodic and non periodic signal,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Demonstrate the concept and different types of DT signals and the effect of
CO1 K2
different operations on the signals.
CO2 Explain how DTFS can be used to represent a periodic DT signal. K2
Apply the concept of DTFT for an aperiodic signal to determine the
CO3 K3
frequency spectrum.
Utilize the properties of a DT system based on its impulse response and z
CO4 K3
transform.
CO5 Identify the response of a DT LTI system to an arbitrary input sequence. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 2 2 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
University of Victoria,
1 Signals and Systems Michael D. Adams British Columbia, 3/e 2020
Canada
2 Barry Van Veen, Simon
Signals and systems Wiley 2/e, 2007
Haykins
3 Signals and systems A Nagoor Khani McGraw Hill 2/e, 2022
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Fundamentals of Signals and Edward W. Kamen,
1 Systems Using the Web and Bonnie S Heck Pearson 3/e, 2014
MATLAB
SOFT COMPUTING
(Common to CS/CD/CM/CR/CA/AD/AI/AM/CB/CN/CI)
Course Objectives:
1. To give exposure on soft computing, various types of soft computing techniques, and
applications of soft computing
2. To impart solid foundations on Neural Networks, its architecture, functions and various
algorithms involved, Fuzzy Logic, various fuzzy systems and their functions, and Genetic
algorithms, its applications and advances.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Soft Computing. Difference between Hard Computing & Soft
Computing. Applications of Soft Computing. Artificial Neurons Vs
Biological Neurons. Basic models of artificial neural networks –
1 Connections, Learning, Activation Functions. McCulloch and Pitts Neuron. 10
Hebb network, Perceptron Networks– Learning rule, Training and testing
algorithm. Adaptive Linear Neuron– Architecture, Training and testing
algorithm.
Fuzzy logic, Fuzzy sets – Properties, Fuzzy membership functions, Features
of Fuzzy membership functions. operations on fuzzy set. Linguistic
2 variables, Linguistic hedges Fuzzy Relations, Fuzy If-Then Rules, 9
Fuzzification, Defuzzification– Lamda cuts, Defuzzification methods. Fuzzy
Inference mechanism - Mamdani and Sugeno types.
Evolutionary Computing, Terminologies of Evolutionary Computing,
3 8
Concepts of genetic algorithm. Operators in genetic algorithm - coding,
selection, cross over, mutation. Stopping condition for genetic algorithm.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Describe the techniques used in soft computing and outline the
CO1 K2
fundamental models of artificial neural networks
CO2 Solve practical problems using neural networks K3
CO3 Illustrate the operations, model, and applications of fuzzy logic. K3
Illustrate the concepts of evolutionary algorithms such as Genetic
CO4 K3
Algorithm
Describe the concepts of multi-objective optimization models and
CO5 K2
collective systems.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 2 2 3
CO3 3 3 3 2 3
CO4 3 3 2 2 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
S.N.Sivanandam, John Wiley &
1 Principles of Soft Computing 3/e, 2018
S.N. Deepa Sons.
Multi-objective Optimization using John Wiley &
2 Kalyanmoy Deb, 1/e, 2009
Evolutionary Algorithms Sons
Computational intelligence: synergies of
Siddique N, Adeli John Wiley &
3 fuzzy logic, neural networks and 1/e, 2013
H. Sons
evolutionary computing.
COMPUTATIONAL GEOMETRY
(Common to CS/CM)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3 3
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Mark de Berg, Otfried
Computational Geometry:
1 Cheong, Marc van Kreveld, Springer India 3/e, 2011
Algorithms and Applications
and Mark Overmars
Thomas H. Cormen,
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
2 https://archive.nptel.ac.in/courses/106/102/106102011/
3 https://archive.nptel.ac.in/courses/106/102/106102011/
4 https://archive.nptel.ac.in/courses/106/102/106102011/
SEMESTER S4
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of Cyber Law and Cyber Space:- Introduction to cyber
law, Contract aspects in cyber law, Security aspects of cyber law, Intellectual
property aspects in cyber law and Evidence aspects in cyber law, Criminal
aspects in cyber law, Need for Indian cyber law
1 9
Cyberspace- Web space, Web hosting and web development agreement,
Legal and Technological Significance of domain Names, Internet as a tool
for global access.
Cyber crime and Cyber Ethics:- Cyber crime and Cyber Ethics:-
Introduction to cybercrime- Definition and Origins of Cyber crime-
Classifications of Cybercrime, Cyber Offences- Strategic Attacks, Types of
Attacks, Security Challenges Faced by Mobile Devices. Organizational
2 9
Measures for Handling Mobile Phones.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Describe the concepts of cyber law and the various components and
CO1 K2
challenges associated with cyberspace.
Discuss the concept of cybercrime and computer crime, the challenges
CO2 faced by law enforcement, and the importance of intellectual property in K2
the digital age.
Explain the importance of cyber law and ethics, the need for regulations,
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2
CO2 2 2 2
CO3 2 2 2
CO4 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Nilakshi Jain, Ramesh
1 Cyber Security and Cyber Laws Wiley 1/e, 2020
Menon
Cyber Security understanding Cyber
2 Sumit Belapure , Nina Wiley India
Crimes, Computer Forensics and Legal 1/e, 2011
Godbole Pvt.Ltd.
Perspectives
Cyber Ethics 4.0: Serving Humanity
3 Christoph Stückelberger,
with Values Globethics 1/e, 2018
Pavan Duggal
2 https://onlinecourses.swayam2.ac.in/cec22_lw07/preview
3 https://www.coursera.org/learn/data-security-privacy#modules
4 https://jurnal.fh.unila.ac.id/index.php/fiat/article/download/2667/1961/12044
SEMESTER S4
VLSI DESIGN
(Common to CS/CN/CI)
Course Code PECST415 CIE Marks 40
Course Objectives:
1. To impart the key concepts of MOS technology including characteristics of CMOS and its
application in digital VLSI circuits to design basic CMOS logic gates.
2. To impart the key concepts of Integrated Circuit Design and introduce various design flows.
3. To equip the learner to implement both combinational and sequential logic circuits using both
semi-custom and FPGA design flow.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
CMOS Fundamentals for Digital VLSI Design :
CPN junction, MOS transistor theory and operation, PMOS, NMOS, CMOS,
CMOS Inverter, Voltage Transfer Curve, CMOS logic gates, Tristate
1 Inverter, Tristate buffer. Combinational Circuits Timing - Rise Time, Fall 9
time, Propagation Delay. Introduction to sequential logic circuits, flip-flops
and latches, Timing analysis - Set-up time, Hold Time, Propagation Delay,
Frequency of Operation, Static and Dynamic Timing Analysis, Pipelining
Finite State Machines (FSMs): Mealy and Moore models. Verilog HDL
Design and implementation of RISC stored programmed Machine.
● Ability to analyze the circuit for resource utilization such as area consumption and power
consumption. Analyze the circuit for timing violations. Optimize performance.
End Semester Examination Marks (ESE):
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Utilize the MOS Circuits and design basic circuits using CMOS. K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to VLSI Design Cambridge
1 Flow Sneh Saurabh 1/e, 2023
University Press
Pearson
Digital Integrated Circuits: A Jan M. Rabaey, Anantha P.
2 Education 2/e, 2003
Design Perspective. Chandrakasan, Borivoje Nikolic
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Digital Design and Computer Sarah L. Harris, David Morgan
1 1/e, 2022
Architecture - RISC-V Edition Harris Kaufmann
1/e, 2006
5 Embedded Core Design with FPGAs Zainalabedin Navabi McGraw-Hill
Video Links (NPTEL, SWAYAM…)
No. Link ID
Introduction to Digital VLSI Design Flow, Introduction to Digital VLSI Design Flow, IIT
1 Guwahati https://nptel.ac.in/courses/106103116
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Foundational Data Structures- Overview of Arrays and Linked Lists,
implementation of pointers and objects, Representing rooted trees, Hashing -
Hash Tables, Hash functions, Cuckoo Hashing; Bloom Filters - Count-Min
1 Sketch, Applications to Networks - Click Stream Processing using Bloom 9
Filters, Applications to Data Science - Heavy Hitters and count-min
structures.
Implement various real world problems using multiple suitable data structures and compare the
performance.
End Semester Examination Marks (ESE):
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Implement and use arrays, linked lists, rooted trees and hashing
CO1 K3
techniques in various programming scenarios.
Design and implement advanced tree data structures for information
CO2 K3
retrieval.
CO3 Use spatial and temporal data structures in data science problems. K3
Analyze data structures in special scenarios such as distributed, parallel
CO4 K5
and data compression areas.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 3 2 3
CO2 3 3 3 3 3 2 3
CO3 3 3 3 3 3 2 3
CO4 3 3 3 3 3 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Advanced Data Structures: Suman Saha, Shailendra
1 CRC Press 1/e, 2019
Theory and Applications Shukla
Cambridge
2 Advanced Data Structures Peter Brass 1/e, 2008
University Press
Thomas H Cormen, Charles E
3 Introduction to Algorithms Leiserson, Ronald L Rivest, MIT Press 4/e, 2022
Clifford Stein
Fundamentals of Computer Ellis Horowitz, SatrajSahani
4 University Press 2/e, 2009
Algorithms and Rajasekharam
Oxford University
5 Advanced Data Structures Reema Thareja, S. Rama Sree 1/e, 2018
Press
Data Structures and Algorithm 2/e, 2004.
6 Mark Allen Weiss Pearson
Analysis in C++,
Design and Analysis of M T Goodrich, Roberto
7 Wiley 1/e, 2021
Algorithms Tamassia
Teaching Hours/Week
2:0:0:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
1. Understanding of finance and costing for engineering operation, budgetary planning and
control
2. Provide fundamental concept of micro and macroeconomics related to engineering industry
3. Deliver the basic concepts of Value Engineering.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basic Economics Concepts - Basic economic problems – Production
Possibility Curve – Utility – Law of diminishing marginal utility – Law of
Demand - Law of supply – Elasticity - measurement of elasticity and its
1 6
applications – Equilibrium- Changes in demand and supply and its effects
Cost concepts – Social cost, private cost – Explicit and implicit cost – Sunk
cost - Opportunity cost - short run cost curves - Revenue concepts
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Micro project
(Written) (Written)
10 15 12.5 12.5 50
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the fundamentals of various economic issues using laws
CO1 and learn the concepts of demand, supply, elasticity and production K2
function.
Develop decision making capability by applying concepts relating to
CO2 costs and revenue and acquire knowledge regarding the functioning of K3
firms in different market situations.
Outline the macroeconomic principles of monetary and fiscal systems,
CO3 K2
national income and stock market.
Make use of the possibilities of value analysis and engineering, and
CO4 solve simple business problems using break even analysis, cost benefit K3
analysis and capital budgeting techniques.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 - - - - - 1 - - - - 1 -
CO2 - - - - - 1 1 - - - 1 -
CO3 - - - - 1 - - - - - 2 -
CO4 - - - - 1 1 - - - - 2 -
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Geetika, Piyali Ghosh
1 Managerial Economics Tata McGraw Hill, 2015
and Chodhury
H. G. Thuesen, W. J.
2 Engineering Economy PHI 1966
Fabrycky
3 Engineering Economics R. Paneerselvam PHI 2012
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Leland Blank P.E,
1 Engineering Economy Mc Graw Hill 7TH Edition
Anthony Tarquin P. E.
2 Indian Financial System Khan M. Y. Tata McGraw Hill 2011
Engineering Economics and Donald G. Newman,
3 Engg. Press, Texas 2002
analysis Jerome P. Lavelle
Contemporary Engineering Prentice Hall of India
4 Chan S. Park 2001
Economics Ltd
SEMESTER S3/S4
Course Objectives:
1. Equip with the knowledge and skills to make ethical decisions and implement gender-sensitive
practices in their professional lives.
2. Develop a holistic and comprehensive interdisciplinary approach to understanding engineering
ethics principles from a perspective of environment protection and sustainable development.
3. Develop the ability to find strategies for implementing sustainable engineering solutions.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of ethics - Personal vs. professional ethics, Civic Virtue,
Respect for others, Profession and Professionalism, Ingenuity, diligence
and responsibility, Integrity in design, development, and research domains,
Plagiarism, a balanced outlook on law - challenges - case studies,
Technology and digital revolution-Data, information, and knowledge,
1 6
Cybertrust and cybersecurity, Data collection & management, High
technologies: connecting people and places-accessibility and social
impacts, Managing conflict, Collective bargaining, Confidentiality, Role
of confidentiality in moral integrity, Codes of Ethics.
Basic concepts in Gender Studies - sex, gender, sexuality, gender
spectrum: beyond the binary, gender identity, gender expression, gender
stereotypes, Gender disparity and discrimination in education,
employment and everyday life, History of women in Science & Technology,
Gendered technologies & innovations, Ethical values and practices in
connection with gender - equity, diversity & gender justice, Gender policy
and women/transgender empowerment initiatives.
Continuous internal evaluation will be based on individual and group activities undertaken throughout the
course and the portfolio created documenting their work and learning. The portfolio will include
reflections, project reports, case studies, and all other relevant materials.
The students should be grouped into groups of size 4 to 6 at the beginning of the semester. These
groups can be the same ones they have formed in the previous semester.
Activities are to be distributed between 2 class hours and 3 Self-study hours.
The portfolio and reflective journal should be carried forward and displayed during the 7th
Semester Seminar course as a part of the experience sharing regarding the skills developed
through various courses.
Sl. Item Particulars Group/I Marks
No. ndividua
l (G/I)
3 Activities 2. One activity* each from Module II, Module III & Module IV G 15
Total Marks 50
Evaluation Criteria:
● Depth of Analysis: Quality and depth of reflections and analysis in project reports and case
studies.
● Application of Concepts: Ability to apply course concepts to real-world problems and
local contexts.
● Creativity: Innovative approaches and creative solutions proposed in projects and reflections.
● Presentation Skills: Clarity, coherence, and professionalism in the final presentation.
Course Outcomes (COs)
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 3 3 2 2
CO2 1 3 2 3 3 2 2
CO3 3 3 2 3 2 2
CO4 1 3 3 2 3 2 2
CO5 3 3 2 3 2 2
Reference Books
Edition and
Sl. No Title of the Book Name of the Author/s Name of the Publisher
Year
2nd edition
Ethics in Engineering Practice Cambridge University
1 Caroline Whitbeck & August
and Research Press & Assessment
2011
2nd edition
Cambridge University &
3 Bert J. M. de Vries
Sustainability Science Press & Assessment December
2023
Cambridge University
4 Sustainable Engineering Bhavik R. Bakshi, 2019
Principles and Practice Press & Assessmen
M Govindarajan, S
PHI Learning Private
5 Natarajan and V S 2012
Engineering Ethics Ltd, New Delhi
Senthil Kumar
Suggested Activities/Projects:
Module-II
● Write a reflection on a local environmental issue (e.g., plastic waste in Kerala backwaters or
oceans) from different ethical perspectives (anthropocentric, biocentric, ecocentric).
● Write a life cycle analysis report of a common product used in Kerala (e.g., a coconut, bamboo
or rubber-based product) and present findings on its sustainability.
● Create a sustainability report for a local business, assessing its environmental, social, and
economic impacts
● Presentation on biodiversity in a nearby area (e.g., a local park, a wetland, mangroves, college
campus etc) and propose conservation strategies to protect it.
● Develop a conservation plan for an endangered species found in Kerala.
● Analyze the green spaces in a local urban area and propose a plan to enhance urban
ecology using native plants and sustainable design.
● Create a model of a sustainable urban landscape for a chosen locality in Kerala.
Module-III
● Study a local water body (e.g., a river or lake) for signs of pollution or natural flow disruption and
suggest sustainable management and restoration practices.
● Analyse the effectiveness of water management in the college campus and propose improvements -
calculate the water footprint, how to reduce the footprint, how to increase supply through rainwater
harvesting, and how to decrease the supply-demand ratio
● Implement a zero waste initiative on the college campus for one week and document the challenges and
outcomes.
● Develop a waste audit report for the campus. Suggest a plan for a zero-waste approach.
● Create a circular economy model for a common product used in Kerala (e.g., coconut oil, cloth etc).
● Design a product or service based on circular economy and degrowth principles and present a business
plan.
● Develop a plan to improve pedestrian and cycling infrastructure in a chosen locality in Kerala
Module-IV
● Evaluate the potential for installing solar panels on the college campus including cost-benefit analysis
and feasibility study.
● Analyse the energy consumption patterns of the college campus and propose sustainable alternatives to
reduce consumption - What gadgets are being used? How can we reduce demand using energy-saving
gadgets?
● Analyse a local infrastructure project for its climate resilience and suggest improvements.
● Analyse a specific environmental regulation in India (e.g., Coastal Regulation Zone) and its impact on
local communities and ecosystems.
● Research and present a case study of a successful sustainable engineering project in Kerala/India (e.g.,
sustainable building design, water management project, infrastructure project).
● Research and present a case study of an unsustainable engineering project in Kerala/India highlighting
design and implementation faults and possible corrections/alternatives (e.g., a housing complex with
water logging, a water management project causing frequent floods, infrastructure project that affects
surrounding landscapes or ecosystems).
SEMESTER S4
Teaching Hours/Week
0:0:3:0 ESE Marks 50
(L: T:P: R)
Course Objectives:
Familiarisation with basic Linux programming commands: ps, strace, gdb, strings,
1
objdump, nm, file, od, xxd, time, fuser, top
Use /proc file system to gather basic information about your machine:
4 Create a new process using a fork system call. Print the parent and child process IDs. Use
the pstree command to find the process tree for the child process starting from the init
process.
Write a program to add two integers (received via the command line) and compile it to an
executable named “myadder”. Now write another program that creates a new process
5
using a fork system call. Make the child process add two integers by replacing its image
with the “myadder” image using execvp system call.
Create a new process using a fork system call. The child process should print the string
“PCCSL407” and the parent process should print the string “Operating Systems Lab”.
6
Use a wait system call to ensure that the output displayed is “PCCSL407 Operating
Systems Lab”
Input a list of processes, their CPU burst times (integral values), arrival times, and
9 priorities. Then simulate FCFS, SRTF, non-preemptive priority (a larger priority number
implies a higher priority), and RR (quantum = 3 units) scheduling algorithms on the
process mix, determining which algorithm results in the minimum average waiting time
(over all processes).
Use semaphores to solve the readers-writers problem with writers being given priority
10
over readers.
Obtain a (deadlock-free) process mix and simulate the banker’s algorithm to determine a
11
safe execution sequence.
Simulate the address translation in the paging scheme as follows: The program receives
three command line arguments in the order
Simulate the FIFO, LRU, and optimal page-replacement algorithms as follows: First,
generate a random page-reference string where page numbers range from 0 to 9. Apply the
random page-reference string to each algorithm, and record the number of page faults
15
incurred by each algorithm. Assume that demand paging is used. The length of the
reference string and the number of page frames (varying from 1 to 7) are to be received as
command line arguments.
Simulate the SSTF, LOOK, and CSCAN disk-scheduling algorithms as follows: Your
program will service a disk with 5,000 cylinders numbered 0 to 4,999. The program will
generate a random series of 10 cylinder requests and service them according to each of the
16
algorithms listed earlier. The program will be passed the initial position of the disk head
(as a parameter on the command line) and will report the total number of head movements
required by each algorithm.
Course Assessment Method
(CIE: 50 marks, ESE: 50 marks)
(Continuous Assessment)
5 25 20 50
10 15 10 10 5 50
● Submission of Record: Students shall be allowed for the end semester examination only upon
submitting the duly certified record.
● Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO- PO Mapping (Mapping of Course Outcomes with Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
Text Books
Andrea Arpaci-
1 Operating Systems: Three Easy
Dusseau, Remzi CreateSpace 1/e, 2018
Pieces
Arpaci-Dusseau
Reference Books/Websites
2 The Little Book of Semaphores Allen B. Downey Green Tea Press 1/e, 2016
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://archive.nptel.ac.in/courses/106/105/106105214/
2 https://www.youtube.com/playlist?list=PLDW872573QAb4bj0URobvQTD41IV6gRkx
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
● Oral Examination: Ability to explain the experiment, results and underlying principles
during a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
Evaluation Pattern for End Semester Examination (50 Marks)
● Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
DBMS LAB
(Common to CS/CD/CR/CA/AD/AI/CB/CN/CC/CU/CI/CG)
Course Objectives:
1. To equip students with comprehensive skills in SQL, PL/SQL, and NoSQL databases.
2. To enable the learner to proficiently design, implement, and manage relational and non-
relational databases to meet diverse data management needs
Expt.
Experiments
No.
1 Design a database schema for an application with ER diagram from a problem description.
Creation of database schema - DDL (create tables, set constraints, enforce relationships,
2 create indices, delete and modify tables). Export ER diagram from the database and verify
relationships (with the ER diagram designed in step 1).
3 Database initialization - Data insert, Data import to a database (bulk import using UI and
SQL Commands).
4 Practice SQL commands for DML (insertion, updating, altering, deletion of data, and
viewing/querying records based on condition in databases).
5 Implementation of various aggregate functions, Order By, Group By & Having clause in
SQL.
6 Implementation of set operators nested queries, and join queries.
7 Practice of SQL TCL DCL commands like Rollback, Commit, Savepoint,Practice of SQL
DCL commands for granting and revoking user privileges.
8 Practice of SQL commands for creation of views and assertions.
9 Creation of Procedures, Triggers and Functions.
10 Creation of Packages and cursors.
11 Design a database application using any front-end tool for any problem selected in
experiment number 1. The application constructed should have five or more tables**.
12 Perform basic CRUD (Create, Read, Update, Delete) operations on a Cassandra table.
13 Write and execute CQL queries to retrieve specific data from Cassandra tables
14 Create a simple application using Mongodb with python
** The problem must be designed to convey the difference of NoSQL from SQL databases.
Course Assessment Method
(CIE: 50 marks, ESE: 50 marks)
5 25 20 50
● Submission of Record: Students shall be allowed for the end semester examination only upon
submitting the duly certified record.
● Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
Develop database schema for a given real world problem-domain using
CO1 K3
standard design and modeling approaches
Construct queries using SQL for database creation, interaction, modification,
CO2 K3
and updation.
Plan and implement triggers and cursors, procedures, functions, and control
CO3 K3
structures using PL/SQL
CO4 Perform CRUD operations in NoSQL Databases K3
CO5 Design database applications using front-end tools and back-end DBMS K5
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO- PO Mapping (Mapping of Course Outcomes with Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 1 3 3
CO2 3 3 3 1 3 3
CO3 3 3 3 1 3 3
CO4 3 3 3 2 3 3 3
CO5 3 3 3 2 3 3 3 3
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Fundamentals of Database Systems Elmasri, Navathe Pearson 7/e, 2017
2 Professional NoSQL Shashank Tiwari Wiley 1/e, 2011
Reference Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Database System Concepts, Sliberschatz Korth and S.
McGraw Hill, 7/e, 2017
Sudarshan
2 John Wiley &
NoSQL for Dummies Adam Fowler 1/e, 2015
Sons
NoSQL Data Models: Trends and
3 Challenges (Computer Engineering: Olivier Pivert Wiley 1/e, 2018
Databases and Big Data),
Making the Sense of NoSQL : A Dan McCreary and Ann
4 Manning 1/e, 2014
guide for Managers and Rest of us. Kelly
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
● Oral Examination: Ability to explain the experiment, results and underlying principles
during a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
● Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
COMPUTER NETWORKS
(Common to CS/CD/CM/CR/CA/AD/AI/CB/CN/CU/CI)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Overview of the Internet, Protocol layering (Book 1 Ch 1)
Application Layer: Application-Layer Paradigms, Client-server applications -
1 6
World Wide Web and HTTP, FTP. Electronic Mail, DNS. Peer-to-peer
paradigm - P2P Networks, Case study: BitTorrent (Book 1 Ch 2)
Transport Layer: Services, Protocols, UDP, TCP (Book 1 Ch 3).
Hands-on: Sockets Introduction, Elementary TCP Sockets, TCP
Client/Server Example, I/O Multiplexing: The select and poll Functions
(Book 2 Ch 3 to 6), Elementary UDP Sockets (Book 2 Ch 8), Advanced I/O
Functions (Book 2 Ch 14)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the internetworking design in terms of protocol stack and
CO1 K2
the role of various application layer protocols
Illustrate the functions of the transport layer from connectionless and
CO2 K3
connection-oriented perspectives
Identify how the network layer achieves host-to-host connectivity and
CO3 K3
caters to the diverse service requirements of the host applications
Explain the nuances of the data link layer design and demonstrate the
CO4 various data link link layer protocols K3
CO5 understand how the physical layer supports the functionalities of the K2
top layers
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3
CO2 3 2 3
CO3 3 2 2 3
CO4 3 2 3
CO5 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the
Sl. No Title of the Book Name of the Author/s Edition and Year
Publisher
Computer Networks: A Top- Behrouz A Forouzan McGraw Hill
1 SIE, 2017
Down Approach
Unix Network Programming, W. Richard Stevens,
Pearson
2 Volume 1: The Sockets Andrew M. Rudoff, Bill 3/e, 2004
Education
Networking API Fenner
Sameer Seth
TCP/IP Architecture, design,
3 and implementation in Linux M. Ajaykumar Wiley 1/e, 2008
Venkatesulu
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Computer Networking: A Top-
J. F. Kurose and K. W.
1 Down Approach Featuring Pearson Education 8/e, 2022
Ross
Internet
Computer Networks, A L. L. Peterson and B. S.
2 Morgan Kaufmann 5/e, 2011
Systems Approach Davie
No. Link ID
1 https://nptel.ac.in/courses/106/105/106105183/
SEMESTER S5
Course Objectives:
SYLLABUS
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Part A Part B Total
● 2 Questions from each ● Each question carries 9 marks.
module. ● Two questions will be given from each module, out
● Total of 8 Questions, each of which 1 question should be answered.
60
carrying 3 marks ● Each question can have a maximum of 3
subdivisions.
(8x3 =24 marks) (4x9 = 36 marks)
Bloom’s
Course Outcome Knowledge
Level (KL)
Analyze any given algorithm and express its time and space
CO1 K4
complexities in asymptotic notations.
