4TH Sem Curriculum and Syllabus
4TH Sem Curriculum and Syllabus
NQN-
Indian Constitution MNG 2
400
NQN-
Indian Constitution MNG 2
400
B.Tech (Computer Science and Engineering-AI/DS Specialization)
SEMESTER: IV
COURSE MODULE
COURSE
Cre
Compo
Code Title dits
nent
TCS-
Programming in Java DSC 3
408
TCS- Finite Automata and
DSC 3
402 Formal Languages
TCS-
Microprocessors DSC 3
403
TCS- Design and Analysis of
DSC 3
409 Algorithms
TCS-
Introduction to Bigdata DSC 3
462
PCS-
Java Programming Lab DSC 1
408
PCS- 1
Microprocessors Lab DSC
403
PCS-
DAA Lab DSC 1
409
XCS-
Career Skills SEC 1
401
PESE Practical for SEC 1
400 Employability Skill
Enhancement
SCS-
MOOCS Seminar VAC 1
401
GP-401 General Proficiency SEC 1
NQN-
Indian Constitution MNG 2
400
B.Tech (Computer Science and Engineering-Cyber Security
Specialization)
SEMESTER: IV
COURSE MODULE
COURSE
Cre
Compo
Code Title dits
nent
TCS-
Programming in Java DSC 3
408
TCS- Finite Automata and
DSC 3
402 Formal Languages
TCS-
Microprocessors DSC 3
403
TCS- Design and Analysis of
DSC 3
409 Algorithms
TCS- Foundation of Cyber
DSE 3
495 Security
PCS-
Java Programming Lab DSC 1
408
PCS- 1
Microprocessors Lab DSC
403
PCS-
DAA Lab DSC 1
409
XCS-
Career Skills SEC 1
401
PESE Practical for SEC 1
400 Employability Skill
Enhancement
SCS-
MOOCS Seminar VAC 1
401
GP-401 General Proficiency SEC 1
NQN-
Indian Constitution MNG 2
400
GRAPHIC ERA HILL UNIVERSITY
SEMESTER IV
9. Course Outcome:
Total 46
Text Books:
Reference Books:
Kathy Sierra, Bert Head First 3rd Edition O'Reilly Media, Inc. 2022
Bates, Trisha Gee Java: A Brain-
Friendly Guide
9. Course After completion of the course the students will be able to:
Outcome: CO1: Demonstrate the conversion of NFA into DFA, ϵ-NFA into
DFA and Minimization of Finite Automata by using Myhill-
Nerode Theorem
CO2: Formulate DFA, RE and FA with output.
CO3: Design CFG and check the language is not CFL.
CO4: Design PDA and convert n-PDA into d-PDA.
CO5: Design Turing machines for addition, subtraction,
multiplication etc.
CO6:Formulate finite machines; push down automata and
Turing machines for automated functioning of devices.
Contact
UNIT CONTENTS
Hrs
Total 47
Text Books:
Reference Books:
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Identify of 8085 and 8086 microprocessors and memory
segmentation
CO2 Analysis of Instruction set of 8085and 8086.
CO3 Implementation of different programs on 8085 and