Illustrate the operations of advanced data structures like AVL trees and
CO3 K3
Disjoint sets.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 3
CO2 3 3 3 2
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 2 2
CO6 3 3 3 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
T.H.Cormen,
1 Introduction to Algorithms C.E.Leiserson, R.L.Rivest, Prentice-Hall India 4/e, 2018
C. Stein,
Ellis Horowitz, Sartaj
Fundamentals of Computer Orient Longman
2 Sahni, Sanguthevar 2/e, 2008
Algorithms Universities Press
Rajasekaran,
Computer Algorithms,
Sara Baase and Allen Van
3 Introduction to Design and Pearson Education 3/e, 2009
Gelder
Analysis
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Design and Analysis of Michael T. Goodrich
1 Algorithms Roberto Tamassia Wiley 1/e, 2021
MACHINE LEARNING
(Common to CS/AD/CR/CA/CC/CD)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to ML :-
Machine Learning vs. Traditional Programming, Machine learning
paradigms - supervised, semi-supervised, unsupervised, reinforcement
learning.
Parameter Estimation - Maximum likelihood estimation (MLE) and
maximum aposteriori estimation (MAP), Bayesian formulation.
1 9
Supervised Learning :-
Feature Representation and Problem Formulation, Role of loss functions
and optimization
Regression - Linear regression with one variable, Linear regression with
multiple variables : solution using gradient descent algorithm and matrix
method.
Classification - Logistic regression, Naïve Bayes, KNN, Decision Trees –
2 9
ID3
Generalisation and Overfitting - Idea of overfitting, LASSO and RIDGE
regularization, Idea of Training, Testing, Validation
Evaluation measures – Classification - Precision, Recall, Accuracy, F-
Measure, Receiver Operating Characteristic Curve(ROC), Area Under
Curve (AUC).
Regression - Mean Absolute Error (MAE), Root Mean Squared Error
(RMSE), R Squared/Coefficient of Determination.
SVM – Linear SVM, Idea of Hyperplane, Maximum Margin Hyperplane,
Non-linear SVM, Kernels for learning non-linear functions
3 Neural Networks (NN) - Perceptron, Neural Network - Multilayer feed- 9
forward network, Activation functions (Sigmoid, ReLU, Tanh), Back
propagation algorithm.
Unsupervised Learning
Clustering - Similarity measures, Hierarchical Clustering - Agglomerative
Clustering, partitional clustering, K-means clustering
4 9
Dimensionality reduction - Principal Component Analysis, Multidimensional
scaling
Ensemble methods - bagging, boosting; Resampling methods -
Bootstrapping, Cross Validation. Practical aspects - Bias-Variance tradeoff.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Part A Part B Total
● 2 Questions from each ● Each question carries 9 marks.
module. ● Two questions will be given from each module, out
● Total of 8 Questions, each of which 1 question should be answered.
60
carrying 3 marks ● Each question can have a maximum of 3
subdivisions.
(8x3 =24 marks) (4x9 = 36 marks)
Bloom’s
Course Outcome Knowledge
Level (KL)
Illustrate Machine Learning concepts and basic parameter estimation
CO1 K2
methods.
CO2 Demonstrate supervised learning concepts (regression, classification). K3
CO3 Illustrate the concepts of Multilayer neural network and Decision trees K3
Describe unsupervised learning concepts and dimensionality reduction
CO4 K3
techniques
Use appropriate performance measures to evaluate machine learning
CO5 K3
models
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Introduction to Machine Learning Ethem Alpaydin MIT Press 4/e, 2020
Data Mining and Analysis:
Mohammed J. Zaki | Cambridge University
2 Fundamental Concepts and 1/e, 2016
Wagner Meira Press
Algorithms
Neural Networks for Pattern Oxford University
3 Christopher Bishop 1/e, 1998
Recognition Press
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Applied Machine Learning M Gopal McGraw Hill 2/e, 2018
Machine Learning Manaranjan Pradhan | U
2 Wiley 1/e, 2019
using Python Dinesh Kumar
Machine Learning: Theory and M.N. Murty, V.S.
3 Universities Press 1/e, 2024
Practice Ananthanarayana
No. Link ID
1 https://archive.nptel.ac.in/courses/106/105/106105152/
2 https://archive.nptel.ac.in/courses/106/106/106106139/
3 https://nptel.ac.in/courses/106106202\
SEMESTER S5
MICROCONTROLLERS
(Common to CS/CC)
Course Objectives:
1. To introduce the ARM architecture and ARM-based microcontroller architecture.
2. To impart knowledge on the hardware and software components to develop embedded systems
using STM32 microcontrollers.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
● Identify real world problems requiring hardware solutions and develop them using
peripheral devices. Some of the examples would be - Home automation, Small
home/office security system, ARM based voice response system etc.
Course Assessment Method
(CIE: 60 marks, ESE: 40 marks)
5 30 12.5 12.5 60
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
The Definitive Guide to ARM Cortex-
1 Joseph Yiu Newnes - Elsevier 3/e, 2014
M3 and Cortex-M4 Processors
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
ARM System Developer’s Andrew N. Sloss, Dominic
1 Morgan Kaufman 1/e, 2008
Guide Symes, Chris Wright
Introduction to ARM ®
3 Jonathan W. Valvano Self-Published 5/e, 2014
Cortex-M Microcontrollers
Video Links (NPTEL, SWAYAM…)
1 https://archive.nptel.ac.in/courses/106/105/106105193/
2 https://www.st.com/resource/en/datasheet/
Simulation/ Presentation
Lecture delivery Project identification Laboratory Work/ (Progress and Final
Workshops Presentations)
Group discussion Project Analysis Data Collection Evaluation
Question answer Project Milestone Reviews,
Sessions/ Analytical thinking and Feedback,
Testing
Brainstorming self-learning Project reformation (If
Sessions required)
Poster Presentation/
Guest Speakers
Case Study/ Field Video Presentation: Students
(Industry Prototyping
Survey Report present their results in a 2 to 5
Experts)
minutes video
Assessment and Evaluation for Project Activity
5 Final Presentations 5
Total 30
Course Objectives:
1. To learn the techniques to effectively plan, manage, execute, and control projects within
time and cost targets with a focus on Information Technology and Service Sector.
2. To learn agile project management techniques such as Scrum and DevOps .
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Project scheduling and feasibility study : -
Project Overview and Feasibility Studies - Identification, Market and
Demand Analysis, Project Cost Estimate, Financial Appraisal; Project
1 Scheduling - Project Scheduling, Introduction to PERT and CPM, Critical 8
Path Calculation, Precedence Relationship, Difference between PERT and
CPM, Float Calculation and its importance, Cost reduction by Crashing of
activity.
Resource Scheduling, Cost Control and Project management Features :-
Cost Control and Scheduling - Project Cost Control (PERT/Cost), Resource
2 8
Scheduling & Resource Levelling; Project Management Features - Risk
Analysis, Project Control, Project Audit and Project Termination.
Agile Project Management :-
Agile Project Management - Introduction, Agile Principles, Agile
3 9
methodologies, Relationship between Agile Scrum, Lean, DevOps and IT
Service Management (ITIL;. Other Agile Methodologies - Introduction to
XP, FDD, DSDM, Crystal.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand how effectively plan, and schedule projects within time
CO1 K2
and cost targets
Apply project estimation and evaluation techniques to real world
CO2 K3
problem
CO3 Discuss different Agile Project Methodologies K2
CO4 Apply various SCRUM practices in project management. K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 2
CO2 3 3 3 2 2
CO3 3 3 3 2 2
CO4 3 3 3 2 2
CO5 3 3 3 2 2
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Succeeding with Agile: Software
1 Mike Cohn Addison-Wesley 1/e, 2009
Development Using Scrum
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Agile Product Management with
1 Roman Pichler Addison-Wesley 1/e, 2010
Scrum
Agile Project Management with
2 Ken Schwaber Microsoft Press 1/e, 2004
Scrum
No. Link ID
1 https://archive.nptel.ac.in/noc/courses/noc19/SEM2/noc19-cs70/
2 https://www.youtube.com/watch?v=TPEgII1OilU
3 https://www.youtube.com/watch?v=7Bxdds2siU8
SEMESTER S5
ARTIFICIAL INTELLIGENCE
Course Objectives:
1. To lay a solid foundation of the important abstractions, techniques, and reasoning for
intelligent systems.
2. To enable the learners to understand the basic principles of Reinforcement Learning.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Artificial Intelligence:-
Introduction, Foundation and history of AI Agents and Environments; The
1 concept of rationality; The nature of environments, Structure of agents. 8
Problem solving Agents Well-defined problems and solutions, Formulating
problems; Example problems- vacuum world, 8-puzzle, 8-queens.
Searching:-
Depth First Search, Breadth First Search, Iterative Deepening Search.
Heuristic Search strategies - Heuristic functions, The effect of heuristic
2 10
accuracy on performance; Generate and test, Greedy best first search, A*
algorithm, Constraint satisfaction problems, Adversarial search - Games,
Optimal Decision in games, The minimax algorithm, Alpha–beta pruning.
Knowledge-Based Agents :-
The Wumpus World, Logic, Propositional Logic, Reasoning Patterns in
3 Propositional Logic, First order logic, Inference in first order logic, 8
propositional vs. first order inference, unification & lifts forward chaining,
Backward chaining.
Reinforcement Learning :- Learning from Rewards, Passive Reinforcement
Learning, Active Reinforcement Learning, Generalization in Reinforcement
4 10
Learning, Policy Search, Apprenticeship and Inverse Reinforcement
Learning, Applications of Reinforcement Learning
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Explain how intelligent agents can solve problems. K2
CO2 Use the different types of search methods to solve various problems. K3
Formulate knowledge representation and examine resolution in
CO3 K3
propositional logic and first order logic.
CO4 Utilize reinforcement learning techniques to create intelligent agents. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 2 - - - - - - - 2
CO2 3 3 3 2 - - - - - - - 2
CO3 2 2 2 2 - - - - - - - 2
CO4 3 2 2 2 - - - - - - - 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 AI – A Modern Approach Stuart Russel, Peter Norvig Pearson Education 4/e, 2021
Kevin Knight, Elaine Rich,
2 Artificial Intelligence Tata McGraw-Hill 3/e, 2009
Shivashankar B. Nair
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to Artificial
1 Intelligence and Expert Dan W. Patterson Pearson Education 1/e, 2015
Systems
Artificial Intelligence:
2 Structures and Strategies for George F. Luger Pearson Education 6/e, 2009
Complex Problem Solving
Artificial Intelligence : Making
3 Nilakshi Jain Wiley 1/e, 2019
a System Intelligent
DATA ANALYTICS
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Text Processing :-
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Part A Part B Total
● 2 Questions from each ● Each question carries 9 marks.
module. ● Two questions will be given from each module, out
● Total of 8 Questions, each of which 1 question should be answered.
60
carrying 3 marks ● Each question can have a maximum of 3 subdivisions.
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Explain the key concepts of data analytics K2
Apply appropriate techniques to convert raw data into suitable format
CO2 K3
for practical data analytics tasks
CO3 Extend the concept of association rule mining in real world scenario K3
Select appropriate clustering and classification algorithms for various
CO4 applications and extend data analytics methods to the new domains of K4
data.
CO5 Understand the basics of text analytics and text classification K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to Statistics and Christian Heumann and
1 Springer 1/e, 2016
Data Analysis Michael Schomaker
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to Information Christopher D. Manning, Cambridge
1 1/e, 2008
Retrieval Raghavan, P., Schutze, H. University Press
Charu C. Aggarwal, Cheng
2 Mining Text Data Springer 1/e, 2012
Xiang Zhai
Analytics in a Big Data World: The
Essential Guide to Data Science and Bart Baesens John Wiley
3 1/e, 2013
its Business Intelligence and
Analytic Trends
Pang-Ning Tan, Michael
Pearson
4 Introduction to Data Mining Steinbach and Vipin 1/e, 2007
Education
Kumar
No. Link ID
1 https://archive.nptel.ac.in/noc/courses/noc19/SEM1/noc19-cs15/
2 https://onlinecourses.swayam2.ac.in/cec19_cs01/preview
SEMESTER S5
DATA COMPRESSION
( Common to CS/CD/CM/CR/AD/AI/AM/CN/CI)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Basic Compression Techniques :-
Data Compression Approaches - Variable-Length Codes, Run-Length
Encoding, Space - Filling Curves, Dictionary-Based Methods, Transforms,
Quantization.
1 10
Huffman Encoding - Huffman Decoding, Adaptive Huffman Coding,
Facsimile Compression. Run Length Encoding (RLE), RLE Text
compression, Dictionary based Coding- LZ77, LZ78, LZW and Deflate: Zip
and Gzip compression.
Advanced Techniques :-
Arithmetic Coding - The Basic Idea, Implementation,Underflow; Image
Compression- Introduction, Approaches to Image Compression, History of
2 Gray Codes, Image Transforms, Orthogonal Transforms, The Discrete 10
Cosine Transform, Intermezzo: Statistical Distributions, JPEG, Human
Vision and Color, The Wavelet Transform, Filter Banks, WSQ, Fingerprint
Compression
Video Compression :-
3 Video Compression - Analog video, Digital Video, Motion Compensation. 8
MPEG standards MPEG, H.261
Audio Compression :-
Audio Compression - Companding, The Human Auditory System, Heinrich
4 8
Georg Barkhausen, Linear Prediction, µ-Law and A-Law Companding,
Shorten
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Describe the fundamental approaches in data compression techniques K2
CO2 Illustrate various classical data compression techniques K3
CO3 Illustrate various text and image compression standards K3
CO4 Describe the video compression mechanisms to reduce the redundancy in video K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 A Concise Introduction to Data Compression David Salomon Springer 1/e, 2008
2 Data compression: The Complete Reference David Salomon Springer 3/e, 2004
3 Introduction to Data Compression Khalid Sayood Morgan Kaufman 1/e, 2003
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Fractal and wavelet Image Stephen Welstead,
1 PHI 1/e, 1999
Compression techniques
2 Multimedia System Sleinreitz Springer 1/e, 2006
3 The Data Compression Book Mark Nelson, Jean-loup Gailly BPB Publications 1/e, 1996
Course Objectives:
1. To teach the concept of DFT and apply it for filtering data sequences.
2. To educate on the algorithms for complexity reduction in the computation of DFT.
3. To teach the theory of FIR and IIR filters and to design FIR filters.
4. To get exposed to the basic idea of some of the important techniques for designing
efficient VLSI architectures for DSP.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Definition of a digital signal processing system, Sampling, Sampling rate,
DFT and IDFT (Properties of DFT). Linear Convolution using Circular
Convolution, Convolution of long data sequences- Overlap add method,
1 overlap save method. Linear filtering methods based on DFT – FFT (DIT- 9
FFT only) – efficient computation of the DFT of a 2N point real sequences –
correlation – use of FFT in linear filtering and correlation, Symmetries in the
DFT
Types of transfer functions- Ideal filters, Zero phase and linear phase transfer
functions, Types of linear phase FIR transfer functions; Simple digital filters:
Simple FIR digital filters (Low pass and high pass), Simple IIR digital filters
2 (Low pass and high pass), All pass and minimum phase transfer function 8
Design of FIR filter : window based design (Rectangular, Hamming,
Hanning windows). Applications of DSP-Spectral analysis of sinusoidal
signals.
Realization structures for FIR filters- direct, cascade, parallel. IIR Filter
realization structures (Direct form I, II, cascade and Parallel and transposed
structures); Computational accuracy in DSP implementation- Number
3 9
formats for signals and coefficients in DSP systems, Dynamic range and
precision, Sources of error in DSP implementation - A/D conversion error,
DSP computational error, D/A Conversion error.
FFT and FIR Filter realization on a fixed point processor -finite wordlength
effects - Quantization, rounding and truncation, overflow and scaling.
DSP Algorithm representations, data flow, control flow, signal flow graphs,
block diagrams - Loop bound, iteration bound, critical path - Pipelining,
parallel processing, low power architectures - Retiming, folding and
unfolding techniques, applications.
Hands-on : -
● FPGA based hardware realization of the FFT algorithm, circular
4 10
convolution, IIR and FIR filter structures using iVerilog.
● To realize different DSP algorithms including basic multiply
accumulation and shifting operations on a fixed point processor.
● Analyze the effect of the finite wordlength by implementing the FFT
algorithm and FIR filters by using fixed point coefficient
representation in different formats like Q7, Q15 etc.
● Design an FIR low pass filter using MATLAB/SCILAB and check
how it filters a speech signal by recording it and playing the result.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the concept of DFT and apply it for determining the
CO1 K2
spectral information of data sequences.
CO2 Apply algorithms for complexity reduction in the computation of DFT. K3
Use the theory of FIR and IIR filters and be able to design FIR filters
CO3 K3
using the window method.
CO4 Build the IIR and FIR filter transfer functions using suitable structures K3
Identify the effect of finite wordlength on DSP algorithm
CO5 K3
implementation.
Utilize the low power architectures for implementing the DSP
CO6 K3
algorithms
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2
CO2 3 3 3 2
CO3 3 3 3 3 2
CO4 3 3 3 3 2
CO5 3 3 3 3 2
CO6 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Digital Signal Processing [Modules 1,2,3] S. Salivahanan McGraw Hill 10/e, 2019
Digital Signal Processing: A Computer -
2 Sanjit K.Mitra McGraw Hill 4/e, 2013
Based Approach [Modules 2]
VLSI Signal Processing Systems, Design
3 Keshab K. Parhi Wiley 1/e, 2007
and Implementation [Module 4]
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
John G. Prokais, Dimitris K
1 Digital Signal Processing Pearson 4/e, 2007
Manolakis
Introduction to Digital Signal
2 Johnny R Johnson Pearson 1/e, 2015
Processing
Mathematics of the Discrete
3 Fourier Transform (DFT): with Julius O. Smith III W3K Publishing 2/e, 2007
Audio Applications
Digital Signal Processing :
Nova Science
4 Fundamentals, Techniques and Juan Zhang 1/e, 2016
Publishers
Applications
Fast Fourier Transform
5 Algorithms for Parallel Daisuke Takahashi Springer 1/e,
Computers (Vol 2)
Video Links (NPTEL, SWAYAM…)
No. Link ID
1 https://archive.nptel.ac.in/courses/108/101/108101174/
2 https://methodist.edu.in/web/uploads/files/DSP%20NOTES.pdf
SEMESTER S5
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Basics of Computer graphics - Basics of Computer Graphics and its
applications. Video Display devices - LED, OLED, LCD, PDP and FED and
reflective displays. Random and Raster scan displays and systems.
1 Line and Circle drawing Algorithms - Line drawing algorithms- 10
Bresenham’s algorithm, Liang-Barsky Algorithm, Circle drawing algorithms
- Midpoint Circle generation algorithm, Bresenham’s Circle drawing
algorithm.
Geometric transformations - 2D and 3D basic transformations -
Translation, Rotation, Scaling, Reflection and Shearing, Matrix
2 representations and homogeneous coordinates. 8
Filled Area Primitives - Scan line polygon filling, Boundary filling and
flood filling.
Transformations and Clipping Algorithms - Window to viewport
3 8
transformation. Cohen Sutherland and Midpoint subdivision line clipping
algorithms, Sutherland Hodgeman and Weiler Atherton Polygon clipping
algorithms.
Three dimensional graphics - Three dimensional viewing pipeline.
Projections- Parallel and Perspective projections. Visible surface detection
algorithms- Back face detection, Depth buffer algorithm, Scan line
algorithm, A buffer algorithm.
Fundamental of Multimedia - Introduction to Multimedia, Authoring and
Tools, Graphics and Image Data Representations, Popular File Formats,
Fundamental Concepts and types of Video, Basics of Digital Audio and its
types.
4 9
Compression Methods - Lossless Compression Algorithms- Run-Length
Coding, Arithmetic Coding. Lossy Compression Algorithms- Transform
Coding. JPEG and JPEG-LS Standard Image Compression, H.261. Video
Compression Technique.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Understand the principles of computer graphics and displays K2
CO2 Illustrate line drawing, circle drawing and polygon filling algorithms K3
CO3 Illustrate 2D and 3D basic transformations and matrix representation K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Computer Graphics : Algorithms and D. P. Mukherjee,
1 PHI 1/e, 2010
Implementations Debasish Jana
Donald Hearn, M.
2 Computer Graphics with OpenGL Pauline Baker and PHI 4/e, 2013
Warren Carithers
Ze-Nian Li and Mark S.
3 Fundamentals of Multimedia Pearson 2003
Drew
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Jiun-Haw Lee, I-Chun
Introduction to Flat Panel
1 Cheng, Hong Hua, Shin- Wiley 1/e, 2020
Displays
Tson Wu
Computer Graphics and
2 ITL ESL Pearson 1/e, 2013
Multimedia
Zhigang Xiang and Roy
3 Computer Graphics McGraw Hill 2/e, 2000
Plastock
Principles of Interactive William M. Newman and
4 McGraw Hill 1/e, 2001
Computer Graphics Robert F. Sproull
Procedural Elements for
5 David F. Rogers McGraw Hill 1/e, 2017
Computer Graphics
Donald D Hearn, M Pauline
6 Computer Graphics Pearson 2/e, 2002
Baker
Web Based Technologies and Multimedia Applications by Prof. P. V. Suresh at Indira Gandhi
4
National Open University https://onlinecourses.swayam2.ac.in/nou20_cs05/preview
SEMESTER S5
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction – The impact of hardware and software technology trends Self
review – Instruction set Architecture, Memory addressing, addressing modes
Class of Computers, Concept of Computer Hardware and Organization (P15,
5th Edition) Measuring, Reporting and Summarizing Performance,
Benchmarks – Desktop and Server Amdahl’s Law, Processor Performance
Equation
1
_____________________________________________________
Beyond the books – Visit www.spec.org. Explore the High Performance
Computing benchmarks and compare the results submitted by different
vendors for the same benchmark. Are you able to appreciate the need for
benchmarks to compare performance? What are retired benchmarks? Can
you write a paper and publish results based on a retired benchmark?
Review the basic Concepts of Parallel Processing and Pipelining Instruction
2 Level Parallelism, data dependencies and hazards Different types of
dependences, Compiler Techniques for ILP, Branch Prediction – Correlating
branch predictor Dynamic Scheduling – Idea, Introduction to Tomasulo’s
scheme. Register Renaming Hardware Speculation, Reorder Buffers
Multiple issue and static scheduling, VLIW
Data Level Parallelism. Vector Processors – How do they work, Memory
Banks, Stride, Scatter Gather. SIMD-comparison with vector GPU,
Comparison of loops in C vs CUDA NVIDIA GPU Memory structure
Vector Processor vs GPU, Multimedia SIMD computers vs GPU
3 Multiprocessor Architecture, Centralized shared memory architecture Cache
coherence and snooping protocol (Implementation details – not required).
Performance of Symmetric Shared-Memory Processors. Distributed Shared
Memory and Directory based protocol – basics. Synchronization – Basic
Hardware Primtives. Memory Consistency Models – Sequential and relaxed
Warehouse Scale Computers – Goals and requirements. Programming
frameworks for Batch processing – Map reduce and Hadoop Computer
Architecture of Warehouse-scale computers Moore’s Law, Dennard Scaling,
Dark Silicon and the transition towards Heterogeneous Architectures
Asymmetric multi-core architecture – Static and Dynamic (Overall idea,
4 example processors) Functional Heterogeneous Multicore architecture –
GPUs, Accelerators, Reconfigurable Computing Beyond the textbook –
Identify the processor used in your PC and mobile phone. Study about its
architecture, is it homogeneous or heterogeneous, does it use GPUs, what
information can you gather about it from the manufacturer’s website –
Discuss in the class
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Enumerate the different classes of computers and where they are used
CO1 K2
in everyday life.
Compute the effect of hardware/software enhancements on the speedup
CO2 K3
of a processor using Amdahl’s law.
Interpret possible dependencies that can cause hazards in a given block
CO3 K3
of code.
Summarize different strategies followed to ensure Instruction Level
CO4 K2
Parallelism.
Compare different strategies followed to ensure Instruction Level
CO5 Parallelism and different strategies followed to ensure Data K3
Parallelism.
Illustrate the need for memory consistency models and cache
CO6 K3
coherence protocols and explain the principle behind it.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
CO6 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Computer architecture: A Quantitative Hennessy, J. and
1 Morgan Kaufman 5/e, 2012
Approach. Patterson, D
The Dark Side of Silicon: Energy
2 Efficient Computing in the Dark Kanduri, Anil, et al. Springer 1/e, 2017
Silicon Era
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Gérard Blanchet
1 Computer Architecture Wiley 1/e, 2013
Bertrand Dupouy
2 Advanced Computer Architectures Sajjan C Shiva Taylor & Fancis 1/e, 2018
Computer Architecture
3 Charles Fox no starch press 1/e, 2024
No. Link ID
1 https://archive.nptel.ac.in/courses/106/103/106103206/
SEMESTER S5
DATA MINING
(Common to CS/CD/CM/CA/AM)
Course Objectives:
1. To provide a thorough understanding of the key processes and concepts involved in data
mining and data warehousing within application domains
2. To enable students to understand the different data pre-processing techniques, fundamentals
and advanced concepts of classification, clustering, association rule mining, text mining and
web mining, and apply these techniques in real-world scenarios
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Data Preprocessing :-
2 Data Preprocessing - Need of data preprocessing, Data Cleaning- Missing 9
values, Noisy data, Data Integration and Transformation
Data Reduction - Data cube aggregation, Attribute subset selection,
Dimensionality reduction, Numerosity reduction, Discretization and concept
hierarchy generation.
Web Mining - Web Content Mining, Web Structure Mining- Page Rank, Web
4 Usage Mining- Preprocessing, Data structures, Pattern Discovery, 10
Pattern Analysis
Text Mining - Text Data Analysis and information Retrieval, Basic measures
for Text retrieval, Text Retrieval methods, Text Indexing Technique
Students must be asked to identify problems involving large datasets and identify the right solution
from the concepts already learned. A comparison of the results with a similar approach also need to be
performed to assess the Knowledge Level 5.
End Semester Examination Marks (ESE):
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the key process of data mining and data K2
CO1
warehousing concepts in application domains.
Apply appropriate pre-processing techniques to convert raw data into K3
CO2
suitable format for practical data mining tasks
Illustrate the use of classification and clustering algorithms in various K3
CO3
application domains
CO4 Comprehend the use of association rule mining techniques K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2
CO2 3 3 3 3 2 2
CO3 3 3 3 3 2 2
CO4 3 3 3 3 2 2
CO5 2 2 2
Text Books
Edition and
Sl. No Title of the Book Name of the Author/s Name of the Publisher
Year
Data Mining Concepts and Jaiwei Han, Micheline
1 Elsevier 3/e, 2006
Techniques Kamber
Reference Books
Edition and
Sl. No Title of the Book Name of the Author/s Name of the Publisher
Year
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Maximum Flow Algorithms - Dinic's Algorithm, Push-Relabel Algorithm.
Applications - network bandwidth allocation, data center resource
management.
Minimum Cost Flow - Cycle-Canceling Algorithm, Capacity Scaling
Algorithm. Applications - transportation logistics, network routing with cost
constraints.
1 9
Assignments:
1. Network Bandwidth Allocation - Optimize bandwidth allocation in a
communication network using Dinic's Algorithm.
Implement Dinic's Algorithm to solve a network flow problem
where you are given a communication network represented as a
directed graph with capacities on edges. Your goal is to maximize
the flow from a source node to a sink node. Use a real-world
network dataset (e.g., a telecommunications network with nodes and
link capacities).
2. Logistics Optimization - Optimize the transportation of goods in a
supply chain network using the Capacity Scaling Algorithm.
Use the Capacity Scaling Algorithm to address a logistics problem
where you need to minimize transportation costs in a supply chain
network. The network is represented as a graph where nodes
represent locations (warehouses, distribution centers, etc.), and edges
represent transportation routes with associated costs. Use a dataset
representing a supply chain network with nodes, edges, and costs.
Strongly Connected Components (SCC) - Tarjan's Algorithm, Kosaraju's
Algorithm. Applications - analyzing web page link structures, understanding
connected components in social networks.
Dynamic Graph Connectivity - Dynamic connectivity algorithms, Eulerian
and Hamiltonian paths. Applications - real-time network monitoring,
dynamic route planning.
Assignments:
1. Web Page Link Analysis - Objective: Analyze strongly connected
components (SCC) in a web graph using Tarjan's Algorithm.
Implement Tarjan's Algorithm to find SCCs in a web graph where
nodes represent web pages and edges represent hyperlinks. SCCs
2 9
help in understanding the structure of the web and identifying
clusters of interconnected pages. Use a real-world web graph dataset
with nodes and edges.
2. Dynamic Route Planning - Manage and analyze routes in a
transportation network that evolves over time using dynamic
connectivity algorithms.
Implement dynamic connectivity algorithms to handle a
transportation network where edges and nodes may be added or
removed over time. The goal is to maintain and update the
connectivity information efficiently. Use a dataset representing a
transportation network with dynamic updates.
Graph Matching - Edmonds' Algorithm for finding maximum matchings.
Applications - job assignment, network design.
3 9
Graph Coloring - Colorings for special classes of graphs (e.g., planar graphs,
interval graphs). Applications - frequency assignment in wireless networks,
scheduling problems
Assignments:
1. Job Assignment Optimization - Solve job assignment problems using
Edmonds' Algorithm.
Implement Edmonds' Blossom Algorithm to address job assignment
problems where you need to match workers to jobs in a way that
maximizes the overall efficiency or minimizes the cost. Use a dataset
with job assignments and associated costs or efficiencies.
2. Frequency Assignment - Allocate frequencies in wireless
communication systems using graph coloring techniques.
Apply graph coloring techniques to allocate frequencies to
transmitters in a wireless communication network to avoid
interference. The goal is to minimize the number of frequencies used
while ensuring that adjacent transmitters do not use the same
frequency. Use a dataset representing a network of transmitters with
potential interference.
Graph Partitioning and Community Detection - Kernighan-Lin Algorithm,
Spectral Partitioning. Applications - social network community detection,
large-scale data clustering.
Parameterized Algorithms for Graph Problems - Fixed-parameter tractability
for vertex cover, feedback vertex set. Applications - network security,
bioinformatics.
Assignments:
1. Social Network Community Detection - Detect communities in a
social network using the Kernighan-Lin Algorithm.
Apply the Kernighan-Lin Algorithm to detect communities in a
4 social network where nodes represent individuals and edges 9
represent relationships. The goal is to find clusters of highly
interconnected individuals. Use a social network dataset with nodes
and edges representing social connections.
2. Network Security Analysis - Identify critical nodes in a network
using parameterized algorithms to assess network security.
Use parameterized algorithms to identify critical nodes and
vulnerabilities in a network. These nodes are crucial for the
network's connectivity, and their removal would impact the
network's security and robustness. Use a dataset representing a
network with nodes and edges, along with possible vulnerabilities.
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Develop and implement advanced algorithms for network flow, graph
CO1 connectivity, and matching, and evaluate their performance on real- K3
world datasets.
Analyze and compare the efficiency and effectiveness of various graph
CO2 algorithms, including those for network optimization and community K4
detection.
Apply advanced graph algorithms to solve practical problems such as
CO3 network optimization, job assignment, and frequency allocation, K3
demonstrating their utility in real-world scenarios.
Formulate and solve complex graph-related problems using appropriate
CO4 algorithms, including those for graph traversal, minimum spanning K5
trees, and network security analysis.
Critically assess the strengths and limitations of different graph
CO5 algorithms, and effectively communicate findings and K5
recommendations through detailed reports and presentations.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 2
CO2 3 3 3 3 2
CO3 3 3 3 3 2
CO4 3 3 3 3 2
CO5 3 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Thomas H. Cormen,
Charles E. Leiserson, The MIT Press
1 Introduction to Algorithms 4/e 2023
Ronald L. Rivest and Cambridge
Clifford Stein
Robert Sedgewick and
2 Algorithms Addison-Wesley 4/e, 2023
Kevin Wayne
Cambridge University
3 Graph Algorithms Shimon Even 2/e, 2011
Press
4 Graph Theory Reinhard Diestel Springer 4/e, 2010
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Mingyu Xiao and Ton Springer Verlag,
1 A Guide to Graph Algorithms 1st, 2022
Kloks Singapore;
Albert-László
Cambridge University
2 Network Science Barabási and Márton 1st, 2016
Press
Pósfai
Springer-Verlag New
3 Modern Graph Theory Bela Bollobas 1st, 1998
York Inc
Ravindra Ahuja, Thomas
Network Flows: Theory,
4 Magnanti, and James Pearson 1st, 1993
Algorithms, and Applications
Orlin
5 Introduction to Graph Theory Douglas B. West Pearson 2nd, 2020
Modern Graph Theory
Algorithms with Python:
Harness the power of graph Colleen M Farrelly and
6 Packt Publishing 2024
algorithms and real-world Franck Kalala Mutombo
network applications using
Python
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://onlinecourses.nptel.ac.in/noc21_cs48/preview
2 https://onlinecourses.nptel.ac.in/noc21_cs48/preview
3 https://onlinecourses.nptel.ac.in/noc21_cs48/preview
4 https://onlinecourses.nptel.ac.in/noc21_cs48/preview
SEMESTER S5
NETWORKS LAB
(Common to CS/CD/CM/CB/CU/CI)
Course Objectives:
1. To provide hands-on experience in network programming using Linux System calls and
network monitoring tools.
2. To comprehend the implementation of network protocols and algorithms, and configuration
of network layer services using network simulators.
Expt.
Experiments
No.
Warm up
Familiarize Linux networking commands - ifconfig, ifplugstatus, iftop, ping, ip,
1
traceroute, mtr, netstat, whois, nmap, nmcli, speedtest-cli, bmon, nslookup, tcpdump
Wireshark based
Start your web browser and clear the browser's cache memory. Open Wireshark and start
capturing. Then visit any webpage of your choice. Type http in the filter field of the
Wireshark and click Apply so that only HTTP messages are displayed. After enough
packets have been captured, select the Capture from the pull-down menu and select Stop
to stop capturing.
Using the captured information, determine the following:
2 (a) the source IP address and destination IP address of the first GET message
(b) the medium format, the language, the encoding, and the character set that the
client can accept. (Use the first GET message)
(c) the URL of the website and the user agent (Use the first GET message)
(d) the source IP address and destination IP address of the first response message
(e) the status codes for the first response message.
(f) when the HTML file that you are retrieving was last modified at the server
(g) value of the content-length field of the first response message
(h) how long it took from the time the GET message was sent until the response
message was received.
(Use the timestamps of a GET message and that of the corresponding response
message. By default, the time column's value is the amount of time in seconds
since Wireshark tracing began.)
(i) the HTTP version of your browser.
Compose an e-mail and address it to yourself, but do not send it yet. Open the Wireshark
and start capturing. Go to your e-mail user agent and send the e-mail. In the Wireshark
window, type smtp in the filter field and click Apply. Stop capturing and save the
captured file.
Using the captured information, answer the following:
(a) All SMTP packets have the same two IP addresses. Which one is the IP address of
your computer? Which host does the other IP address represent?
3
(b) All SMTP packets have the same two port numbers. Which one is the port number
of the SMTP client process? In which range is the client port number?
(c) What is the port number of the SMTP server process?
(d) Examine the SMTP commands or SMTP response codes in each SMTP packet
and write down their meanings.
(e) There is an IMF packet that is encapsulated inside an SMTP packet. What is the
content of this packet?
First, clear the DNS record from the cache memory of your computer. For this, use
ipconfig/flushdns on Windows or systemd-resolve --flush-caches on Linux. Next, clear
your browser's cache memory. Open the Wireshark and start capturing. In your browser
visit your college website. Wireshark starts to capture packets. Type dns in the filter field
and press Apply so that only DNS messages are displayed. Stop capturing and save the
captured file.
Using the captured information, answer the following questions:
(a) Locate the first DNS query message resolving your college website. What is the
4
packet number (This “packet number” is assigned by Wireshark for listing
purposes only; it is NOT a packet number contained in any real packet header.) in
the trace for the DNS query message?
(b) Is this query message sent over UDP or TCP?
(c) Now locate the corresponding DNS response to the initial DNS query. What is the
packet number in the trace for the DNS response message? Is this response
message received via UDP or TCP?
(d) What are the source and destination port numbers for the DNS query message?
(e) What are the source and destination port numbers for the DNS response message?
(f) To what IP address is the DNS query message sent?
(g) What is the query message ID number? What is the response message ID number?
What is the purpose of this field?
(h) What is the length of the flag field in a DNS message?
(i) Which bit in the flag field determines whether the message is a query or a
response?
(j) Which bits are used only in the response message? What is the function of these
bits in the response message?
(k) How many question records, answer records, authority records, and additional
records are present in the query message?
(l) How many question records, answer records, authority records, and additional
records are present in the response message?
Socket programming based
Client-Server communication using TCP:- The client inputs an integer N and creates a
square matrix of order N by populating the matrix with random numbers in the range
5 [1,50]. It then sends the matrix to the server which identifies the matrix type (upper
triangular, lower triangular, diagonal). The server then informs the type (as a string) to the
client which it prints.
Client-Server communication using UDP:- You are very good at communicating in the
“new generation” English language with all sorts of abbreviations like tbh, ig, etc. Now
design a client-server application as follows: The client inputs a new-generation English
sentence from the user and sends it to the server. The server then translates the received
sentence to formal English and sends the translated sentence back to the client which it
prints.
Sample string sent to the server
6
Really idc about this stupid server as it is of no use irl but atm, I will design one, tbf to the
professor.
Translated string sent back to the client
Really I don't care about this stupid server as it is of no use in real life but at the moment, I
will design one, to be fair to the professor.
You may consider only the following abbreviations: tbh, ig, tbf, atm, irl, lol, asap, omg,
ttyl, idk, nvm
7 Implement a multi-user chat server using TCP as the transport layer protocol.
Implement a concurrent Time Server application using UDP to execute the program at a
8
remote server. The client sends a time request to the server which sends its system time
back. The client then displays the received time value.
Develop a concurrent file server that will provide the file requested by the client if it
exists. If not, the server sends an appropriate message to the client. The server should also
9
send its process ID (PID) to clients for displaying along with the file contents or with the
message.
10 Develop a packet-capturing application using raw sockets.
Cisco’s Packet tracer based
Familiarizing router commands
(a) Knowing the current mode (user or privileged), switching to privileged mode
(b) Switching to configuration mode
(c) Obtaining router information such as type, OS, memory stats, interface details etc.
(d) Viewing the status of any routing protocols currently configured
(e) Showing the routing table
(f) Saving the running configuration
11
(g) Viewing the command history
(h) Viewing the router clock
(i) Viewing the list of hosts
(j) Displaying the statistics for all the interfaces (Both detailed and brief views)
(k) Knowing the controller type (DTE or DCE)
(l) Configuring serial and ethernet interfaces - enabling the interface, setting IP
address, mask, and clock rate
Figure 1: A sample network along with the interface addresses (all interfaces use a /24 mask)
Set up static routing for the network shown in Figure 1. Once the routes are set up, display
12
the routing table and verify the connectivity using ping.
Implement RIPv2 routing for the network shown in Figure 1. Once the routes are set up,
13
display the routing table and verify the connectivity using ping.
Implement OSPF routing for the network shown in Figure 1. Once the routes are set up,
14
display the routing table and verify the connectivity using ping.
You are the network administrator of your college. A small portion of your campus
network is shown in Figure 2. You want to allow only Host_B to communicate with the
15 network 172.16.10.0. Verify your settings by the following checks:
(a) Pinging Host_A from Host_B
(b) Pinging Host_A from Lab_B and Lab_C
5 25 20 50
End Semester Examination Marks (ESE):
● Submission of Record: Students shall be allowed for the end semester examination only upon
submitting the duly certified record.
● Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the working of application layer protocols by analyzing the
CO1 pertinent headers in actual data packets captured using network monitoring K3
tools.
Exploit the client server paradigm to develop real time networking
CO2 K3
applications using transport layer protocols.
CO3 Employ IPv4 and IPv6 addressing, subnetting to efficiently design networks. K3
CO4 Simulate core networking concepts using a network simulator. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3 3
CO2 3 3 3 3 2 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3 3
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Unix Network Programming, W. Richard Stevens,
1 Volume 1: The Sockets Andrew M. Rudoff, Bill Pearson Education 3/e, 2004
Networking API Fenner
CCNA Cisco certified network
2 associate study guide Exam Todd Lammle Wiley 6/e, 2007
640-802 6
Beej's Guide to Network
Brian "beej Jorgensen" Amazon Digital
3 Programming: using Internet 2019
Hall Services
Sockets
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Computer Networks: A Top-
1 Behrouz A Forouzan McGraw Hill SIE, 2017
Down Approach
Computer Networking: A Top-
J. F. Kurose and K. W.
2 Down Approach Featuring Pearson Education 8/e, 2022
Ross
Internet
No. Link ID
1 https://nptel.ac.in/courses/106106091
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
● Oral Examination: Ability to explain the experiment, results and underlying principles
during a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
● Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
Course Objectives:
1. To give the learner a practical experience of the various machine learning techniques and be
able to demonstrate them using a language of choice.
Expt.
Experiments
No.
Implement linear regression with one variable on the California Housing dataset to predict
housing prices based on a single feature (e.g., the average number of rooms per dwelling).
Tasks:
● Load and preprocess the datase.
1
● Implement linear regression using both gradient descent and the normal equation.
● Evaluate the model performance using metrics such as Mean Squared Error
(MSE) and R-squared.
● Visualize the fitted line along with the data points.
Implement polynomial regression on the Auto MPG dataset to predict miles per gallon
(MPG) based on engine displacement. Compare polynomial regression results with linear
regression.
Tasks:
2 ● Load and preprocess the dataset.
● Implement polynomial regression of varying degrees.
● Compare the polynomial regression models with linear regression using metrics
such as MSE and R-squared.
● Visualize the polynomial fit.
Implement Ridge and Lasso regression on the Diabetes dataset. Compare the performance
3 of these regularized models with standard linear regression.
Tasks:
● Load and preprocess the dataset.
● Implement Ridge and Lasso regression.
● Tune hyperparameters using cross-validation.
● Compare performance metrics (MSE, R-squared) with standard linear regression.
Estimate the parameters of a logistic regression model using MLE and MAP on the Breast
Cancer Wisconsin dataset. Compare the results and discuss the effects of regularization.
Tasks:
● Load and preprocess the dataset.
4 ● Implement logistic regression with MLE.
● Apply MAP estimation with different regularization priors (L1 and L2
regularization).
● Compare the performance and parameter estimates with MLE and MAP.
Use MLE and MAP to estimate the parameters of a multinomial distribution on the 20
Newsgroups dataset. Explore the impact of different priors on the estimation.
Tasks:
5 ● Load and preprocess the dataset.
● Implement MLE for multinomial distribution parameter estimation.
● Apply MAP estimation with various priors (e.g., Dirichlet priors).
● Compare results and evaluate the effect of different priors.
Implement a logistic regression model to predict the likelihood of a disease using the Pima
Indians Diabetes dataset. Compare the performance with and without feature scaling.
Tasks:
6 ● Load and preprocess the Pima Indians Diabetes dataset.
● Implement logistic regression for binary classification.
● Evaluate model performance with and without feature scaling.
● Analyze metrics such as accuracy, precision, recall, and F1-score.
Implement a Naïve Bayes classifier to categorize text documents into topics using the 20
Newsgroups dataset. Compare the performance of Multinomial Naïve Bayes with
Bernoulli Naïve Bayes.
Tasks:
● Load and preprocess the 20 Newsgroups dataset.
7
● Implement Multinomial Naïve Bayes and Bernoulli Naïve Bayes classifiers.
● Evaluate and compare the performance of both models using metrics such as
accuracy and F1-score.
● Discuss the strengths and weaknesses of each Naïve Bayes variant for text
classification.
Implement the K-Nearest Neighbors (KNN) algorithm for image classification using the
Fashion MNIST dataset. Experiment with different values of K and analyze their impact
on model performance.
Tasks:
8 ● Load and preprocess the Fashion MNIST dataset.
● Implement KNN for multi-class classification.
● Experiment with different values of K and evaluate performance.
● Discuss the impact of different K values on model accuracy and computational
efficiency.
Implement a Decision Tree classifier using the ID3 algorithm to segment customers based
on their purchasing behavior using the Online Retail dataset. Analyze the tree structure
and discuss the feature importance.
Tasks:
9
● Load and preprocess the Online Retail dataset.
● Implement Decision Tree using the ID3 algorithm.
● Visualize the decision tree and analyze feature importance.
● Discuss how the tree structure helps in understanding customer behavior.
Implement and compare Logistic Regression and Decision Trees on the Adult Income
dataset for predicting income levels. Evaluate both models based on performance metrics
and interpretability.
Tasks:
10 ● Load and preprocess the Adult Income dataset.
● Implement both Logistic Regression and Decision Trees.
● Compare the models based on metrics such as accuracy, precision, recall, and F1-
score.
● Discuss the interpretability of both models and their suitability for the dataset.
Implement a Linear Support Vector Machine (SVM) to classify the Iris dataset. Visualize
the decision boundary and discuss how the margin is determined.
Tasks:
● Load and preprocess the Iris dataset.
11
● Implement a Linear SVM for binary classification (e.g., classify Setosa vs. Non-
Setosa).
● Visualize the decision boundary and margin.
● Discuss the concept of the margin and how it influences classification.
Implement and compare the performance of SVM classifiers with linear, polynomial, and
12 RBF kernels on the Fashion MNIST dataset. Analyze the advantages and disadvantages of
each kernel type.
Tasks:
● Load and preprocess the Fashion MNIST dataset.
● Implement SVM with linear, polynomial, and RBF kernels.
● Compare the classification performance for each kernel.
● Discuss the strengths and weaknesses of each kernel type.
Implement and train a Multilayer Feed-Forward Network (MLP) on the Wine Quality
dataset. Experiment with different numbers of hidden layers and neurons, and discuss how
these choices affect the network’s performance.
Tasks:
13 ● Load and preprocess the Wine Quality dataset.
● Design and implement an MLP with varying architectures (different hidden layers
and neurons).
● Train and evaluate the network.
● Discuss the impact of architecture choices on performance.
Implement and compare the performance of a neural network using different activation
functions (Sigmoid, ReLU, Tanh) on the MNIST dataset. Analyze how each activation
function affects the training process and classification accuracy.
Tasks:
14
● Load and preprocess the MNIST dataset.
● Implement neural networks using Sigmoid, ReLU, and Tanh activation functions.
● Train and evaluate each network.
● Compare training times, convergence, and classification accuracy.
Implement and perform hyperparameter tuning for a neural network on the Fashion
MNIST dataset. Experiment with different learning rates, batch sizes, and epochs, and
discuss the impact on model performance.
Tasks:
15
● Load and preprocess the Fashion MNIST dataset.
● Experiment with different hyperparameters (learning rate, batch size, epochs).
● Train and evaluate the network.
● Discuss how hyperparameter choices affect model performance.
Implement and compare hierarchical (agglomerative) and partitional (K-means) clustering
algorithms on the Mall Customers dataset. Discuss the strengths and weaknesses of each
method based on clustering results and evaluation metrics.
16 Tasks:
● Load and preprocess the Mall Customers dataset.
● Apply both hierarchical (agglomerative) and K-means clustering.
● Compare results using metrics such as inertia, silhouette score, and clustering
visualization.
● Discuss the advantages and disadvantages of each clustering method.
Implement and apply K-means clustering to the Digits dataset. Experiment with different
numbers of clusters and evaluate the clustering results using metrics such as inertia and
silhouette score. Analyze how the choice of K affects clustering performance.
Tasks:
17
● Load and preprocess the Digits dataset.
● Implement K-means clustering with various numbers of clusters.
● Evaluate clustering performance using inertia and silhouette score.
● Analyze the impact of the number of clusters on clustering quality.
Implement bootstrapping and cross-validation on the Iris dataset. Compare the model
performance metrics (e.g., accuracy, F1-score) obtained using these resampling methods.
Discuss the advantages and disadvantages of each method.
Tasks:
18 ● Load and preprocess the Iris dataset.
● Implement bootstrapping to generate multiple samples and evaluate the model.
● Implement k-fold cross-validation and evaluate the model.
● Compare the performance metrics and discuss the pros and cons of each
resampling method.
Implement bagging and boosting ensemble methods on the Titanic dataset. Compare the
performance of both methods in terms of accuracy, precision, recall, and F1-score.
Discuss how each method improves model performance and their respective strengths and
weaknesses.
Tasks:
● Load and preprocess the Titanic dataset.
19
● Implement bagging using a base classifier (e.g., decision tree) and evaluate
performance.
● Implement boosting using a boosting algorithm (e.g., AdaBoost) and evaluate
performance.
● Compare performance metrics and discuss the strengths and weaknesses of each
method.
Investigate the bias-variance tradeoff using polynomial regression on the Boston Housing
dataset. Plot the training and validation errors for various polynomial degrees and discuss
the tradeoff between bias and variance.
20
Tasks:
● Load and preprocess the Boston Housing dataset.
● Implement polynomial regression with varying degrees.
● Plot training and validation errors for each degree.
● Discuss the bias-variance tradeoff and its impact on model performance.
5 25 20 50
● Endorsement by External Examiner: The external examiner shall endorse the record
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to Machine
1 Ethem Alpaydin MIT Press 4/e, 2020
Learning
Machine Learning Manaranjan Pradhan | U
2 Wiley 1/e, 2019
using Python Dinesh Kumar
Machine Learning: Theory and M.N. Murty, V.S.
3 Universities Press 1/e, 2024
Practice Ananthanarayana
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Data Mining and Analysis:
Mohammed J. Zaki | Cambridge University
1 Fundamental Concepts and 1/e, 2016
Wagner Meira Press
Algorithms
Neural Networks for Pattern Oxford University
2 Christopher Bishop 1/e, 1998
Recognition Press
No. Link ID
1 https://archive.nptel.ac.in/courses/106/105/106105152/
2 https://archive.nptel.ac.in/courses/106/106/106106139/
3 https://nptel.ac.in/courses/106106202
Continuous Assessment (25 Marks)
1. Preparation and Pre-Lab Work (7 Marks)
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
● Oral Examination: Ability to explain the experiment, results and underlying principles
during a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
Evaluation Pattern for End Semester Examination (50 Marks)
1. Procedure/Preliminary Work/Design/Algorithm (10 Marks)
● Setup and Execution: Proper setup and accurate execution of the experiment or programming task.
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
Teaching Hours/Week
3:1:0:0 ESE Marks 60
(L: T:P: R)
Credits 4 Exam Hours 2 Hrs 30 Min.
Course Objectives:
2. To introduce compiler construction tools like Lex and YACC and use them in lexical analysis
and parsing.
SYLLABUS
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Use lexical analysis techniques to build a scanner for a given language
CO1 K3
specification. (Cognitive Knowledge Level: Apply)
Construct parse trees for input programs using parsing algorithms and
CO2 detect syntactic errors. K3
(Cognitive Knowledge Level: Apply)
Develop semantic analysis techniques to check program correctness.
CO3 K3
(Cognitive Knowledge Level: Apply)
Build intermediate code representations by applying intermediate code
CO4 K3
generation techniques. (Cognitive Knowledge Level: Apply)
Optimize generated code using code optimization strategies to improve
CO5 K3
performance. (Cognitive Knowledge Level: Apply)
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 2
CO2 3 3 3 3 2
CO3 3 3 3 3 2
CO4 3 3 3 3 2
CO5 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Engineering a Compiler Keith D. Cooper, Linda Torczon Elsevier Science 3/e, 2023
John R. Levine, Tony Mason,
2 Lex and YACC O’ Reily 2/e, 1992
Doug Brown
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
Compilers – Principles Aho A.V., Ravi Sethi
1 Addison Wesley, 2/e, 2010.
Techniques and Tools and D. Ullman.
Compiler Construction -
2 Kenneth C Louden Thomson Learning 1/e, 2007
Principles and Practice
Prentice-Hall
3 Compiler Design in C Allen Holub 1/e, 1990
software series
Modern Compiler Cambridge
4 Andrew W. Appel 2/e, 2004
Implementation in C University Press
GAEST203
Prerequisites (if any) PBCST404 Course Type Theory
PCCST403
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Distributed System Models and Enabling Technologies:-
The age of internet computing:- – High performance and high throughput
computing, Centralized, Parallel, Distributed and Cloud Computing. Design
objectives of HPC and HTC. IoT and Cyber Physical systems.
1 7
Technologies for Network-Based systems:- Multicore CPUs and
Multithreading Technologies. GPU Computing. Virtual Machines.
System models for distributed and cloud computing:- Clusters, Grids,
P2P Systems, Clouds.
Computer Clusters :-
Clustering for massive parallelism:- Design objectives, Design Issues –
Ensuring high availability, Cluster families. Cluster Architecture. GPU
Clusters – Components.
2 Computer Clusters – Design principles – Single System Image features. 11
High availability through redundancy. Fault tolerant cluster configurations,
checkpoint and recovery techniques.
Cluster Job and Resource Management:- – Job Scheduling methods, Job
management system – administration, job types, migration schemes.
Virtualization:- Introduction, Virtualization at different levels and their
comparison. VMM design requirements, OS level virtualization.
3 Virtualization structures and mechanisms. CPU, Memory and I/O 9
Virtualization. Virtual clusters and resource management. Live VM
migration steps, migration of memory, files and network resources.
Cloud Computing, Microservices and Containers:-
Cloud Computing and Service models:- Private, Public and Hybrid clouds.
Cloud Design objectives and Cost Model. Infrastructure-as-a-Service,
Platform-as-a-Service, Software-as-a-Service.
Microservices:- – Introduction, advantages and disadvantages. Interprocess
4 9
Communication – Types of interactions, Protocol, Standard and Message
Format, Discovery Service, API Gateway, Service Registry
Containers – Comparison of Virtual Machines and Containers. Introduction
to Docker. Case Study - Docker Containers – Architecture, Components,
Examples.
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Illustrate the key enabling technologies for network-based systems,
including multicore CPUs, multithreading, GPU computing, and
CO1 K3
virtualization, and how these technologies contribute to the
performance and efficiency of distributed systems.
Use computer cluster architectures, ensuring high availability, fault
tolerance, and massive parallelism. They will also learn to implement
CO2 K4
effective job and resource management strategies within cluster
environments.
Explain various levels of virtualization, including CPU, memory, and
CO3 I/O virtualization, and understand the design requirements and K2
mechanisms of Virtual Machine Monitors (VMMs).
Articulate the differences between private, public, and hybrid cloud
CO4 models, and understand the design objectives and cost considerations K4
associated with different cloud models.
Explain microservices architecture, its advantages and disadvantages,
and the principles of interprocess communication. They will also learn
CO5 about the role of containers in modern computing, with a specific focus K3
on Docker, including its architecture, components, and practical
applications through case studies.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Distributed and Cloud
Computing: From Parallel Kai Hwang,Geoffrey C.
1 Morgan Kaufmann 1/e, 2013
Processing to the Internet of Fox, Jack Dongarra
Things
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Patterns of Distributed
1 Unmesh Joshi Pearson Education 1/e, 2024
Systems
Cluster Computing, Grid
2 Computing, Cloud and Deepa Kalavikatte DSK Publisher 1/e, 2020
Virtualization
Cloud and Distributed
Rajiv Misra, Yashwant
3 Computing: Algorithms and Wiley 1/e, 2020
Singh Patel
Systems
1 https://onlinecourses.nptel.ac.in/noc24_cs118/preview
2 https://onlinecourses.nptel.ac.in/noc24_cs131/preview
SEMESTER S6
SOFTWARE TESTING
(Common to CS/CA/CM/CD/CR/AM/AD)
Course Objectives:
1. To Cultivate proficiency in software testing methodologies and techniques.
2. To Foster expertise in software testing tools and technologies.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Software Testing & Automation:-
Introduction to Software Testing - Concepts, importance of testing,
software quality, and real-world failures (e.g., Ariane 5, Therac 25);
Software Testing Processes - Levels of thinking in testing; Testing
Terminologies - Verification, validation, fault, error, bug, test cases, and
coverage criteria; Types of Testing - Unit, Integration, System,
1 8
Acceptance, Performance (stress, usability, regression), and Security
Testing; Industry Trends - AI in test case automation, Introduction to
GenAI in testing; Testing Methods - Black-Box, White-Box, and Grey-
Box Testing; Automation in Testing - Introduction to automation tools
(e.g., Selenium, Cypress, JUnit); Case Study- Automation of Unit
Testing and Mutation Testing using JUnit.
Unit Testing, Mutation Testing & AI-Driven Automation:-
Unit Testing- Static and Dynamic Unit Testing, control flow testing, data
flow testing, domain testing; Mutation Testing- Mutation operators,
2 8
mutants, mutation score, and modern mutation testing tools (e.g.,
Muclipse); JUnit Framework - Automation of unit testing, frameworks
for testing in real-world projects; AI in Testing - GenAI for test case
generation and optimization, impact on automation; Industry Tools -
Application of AI-driven testing tools in automation and predictive
testing; Case Study - Mutation testing using JUnit, AI-enhanced test case
automation.
Advanced White Box Testing & Security Testing:-
Graph Coverage Criteria - Node, edge, and path coverage; prime path
and round trip coverage; Data Flow Criteria - du paths, du pairs,
subsumption relationships; Graph Coverage for Code - Control flow
graphs (CFGs) for complex structures (e.g., loops, exceptions); Graph
3 10
Coverage for Design Elements - Call graphs, class inheritance testing,
and coupling data-flow pairs; Security Testing - Fundamentals, tools
(OWASP, Burp Suite), and their role in protecting modern applications;
Case Study - Application of graph based testing and security testing
using industry standard tools.
Black Box Testing, Grey Box Testing, and Responsive Testing:-
Black Box Testing - Input space partitioning, domain testing, functional
testing (equivalence class partitioning, boundary value analysis, decision
tables, random testing); Grey Box Testing - Introduction, advantages,
and methodologies (matrix testing, regression testing, orthogonal array
testing); Performance Testing - Network latency testing, browser
4 compatibility, responsive testing across multiple devices (e.g., 10
BrowserStack, LambdaTest); Introduction to PEX - Symbolic execution,
parameterized unit testing, symbolic execution trees, and their
application; GenAI in Testing - Advanced use cases for predictive and
responsive testing across devices and environments; Case Study-
Implementation of black-box, grey-box, and responsive testing using
PEX and AI-driven tools.
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Continuous Internal Evaluation Marks (CIE):
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Illustrate using appropriate tools the mutation testing method for a given
CO2 piece of code to identify hidden defects that can’t be detected using other K3
testing methods.
Explain and apply graph coverage criteria in terms of control flow and
CO3 K2
data flow graphs to improve code quality.
Demonstrate the importance of black-box approaches in terms of Domain
CO4 K3
and Functional Testing
Illustrate the importance of security, compatibility, and performance
CO5 K3
testing across devices.
Use advanced tools like PEX to perform symbolic execution and optimize
CO6 test case generation and also leverage AI tools for automated test case K3
prediction and symbolic execution with PEX.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to Software Cambridge
1 Paul Ammann, Jeff Offutt 2/e, 2016
Testing. University Press
Software Testing and Quality
Kshirasagar Naik,
2 Assurance : Theory and Wiley 1/e, 2008
Priyadarshi Tripathy
Practice
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Software Testing Ron Patten Pearson 2/e, 2005
Software Testing: A
2 Paul C. Jorgensen CRC Press 4/e, 2017
Craftsman’s Approach
Foundations of Software Dorothy Graham, Rex Black,
3 Cengage 4/e, 2021
Testing Erik van Veenendaal
Glenford J. Myers, Tom
4 The Art of Software Testing Wiley 3/e, 2011
Badgett, Corey Sandler
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://archive.nptel.ac.in/courses/106/101/106101163/
2 https://archive.nptel.ac.in/courses/106/101/106101163/
3 https://archive.nptel.ac.in/courses/106/101/106101163/
4 https://archive.nptel.ac.in/courses/106/101/106101163/
SEMESTER S6
DEEP LEARNING
Course Code PECST632 CIE Marks 40
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course Objectives:
1. To give the learner an understanding about the foundations of Deep Learning architecture and
applications
2. To equip the learner with the necessary skills to set-up neural network architecture and use it
for real time problem solution.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Neural Networks Multilayer Perceptron, Back-propagation algorithm and its
1 variants Stochastic gradient descent, Curse of Dimensionality, Deep 8
feedforward networks.
Machine Learning and Deep learning, Representation Learning, Width and
Depth of Neural Networks, Activation Functions: RELU, LRELU, ERELU,
2 9
Unsupervised Training of Neural Networks, Restricted Boltzmann Machines,
Auto Encoders, Deep Learning Applications.
CNN-Architectural Overview, Motivation, Layers, Filters, Parameter
sharing, Regularization, Popular CNN Architectures: ResNet, Alexnet –
3 Applications. Recurrent Neural Networks, Bidirectional RNNs, Encoder – 10
decoder sequence to sequence architectures – BPTT for training RNN, Long
Short Term Memory Networks.
Computer Vision - Speech Recognition - Natural language Processing, Case
studies in classification, Regression and deep networks. Regularized
4 9
Autoencoder, stochastic Encoders and Decoders, Contractive Encoders.
GAN and its variants
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Continuous Internal Evaluation Marks (CIE):
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Construct fundamental neural network architectures and algorithms,
CO1 K3
including Multilayer Perceptron and Back-propagation
Apply advanced techniques such as Stochastic Gradient Descent and
CO2 address the Curse of Dimensionality in the context of deep learning K3
models.
Build various deep learning architectures, including feed-forward
CO3 networks, Convolutional Neural Networks (CNNs), and their K3
applications in real-world problems.
Develop and utilize Recurrent Neural Networks (RNNs) and Long
CO4 Short-Term Memory Networks (LSTMs) for sequence modeling and K3
natural language processing tasks.
Apply unsupervised learning techniques such as Autoencoders and
CO5 Generative Adversarial Networks (GANs) to solve complex problems K3
in computer vision and speech recognition.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 2 3 3
CO2 3 3 2 3 3
CO3 3 3 2 3 3
CO4 3 3 2 3 3
CO5 3 3 2 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Ian Goodfellow, Yoshua
1 Deep Learning MIT Press 1/e, 2016
Bengio, Aaron Courville
Neural Networks and Deep
2 Michael A. Nielsen Determination Press, 2/e, 2015
Learning
Learning Deep Architectures
3 Yoshua Bengio Now Publishers Inc 1/e, 2009
for AI
Deep Learning: A Practitioner's Josh Patterson, Adam
4 O'Reilly 1/e, 2017
Approach Gibson
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Applied Deep Learning. A Case-based
1 Approach to Understanding Deep Neural Umberto Michelucci Apress 1/e, 2018
Networks
Antonio Gulli, Sujit
2 Deep Learning with Keras Packt 1/e, 2017
Pal
3 Deep Learning with Python Francois Chollet Manning 1/e. 2017
4 Deep Learning M Gopal Pearson 1/e, 2022
Cambridge
5 The Science of Deep Learning Iddo Drori 1/e, 2021
Univeristy Press
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://nptel.ac.in/courses/106105215 (Week 4)
2 https://nptel.ac.in/courses/106105215 (Week 5)
3 https://nptel.ac.in/courses/106105215 (Week 8)
4 https://nptel.ac.in/courses/106105215 (Week 10,11 and 12)
SEMESTER S6
Course Objectives:
1. To enable the learners to acquire advanced concepts on wireless communication systems and
mobile ad-hoc networks.
2. To impart the basics of mobile computing, architecture of wireless transmission systems and
next generation networks
3. To Learn the communication protocols, various architectures and security features used in
mobile computing.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Wireless LAN - Advantages, Design goals, Applications, Infrastructure Vs
1 Ad-hoc mode, IEEE 802.11 System Architecture, Protocol Architecture, 9
Physical layer, Medium Access Control layer, HIPERLAN-1, Bluetooth
Introduction to mobile computing – Functions, Middleware and Gateways,
Application and services. Mobile computing architecture – Internet: The
2 8
Ubiquitous network, Three-tier architecture for Mobile Computing, Design
considerations for mobile computing.
Spread spectrum – Direct sequence, Frequency hopping. Medium Access
Control – Space Division Multiple Access (SDMA), Frequency Division
Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code
3 Division Multiple Access (CDMA). Satellite Systems – Basics, Applications, 9
Geostationary Earth Orbit (GEO), Low Earth Orbit (LEO), Medium Earth
Orbit (MEO), Routing, Localization, Handover. Telecommunication Systems
- Global System for Mobile Communication (GSM)
Mobile network layer – Mobile Internet Protocol (IP), Dynamic Host
Configuration Protocol (DHCP), Mobile ad-hoc networks – Routing,
Dynamic Source Routing (DSR), Destination Sequenced Distance Vector
4 (DSDV), Ad-hoc routing protocols; Mobile transport layer – Traditional 10
Transmission Control Protocol (TCP), Improvements in Classical TCP;
Security issues in mobile computing - Information security, Security
techniques and algorithms, Security models.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain the various mobile computing applications, services, design
CO1 K2
considerations and architectures
Describe the various technology trends for next generation cellular
CO2 K2
wireless networks and use the spreading concept on data transmission
CO3 Summarize the architecture of various wireless LAN technologies K2
Identify the functionalities of mobile network layer & transport layer
CO4 K2
and various security issues in mobile computing
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Mobile Computing Technology - Asoke K. Talukder, Hasan
1 McGraw Hill 2/e, 2010
Application and Service Creation Ahmad, Roopa R Yavagal
Fundamentals of 5G Mobile
3 Jonathan Rodriguez Wiley 1/e, 2015
Networks
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Mobile Computing Raj Kamal Oxford University Press 2/e, 2011
2 Computer Networks, Andrew S. Tanenbaum PHI 3/e, 2003
Wireless Communications
3 Theodore S. Rappaport PHI 2/e, 2004
Principles and Practice
Fundamentals of Networking
4 Curt M. White Cengage learning 7/e, 2013
and Communication
No. Link ID
1 https://archive.nptel.ac.in/courses/106/106/106106147/
SEMESTER S6
Course Objectives:
1. To learn the fundamentals of data modeling, query processing, and design in advanced
databases and study the working principles of distributed databases.
2. To learn emerging databases such as XML and NoSQL.
3. To enable the student to use tools, methodologies, and skills for working successfully with
databases in today's global, data driven business model.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Query Processing and Optimization - Measures of query cost, Algorithms for
Selection with cost analysis, Algorithms for Join with cost analysis, Evaluation
of expressions; Heuristics in Query Optimization - Optimization of Relational
1 9
Algebra expressions; Physical Database Design and Tuning - Introduction to
Physical Database Design, Overview of Database Tuning, Tuning the
Conceptual Schema, Tuning Queries and Views; Impact of Concurrency.
Distributed Databases - Distributed Systems, Introduction, Architecture,
Distributed Database Concepts, Distributed Data Storage, Distributed
Transactions, Commit Protocols, Concurrency Control; Query Processing and
2 9
Decomposition - Query Processing Objectives, Characterization of Query
Processors, Layers of Query Processing, Query Decomposition, Localization
of Distributed Data.
XML and Non Relational Databases - Introduction to Semi Structured Data
3 9
and XML Databases, XML Data Model – XSD, XML: DTD and XML
Schema, XML Presentation, XPath Queries, XQuery; NoSQL Databases -
CAP Theorem, Document based; MongoDB Operation - Insert, Update,
Delete, Query, Indexing, Application, Replication, Sharding, Deployment;
Cassandra - Data Model, Key Space, Table Operations, CRUD Operations.
Graph database - Introduction, Data Modelling with Graphs, Building a Graph
Database application, Data Modeling, Predictive Analysis with Graph Theory;
4 9
Depth and Breadth First Search; Path-Finding with Dijkstra’s Algorithm;
Graph Theory and Predictive Modeling
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions.
Bloom’s
Course Outcome Knowledge
Level (KL)
Apply various measures for query processing and optimization, and
CO1 K3
apply techniques to tune database performance.
Explain the architecture and fundamental concepts of distributed
CO2 K2
databases.
Utilize semi-structured data, XML, and XML queries for effective data
CO3 K3
management
Utilize NoSQL database systems to manage and manipulate data in real-
CO4 K3
time applications
Develop advanced skills in graph database concepts, covering data
CO5 modeling, application building, and the application of graph theory for K3
predictive analysis and modeling.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Principles of Database Management: W. Lemahieu, S. Cambridge
1 Practical Guide to Storing, Managing vanden Broucke and B. University 1/e, 2018
and Analyzing Big and Small Data Baesens Press
Designing Data-Intensive Applications:
2 The Big Ideas Behind Reliable, Scalable, M. Kleppmann O’Reilly 1,e2017
and Maintainable Systems
Hector Garcia-Molina
3 Database Systems: The Complete Book Jeffrey D. Ullman Prentice Hall 2/e, 2009
Jennifer Widom
Next generation databases: NoSQL,
4 Guy Harrison Apress 1/e, 2015
newSQL, and big data. Apres.
Foundations of Multidimensional and Morgan
5 Hanan Samet 1/e, 2006
Metric Data Structures Kaufmann
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 CAP Theorem https://nptel.ac.in/courses/106104189
Course Objectives:
1. To provide foundational concepts of digital image representation, processing, and analysis, including
image digitization, color theory, and various data structures, to effectively manipulate and analyze
digital images.
2. To help the learner develop the ability to implement advanced image processing techniques, such as
image segmentation, edge detection, and image compression, while critically evaluating the
performance and quality of these methods in practical applications.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
The image, its representation and properties - Image representations, Image
digitization, Sampling, Quantization, Digital image properties, Metric and
topological properties of digital images, Histograms, Entropy, Visual
perception of the image, Image quality, Noise in images; Color images -
1 Physics of color, Color perceived by humans, Color spaces, Color constancy; 9
Data structures for image analysis - Levels of image data representation,
Traditional image data structures - matrices, Chains, Topological data
structures - Relational structures, Hierarchical Data Structures, Pyramids,
Quadtrees, Other pyramidal structures.
Image pre-processing - Pixel brightness transformations-, Position-dependent
brightness correction, Gray-scale transformation, Geometric Transformations
2 - Pixel coordinate transformations, Brightness interpolation. 8
Local pre-processing, Image Smoothing, Edge detectors, Zero-crossings the
second derivative,Scale in Image Processing, Canny Edge Detection,
Parametric Edge Models, Edges Multi-spectral images,, Line detection by
local pre-processing operators, Detection of corners(interest points),
Image Restoration - Degradations that are easy to restore, Inverse Filtering,
Wiener Filtering
Image Segmentation - Thresholding, Threshold Detection Methods- Optimal
thresholding, Multi-spectral thresholding, Edge-based segmentation, Edge
Image Thresholding, Edge Relaxation, Border Tracing, Border Detection As
Graph Searching, Border Detection As Dynamic Programming, Hough
3 Transforms, Border Detection Using Border location information, 9
Region construction from borders, Region-based segmentation - Region
merging, Region Splitting - Splitting And Merging, Watershed segmentation
Matching, Template Matching, Control Strategies Templating, Evaluation
Issues In Segmentation
Image Transforms - Discrete Cosine Transform, Wavelet transform, Eigen-
analysis, Singular value decomposition, Principal component analysis Radon
Transform;
Image Compression - Image data Properties, Discrete Image Transforms In
4 Image data compression, Predictive compression methods, Vector 10
quantization, Hierarchical and Progressive Compression methods,
Comparison Of Compression Methods, JPEG and MPEG image compression
JPEG still image compression, JPEG–2000 compression, MPEG full-motion
video compression.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the properties of monochrome and colour images and the
CO1 K2
data structures for image analysis
Apply different preprocessing techniques to visualize image
CO2 K3
enhancement
Understand the concept of image segmentation and various techniques
CO3 K2
used for this.
CO4 Understand the various transforms used for image processing K2
Understand the concept of image compression and apply various image
CO5 K2
compression techniques.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2
CO2 3 3 3 3 2
CO3 3 3 3 3 2
CO4 3 3 3 3 2
CO5 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Image Processing, Analysis and Machine Milan Sonka, Vaclav
1 Cengage 4/e, 2015
Vision Hlavac, Roger Boyle
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Fundamental of Digital Image
1 Anil K. Jain Pearson 1/e, 2015
Processing
2 Digital image Processing Ralph Gonzalez, Richard Woods Pearson 4/e, 2018
S Jayaraman, S Esakkirajan, T
3 Digital Image Processing McGraw Hill 2/e, 2020
Veerakumar
No. Link ID
1 https://archive.nptel.ac.in/courses/117/105/117105135/
2 https://archive.nptel.ac.in/courses/106/105/106105032/
SEMESTER S6
FUNDAMENTALS OF CRYPTOGRAPHY
(Common to CS/CM/CR/AM/AD)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Number Theory - Divisibility and The Division Algorithm,
The Euclidean Algorithm, Modular Arithmetic : The Modulus, Properties
of Congruences, Modular Arithmetic Operations, The Extended Euclidean
Algorithm, Primitive Roots, Existence of Primitive Roots for Primes,
1 10
Fermat’s Theorem, Euler’s Totient Function,
Euler’s Theorem, Testing for Primality : Miller–Rabin Algorithm, A
Deterministic Primality Algorithm, Discrete Logarithms, Chinese
Remainder Theorem.
Security Attacks; Security Services; Security Mechanisms; Fundamental
Security Design Principles; Cryptography - Symmetric Cipher Model,
2 8
Substitution Techniques, Transposition techniques; Traditional Block
Cipher Structure.
The Data Encryption Standard - DES Encryption & Decryption, Avalanche
Effect, Strength of DES; Advanced Encryption Standard - AES Structure;
3 10
Stream Ciphers; RC4; Principles of Public-Key Cryptosystems - Public-
Key Cryptosystems, Applications for Public-Key Cryptosystems,
Requirements for Public-Key Cryptography,
The RSA Algorithm, Description of the Algorithm; Diffie–Hellman Key
Exchange..
Cryptographic Hash Functions - Applications of Cryptographic Hash
Functions, Secure Hash Algorithm (SHA), SHA-3; MAC; MD5; Digital
4 8
Signatures.; Key Management and Distribution - Symmetric Key
Distribution; X.509 certificates; PKI.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 2
CO2 3 3 3 2 2
CO3 3 3 3 2
CO4 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Edition
Name of the
Sl. No Title of the Book Name of the Author/s and
Publisher
Year
Cryptography & Network Security:
1 William Stallings Pearson 7/e, 2017
Principles and practice
Reference Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Cryptography & Network Security Behrouz A. Forouzan McGraw Hill 3/E, 2007
Charles P. Pfleeger,
2 Security in Computing Shari L. Pfleeger, Prentice Hall 5/e, 2015
Jonathan Margulies
A Classical Introduction to Cryptography:
3 S. Vaudenay Springer 1/e, 2009
Applications for Communications Security
Introduction to Cryptography: Principles and Springer-
4 H. Delfs, H. Knebl 1/E, 2002
Applications Verlag
2 https://nptel/courses/video/106105031/L17.html
3 https://onlinecourses.nptel.ac.in/noc22_cs90/preview
SEMESTER S6
QUANTUM COMPUTING
(Common to CS/CM/CR/AD/AM)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Review of Basics Concepts
Review of linear algebra, Principles of quantum mechanics, Review of
1 9
Information theory, Review of Theory of Computation.
[Text 1 - Ch 1, 2; Text 2, Ch 11.1, 11.2]
Introduction to Quantum Information
Qubit – Bloch sphere representation, Multiple qubit states, Quantum logic
2 gates – single qubit and multi-qubit, Quantum circuits, Density matrix, 9
Quantum entanglement.
[Text 1 - Ch 3, 4; Text 2 - Ch 4]
Quantum Algorithms: -
Simple Quantum Algorithms, Quantum Integral Transforms, Grover’s
3 9
Search Algorithm and Shor’s Factorization Algorithm.
[Text 1 - Ch 5,6,7,8]
Quantum Communication: -
4 Von Neumann entropy, Holevo Bound, Data compression, Classical 9
information over noisy quantum channels, Quantum information over noisy
quantum channels, Quantum Key Distribution, Quantum Communication
protocols
[Text 2 - Ch 11.3, Ch 12.1 - 12.5 ]
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain the concept of quantum computing against classical
CO1 K2
computing.
CO2 Illustrate various quantum computing algorithms. K2
CO3 Explain the latest quantum communication & protocols. K2
Experiment with new algorithms and protocols for quantum
CO4 K3
computing.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 3 2
CO2 3 2 3 2
CO3 3 2 3 2
CO4 3 2 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Quantum Computing : Mikio Nakahara
1 From Linear Algebra to Tetsuo Ohmi CRC Press 1/e, 2008
Physical Realizations
Quantum Computation and Michael A. Nielsen & Cambridge University
2 1/e, 2010
Quantum Information Isaac L. Chuang Press
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Quantum Computing for Cambridge University
1 Robert Hundt 1/e, 2022
Programmers Press
Quantum Computing for
2 Chris Bernhardt MIT Press 1/e, 2020
Everyone
An Introduction to Practical Omar Amer IEEE Aerospace and
March
3 Quantum Key Distribution Vaibhav Garg Electronic Systems
2021
[paper] Walter O. Krawec Magazine
Quantum communication Nicolas Gisin & Rob March
4 Nature Photonics
[paper] Thew 2007
No. Link ID
1 https://archive.nptel.ac.in/courses/106/106/106106232/
2 https://archive.nptel.ac.in/noc/courses/noc19/SEM2/noc19-cy31/
SEMESTER S6
RANDOMIZED ALGORITHMS
Course Objectives:
1. To equip with the knowledge and skills to design and analyze algorithms that leverage
randomness to improve performance, solve complex problems, and achieve better average-
case or worst-case guarantees.
2. To provide a deep understanding of advanced randomization techniques and their applications
in various domains, including hashing, graph algorithms, probabilistic method, and
complexity theory.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basics of Randomization - Introduction to randomized algorithms,
Probabilistic analysis and expectations, Benefits and applications of
randomization. (Text 1 - Chapter 1)
1 Probability Review - Basic probability theory, Random variables and 9
distributions, Linearity of expectation. (Text 2 - Chapters 1, 2)
Basic Randomized Algorithms - Randomized quicksort, Randomized
selection, Randomized data structures. (Text 3 - Sections 5.3, 9.2)
Randomized Graph Algorithms - Randomized algorithms for graph
problems, Minimum cut problems, Randomized algorithms for network
2 flows. (Text 1 - Chapters 5, 6) 9
Hashing and Randomized Data Structures - Universal and perfect hashing,
Skip lists, Bloom filters. (Text 3 - Chapter 11)
Markov Chains and Random Walks - Introduction to Markov chains,
Random walks on graphs, Applications in randomized algorithms. (Text 2 -
Chapters 6, 7)
The Probabilistic Method - Basics of the probabilistic method, Linearity of
expectation, First and second-moment methods. (Text 4 - Chapters 1, 2)
3 Chernoff Bounds and Concentration Inequalities - Markov's inequality, 9
Chebyshev's inequality, Chernoff bounds, Applications of concentration
inequalities. (Text 1 - Chapter 4)
Randomized Rounding and Martingales - Randomized rounding techniques,
Applications in approximation algorithms, Introduction to martingales,
Azuma's inequality. (Text 5 - Chapter 14)
4 9
Randomized Complexity Classes - RP, ZPP, and BPP, Relationships
between complexity classes, Amplification and derandomization techniques
(Text 6 - Chapter 7)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Demonstrate a strong understanding of the basics of randomized
CO1 algorithms, including probabilistic analysis, expectations, and the K3
benefits of randomization
Illustrate basic randomized algorithms, such as randomized quicksort,
CO2 selection, and data structures, and evaluate their performance against K3
deterministic alternatives.
Apply advanced randomized techniques, including randomized graph
CO3 algorithms, hashing, and Markov chains, to address complex graph and K3
data structure problems.
Show expertise in probabilistic methods, including Chernoff bounds,
CO4 concentration inequalities, and randomized rounding, and use these K3
methods to solve approximation and analysis problems in algorithms.
Understand and apply concepts related to randomized complexity
CO5 classes, such as RP, ZPP, and BPP, and explore amplification and K3
derandomization techniques.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2
CO2 3 3 3 2
CO3 3 3 3 2
CO4 3 3 3 2
CO5 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Rajeev Motwani and Prabhakar Cambridge
1 Randomized Algorithms 1/e, 2004
Raghavan University Press
Probability and Computing:
Randomization and Michael Mitzenmacher and Eli Cambridge
2 3/e, 2017
Probabilistic Techniques in Upfal University Press
Algorithms and Data Analysis
Thomas H. Cormen, Charles E.
3 Introduction to Algorithms Leiserson, Ronald L. Rivest, The MIT Press 4/e, 2023
Clifford Stein
4 The Probabilistic Method Noga Alon and Joel H. Spencer Wiley-Blackwell 4/e 2016
Springer Nature
5 Approximation Algorithms Vijay V. Vazirani 2/e, 2013
(SIE)
Computational Complexity: A Cambridge
6 Sanjeev Arora and Boaz Barak 1/e, 2019
Modern Approach University Press
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Concentration of Measure for
Devdatt Dubhashi and Cambridge University
1 the analysis of randomized 1/e, 2012
Alessandro Panconesi Press
algorithms
The design of approximation David Williamson and Cambridge University
2 1/e, 2011
algorithms David Shmoys Press
Robert Sedgewick and
3 Algorithms Addison-Wesley 4/e, 2023
Kevin Wayne
No. Link ID
1 https://archive.nptel.ac.in/courses/106/103/106103187/
SEMESTER S6
CLOUD COMPUTING
(Common to CS/CA/CM/AM)
Course Objectives:
1. To learn fundamentals of cloud and configure cloud environments, deploy virtual machines,
and work with containerization tools, gaining practical skills.
2. To learn to identify and address common security threats in cloud environments,
implementing best practices to ensure the safety and compliance of applications.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction - Limitations of Traditional Computing & solution, Three
Layers of Computing, Factors behind Cloud Service Adoption; Evolution
and Enabling Technologies of Cloud; Benefits and Challenges; [Text 2]
Fundamental Concepts and Models - Roles and Boundaries, Cloud
1 Characteristics, Cloud Delivery Models, Cloud Deployment Models; [Text 8
1] Introduction to Cloud Providers (AWS, Azure, Google Cloud).
Handson - Cloud Account Setup and Virtual Machine Deployment - Create
accounts on a cloud provider and deploy virtual machine instances, and
document the process and inferences.
Cloud-Enabling Technology - Networks and Internet Architecture, Cloud
Data Center Technology, Modern Virtualization, Multitenant Technology,
Service Technology and Service APIs; Understanding Containerization -
2 10
Influencers, Fundamental Virtualization and Containerization,
Understanding Containers, Understanding Container Images, Multi-
Container Types.[Text 1]
Handson - Hypervisor and Containers installation - Install hypervisors and
deploy VMs on local machines. Install any container platform and deploy
applications.
Resource Management - Resource Pooling, Sharing, Provisioning; Scaling
in Cloud and the Strategies; Capacity Planning in Cloud Computing; Storage
and File System - Challenges; Cloud Native File System, Deployment
3 models, Storage Types, Popular Cloud Storages. High performance 9
Computing Models.[Text 2]
Handson - Use Map-reduce to implement basic big data applications such as
word count.
Understanding Cloud Security - Basic Security Terminology, Basic Threat
Terminology, Threat Agents, Common Threats; Other Considerations -
Flawed Implementations, Security Policy Disparity, Contracts, Risk
4 7
Management.[Text 1]
Handson : Identify possible attacks of any selected cloud applications and
suggest/implement solutions/policies for mitigation.
Ways of assessing at
1. Analyze level - Analyze performance of traditional models (Hardware, Application,
Computing / security models) against that in the cloud.
2. Evaluate level - Derive conclusions on the cloud programming / computing / security models
based on standard performance evaluation criteria.
Bloom’s
Course Outcome Knowledge
Level (KL)
Evaluate the limitations of traditional computing models and recognize
CO1 the factors driving cloud service adoption and compare between K5
various cloud delivery and deployment models.
Demonstrate proficiency in cloud-enabling technologies, including
CO2 K3
modern virtualization and containerization
Examine the resource management within the cloud, including
CO3 resource pooling, scaling strategies, and storage management and K4
utilize tools like MapReduce for processing big data applications.
Identify potential security threats in cloud environments and apply
CO4 K3
appropriate security measures to mitigate these risks.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3 3
CO2 3 3 3 3 2 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Cloud Computing : Concepts,
1 Thomas Erl Pearson 2/e, 2023
Technology, Security, and Architecture
Cambridge
2 Cloud Computing Sandeep Bhowmik 1/e, 2017
University Press
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Cloud Computing : Theory and
1 Dan C. Marinescu Morgan Kaufman 3/e, 2023
Practice
Cloud Computing: A Hands-On Arshdeep Bahga and Vijay
2 Universities Press 1/e, 2014
Approach Madisetti
Rajkumar Buyya, Christian
3 Mastering Cloud Computing Morgan Kaufman 1/e, 2013
Vecchiola S.Thamarai Selvi
Cloud Computing : A Practical Anthony T. Velte, Toby J.
4 McGraw Hill 1/e, 2010
Approach Velte, Robert Elsenpeter
No. Link ID
1 https://archive.nptel.ac.in/courses/106/105/106105167/
SEMESTER S6
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of Mobile Application Development:
Assignments/Projects:
Assignments/Projects:
Assignments/Projects:
Analyze
Key Actions: Differentiate, Organize, Attribute
Evaluate
Key Actions: Check, Critique, Judge
Analyze:
UI/UX Design Provides detailed Provides good Provides basic Provides minimal
Evaluation critique with critique with critique with or no critique
actionable some actionable limited actionable
insights insights insights
In Part A, all questions need to be answered and in Part B, each student can choose
any one full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain mobile application development using Flutter and different
CO1 K2
mobile platforms.
Apply principles of effective mobile UI/UX design, Create responsive
CO2 K3
user interfaces using Flutter features.
Experiment effectively with state in Flutter application, networking
CO3 K4
and data persistence.
Apply security best practices in mobile app development, test, and
CO4 K5
debug Flutter applications effectively.
Set up CI/CD pipelines for Flutter projects and deploy mobile apps to
CO5 K5
Google Play Store and Apple App Store.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Flutter Cookbook Simone Alessandria Packt 2/e, 2023
2 Flutter for Beginners Alessandro Biessek Packt 1/e, 2019
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Flutter in Action Eric Windmill Manning 1/e, 2019
Flutter and Dart: Up and Deepti Chopra, Roopal
2 BPB 1/e, 2023
Running Khurana
Managing State in Flutter
3 Waleed Arshad Packt 1/e, 2021
Pragmatically
Lahiru Rajeendra
4 Ultimate Flutter Handbook Orange House 1/e, 2023
Mahagamage
No. Link ID
1 https://www.youtube.com/watch?v=VPvVD8t02U8
SEMESTER S6
Course Objectives:
1. To teach the security terminologies along with familiarization of web-based attacks and the
vulnerability assessment tools for real time practices
2. To help learners to perform network analysis and learns the measures to handle security
bleaches at the system level
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Information Security
Introduction, Threats to Information Systems, Cyber Security and Security
1 risk analysis, Information Gathering- Reconnaissance, Reco-ng, Software 10
Vulnerabilities- Buffer Overflow, Stack Overflow, Format String,
Vulnerability Assessment and Penetration Testing- Burpsuite, Metasploit.
Web Security
Web Attacks- SQL Injection Attacks, Cross-Site Scripting (XSS), Cross-Site
Request Forgery (CSRF), Domain Name System- Security Issues with DNS,
2 12
DNS attacks, DNSSEC, OWASP ZAP, WebGoat, Damn Vulnerable Web
Application (DVWA), Website Mirroring, HTTRACK, Email Security-
Email risks, Protocols, Operating safely when using email.
Network Security:
3 12
Network Security Terminologies, DoS, DDoS, ARP Spoofing and Session
Hijacking, Capturing the Network Traffic- Promiscuous Mode, Flooding,
DHCP Redirection, Redirection and Interception with ICMP. Port Scanning-
TCP and UDP, Port Scanning Tools- Nmap, SuperScan, Wireshark-
Analysing and Filtering Traffic
System Security:
● Security Analysis & Fixing: Analyze captured traffic to identify potential vulnerabilities
(e.g., plaintext passwords) and recommend security enhancements.
● Security Analysis & Fixing: Use OWASP ZAP to perform security testing on the
application, identify vulnerabilities, and then fix these issues by implementing secure coding
practices.
● Development: Develop a simple web application with common security flaws, such as
SQL injection, XSS, and broken authentication mechanisms.
● Security Analysis & Fixing: Use Burp Suite to scan the application, identify
vulnerabilities, and analyze the attack surface. Afterward, secure the application by fixing
these vulnerabilities and re-running the scan to verify the fixes.
Penetration Testing Framework Using Metasploit:
● Security Analysis & Fixing: Use Metasploit to exploit the system, demonstrate various
attacks like privilege escalation, and then apply patches, configuration changes, and security
best practices to mitigate the discovered vulnerabilities.
5 30 12.5 12.5 60
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO3 Identify the network based attacks using network monitoring tools K3
Illustrate the system security measures used for windows and Linux K2
CO4
operating systems
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 3 3 3
CO2 2 2 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Build Your Own Security Lab Michael Gregg Wiley 1/e, 2008
2 Network security and Cryptography B. Menezes Cengage 1/e, 2010
Chris Anley, John Heasman,
Shellcoder's Handbook: Discovering
3 Felix Lindner, Gerardo Wiley 2/e,2007
and Exploiting Security Holes
Richarte
Eric Cole, Ronald Krutz, Wiley
4 Network Security Bible 1/e, 2010
James W Conley
Reference Books
Edition
Name of the Name of the
Sl. No Title of the Book and
Author/s Publisher
Year
1 https://onlinecourses.nptel.ac.in/noc23_cs127/preview
2 https://onlinecourses.nptel.ac.in/noc24_cs85/preview
3 https://onlinecourses.swayam2.ac.in/nou19_cs08/preview
Simulation/ Presentation
Lecture delivery Project identification Laboratory Work/ (Progress and Final
Workshops Presentations)
Group discussion Project Analysis Data Collection Evaluation
Question answer Project Milestone Reviews,
Sessions/ Analytical thinking and Feedback,
Testing
Brainstorming self-learning Project reformation (If
Sessions required)
Poster Presentation/
Guest Speakers
Case Study/ Field Video Presentation: Students
(Industry Prototyping
Survey Report present their results in a 2 to 5
Experts)
minutes video
Assessment and Evaluation for Project Activity
5 Final Presentations 5
Total 30
DATA STRUCTURES
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
-
Prerequisites (if any) Course Type Theory
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basic Concepts of Data Structures
2 Singly Linked List - Operations on Linked List, Stacks and Queues using 9
Linked List, Polynomial representation using Linked List; Doubly Linked List.
Sorting Techniques :- Selection Sort, Insertion Sort, Quick Sort, Merge Sort;
4 9
Searching Techniques - Linear Search, Binary Search, Hashing - Hashing
functions : Division; Collision Resolution : Linear probing, Open hashing.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Identify appropriate data structures for solving real world problems. K3
CO1
Describe and implement linear data structures such as arrays, linked
CO2 K3
lists, stacks, and queues.
Describe and Implement non linear data structures such as trees and
CO3 K3
graphs.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
3 3 3 3
CO1
3 3 3 3
CO2
3 3 3 3
CO3
3 3 3 3
CO4
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of
Edition
Sl. No Title of the Book Name of the Author/s the
and Year
Publisher
Ellis Horowitz, Sartaj Sahni Universities
1 Fundamentals of Data Structures in C 2/e, 2007
and Susan Anderson-Freed, Press
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Prentice Hall
1 Classic Data Structures Samanta D. 2/e, 2018
India.
Aho A. V., J. E.
Pearson
2 Data Structures and Algorithms Hopcroft and J. D. 1/e, 2003
Publication.
Ullman
Introduction to Data Structures with Tremblay J. P. and P. G. Tata McGraw
3 2/e, 2017
Applications Sorenson Hill.
Theory and Problems of Data
4 Lipschuts S. Schaum’s Series 2/e, 2014
Structures
DATA COMMUNICATION
(Common to CS/CM/CD/CA)
Course Objectives:
1. To understand the details of data communication at the lower level and the associated issues.
2. To gain insight into the important aspects of data communication and computer networking
systems and to apply the in practical applications.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Communication model - Simplex, Half duplex, Full duplex transmission.
Periodic analog signals - Sine wave, Amplitude, Phase, Wavelength, Time
and frequency domain, Bandwidth. Analog & digital data and signals.
Transmission impairments - Attenuation, Delay distortion, Noise. Data rate
limits - Noiseless channel, Nyquist bandwidth, Noisy channel, Shannon's
1 10
capacity formula.
Guided transmission media - Twisted pair, Coaxial cable, Optical fiber.
Unguided media - Radio waves, Terrestrial microwave, Satellite microwave,
Infrared. Wireless propagation - Ground wave propagation, Sky wave
propagation, Line-of-Sight (LoS) propagation.
Digital data to digital signal – Non-Return-to-Zero (NRZ), Return-to-Zero
(RZ), Multilevel binary, Biphase. Analog data to digital signal - Sampling
2 9
theorem, Pulse Code Modulation (PCM), Delta Modulation (DM). Digital
data to analog signal - Amplitude Shift Keying (ASK), Frequency Shift
Keying (FSK), Phase Shift Keying (PSK). Analog data to analog signal -
Amplitude Modulation (AM), Frequency Modulation (FM), Phase
Modulation (PM).
Multiplexing - Frequency Division Multiplexing (FDM), Wavelength
Division Multiplexing (WDM), Time Division Multiplexing (TDM),
Characteristics, Synchronous TDM, Statistical TDM. Spread spectrum
3 8
techniques - Direct Sequence Spread Spectrum (DSSS), Frequency Hopping
Spread Spectrum (FHSS), Code Division Multiplexing, Code Division
Multiple Access (CDMA).
Digital data communication techniques - Asynchronous transmission,
Synchronous transmission. Detecting and correcting errors - Types of errors,
4 Parity check, Checksum, Cyclic Redundancy Check (CRC), Forward Error 9
Correction (FEC), Hamming distance, Hamming code. Basic principles of
switching - Circuit switching, Packet switching, Message switching.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Identify the characteristics of signals for analog and digital
CO1 K3
transmissions so as to define the associated real world challenges.
Select transmission media based on characteristics and propagation
CO2 K3
modes.
CO3 Choose appropriate signal encoding techniques for a given scenario K3
CO4 Illustrate multiplexing and spread spectrum technologies K2
Use error detection, correction and switching techniques in data
CO5 K3
communication
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 2 3
CO3 3 3 2 3
CO4 3 3 3 2 3
CO5 3 3 3 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Data Communications and Networking Forouzan B. A McGraw Hill 6/e, 2019
2 Data and Computer Communication William Stallings Pearson 10/e, 2016
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Mobile Communications Schiller J Pearson 2/e, 2009
Fundamentals of Networking
2 Curt M. White Cengage 7/e, 2010
and Communication
FOUNDATIONS OF CRYPTOGRAPHY
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Integer Arithmetic – Divisibility, Greatest Common Divisor Euclid’s and
1 Extended Euclid’s Algorithm for GCD; Modular Arithmetic – Operations, 9
Properties, Polynomial Arithmetic; Algebraic Structures – Group Ring Field.
Prime numbers and Prime Factorisation - Primitive Roots, Existence of
Primitive Roots for Primes, Fermat’s Theorem, Primality Testing, Euler’s
2 9
Theorem, Euler’s Totient Function, Discrete Logarithms, Modular
Arithmetic, Chinese Remainder Theorem.
Principles of security - Types of Security attacks, Security services, Security
Mechanisms; Cryptography - Introduction, cryptographic notations,
3 9
substitution techniques, Transposition Techniques, limitations of classical
cryptography.
Symmetric key Ciphers - Block Cipher principles & Algorithms- DES, AES,
4 Differential and Linear Cryptanalysis; Asymmetric Key Ciphers- RSA, ECC; 9
Hash Functions - MD5, SHA-1.
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain the integer arithmetic operations including divisibility and
GCD algorithms, modular arithmetic operations and properties,
CO1 K2
polynomial arithmetic, and algebraic structures such as groups, rings,
and fields.
Describe the number theory concepts essential for cryptographic
CO2 K2
applications and mathematical problem-solving.
Explain the security principles, types of attacks, and protective
CO3 measures, alongside a thorough understanding of cryptographic K2
techniques and their applications in securing data.
Discuss symmetric and asymmetric key cryptography, including block
CO4 cipher principles, algorithms, public key cryptosystems, and hash K2
functions
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2
CO2 2 2 2
CO3 2 2 2
CO4 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Cryptography & Network
1 Behrouz A. Forouzan McGraw Hill 3/e, 2007
Security
Charles P. Pfleeger, Shari L.
2 Security in Computing Prentice Hall 5/e, 2015
Pfleeger, Jonathan Margulies
Introduction to Cryptography:
3 H. Delfs, H. Knebl Springer 1/e, 2002
Principles and Applications
A Classical Introduction to
4 Cryptography: Applications for Serge Vaudenay Springer 1/e, 2009
Communications Security
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Cryptography and Network
1 William Stallings Pearson Education 7/e,2017
Security
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to ML
Unsupervised Learning
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Illustrate Machine Learning concepts and basic parameter estimation
CO1 K2
methods
CO2 Demonstrate supervised learning concepts (regression, classification) K3
CO3 Illustrate the concepts of Multilayer neural network and Decision trees K3
Describe unsupervised learning concepts and dimensionality reduction
CO4 K3
techniques
Use appropriate performance measures to evaluate machine learning
CO5 K3
models
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 2
CO2 3 3 3 3 2 2
CO3 3 3 3 3 2 2
CO4 3 3 3 3 2 2
CO5 3 3 3 3 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Introduction to Machine Learning Ethem Alpaydin MIT Press 2/e, 2010
Data Mining and Analysis: Mohammed J. Zaki, | Cambridge
2 1/e, 2016
Fundamental Concepts and Algorithms Wagner Meira University Press
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Machine Learning Tom Mitchell McGraw-Hill 1997
2 https://youtu.be/g__LURKuIj4?si=Xj10NPfMfpQSOhVx
3 https://youtu.be/yG1nETGyW2E?si=ySlxpeWuFAUQBf7-
4 https://youtu.be/zop2zuwF_bc?si=W7TpSHLdi4rykva4
SEMESTER S6
Course Objectives:
1. To teach the core object-oriented principles such as abstraction, encapsulation, inheritance, and
polymorphism, robust error-handling using exception mechanisms to ensure program
reliability.
2. To equip the learner to develop object oriented programs encompassing fundamental
structures, environments, and the effective utilization of data types, arrays, strings, operators,
and control statements for program flow in Java.
3. To enable the learner to design and develop event-driven graphical user interface (GUI)
database applications using Swing and database connection components.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Internal Internal
Assignment/ Examination-1 Examination- 2
Attendance Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
1 Java: The Complete Reference Herbert Schildt Tata McGraw Hill 13/e, 2024
Reference Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
3 Clean Code : A Handbook of Agile Robert C. Martin Prentice Hall 1/e, 2008
Software Craftsmanship
4 Programming with Java E Balagurusamy McGraw Hill 6/e, 2019
3 https://nptel.ac.in/courses/106105191 (Lecture no: 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
https://nptel.ac.in/courses/106105191
4
(Lecture no: 43, 44, 45, 46, 47, 50, 51, 52, 53, 54, 55)
SEMESTER S6
SYSTEMS LAB
Course Objectives:
1. To introduce the fundamental concepts of compiler design, including lexical analysis, syntax
analysis, and code generation.
2. To equip students with practical skills to design and implement the components of a compiler
using tools like LEX and YACC.
3. To teach students the basic and advanced techniques of virtual machine instantiation and
management using open-source hypervisors / public cloud platforms.
Expt.
Experiments
No.
Design and implement a lexical analyzer using C language to recognize all valid tokens in
1 the input program. The lexical analyzer should ignore redundant spaces, tabs and
newlines. It should also ignore comments.
2 Write a lex program to display the number of lines, words and characters in an input text.
5 Convert the BNF rules into YACC form and write code to generate abstract syntax tree.
Implement the back end of the compiler which takes the three address code and
Instantiation of VMs with image file using open-source hypervisors / public cloud
12
platforms.
13 Virtual machine Cluster set up using open-source hypervisors / public cloud platforms.
14 Setting host name for virtual machine nodes in cluster and ssh set up for remote login.
Preparation/Pre-Lab Work
experiments, Viva and Timely Internal
Attendance Total
completion of Lab Reports / Record Examination
(Continuous Assessment)
5 25 20 50
● Endorsement by External Examiner: The external examiner shall endorse the record
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Implement lexical and syntax analyzer using the tools LEX and YACC K3
CO2 Develop Top-Down and Bottom-Up parsers. K3
CO3 Implement intermediate code for expressions. K3
CO4 Experiment with a cluster of virtual machines in a virtualized environment. K3
CO5 Demonstrate the data sharing and communication between virtual machines. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 3 3 3 2 3
CO2 2 2 3 3 3 2 2 3
CO3 2 2 3 3 3 2 2 3
CO4 3 3 3 2 2 3
CO5 3 2 2 3
1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Keith D. Cooper Linda
1 Engineering a Compiler Katey Birtcher 3/e, 2023
Torczon
John R Levine, Tony O’Reilly Media,
2 Lex and Yacc 2/e, 2013
Mason& Doug Brown Inc
Distributed and Cloud Computing:
Kai Hwang, Jack Morgan
3 From Parallel Processing to the 1/e, 2018
Dongarra, Geoffrey C. Fox Kaufman
Internet of Things
Lambert
Manan Shah, Charusmita
4 Virtual Machines Academic 1/e, 2018
Shah
Publishing
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Compilers Principles Aho A Ravi Sethi and J
1 Addison Wesley 2/e, 2013
Techniques and Tools D Ullman
Compiler Construction Cenage Learning
2 Kenneth C Louden 1/e, 2007
Principles and Practice Indian Edition
System programming and Tata McGraw Hill &
3 D M Dhamdhare 1/e, 2013
operating system Company
The Theory and Practice of Tata McGraw Hill &
4 Tremblay and Sorenson 1/e, 1985
Compiler Writing Company
No. Link ID
1 https://archive.nptel.ac.in/courses/106/105/106105190/
2 https://www.virtualbox.org/
Continuous Assessment (25 Marks)
● Quality of Reports: Clarity, completeness and accuracy of lab reports. Proper documentation
of experiments, data analysis and conclusions.
● Timely Submission: Adhering to deadlines for submitting lab reports/rough record and
maintaining a well-organized fair record.
● Oral Examination: Ability to explain the experiment, results and underlying principles
during a viva voce session.
Final Marks Averaging: The final marks for preparation, conduct of experiments, viva,
and record are the average of all the specified experiments in the syllabus.
● Setup and Execution: Proper setup and accurate execution of the experiment or programming
task.
● Ability to explain the experiment, procedure results and answer related questions
● Proficiency in answering questions related to theoretical and practical aspects of the subject.
5. Record (5 Marks)
Course Objectives:
1. To enable the learners to apply formal methods for modelling, validation, and verification of
software systems.
2. To familiarize with a series of advanced tools that address challenges faced in design, coding,
and verification.
3. To provide an introduction to the theoretical aspects of these tools, as well as hands-on
exploration.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction :-
Stages in software development; software defects –causes of software defects;
1 9
techniques for dealing with software defects-Testing and verification, formal
methods and tools.
Ensuring reliability in the design phase :-
Conceptual modelling, the tool Alloy, conceptual modelling in Alloy,
2 9
Analysing Alloy models, Fixing bugs in modelling, How Alloy works? Show
that the Konigsberg Bridge Problem has no solution.
Verification by Model Checking :-
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Explain the need and use of formal methods and tools in software engineering. K2
CO2 Demonstrate conceptual modelling of systems using Alloy. K3
Illustrate the process of proving correctness of code using Hoare-Triple based
CO3 K3
weakest precondition analysis
CO4 Demonstrate program verification using VCC. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 - - - - - - - - - -
CO2 2 3 2 3 2 - - - - - - -
CO3 3 3 3 2 - - - - - - - -
CO4 3 3 3 3 3 - - - - - - -
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Software Abstractions Daniel Jackson MIT Press 2011
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Verifying C Programs: A E. Cohen, M. A.,
1 VCC Tutorial, Working draft, Hillebrand, S. Tobies, 2015
version 0.2 M. Moskal, W. Schulte
The VCC Manual, Working
2 2016.
draft, version 0.2
Links
No. Link ID
1 Tutorial for Alloy Analyzer 4.0 https://alloytools.org/tutorials/online/
SEMESTER S7
WEB PROGRAMMING
(Common to CS/CA/CM/CD/CR/AD/AM)
Course Objectives:
1. To equip students with the knowledge and skills required to create, style, and script web
pages using HTML5, CSS, JavaScript, and related technologies.
2. To provide hands-on experience with modern web development tools and frameworks such as
React, Node.js, JQuery, and databases, enabling students to design and build dynamic,
responsive, and interactive web applications.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Creating Web Page using HTML5 - Introduction, First HTML5 example,
Headings, Linking, Images, Special Characters and Horizontal Rules, Lists,
Tables, Forms, Internal Linking, meta Elements, HTML5 Form input Types,
Input and datalist Elements and autocomplete Attribute, Page-Structure
Elements; Styling Web Page using CSS - Introduction, Inline Styles,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 - 3 - - - - - - 3
CO2 3 3 3 - 3 - - - - - - 3
CO3 3 3 3 - 3 - - - - - - 3
CO4 3 3 3 - 3 - - - - - - 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Randy Connolly, Ricardo
1 Fundamentals of Web Development Pearson 1/e, 2017
Hoar
Building User Interfaces with
2 Chris Minnick Wiley 1/e, 2022
ReactJS - An Approachable Guide
Internet & World Wide Web - How Paul J. Deitel, Harvey M.
3 Pearson 1/e, 2011
to Program Deitel, Abbey Deitel
SPA Design and Architecture:
Manning
4 Understanding Single Page Web Emmit Scott 1/e, 2015
Publications
Applications
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
A Hand Book On Web
1 Development : From Basics of Pritma Jashnani Notion press 1/e, 2022
HTML to JavaScript and PHP
Advanced Web Development
2 Mohan Mehul BPB 1/e, 2020
with React
JavaScript Frameworks for Tim Ambler, Sufyan bin
3 Apress 1/e, 2019
Modern Web Development Uzayr, Nicholas Cloud
BIOINFORMATICS
Course Objectives:
SYLLABUS
Contact
Module Syllabus Description
Hours
Molecular Biology Primer (3 hours)
Genes, DNAs, RNAs, Proteins, Genomics, Sequencing techniques,
Bioinformatics overview and scope
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Understand the Basics of Bioinformatics K2
Use various biological databases and apply sequence alignment
CO2 K3
techniques
Use molecular phylogenetics to identify evolutionary relationships
CO3 K3
among various biological species
CO4 Apply the concept of combinatorial pattern matching in bioinformatics K3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 - - - - - - - - 2
CO2 3 3 3 - - - - - - - - 2
CO3 3 3 3 3 - - - - - - - 2
CO4 3 3 3 3 - - - - - - - 2
CO5 3 3 3 3 3 - - - - - - 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 An Introduction to Bioinformatics N. C. Jones and P.
MIT Press, 2004 1/e, 2004
Algorithms, A. Pevzner,
Bioinformatics for Beginners: Genes,
2 Genomes, Molecular Evolution, Supratim Choudhuri Academic Press 1/e, 2014
Databases and Analytical Tools
3 R Programming for Bioinformatics Robert Gentleman CRC Press 1/e, 2009
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
T. K. Attwood and D.
1 Introduction to Bioinformatics Pearson Education 1/e, 2003
J. Parry-Smith,
B. Junker and F.
2 Analysis of Biological Networks, Wiley Publishers 1/e, 2007
Schreiber,
Heterogeneous Information
Y. Sun and J. Han, Morgan & Claypool
3 Networks - Principles & 1/e, 2012
Mining Publishers
Methodologies
Cambridge
4 Multilayer Social Networks, M. E. Dickison et al, 1/e, 2016
University Press
INFORMATION SECURITY
(Common to CS/CM/CA/AM)
Course Objectives:
1. To learn the essentials of confidentiality, integrity and apply access control mechanisms to the
user information
2. To understand threats and Vulnerabilities and design security frameworks
3. To learn how to maintain the accuracy and completeness of data as it is transmitted over the
network with total security
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Information Security - CIA triad , OSI Security Architecture,
Security Goals, Security Services and Mechanisms, Threats, Attacks-
Malicious code, Brute force, Timing attack, Sniffers;
1 9
Access Control Mechanisms - Access Control, Access control matrix, Access
control in OS-Discretionary and Mandatory access control, Role-based access
control.
Software Vulnerabilities - Buffer and Stack Overflow, Cross-site Scripting
(XSS) and vulnerabilities, SQL Injection and vulnerabilities, Phishing;
2 9
Malwares - Viruses, Worms and Trjans, Topological worms, Trapdoors,
Salami attack, Man-in-the-middle attacks, Covert channels.
Introduction to security of information storage - Processing, and
Transmission. Information Security Management - The ISO Standards relating
to Information Security - Other Information Security Management
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Network security and Cryptography B. Menezes Cengage 1/e, 2010
Reference Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Cryptography and Network Security B. A. Forouzan, D.
1 Mukhopadhyay
McGraw Hill 3/e, 2015
No. Link ID
1 https://archive.nptel.ac.in/courses/106/106/106106129/
2 https://nptel.ac.in/courses/106106199
SEMESTER S7
EMBEDDED SYSTEMS
(Common to CS/CM/AM)
Course Objectives:
1. To provide a strong foundation in embedded systems, including the architecture, components,
and design principles.
2. To equip learners with the skills needed to design, develop, and integrate embedded systems
using microcontrollers, especially 8051.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Embedded Systems:-
Definition of Embedded System, Embedded Systems Vs General Computing
Systems, History, Classification, and, Major application areas of Embedded
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain the core components, characteristics, and applications of
CO1 K2
embedded systems, and their difference from general computing systems
Apply knowledge of the 8051 microcontroller, its architecture, instruction
CO2 K3
set, and addressing modes, to design and develop embedded systems.
Develop embedded firmware using appropriate languages, and understand
CO3 K3
the key concepts in hardware-software co-design.
Use the integration of embedded hardware and firmware, and utilize tools
CO4 K3
for system testing and validation
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Introduction to Embedded
1 Shibu K V McGraw Hill 2/e, 2017
Systems
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Embedded Systems Architecture,
1 Raj Kamal McGraw Hill 3/e, 2017
Programming and Design
Embedded Systems Design- A Unified Frank Vahid, Tony
2 Wiley 1/e, 2006
Hardware/Software Introduction Givargis
3 Embedded Systems Lyla B Das Pearson
No. Link ID
1 https://nptel.ac.in/courses/108102045
SEMESTER S7
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Blockchain Fundamentals
4 Handling. 10
Permissioned Blockchains, Introduction to Hyperledger Foundation,
Hyperledger Distributed Ledger frameworks, Hyperledger Fabric.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Explain the fundamental concepts of Blockchain technology. K2
Illustrate the cryptographic building blocks of Blockchain technology
CO2 K2
and understand the consensus mechanisms.
Explain the concepts of cryptocurrency bitcoin, mining processes, and
CO3 K2
wallet management.
Use the concepts of Ethereum platform and understand the use cases of
CO4 K3
blockchain technology
Develop skills in designing and deploying simple applications using
CO5 K3
Solidity language.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2
CO2 3 3 3 2
CO3 3 3 3 2
CO4 3 3 3 3 2
CO5 3 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Blockchain Technology: Asharaf S, Sivadas Neelima,
1 Wiley 1/e, 2023
Algorithms and Applications Adarsh S, Franklin John
Chandramauoli
Universities
2 BlockchainTechnology Subrahmaniyan, Asha A 1/e ,2020
Press.
George
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Packt
2 Mastering Blockchain Imran Bashir 1/e, 2020
Publishing
Solidity programming Essentials: A
Packt
3 beginner's guide to build smart contracts Ritesh Modi 1/e, 2018.
Publishing
for Ethereum and blockchain
Course Objectives:
1. To enable the learners to familiarize with the concepts of Real Time systems
2. To teach different task scheduling algorithms in uniprocessor and multiprocessor environments.
3. To learn the features of real-time communications, real-time databases and real time OS.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Real-Time systems: Basic concepts, applications of Real-Time
systems, basic model of Real-Time systems, characteristics of Real-Time
1 6
systems, types of Real-Time systems: hard, firm, soft, timing constraints,
modelling timing constraints.
Real-Time task scheduling: Basic concepts, clock driven scheduling, table
driven scheduling, cyclic, schedulers, hybrid schedulers, event driven
scheduling, EDF Scheduling, RMA, DMA, resource sharing among RT tasks,
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3 3
CO3 3 3 2 3
CO4 3 3 2 3
CO5 3 3 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Real-Time Systems: Theory and Practice Rajib Mall Pearson Education, 1/e, 2007
2 Real-Time Systems Jane W. S. Liu Pearson Education, 3/e, 2009
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Real-Time Systems Design and Philip A. Laplante,
1 Wiley 1/e, 2012
Analysis, Wiley Seppo J. Ovaska
Course Objectives:
1. To provide a deep understanding of approximation algorithms, including their design, analysis,
and application to various optimization problems.
2. To equip the skills to evaluate and analyze the efficiency and effectiveness of approximation
techniques. This includes understanding performance metrics, approximation ratios, and the
theoretical limits of approximation algorithms, as well as applying these techniques to complex
problems in network design, combinatorial optimization, and other areas.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basics of Approximation Algorithms - Introduction to approximation
algorithms, Performance guarantees: approximation ratio and factor,
Examples of approximation problems. (Chapter 1)
4 10) 9
Network Design Problems - Steiner tree problem, Traveling Salesman
Problem (TSP), Multicommodity flow problem. (Chapter 7)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Demonstrate a foundational understanding of approximation
CO1 algorithms, including performance guarantees, approximation ratios, K3
and common examples of approximation problems.
Illustrate the principles of greedy algorithms and apply them to solve
CO2 classic problems such as the set cover and vertex cover problems, K3
understanding their efficiency and limitations.
Show proficiency in local search algorithms and linear programming
CO3 relaxation methods, including the primal-dual method, and apply these K3
techniques to solve combinatorial optimization problems.
Understand and implement rounding techniques, both randomized and
deterministic, and learn the basics of semi-definite programming
CO4 K3
(SDP), including algorithms like Goemans-Williamson for the MAX-
CUT problem.
Demonstrate polynomial-time approximation schemes (PTAS) and
fully polynomial-time approximation schemes (FPTAS), and explore
CO5 K3
inapproximability results, including reductions, hardness of
approximation, and the PCP theorem.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 2
CO2 3 3 3 3 2
CO3 3 3 3 3 2
CO4 3 3 3 3 2
CO5 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Approximation Algorithms Vijay V. Vazirani Springer Nature (SIE) 2/e, 2013
Reference Books
Edition
Name of the
Sl. No Title of the Book Name of the Author/s and
Publisher
Year
The design of approximation David Williamson and Cambridge
1 1/e, 2011
algorithms David Shmoys University Press
Rajeev Motwani and Cambridge
2 Randomized Algorithms 1/e, 2004
Prabhakar Raghavan University Press
Probability and Computing:
Randomization and Probabilistic Michael Mitzenmacher and Cambridge
3 3/e, 2017
Techniques in Algorithms and Data Eli Upfal University Press
Analysis
Thomas H. Cormen, Charles
4 Introduction to Algorithms E. Leiserson, Ronald L. The MIT Press 4/e, 2023
Rivest and Clifford Stein
Noga Alon and Joel H.
5 The Probabilistic Method Wiley-Blackwell 4/e, 2016
Spencer
Computational Complexity: A Sanjeev Arora and Boaz Cambridge
6 1/e, 2019
Modern Approach Barak University Press
COMPUTER VISION
Course Objectives:
1. To cover the basics of image formation, key computer vision concepts, methods, techniques,
pattern recognition, and various problems in designing computer vision and object
recognition systems.
2. To enable the learners to understand the fundamentals of computer vision and machine
learning models to develop applications in computer vision.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals in Computer Vision :-
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the basic concepts and terminologies like Camera
CO1 K2
Calibration, Stereopsis in computer vision
CO2 Apply filters for feature extraction and for finding patterns. K3
CO3 Build different machine learning models for computer vision K3
CO4 Implement segmentation and object detection models K3
Analyze different machine learning models for segmentation/object
CO5 K4
detection.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Computer vision: A modern Forsyth, David, and Jean
1 Prentice hall 2011
approach Ponce
Emerging topics in computer Medioni, Gerard and Sing
2 PHI 2004
vision Bing Kang
Valliappa Lakshmanan,
Practical Machine Learning for
3 Martin Görner, Ryan O'Reilly Media 2021
Computer Vision
Gillard
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Computer vision: algorithms Springer Science &
1 Szeliski, Richard 2010
and applications Business Media
Image Segmentation:
2 Principles, Techniques, and Tao Lei, Asoke K. Nandi John Wiley & Sons 2022
Applications
Deep Learning in Computer
Ali Ismail Awad,
3 Vision Principles and CRC Press 2020
Mahmoud Hassaballah
Applications
Course Objectives:
1. To understand and apply spectral graph theory techniques to analyze and solve complex graph
problems, such as community detection and network design, through detailed study and
hands-on assignments.
2. To develop and evaluate LP- and SDP-based approximation algorithms for NP-hard
problems, including real-world applications like scheduling and optimization, by
implementing these algorithms and assessing their performance in practical scenarios
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Spectral Graph Theory - Introduction to Spectral Graph Theory, Graph
Laplacians: Definition and Properties, Eigenvalues and Eigenvectors of
Laplacian matrices, Cheeger’s Inequality, Graph Partitioning.
Assignments:
1. Implement Cheeger’s inequality for a set of sample graphs. Compare
the theoretical results with empirical data to analyze the effectiveness
of different partitioning algorithms. Use a set of sample graphs such
as Erdős-Rényi Random Graphs, Barabási-Albert Model: Known for
1 9
scale-free properties, and Regular Graphs. Compare theoretical
results with empirical data using different partitioning algorithms
such as Spectral Clustering - Uses the eigenvectors of the Laplacian
matrix, K-means Clustering - Applied to spectral embeddings of the
graph, Normalized Cut - Minimizes the normalized cut criterion.
Measure how close the empirical conductance is to the theoretical
lower bound provided by Cheeger's inequality. Analyze which
algorithms produce cuts with conductance values closer to the
theoretical bounds.
Real-world Application: Apply Cheeger's inequality to social
network analysis to detect community structures.
2. Analyze the properties of the Laplacian matrix of a given graph
(Erdős-Rényi Random Graphs). Compute its eigenvalues and
eigenvectors and discuss the implications for graph partitioning.
Examine the use of graph Laplacians in network community
detection.
Spectral Clustering - Introduction to Clustering and Spectral Clustering,
Normalized Cut, Eigenvalue Techniques for Clustering, Spectral Clustering
Algorithm, Applications of Spectral Clustering.
Assignment:
1. Implement a spectral clustering algorithm and apply it to a real-world
dataset (Iris dataset). After running the spectral clustering algorithm,
evaluate the results using metrics such as Silhouette Score and
Adjusted Rand Index (ARI). Plot the data points colored by their
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
CO5 3 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Spectral Graph Theory (CBMS American
1 Fan R. K. Chung 1/e, 1997
Regional Conference Series) Mathematical Society
2 Algebraic Graph Theory Norman Biggs Cambridge India 2/e, 2016
3 Approximation Algorithms Vijay V. Vazirani Springer Nature 2/e, 2013
Stephen Boyd, Lieven Cambridge University
4 Convex Optimization 1/e, 2004
Vandenberghe Press
Reference Books
Sl. Name of the Name of the Edition
Title of the Book
No Author/s Publisher and Year
1 Algebraic Graph Theory C. Godsil, G.F. Royle Springer Nature 1/e, 2009
David Williamson, Cambridge
2 The design of approximation algorithms 1/e, 2011
David Shmoys University Press
Rajeev Motwani, Cambridge
3 Randomized Algorithms 1/e, 2004
Prabhakar Raghavan University Press
Probability and Computing: Randomization Michael
Cambridge
4 and Probabilistic Techniques in Algorithms Mitzenmacher, Eli 3/e, 2017
University Press
and Data Analysis Upfal
Graph Theory and Complex Networks: An Maarten Van
5 Maarten Van Steen 1/e, 2010
Introduction Steen
No. Link ID
1 https://archive.nptel.ac.in/courses/128/106/128106001/
SEMESTER S7
Course Objectives:
1. To give a comprehensive understanding of advanced networking concepts, including MPLS,
VPNs, Data Center Networks, and Software-Defined Networking (SDN).
2. To impart the skills necessary to analyze, design, and evaluate complex networking
architectures, addressing the challenges and emerging trends.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Review of Computer Networking Fundamentals - OSI and TCP/IP Models,
Layers and Protocols, IP Addressing and Subnetting, Routing Protocols -
RIP, OSPF, BGP;
QoS in IP networks - Random Early Detection, Protocols for QoS support -
1 8
RSVP, RTP, Multiprotocol Label Switching (MPLS): Overview and Use
Cases; Network Security Basics - Firewalls, ACLs, and NAT; Working of
NAT; Virtual Private Networks (VPNs) - Types and Architectures;
Overview of Data Center Networks: Key Components and Topologies;
DLL switching - Overview, VLANs, Inter-VLAN Routing; Spanning Tree
Protocol (STP) - IEEE 802.1D, Rapid Spanning Tree Protocol (RSTP) -
IEEE 802.1w, Multiple Spanning Tree Protocol (MSTP) - IEEE 802.1s, STP
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Explain and critically analyze advanced networking protocols and
CO1 technologies, including MPLS, VPNs, and SDN, and their applications K3
in modern networks
Demonstrate an understanding of data center network architectures,
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 3
CO2 3 3 3 2 3
CO3 3 3 3 2 3
CO4 3 2 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Computer Networking: A Top-Down James F. Kurose,
1 Pearson 8/e, 2022
Approach Keith W. Ross
Data Center Virtualization Fundamentals: Gustavo A. A.
Understanding Techniques and Designs for Santana
2 CISCO Press 1/e, 2013
Highly Efficient Data Centers with Cisco
Nexus, UCS, MDS, and Beyond
Jim Guichard, Ivan
3 MPLS and VPN Architectures CISCO Press 1/e, 2000
Pepelnjak, Jeff Apcar
High-speed networks and Internet:
4 William Stallings Pearson 2/e, 2002
Performance and Quality of Service
Paul Goransson,
Software Defined Networks: A Chuck Black, Morgan
5 2/e, 2016
Comprehensive Approach Timothy Culver Kaufman
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Cloud Networking: Understanding
1 Gary Lee Morgan Kaufman 1/e, 2014
Cloud-based Data Centre Networks
Course Objectives:
1. To impart the ideas of fairness, accountability, bias, and privacy as fundamental aspects of
responsible AI.
2. To teach the principles of interpretability techniques including simplification, visualization,
intrinsic interpretable methods, and post hoc interpretability for AI models.
3. To give the learner understanding of the ethical principles guiding AI development, along
with privacy concerns and security challenges associated with AI deployment.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Foundations of Responsible AI :-
Introduction to Responsible AI- Overview of AI and its societal impact;
1 7
Fairness and Bias - Sources of Biases, Exploratory data analysis, limitation
of a dataset, Preprocessing, inprocessing and postprocessing to remove bias.
Interpretability and explainability:-
Interpretability - Interpretability through simplification and visualization,
Intrinsic interpretable methods, Post Hoc interpretability, Explainability
2 10
through causality, Model agnostic Interpretation.
Interpretability Tools - SHAP (SHapley Additive exPlanation), LIME(Local
Interpretable Model-agnostic Explanations)
Ethics, Privacy and Security :-
Ethics and Accountability -Auditing AI models, fairness assessment,
4 and responsibility. 9
Case Studies - Recommendation systems, Medical diagnosis, Computer
Vision, Natural Language Processing.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Identify and describe key aspects of responsible AI such as fairness,
CO1 K2
accountability, bias, and privacy.
CO2 Describe AI models for fairness and ethical integrity. K2
Understand interpretability techniques such as simplification,
CO3 visualization, intrinsic interpretable methods, and post hoc K2
interpretability.
Comprehend the ethical principles, privacy concerns, and security
CO4 K3
challenges involved in AI development and deployment.
Understand responsible AI solutions for practical applications, balancing
CO5 K3
ethical considerations with model performance.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Responsible Artificial Intelligence: How to
1 Virginia Dignum Springer Nature 1/e, 2019
Develop and Use AI in a Responsible Way
2 Interpretable Machine Learning Christoph Molnar Lulu 1/e, 2020
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
ResponsibleAI Implementing
Sray Agarwal,
1 Ethical and Unbiased Springer Nature 1/e, 2021
Shashin Mishra
Algorithms
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://youtu.be/3-xhMXeYIcg?si=x8PXrnk0TabaWxQV
https://youtu.be/sURHNhBMnFo?si=Uj0iellJs3oLOmDL [SHAP and LIME]
https://c3.ai/glossary/data-science/lime-local-interpretable-model-agnostic-explanations/
2
https://shap.readthedocs.io/en/latest/
https://www.kaggle.com/code/bextuychiev/model-explainability-with-shap-only-guide-u-need
3 https://www.youtube.com/live/DA7ldX6OIG4?si=Dk4nW1R1zi_UMG_4
https://youtu.be/XlYhKwRLerc?si=IeU7C0BLhwn9Pvmi
Case Studies
4
https://www.kaggle.com/code/teesoong/explainable-ai-on-a-nlp-lstm-model-with-lime
https://www.kaggle.com/code/victorcampelo/using-lime-to-explaining-the-preditions-from-ml
SEMESTER S7
FUZZY SYSTEMS
(Common to CS/CA)
Course Objectives:
1. To understand the concepts of fuzziness and its use in building better solutions to problems.
2. To understand the basic concepts of fuzzy sets, fuzzy relations, fuzzy logic and building of
fuzzy approximation-based solutions.
SYLLABUS
Modu Contact
Syllabus Description
le No. Hours
Basic Fuzzy Set Theory :-
Introduction - Uncertainty, Imprecision and Vagueness. Crisp vs Fuzzy sets.
Representation of Fuzzy sets. Membership Functions – Types, Basic
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Explain fuzzy logic based problem solving K2
Summarize the concepts of crisp sets, crisp relations, crisp logic with
CO2 K3
fuzzy sets, fuzzy relations and fuzzy logic
Develop fuzzy systems by selecting appropriate membership functions,
CO3 K3
fuzzification and defuzzification methods
CO4 Develop solutions using graphical and rule-based methods K3
CO5 Make use of fuzzy logic inference to solve real world problems K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 1 1 2
CO2 3 1 1 2
CO3 3 3 2 1 2
CO4 3 3 2 1 2
CO5 3 3 2 2 1 2
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Fuzzy Logic with Engineering John Wiley and Sons 3/e, 2010
Timothy J. Ross
Applications
DIGITAL FORENSICS
(Common with CS/CM/CA/CD/CR/AI/AM/AD)
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to Digital Forensics - Principles in Digital Forensics; Stages in
Digital Forensics Investigation- Forensics Imaging & Cloning, Concept of
Chain of Custody, Digital Evidence Handling at Crime Scene,
Collection/Acquisition and Preservation of Digital Evidence, Processing &
Analysis, Compilation of Findings & Reporting; Expansion of Stages in
Digital Investigation.
Types of Storage Media - Hard Disk Drives (HDD), Solid State Drives
(SSD), USB Flash Drives, Optical Discs, Memory Cards, Cloud Storage,
Drive Geometry, Cylinders, Heads, and Sectors, Logical Block Addressing
1 10
(LBA); Expansion of Types of Storage Medium.
Overview of File Systems - Introduction to File Systems, File Systems in
Digital Forensics, FAT (File Allocation Table), Structure and Characteristics
: FAT12, FAT16, FAT32, NTFS (New Technology File System), Structure
and Characteristics, Master File Table (MFT), EXT (Extended File System),
EXT2, EXT3, EXT4, Journaling in EXT3 and EXT4, HFS (Hierarchical File
System), HFS and HFS+ Structure and Characteristics, Metadata and
Attributes
Tools suggested : Hex Viewer , FTK Imager , OS Forensics
Windows Forensics - OS Artefacts, Registry Analysis, Analysis of USB
Connections, Event Logs, Applications, Slack Space, Overwritten Files, Data
Recovery Techniques, Volatile and Non-Volatile Data, Hibernation file
analysis, Pagefile analysis, prefetch files, thumbnails, Timestamps, File
Signatures, File System Analysis Tools, Techniques for Recovering Deleted
2 9
Files, File Carving; Memory Forensics - RAM dump and analysis; Linux
and MAC Forensics; Anti Forensics Methods - Steganography, Encryption,
Alternate Data Streams.
Tools suggested : Hex Viewer, FTK Imager, Autopsy, RegRipper, Volatility,
Dumpit
Mobile Forensics - Introduction to Mobile Forensics, Mobile Forensics
Fundamentals, Understanding Mobile Device Storage, Android, iOS,
Windows OS Artifacts, ADB (Android Debug Bridge), APK Files,
Techniques for Acquiring Data from Mobile Devices, Rooting, Jailbreaking.
Analysis of Application Files - Social Media Files, Understanding and
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Perform forensics analysis of hard disk, Network, and mobile phones. K3
CO2 Experiment with the network traffic dump. K3
CO3 Examine the analyse logs of the systems and identify the anomalies. K3
CO4 Plan an onsite triage in case of an incident. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2
CO2 3 3 3 3 2
CO3 3 3 3 3 2
CO4 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Digital Forensics and Incident
1 Gerard Johansen Packt 2/e, 2020
Response
Guide to Computer Forensics and Bill Nelson, Amelia Phillips,
2 Cengage 6/e, 2020
Investigations Christopher Steuart
Rohit Tamma, Oleg Skulkin ,
3 Practical Mobile Forensics Packt 4/e, 2020
Heather Mahalik, Satish Bommisetty
Mobile Forensics - Advanced
4 Oleg Afonin, Vladimir Katalov Packt 1/e, 2016
Investigative Strategies
Network Forensics : Tracking
5 Sherri Davidoff, Jonathan Ham Pearson 1/e, 2013
Hackers Through Cyberspace
Addison-
6 File system forensic analysis Brian Carrier 1/e, 2005
Wesley
Windows Forensics: The Field
7 Guide for Corporate Computer Chad Steel Wiley 1/e, 2006
Investigations
Android Forensics: Investigation,
8 Analysis and Mobile Security for Andrew Hoog Syngress 1/e, 2011
Google Android
No. Link ID
1 https://onlinecourses.swayam2.ac.in/cec20_lb06/preview
2 https://www.swgde.org/documents/published-by-committee/quality-standards/
3 https://csrc.nist.gov/pubs/sp/800/101/r1/final
SEMESTER S7
Course Objectives:
1. To equip students with a general purpose tool to analyze strategic behavior in multi-agent
interaction
2. To discuss the mathematical details of analyzing and designing strategic interactions.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Game Theory - Competitive equilibrium, Rationality;
Strategic Games - Dominance, Nash equilibrium, Maxmin strategies,
elimination of dominated strategies, preservation of pure Nash equilibrium
1 8
(PSNE), matrix games, relation between maxmin and PSNE in matrix games
Mixed strategies, mixed strategy Nash equilibrium (MSNE), finding MSNE,
MSNE characterization theorem, algorithm to find MSNE
Correlated equilibrium (CE) - Computing CE, extensive form games,
subgame perfection, limitations of subgame perfect Nash equilibrium;
Imperfect information extensive form games (IIEFG) - strategies in IIEFGs,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Differentiate between different types of games Identify various
CO1 K3
equilibria within games
CO2 Identify strategic interactions. K3
CO3 Describe the basic concepts of non-cooperative and cooperative games. K2
CO4 Apply the concepts in different game scenarios. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 An Introduction to Game Cambridge University 1/e, 2004
Martin Osborne
Theory Press
2 Game Theory and Mechanism Y. Narahari World Scientific and 1/e, 2013
Design IISc Press
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Game Theory 101: The
1 William Spaniel Self 1/e,
Complete Textbook
Princeton University
2 Game Theory - An Introduction Steven Tadelis 1/e, 2013
Press
Course Objectives:
1. To Gain an understanding of the modern processor architectures.
2. To Give an introduction to parallel programming using OpenMP and MPI.
SYLLABUS
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
CO2 3 2 3
CO3 3 3 3 2 3
CO4 3 3 3 2 3
Text Books
Sl. No Title of the Book Name of the Author/s Name of the Edition and
Publisher Year
Introduction to High
Georg Hager
1 Performance Computing for CRC Press 1/e, 2011
Gerhard Wellein
Scientists and Engineers
Thomas Sterling, Maciej
High Performance Computing: Morgan
2 Brodowicz, Matthew 1/e, 2017
Modern Systems and Practices Kaufmann
Anderson
Reference Books
Sl. Title of the Book Name of the Name of the Edition and
No Author/s Publisher Year
Parallel and High-Performance Robert Robey Manning
1 1/e, 2021
Computing Yuliana Zamora Publications
Charles Severance
2 High-Performance Computing O'Reilly Media 2/e, 1998
Kevin Dowd
Computer Architecture And Parallel Kai Hwang
3 McGraw-Hill 1/e, 1984
Processing Faye Alaye Briggs
Computer Architecture: A John L. Hennessy
4 Morgan Kaufman 6/e, 2017
Quantitative Approach David A. Patterson
PROGRAMMING LANGUAGES
(Common to CS/CR/CM/CA/AD/AM)
Course Objectives:
1. To enable the students understand various constructs and their respective comparisons in
different high-level languages so that he can choose a suitable programming language for
solving a particular problem
2. To develop the student’s ability to understand the salient features and paradigms in the
landscape of programming languages.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction - The Origins of Programming Languages, Abstractions in
Programming Languages, Computational Paradigms, Language Definition,
Language Translation, The Future of Programming Languages; Language
Design Criteria - Historical Overview, Efficiency, Regularity, Security,
Extensibility, C++: An Object-Oriented Extension of C, Python: A General-
1 9
Purpose Scripting Language; Syntax and Analysis Parsing: Lexical Structure
of Programming Languages, Context-Free Grammars and BNFs, Parse Trees
and Abstract Syntax Trees, Ambiguity, Associativity, and Precedence, EBNFs
and Syntax Diagrams, Parsing Techniques and Tools, Lexics vs. Syntax vs.
Semantics, Case Study: Building a Syntax Analyzer for TinyAda;
Basic Semantics- Attributes, Binding, and Semantic Functions, Declarations,
Blocks, and Scope, The Symbol Table, Name Resolution and Overloading,
Allocation, Lifetimes, and the Environment, Variables and Constants, Aliases,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the history of programming languages and introduce
CO1 abstraction, the concept of different language paradigms, and an K1
overview of language design criteria.
Describe how the syntactic structure of a language can be precisely
CO2 specified using context-free grammar rules in Backus-Naur form K2
(BNF).
Explain the abstractions of the operations that occur during the
CO3 K2
translation and execution of programs.
CO4 Apply the data types in various languages K3
Apply procedure activation and parameter passing; and exceptions and
CO5 K4
exception handling.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 3
CO2 2 3 2 3
CO3 3 2 2 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Name of the Edition
Title of the Book
No Author/s Publisher and Year
1 Kenneth C Cengage
Programming languages: principles and practices. 3/e, 2011
Louden Learning
2 Concepts of programming languages. Sebesta R W. Pearson 12/e, 2023
3 Programming languages: concepts and constructs. Sethi R Pearson 2/e, 2006
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Programming Languages: Principles and Allen Tucker, Robert
1 Paradigms Noonan
McGraw-Hill 2/e, 2017
2 Principles of programming languages. Gilles Dowek. Springer 1/e, 2009.
3 Principles of Programming Languages Rajiv Chopra Wiley 1/e, 2019
No. Link ID
1 https://archive.nptel.ac.in/courses/106/102/106102067/
SEMESTER S7
PARALLEL ALGORITHMS
(Common to CS/CM/CD/AM)
Course Objectives:
1. To develop a comprehensive understanding of parallel computing principles and architectures by
studying various types of parallelism, such as data and task parallelism, and analyzing different
computing architectures.
2. To implement and evaluate parallel algorithms for fundamental operations, such as matrix
addition and multiplication, using performance metrics like speedup and scalability, while gaining
hands-on experience with parallel programming models and tools.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Parallel Computing - Overview of parallel computing and its
importance, Types of parallelism: data parallelism, task parallelism, Parallel
computing architectures: SIMD, MIMD, shared memory, distributed memory.
Parallel Programming Models - Parallel programming models: Parallel
1 9
Random Access Machine (PRAM), bulk synchronous parallel (BSP), LogP,
Shared memory vs. distributed memory models; Performance Metrics -
Performance metrics for parallel algorithms: speedup, efficiency, scalability,
Amdahl's Law and Gustafson's Law.
Parallel Algorithms for Basic Operations - Parallel algorithms for matrix
addition, matrix multiplication, and reduction, Parallel prefix sum (Parallel
scan) algorithms. Case Studies of Parallel Addition, Multiplication, Reduction,
2 9
and Prefix Sum in Modern Computing Systems; Parallel Sorting Algorithms -
Parallel sorting algorithms: parallel merge sort, parallel quicksort, bitonic
merge sort, Comparison of parallel sorting techniques.
Parallel Graph Algorithms - Parallel algorithms for graph traversal: BFS, DFS,
3 9
Parallel algorithms for minimum spanning tree (MST) and shortest path.
Parallel Search Algorithms - Parallel search algorithms: parallel binary search,
parallel search trees, Applications and analysis.
Parallel Programming with OpenMP - Introduction to OpenMP, Parallel
programming constructs in OpenMP, Performance tuning and optimization
Parallel Programming with MPI - Introduction to MPI, Message passing
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand and articulate the fundamental principles and architectures
CO1 K2
of parallel computing.
Implement and evaluate parallel algorithms for basic operations such
CO2 K3
as sorting and searching.
Develop and analyze parallel algorithms for complex problems,
CO3 K3
including graph and numerical algorithms.
Apply parallel programming techniques to real-world problems and
CO4 K3
assess the efficiency and performance of parallel solutions.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 3
CO2 3 3 3 2 3
CO3 3 3 3 3 3
CO4 3 3 3 3 2 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Ananth Grama, Anshul
1 Introduction to Parallel Computing Gupta, George Karypis, Addison-Wesley 2/e, 2003
Vipin Kumar
Parallel Programming: Techniques and
2 Barry Wilkinson and
Applications Using Networked Pearson India 2/e, 2006
Michael Allen
Workstations and Parallel Computers
3 Addison-Wesley
An Introduction to Parallel Algorithms Joseph Jaja 1/e, 1992
Professional
4 Henri Casanova, Arnaud Chapman and
Parallel Algorithms 1/e, 2020
Legrand, Yves Robert Hall/CRC
5 Parallel Scientific Computing in C++ and George Em Karniadakis Cambridge
1/e, 2003
MPI and Robert M. Kirby II University Press
Reference Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Parallel Programming for Multicore and Thomas Rauber, Gudula
1 Springer 3/e, 2023
Cluster Systems Rünger
Using OpenMP: Portable Shared Memory Barbara Chapman, Gabriele
2 MIT Press 1/e,2007
Parallel Programming Jost, Ruud van der Pas
Using MPI: Portable Parallel
William Gropp, Ewing
3 Programming with the Message-Passing MIT Press 3/e, 2014
Lusk, Anthony Skjellum
Interface
INTERNET OF THINGS
(Common to CS/CM/CA)
Course Objectives:
1. To provide students with an understanding of IoT architecture, protocols, and integration
techniques that enable device-to-device, device-to-cloud, and cloud-to-cloud
communications.
2. To enable students with the ability to create and implement IoT solutions using platforms like
Raspberry Pi, cloud-based services, and analytics tools to develop real-world IoT
applications.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction - Why IoT? Trends in IT Space, Internet of Things Era, Device-
to-Device/Machine-to-Machine Integration, Device-to-Cloud (D2C)
Integration, IoT Platform as a Service (PaaS), Cloud-to-Cloud (C2C)
1 8
Integration, IoT Key Application Domains, Emerging IoT Flavors; IoT
Ecosystem - Architecture for IoT, Mobile Technologies, Mobile Application
Development Platforms, LPWAN.
Infrastructure and Service Discovery Protocols - Layered Architecture for IoT,
Protocol Architecture of IoT, Infrastructure Protocols, Device or Service
Discovery for IoT, Protocols & products for IoT Service Discovery;
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 The Internet of Things Pethuru Raj, Anupama C. Raman CRC Press 1/e, 2017
2 Mastering Internet of Things Peter Waher Pact 1/e, 2018
Reference Books
Sl. Name of the Name of the Edition
Title of the Book
No Author/s Publisher and Year
Internet of Things : Architecture and
1 Raj Kamal McGraw Hill 2/e, 2023
Design Principles
Internet of Things : Principles and Rajkumar Buyya
2 Morgan Kaufman 1/e, 2016
Paradigms Amir Vahid Dastjerdi
Sudip Misra, Anandarup Cambridge
3 Introduction to IoT 1/e, 2021
Mukherjee, Arijit Roy University Press
Video Links (NPTEL, SWAYAM…)
No. Link ID
1 https://archive.nptel.ac.in/courses/106/105/106105166/
SEMESTER S7
Course Objectives:
1. To equip students with the ability to design, analyze, and implement advanced algorithms that
are fundamental to data science, enabling them to process and analyze large-scale datasets
efficiently and effectively.
2. To provide hands-on experience through real-world projects that require students to apply
algorithmic techniques to solve data science problems, strengthen the development of
practical skills in data manipulation, analysis, and interpretation.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Foundations of Data Science Algorithms
Introduction to Data Science and Algorithms - Overview of data science and
its significance, Role of algorithms in data science; Data Preprocessing
Techniques - Data cleaning, transformation, and normalization, Handling
missing data, outliers, and data imputation techniques; Dimensionality
reduction techniques - Principal Component Analysis (PCA), t-Distributed
Stochastic Neighbor Embedding (t-SNE); Algorithmic Approaches to Data
1 9
Sampling - Random sampling, stratified sampling, and bootstrapping,
Importance of representative sampling in data analysis.
Bloom’s
Course Outcome Knowledge
Level (KL)
Implement data preprocessing and cleaning techniques to prepare raw
CO1 K3
data for analysis, ensuring the quality and reliability of the datasets.
Perform exploratory data analysis (EDA) and create insightful
CO2 visualizations that help in understanding the underlying patterns and K4
trends in the data.
Develop predictive models using various regression and classification
CO3 algorithms, and optimize them for better performance, applying K5
appropriate evaluation metrics.
Implement scalable algorithms using distributed computing
CO4 K6
frameworks like Apache Spark to process large datasets efficiently.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 2
CO2 3 3 3 3 2
CO3 3 3 3 3 2
CO4 3 3 3 3 2
CO5 3 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Algorithms for Data Science Brian Steele, John
1 Springer International 1/e, 2016
Hardcover Chandler, Swarna Reddy
Jure Leskovec, Anand Cambridge University
2 Mining of Massive Datasets 2/e, 2020
Rajaraman, Jeff Ullman Press
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Avrim Blum, John Hopcroft Cambridge
1 Foundations of Data Science 1/e, 2020
and Ravi Kannan University Press
The Elements Of Statistical Trevor Hastie, Robert
2 Learning: Data Mining, Tibshirani and Jerome Springer 9/e, 2017
Inference, And Prediction Friedman
Data Mining: Concepts and Jiawei Han, Micheline Kamber Morgan
3 3/e, 2011
Techniques and Jian Pei Professor Kaufmann
Data Mining and Predictive
4 Daniel T. Larose Wiley 2/e, 2015
Analytics
Dirk Deroos, Paul C.
5 Hadoop for Dummies Zikopoulos, Roman B. Melnyk, Wiley 1/e, 2014
Bruce Brown, Rafael Coss
CYBER SECURITY
Course Objectives:
1. To teach the basic attacks, threats and vulnerabilities related to cyber security
2. To make the learner aware of cyber crimes and cyber laws
3. To give concepts of the malwares and its protection mechanisms in systems and mobile
devices
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Cyber Security :-
Basic Cyber Security Concepts, Layers of Security, Vulnerability, Threats,
Computer Criminals, CIA Triad, Motive of Attackers, Active attacks, Passive
1 9
attacks, Software attacks, Hardware attacks, Cyber Threats and its
Classifications- Malware, Social Engineering, DoS/DDoS, Insider Threats,
Advanced Persistent Threats (APTs), Data Breaches and Information Theft.
Cybercrime and CyberLaw :-
Cybercrime, Classification of Cybercrimes, The legal perspectives- Indian
perspective, Global perspective, Categories of Cybercrime.
2 9
Fundamentals of cyber law, Outline of legislative framework for cyber Law,
History and emergence of cyber law, Outreach and impact of cyber law, Major
amendments in various statutes.
Malwares and Protection against Malwares :-
Virus, Worms, Trojans, Spyware, Adware, Key-logger, Ransomware,
Common Methods of Malware Propagation- Email Attachments, Malicious
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 3 2
CO2 2 3 2 2
CO3 2 3 2 2
CO4 2 3 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Reference Books
Sl. Name of the Name of the Edition
Title of the Book
No Author/s Publisher and Year
1 Computer Security: Principles and Practices William Stallings Pearson 5/e, 2011
CLOUD COMPUTING
Course Objectives:
1. To understand the core principles, architecture, and technologies that underpin cloud
computing, including virtualization, data storage, and cloud services.
2. To equip students with the skills to use cloud computing tools effectively, implement cloud-
based applications, and address security challenges within cloud environments.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction - Cloud Computing, Types of Cloud, Working of Cloud
2 And Cloud Computing; Data Storage And Cloud Computing - Data Storage, 9
Cloud Storage, Cloud Storage from LANs to WANs.
Cloud Computing Services - Cloud Computing Elements, Understanding
Services and Applications by Type, Cloud Services; Cloud Computing and
3 10
Security - Risks in Cloud Computing, Data Security in Cloud, Cloud
Security Services.
Cloud Computing Tools - Tools and Technologies for Cloud, Apache
Hadoop, Cloud Tools; Cloud Applications - Moving Applications to the
4 9
Cloud, Microsoft Cloud Services, Google Cloud Applications, Amazon
Cloud Services.
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Articulate the fundamental concepts of cloud computing, its types, and
CO1 K2
how cloud computing architecture operates.
Understand and describe the foundations of virtualization, its relationship
CO2 K2
with cloud computing.
Describe various cloud computing services, understand the different
CO3 K3
service models, and identify potential risks.
Demonstrate proficiency in using cloud computing tools such as Apache
CO4 K3
Hadoop, and deploy applications using popular cloud platforms.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
1
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO
PO1 PO2 PO3 PO4 PO6 PO7 PO8 PO9 PO10 PO11 PO12
5
CO1 2 2 2 2
CO2 2 2 2 2 2
CO3 2 2 2 2 2
CO4 2 2 2 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Cloud Computing: A Practical Approach for A.Srinivasan,
Pearson 1/e, 2014
Learning and Implementation J.Suresh
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Cloud Computing : Concepts,
1 Technology, Security, and Thomas Erl Pearson 2/e, 2023
Architecture
Cambridge University
2 Cloud Computing Sandeep Bhowmik 1/e, 2017
Press
Cloud Computing: A Hands-On Arshdeep Bahga and
3 Universities Press 1/e, 2014
Approach Vijay Madisetti
2
SEMESTER S7
SOFTWARE ENGINEERING
Course Code OECST723 CIE Marks 40
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Credits 3 Exam Hours 2 Hrs. 30 Min.
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to Software Engineering and Process Models - Software
engineering, Software characteristics and types, Layers of Software
Engineering-Process, Methods, Tools and Quality focus. Software Process
models – Waterfall, Prototype, Spiral, Incremental, Agile model – Values and
Principles.
1 9
Requirement engineering - Functional, Non-functional, System and User
requirements. Requirement elicitation techniques, Requirement validation,
Feasibility analysis and its types, SRS document characteristics and its
structure.
Case study: SRS for College Library Management Software
Software design - Software architecture and its importance, Software
architecture patterns: Component and Connector, Layered, Repository, Client-
Server, Publish-Subscribe, Functional independence – Coupling and Cohesion
2 10
Case study: Ariane launch failure
Object Oriented Software Design - UML diagrams and relationships– Static
and dynamic models, Class diagram, State diagram, Use case diagram,
1
Sequence diagram
Case Studies: Voice mail system, ATM Example
Software pattern - Model View Controller, Creational Design Pattern types –
Factory method, Abstract Factory method, Singleton method, Prototype
method, Builder method. Structural Design Pattern and its types – Adapter,
Bridge, Proxy, Composite, Decorator, Façade, Flyweight. Behavioral Design
Pattern
Coding, Testing and Maintenance:
Coding guidelines - Code review, Code walkthrough and Code inspection,
Code debugging and its methods.
Testing - Unit testing , Integration testing, System testing and its types, Black
box testing and White box testing, Regression testing
2
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one full
question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Plan the system requirements and recommend a suitable software process
CO1 K3
model.
CO4 Develop a software product based on cost, schedule and risk constraints. K3
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
3
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Software Engineering: A
1 Roger S. Pressman McGraw-Hill 8/e, 2014
practitioner's approach
2 Software Engineering Ian Sommerville Addison-Wesley 10/e, 2015
Erich Gamma,Richard Pearson Education
Design Patterns, Elements of
3 Helm, Ralph Addison-Wesley 1/e, 2009
Reusable Object Oriented Software
Johnson,John Vlissides
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Pankaj Jalote’s Software Engineering:
1 Pankaj Jalote Wiley India 1/e, 2024
With Open Source and GenAI
Waman S
2 Software Engineering: A Primer Tata McGraw-Hill 1/e, 2008
Jawadekar
Object-Oriented Modelling Michael Blaha, Pearson Education.
3 2/e, 2007
and Design with UML James Rumbaugh
Software Engineering Foundations : A Auerbach
4 Yingux Wang 1/e, 2008
Software Science Perspective Publications
5 Object-Oriented Design and Patterns Cay Horstmann Wiley India 2/e, 2005
Engineering Software Products: An
1/e, 2020
6 Introduction to Modern Software Ian Sommerville Pearson Education
Engineering
4
Video Links (NPTEL, SWAYAM…)
Module
Link ID
No.
1 https://www.youtube.com/watch?v=Z6f9ckEElsU
2 https://www.youtube.com/watch?v=1xUz1fp23TQ
3 http://digimat.in/nptel/courses/video/106105150/L01.html
4 https://www.youtube.com/watch?v=v7KtPLhSMkU
2 https://archive.nptel.ac.in/courses/106/105/106105182/
5
SEMESTER S7
COMPUTER NETWORKS
Course Objectives:
1. To Introduce the core concepts of computer networking.
2. To Explore routing protocols and their role in network communication
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Computer Networks:-
Introduction, Network Components, Network Models, ISO/OSI, TCP/IP,
1
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Part A Part B Total
2 Questions from each module. Each question carries 9 marks.
Total of 8 Questions, each Two questions will be given from each module, out of
carrying 3 marks which 1 question should be answered.
60
Each question can have a maximum of 3 subdivisions.
(8x3 =24 marks) (4x9 = 36 marks)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
2
Text Books
Name of the Edition and
Sl. No Title of the Book Name of the Author/s
Publisher Year
1 Computer Networks: A Top-
Behrouz A Forouzan McGraw Hill SIE, 2017
Down Approach
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Computer Networks, A L. L. Peterson and B. S.
1 Morgan Kaufmann 5/e, 2011
Systems Approach Davie
Sameer Seth
2 TCP/IP Architecture, design,
M. Ajaykumar Wiley 1/e, 2008
and implementation in Linux
Venkatesulu
3 Computer Networks Andrew Tanenbaum Pearson 6/e, 2021
Computer Networking: A Top-
4 J. F. Kurose and K. W.
Down Approach Featuring Pearson Education 8/e, 2022
Ross
Internet
No. Link ID
1 https://nptel.ac.in/courses/106/105/106105183/
3
SEMESTER S7
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
GXEST204 OR
Prerequisites (if any) Course Type Theory
OECST615
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of Mobile Application Development:
Introduction to Mobile Application Development, Overview of Mobile
Platforms: iOS and Android, Introduction to Flutter: History, Features, and
1 9
Benefits, Setting Up the Flutter Development Environment*, Mobile App
Architectures (MVC, MVVM, and BLoC), Basics of Dart Programming
Language.
1
Networking in Flutter: HTTP Requests, JSON Parsing, RESTful APIs
Data Persistence: SQLite, SharedPreferences, Hive
Asynchronous Programming with Dart: Futures, async/await, and Streams
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
2
Course Outcomes (COs)
At the end of the course students should be able to:
Bloom’s
Course Outcome Knowledge
Level (KL)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
Text Books
3
Reference Books
No. Link ID
1 https://www.youtube.com/watch?v=VPvVD8t02U8
4
SEMESTER 8
COMPUTER SCIENCE AND ENGINEERING
SEMESTER S8
SOFTWARE ARCHITECTURES
Course Objectives:
1. To develop a comprehensive understanding of software architecture principles and patterns.
2. To provide the ability to design and analyze software architectures.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Software Architecture: Definition and Importance,
Architecture in the Life Cycle, Role of the Architect vs. Engineer,
1 8
Requirements engineering: Stakeholders, Concerns, and Types of
Requirements, Use Cases and Tactics.
Architectural Patterns and Styles: Architectural Patterns- Overview of
Patterns and Styles, Applying Patterns and Choosing a Style. Patterns for
2 8
Enterprise Applications: Enterprise Applications and Layered Patterns,
Concurrency Problems.
Components, Contracts, and Service-Oriented Architectures:
Component Software- Nature of Components and Reuse, UML and
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 3
CO2 3 3 3 2 3
CO3 3 2 2 2 3
CO4 3 3 3 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Software Architecture A.Bijlsma, B.J.Heeren, Free Technology 1/e, 2011
E.E.Roubtsova,S. Stuurman Academy
2 Software Architecture 1 Mourad Chabane Oussalah Wiley 1/e, 2014
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Head First Software Architecture: A
Raju Gandhi, Mark
1 Learner's Guide to Architectural Oreilly 1/e, 2024
Richards, Neal Ford
Thinking
No. Link ID
1 https://www.youtube.com/playlist?list=PL4JxLacgYgqTgS8qQPC17fM-NWMTr5GW6
SEMESTER S8
Course Objectives:
Module Contact
Syllabus Description
No. Hours
Introduction to NLP:
Introduction to Natural Language Processing - Various stages of traditional
NLP – Challenges - Basic Text Processing techniques - Common NLP
1 7
Tasks. N-gram Language Models - Naive Bayes for Text Classification, and
Sentiment Analysis – Evaluation-Precision, Recall and F-measure-Test sets
and cross validation.
Traditional NLP Techniques:
Annotating Linguistic Structures - Context-Free Grammars, Constituency
2 7
Parsing, Ambiguity, CYK Parsing, Dependency Parsing - Transition-Based
Dependency Parsing, Graph-Based Dependency Parsing, Evaluation.
Neural Networks for NLP:
Word representations - Lexical Semantics, Vector Semantics, TF-IDF,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Understand the foundational concepts of NLP and apply that to do text
CO1 K3
processing.
CO2 Utilize word representations and evaluate vector models for NLP K3
Analyse and implement advanced linguistic annotation and parsing
CO3 K4
techniques
CO4 Apply advanced sequence modeling techniques using Neural Networks K3
Apply NLP techniques in machine translation, question answering, and
CO5 K3
information retrieval.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3
CO3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Speech and language processing: An
1 introduction to natural language processing, Dan Jurafsky and
Pearson 2006
computational linguistics, and speech James H. Martin.
recognition
2 Introduction to Natural Language Processing Jacob Eisenstein MIT Press 2019
Lewis Tunstall,
3 Natural Language Processing with O’Reilly 2022
Leandro von Werra,
Transformers
and Thomas Wolf
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Deep learning for Natural Language
1 Stephan Raaijmakers Manning 2022
Processing
Natural Language Processing with Delip Rao and Brian
2 O’Reilly 2019
PyTorch McMahan
Ian Goodfellow, Yoshua
3 Deep Learning MIT Press 2016
Bengio, Aaron Courville
No. Link ID
1 https://onlinecourses.nptel.ac.in/noc19_cs56
SEMESTER S8
TOPICS IN SECURITY
(Common to CS/CM/AM/CB/CN/CU/CI)
Course Objectives:
1. To explore various web security and privacy concerns
2. To impart security policies and models for data integrity.
3. To enable the learners to protect databases and introduce IDS
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Fundamentals of Security and Threat Management: Computer Security,
Threats, Harm, Vulnerabilities, Authentication, Access Control
Web Security- Browser Attacks, Web Attacks Targeting Users, Obtaining
1 9
User or Website Data
Privacy- Privacy Concepts, Principles and Policies, Privacy on the Web,
Privacy Principles and Policies, Email Security.
Cryptography in Network Security- Network Encryption, Browser
Encryption, Onion Routing, IPSEC, VPN
Intrusion Detection and Prevention Systems-Types of IDSs, Other
2 9
Intrusion Detection Technology, Intrusion Prevention Systems, Intrusion
Response, Goals for Intrusion Detection Systems, IDS Strengths and
Limitations
Database Security: -Machine Learning for Malware detection, Supervised
Learning for Misuse/Signature Detection, Anomaly Detection using ML,
Spam detection based on Machine Learning approach, Adversarial Machine
3 10
Learning
Security Requirements of Databases, Reliability and Integrity of Databases,
Database Disclosure
Security policies and models: Confidentiality Policies, Bell- LaPadula
model, Integrity policies, Biba model, Clark-Wilson models, Chinese wall
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Explain the fundamentals of threat management, web security and privacy K2
CO2 Identify the significance of network security and IDS K2
CO3 Apply machine learning algorithms for database security K3
Explain the policies and models for data integrity along with managements K2
CO4
and incidents associated with data
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Charles P. Pfleeger, Shari
1 Security in Computing Lawrence Pfleeger Pearson 5/e, 2015
Jonathan Margulies
2 Data mining and machine learning Auerbach
Dua, Sumeet, Xian Du 1/e, 2011
in cybersecurity Publications
Machine learning and security:
3 Chio, Clarence,
Protecting systems with data and O’Reilly 1/e, 2018
David Freeman
algorithms.
4 Cengage
Network Security and Cryptography Bernard Menezes 1/e, 2010
Learning
5 Addison -
Computer Security: Art and Science M Bishop 2/e, 2019
Wesley
Reference Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Principles of information security Cengage
1 E Whiteman, J Mattord 4/e, 2011
Learning
Network Security Essentials: Applications
2 William Stallings McGraw Hill 6/e, 2018
and Standards
3 Network security: the complete reference. Bragg, Roberta McGraw-Hill 1/e, 2004
Cengage
4 Database Security Basta A., Zgola M, 3/e, 2011
Learning
COMPUTATIONAL COMPLEXITY
(Common to CS/CM/AD/CB/CN/CU/CR/CI)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Complexity Theory - Basic concepts and motivations,
Deterministic and nondeterministic models, Turing machines, and
computational models. (Text 2 - Ch 7)
Complexity Classes P and NP - Definitions and examples of P and NP,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
Describe and interpret different computational models, including
CO1 K2
deterministic and nondeterministic Turing machines.
Recall and categorize complexity classes such as P, NP, and PSPACE,
CO2 K2
and explain their fundamental properties.
Use polynomial-time reductions to demonstrate problem completeness
CO3 K3
and analyze the computational difficulty of problems.
Evaluate problems based on their space complexity and apply theories
CO4 K4
like Savitch's theorem to assess space-bounded algorithms.
Examine advanced topics in complexity theory, including interactive
CO5 proofs, PCPs, and quantum complexity, and their implications for K3
computational theory.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2
CO2 3 3 3 2
CO3 3 3 3 2
CO4 3 3 3 2
CO5 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Computational Complexity: A Modern Sanjeev Arora, Cambridge
1 1/e, 2019
Approach Boaz Barak University Press
2 Introduction to the Theory of Computation Michael Sipser Cengage 3/e, 2014
Quantum Computing: A Gentle Eleanor Rieffel,
3 MIT Press 1/e, 2014
Introduction Wolfgang Polak
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Rajeev Motwani and Cambridge
1 Randomized Algorithms 1/e, 2004
Prabhakar Raghavan University Press
Probability and Computing:
Randomization and Probabilistic Michael Mitzenmacher and Cambridge
2 3/e, 2017
Techniques in Algorithms and Eli Upfal University Press
Data Analysis
Thomas H. Cormen, Charles
The MIT Press
3 Introduction to Algorithms E. Leiserson, Ronald L. 4/e, 2023
Cambridge
Rivest and Clifford Stein
Noga Alon and Joel H.
4 The Probabilistic Method Wiley-Blackwell 4/e, 2016
Spencer
5 Approximation Algorithms Vijay V. Vazirani Springer 4/e, 2013
Theory of Computation : Classical
6 Dexter C Kozen Springer 6/e, 2006
And Contemporary Approaches
Computational Complexity: A Cambridge
7 Oded Goldreich 1/e, 2008
Conceptual Perspective, University Press
Course Objectives:
1. To get familiarised with speech processing and audio processing concepts.
2. To equip the student to apply speech processing techniques in finding solutions to day-to-day
problems
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Speech Production :- Acoustic theory of speech production; Source/Filter
model - Pitch, Formant; Spectrogram- Wide and narrow band spectrogram;
Discrete model for speech production; Short-Time Speech Analysis;
1 Windowing; STFT; Time domain parameters (Short time energy, short time 9
zero crossing Rate, ACF); Frequency domain parameters - Filter bank
analysis; STFT Analysis.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 To recall various steps in the speech production process K2
CO2 To summarise various speech processing approaches K2
CO3 To develop speech-processing applications in various domains K3
CO4 To analyse the speech processing model for audio perception K4
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 2 2 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 2 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Speech Communications: Human &
Douglas O'Shaughnessy IEEE Press 2/e, 1999
Machine
2 Discrete-Time Speech Signal
Thomas F. Quatieri Prentice Hall 1/e, 2001
Processing: Principles and Practice
Lawrence Rabiner, Biing-
3 Fundamentals of Speech Recognition Hwang Juang, B. Pearson 1/e, 2008
Yegnanarayana
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Theory and Application of Digital
1 Rabiner and Schafer Prentice Hall 1/e, 2010
Processing of Speech Signals
Speech and Audio Signal
Nelson Morgan and Ben John Wiley &
2 Processing: Processing and 2/e, 2011
Gold Sons
Perception Speech and Music
No. Link ID
1 https://youtu.be/Xjzm7S__kBU?si=j11bk3F7gocYjhfg
SEMESTER S8
STORAGE SYSTEMS
(Common to CS/CM/CR/CD/AM/AD)
Course Objectives:
1. To provide a comprehensive understanding of storage technologies and architectures.
2. To empower students to design and implement effective storage solutions.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Storage technologies:-
Computer storage technologies-Magnetic bubble memories, Charged
Coupled Devices - CCDs, Micro-Electro-Mechanical Systems
- MEMS, Flash memories, Processing In Memory - PIM, Optical storage -
1 9
Data deduplication in storage systems.
Storage Arrays- Architectural Principles, Replication, Local Snapshot
Redundant Arrays of Independent Disks (RAID) - RAID0,RAID2,RAID3,
RAID4, RAID5, RAID6, Hybrid RAID.
Data Storage Networking:-
Fibre Channel SAN- FC SAN Components,SAN Topologies, iSCSI SAN-
3 Replication, 9
Backup Methods- Hot Backups, Offline Backups, LAN-Based Backups,
LAN-Free Backups (SAN Based), Serverless Backups, NDMP,
Backup Types- Full Backups, Incremental Backups, Differential Backups ,
Synthetic Full Backups, Application-Aware Backups
Storage Management:-
Capacity Management- Capacity Reporting, Thin Provisioning
Considerations, Deduplication and Compression, Quotas and Archiving,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 2 3
CO2 3 3 2 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Data Storage Networking Nigel Poulton WILEY 2/e, 2015
2 Computer Storage Fundamentals Susanta Dutta BPB Publication 1/e, 2018
Reference Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
Storage Systems : Organization, Performance, Alexander Morgan
1 1/e, 2021
Coding, Reliability, and Their Data Processing Thomasian Kaufmann
Somasundaram
2 Information Storage and Management Gnanasundaram Wiley 2/e, 2012
Alok Shrivastava
PROMPT ENGINEERING
(Common to CS/CM/CR/CD/AD/AM)
Course Objectives:
1. To develop students' practical skills in applying prompt engineering techniques to real-world
applications, while fostering an awareness of the ethical considerations and challenges in the
field
2. To give an understanding of contextual cues to mitigating biases with techniques for seamless
interaction with AI systems.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Prompt Engineering and Language Models :-
Fundamentals of Natural Language Processing (NLP) - Overview of Language
Models: From Rule-Based Systems to Transformer Architectures (e.g., GPT,
BERT) - Understanding Prompts: Definition, Importance, and Applications -
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3
CO3 3 3 3 3
CO4 3 3 3 3
CO5 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Speech and Language Daniel Jurafsky and
Pearson 2/e, 2013
Processing James H. Martin
2 Unlocking the Secrets of
Gilbert Mizrahi Packt 1/e, 2023
Prompt Engineering
3 Prompt Engineering Ian Khan Wiley 1/e, 2024
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Natural Language Processing Steven Bird, Ewan Klein,
1 Oreilly 1/e, 2009
with Python and Edward Loper
Transformers for Natural
2 Denis Rothman Packt 1/e, 2021
Language Processing
SEMESTER S8
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Number Theory - Basic concepts and definitions, Greatest
common divisor (GCD) and Euclidean algorithm; Modular Arithmetic -
Congruences and modular arithmetic, Applications of modular arithmetic;
1 9
Integer Factorization - Prime numbers and factorization, Algorithms for
integer factorization; Basic Algorithms - Algorithms for modular arithmetic,
Fast exponentiation techniques
Advanced Factorization Algorithms - Pollard’s rho algorithm, Elliptic curve
factorization; Public-Key Cryptography - RSA algorithm, Security analysis
2 9
of RSA; Elliptic Curve Cryptography - Introduction to elliptic curves,
Algorithms for elliptic curve cryptosystems
Public Key Cryptography - RSA algorithm and its implementation, Security
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
End Semester Examination Marks (ESE)
In Part A, all questions need to be answered and in Part B, each student can choose any one
full question out of two questions
Bloom’s
Course Outcome Knowledge
Level (KL)
CO1 Understand basic number theory concepts and algorithms. K2
CO2 Apply factorization algorithms to solve computational problems. K3
CO3 Analyze and evaluate cryptographic systems based on number theory. K4
Synthesize algebraic number theory concepts into computational
CO4 K4
methods.
Create and present a project on recent advances and applications in
CO5 K4
computational number theory.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
CO-PO Mapping Table (Mapping of Course Outcomes to Program Outcomes)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2
CO2 3 3 3 2
CO3 3 3 3 3 3 2
CO4 3 3 3 3 3 2 2 2
CO5 3 3 3 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
A Computational Introduction Cambridge University
1 Victor Shoup 2/e, 2008
to Number Theory and Algebra Press
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Computational Number Theory John Wiley &
1 Song Y. Yan 1/e, 2013
and Modern Cryptography Sons
A course in computational
2 Henri Cohen Springer-Verlag 4/e, 2000
algebraic number theory
3 Computational Number Theory Abhijit Das CRC 1/e, 2013
Joachim von zur Gathen and Cambridge
4 Modern Computer Algebra 4/e, 2013
Jürgen Gerhard University Press
G. H. Hardy, Edward M.
An Introduction to the Theory Oxford
5 Wright, Roger Heath- Brown 6/e, 2008
of Numbers University Press
and Joseph Silverman
Course Objectives:
1. To provide a comprehensive understanding of the principles of interaction design and their
application in augmented reality (AR) and virtual reality (VR) environments.
2. To equip learners with practical skills in developing, prototyping, and evaluating AR/VR
applications, focusing on user-centered design and advanced interaction techniques.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Interaction Design and AR/VR :- Fundamentals of
Interaction Design - Principles of interaction design, Human-computer
interaction (HCI) basics, User experience (UX) design principles;
1 8
Introduction to AR and VR - Overview of AR and VR technologies (Key
differences and Application), Overview of AR/VR hardware (headsets,
controllers, sensors), Software tools and platforms for AR/VR development.
User-Centered Design and Prototyping :-
Understanding User Needs and Context - User research methods, Personas
and user journey mapping, Contextual inquiry for AR/VR, Designing for
Bloom’s
Course Outcome Knowledge
Level (KL)
Apply fundamental interaction design principles and human-computer
CO1 interaction (HCI) concepts to create effective and intuitive user K3
experiences in AR/VR applications.
Demonstrate proficiency in using AR/VR hardware and software tools
CO2 K3
for the development and prototyping of immersive environments.
Conduct user research and apply user-centered design methodologies to
CO3 K4
tailor AR/VR experiences that meet specific user needs and contexts.
Implement advanced interaction techniques such as gesture controls,
CO4 voice commands, haptic feedback, and eye gaze in AR/VR applications K3
to enhance user engagement and immersion.
Evaluate AR/VR projects, utilizing appropriate evaluation methods and
CO5 metrics, and propose improvements based on user feedback and K5
emerging trends in the field.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Augmented Reality - Theory, Design
1 Chetankumar G Shetty McGraw Hill 1/e, 2023
and Development
Ralf Doerner, Wolfgang
Virtual Reality and Augmented
2 Broll, Paul Grimm, and Wiley 1/e, 2018
Reality: Myths and Realities
Bernhard Jung
Augmented Reality: Principles and Dieter Schmalstieg and
3 Pearson 1/e, 2016
Practice Tobias Hollerer
Alan Dix, Janet Finlay,
4 Human–Computer Interaction Gregory D. Abowd, Russell Pearson 3/e, 2004
Beale
Evaluating User Experience in
5 Regina Bernhaupt Springer 1/e, 2010
Games: Concepts and Methods
Measuring the User Experience:
Morgan
6 Collecting, Analyzing, and Bill Albert, Tom Tullis 2/e, 2013
Kaufman
Presenting Usability Metrics
The Fourth Transformation: How Robert Scoble and Shel
Patrick
7 Augmented Reality & Artificial Israel 1/e, 2016
Brewster
Intelligence Will Change Everything
Augmented Reality and Virtual
M. Claudia tom Dieck and
8 Reality: The Power of AR and VR Springer 1/e, 2019
Timothy Jung
for Business
No. Link ID
1 Interaction Design https://archive.nptel.ac.in/courses/107/103/107103083/
2 Virtual Reality https://archive.nptel.ac.in/courses/106/106/106106138/
3 Augmented Reality https://www.youtube.com/watch?v=WzfDo2Wpxks
SEMESTER S8
INTRODUCTION TO ALGORITHM
(Common to CS/CA/CM/CD/CR/AD/AM)
Course Objectives:
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Algorithm Analysis Time and Space Complexity- Asymptotic
notation, Elementary operations and Computation of Time Complexity-Best,
1 worst and Average Case Complexities- Complexity Calculation of simple 9
algorithms Recurrence Equations: Solution of Recurrence Equations –
Iteration Method and Recursion Tree Methods
Trees - Binary Trees – level and height of the tree, complete-binary tree
representation using array, tree traversals (Recursive and non-recursive),
2 applications. Binary search tree – creation, insertion and deletion and search 9
operations, applications; Graphs – representation of graphs, BFS and DFS
(analysis not required), Topological Sorting.
Divide and Conquer - Control Abstraction, Finding Maximum and Minimum,
Costs associated element comparisons and index comparisons, Binary Search,
Quick Sort, Merge Sort - Refinements; Greedy Strategy - Control
9
Abstraction, Fractional Knapsack Problem, Minimum Cost Spanning Trees –
PRIM’s Algorithm, Kruskal’s Algorithm, Single Source Shortest Path
Algorithm - Dijkstra’s Algorithm.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
CO2 2 3 2 2 2
CO3 3 3 3 2 2
CO4 2 2 2
CO5 2 3 2 2
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
T. H. Cormen, C. E. Leiserson,
1 Introduction to Algorithms Prentice-Hall India 4/e, 2022
R. L. Rivest, C. Stein
Fundamentals of Computer Ellis Horowitz, SartajSahni,
2 Universities Press 2/e, 2008
Algorithms Sanguthevar Rajasekaran
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
1 Algorithm Design Jon Kleinberg, Eva Tardos Pearson 1/e, 2005
2 Algorithms Robert Sedgewick, Kevin Wayne Pearson 4/e, 2011
3 The Algorithm Design Manual Steven S. Skiena Springer 2/e, 2008
No. Link ID
1 https://archive.nptel.ac.in/courses/106/105/106105164/
SEMESTER S8
WEB PROGRAMMING
Teaching Hours/Week
3:0:0:0 ESE Marks 60
(L: T:P: R)
Course
Prerequisites (if any) GXEST203 Theory
Type
Course Objectives:
1. To equip students with the knowledge and skills required to create, style, and script web
pages using HTML5, CSS, JavaScript, and related technologies.
2. To provide hands-on experience with modern web development tools and frameworks such as
React, Node.js, JQuery, and databases, enabling students to design and build dynamic,
responsive, and interactive web applications.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Creating Web Page using HTML5 - Introduction, First HTML5 example,
Headings, Linking, Images, Special Characters and Horizontal Rules, Lists,
Tables, Forms, Internal Linking, meta Elements, HTML5 Form input Types,
Input and datalist Elements and autocomplete Attribute, Page-Structure
Elements; Styling Web Page using CSS - Introduction, Inline Styles,
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
Randy Connolly, Ricardo
1 Fundamentals of Web Development Pearson 1/e, 2017
Hoar
Building User Interfaces with
2 Chris Minnick Wiley 1/e, 2022
ReactJS - An Approachable Guide
Internet & World Wide Web - How Paul J. Deitel, Harvey M.
3 Pearson 1/e, 2011
to Program Deitel, Abbey Deitel
SPA Design and Architecture:
Manning
4 Understanding Single Page Web Emmit Scott 1/e, 2015
Publications
Applications
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
A Hand Book On Web
1 Development : From Basics of Pritma Jashnani Notion press 1/e, 2022
HTML to JavaScript and PHP
Advanced Web Development
2 Mohan Mehul BPB 1/e, 2020
with React
JavaScript Frameworks for Tim Ambler, Sufyan bin
3 Apress 1/e, 2019
Modern Web Development Uzayr, Nicholas Cloud
Course Objectives:
1. To Cultivate proficiency in software testing methodologies and techniques.
2. To Foster expertise in software testing tools and technologies.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to Software Testing & Automation:-
Introduction to Software Testing - Concepts, importance of testing, software
quality, and real-world failures (e.g., Ariane 5, Therac 25); Software Testing
Processes - Levels of thinking in testing; Testing Terminologies - Verification,
validation, fault, error, bug, test cases, and coverage criteria; Types of Testing -
3 (e.g., loops, exceptions); Graph Coverage for Design Elements - Call graphs, class 10
inheritance testing, and coupling data-flow pairs; Security Testing -
Fundamentals, tools (OWASP, Burp Suite), and their role in protecting modern
applications; Case Study - Application of graph based testing and security testing
using industry standard tools.
Black Box Testing, Grey Box Testing, and Responsive Testing:-
Black Box Testing - Input space partitioning, domain testing, functional testing
(equivalence class partitioning, boundary value analysis, decision tables, random
testing); Grey Box Testing - Introduction, advantages, and methodologies (matrix
testing, regression testing, orthogonal array testing); Performance Testing -
Tota
Part A Part B
l
● 2 Questions from each ● Each question carries 9 marks.
module. ● Two questions will be given from each module, out
● Total of 8 Questions, each of which 1 question should be answered.
60
carrying 3 marks ● Each question can have a maximum of 3
subdivisions.
(8x3 =24 marks) (4x9 = 36 marks)
Course Outcomes (COs)
At the end of the course students should be able to:
Bloom’s
Course Outcome Knowledge
Level (KL)
Demonstrate the ability to apply a range of software testing techniques,
CO1 K2
including unit testing using JUnit and automation tools.
Illustrate using appropriate tools the mutation testing method for a given
CO2 piece of code to identify hidden defects that can’t be detected using other K3
testing methods.
Explain and apply graph coverage criteria in terms of control flow and
CO3 K2
data flow graphs to improve code quality.
Demonstrate the importance of black-box approaches in terms of Domain
CO4 K3
and Functional Testing
Illustrate the importance of security, compatibility, and performance
CO5 K3
testing across devices.
Use advanced tools like PEX to perform symbolic execution and optimize
CO6 test case generation and also leverage AI tools for automated test case K3
prediction and symbolic execution with PEX.
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
Text Books
Sl. Name of the Edition
Title of the Book Name of the Author/s
No Publisher and Year
1 Cambridge
Introduction to Software Testing. Paul Ammann, Jeff Offutt 2/e, 2016
University Press
2 Software Testing and Quality Kshirasagar Naik,
Wiley 1/e, 2008
Assurance: Theory and Practice Priyadarshi Tripathy
Reference Books
Name of
Sl. Edition
Title of the Book Name of the Author/s the
No and Year
Publisher
1 Software Testing Ron Patten Pearson 2/e, 2005
Software Testing: A Craftsman’s
2 Paul C. Jorgensen CRC Press 4/e, 2017
Approach
3 Dorothy Graham, Rex Black,
Foundations of Software Testing Cengage 4/e, 2021
Erik van Veenendaal
Glenford J. Myers, Tom
4 The Art of Software Testing Wiley 3/e, 2011
Badgett, Corey Sandler
Course Objectives:
1. To give an understanding in the Internet of Things, including the components, tools, and
analysis through its fundamentals and real-world applications.
2. To enable the students to develop IoT solutions including the softwares and programming of
Raspberry Pi hardware.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Introduction to IoT - Physical Design of IoT, Logical Design of IoT, IoT
1 levels and Deployment templates, Domain Specific IoT- Home automation, 9
Energy, Agriculture, Health and lifestyle.
IoT and M2M-M2M, Difference between IoT and M2M, Software Defined
Networking, Network Function virtualization, Need for IoT System
Management, Simple Network Management Protocol (SNMP), NETCONF,
2 9
YANG; LPWAN - LPWAN applications, LPWAN technologies, Cellular
(3GPP) and Non 3GPP standards, Comparison of various protocols like
Sigfox, LoRA, LoRAWAN, Weightless, NB-IoT, LTE-M.
Developing IoT - IoT design methodology, Case study on IoT system for
weather monitoring, Motivations for using python, IoT-system Logical
3 9
design using python, Python Packages of Interest for IoT - JSON, XML,
HTTPlib & URLLib, SMTPLib
Programming Raspberry Pi with Python-Controlling LED with Raspberry Pi,
4 Interfacing an LED and switch with Raspberry Pi, Other IoT devices- 9
PcDino, Beagle bone Black, Cubieboard, Data Analytics for IoT
Course Assessment Method
(CIE: 40 marks, ESE: 60 marks)
Continuous Internal Evaluation Marks (CIE):
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written )
5 15 10 10 40
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 3
CO2 3 3 3 2 3
CO3 3 3 3 2 2 3
CO4 3 3 3 2 2 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Internet of Things - a Hands On Arshdeep Bahga, Vijay
1 Universities Press 1/e, 2016
Approach. Madisetti
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Internet of Things : Architecture
1 Rajkamal McGraw Hill 2/e, 2022
and Design Principles
The Internet of Things –Key Olivier Hersent, David
2 Wiley 1/e, 2012
applications and Protocols Boswarthick, Omar Elloumi
IoT fundamentals : Networking David Hanes Gonzalo.
3 technologies, Protocols and use Salgueiro, Grossetete, Robert Cisco Press 1/e, 2017
cases for the Internet of things Barton
No. Link ID
1 https://archive.nptel.ac.in/courses/106/105/106105166/
2 https://archive.nptel.ac.in/courses/108/108/108108179/
SEMESTER S8
COMPUTER GRAPHICS
Course Objective:
1. To provide strong technological concepts in computer graphics including the three-
dimensional environment representation in a computer, transformation of 2D/3D objects and
basic mathematical techniques and algorithms used to build applications.
SYLLABUS
Module Contact
Syllabus Description
No. Hours
Basics of Computer graphics - Basics of Computer Graphics and its
applications. Video Display devices - LED, OLED, LCD, PDP and FED and
reflective displays. Random and Raster scan displays and systems.
Internal Internal
Assignment/
Attendance Examination-1 Examination- 2 Total
Microproject
(Written) (Written)
5 15 10 10 40
Note: K1- Remember, K2- Understand, K3- Apply, K4- Analyse, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 3
CO2 3 3 3 3 3
CO3 3 3 3 3 3
CO4 3 3 3 3 3
Note: 1: Slight (Low), 2: Moderate (Medium), 3: Substantial (High), -: No Correlation
Text Books
Name of the Name of the Edition
Sl. No Title of the Book
Author/s Publisher and Year
1 Computer Graphics : Algorithms and D. P. Mukherjee,
PHI 1/e, 2010
Implementations Debasish Jana
Donald Hearn, M.
2 Computer Graphics with OpenGL Pauline Baker and PHI 4/e, 2013
Warren Carithers
Reference Books
Name of the Edition
Sl. No Title of the Book Name of the Author/s
Publisher and Year
Jiun-Haw Lee, I-Chun
Introduction to Flat Panel
1 Cheng, Hong Hua, Shin- Wiley 1/e, 2020
Displays
Tson Wu
Computer Graphics and
2 ITL ESL Pearson 1/e, 2013
Multimedia
Zhigang Xiang and Roy
3 Computer Graphics McGraw Hill 2/e, 2000
Plastock
Principles of Interactive William M. Newman and
4 McGraw Hill 1/e, 2001
Computer Graphics Robert F. Sproull
Procedural Elements for
5 David F. Rogers McGraw Hill 1/e, 2017
Computer Graphics
Donald D Hearn, M Pauline
6 Computer Graphics Pearson 2/e, 2002
Baker
No. Link ID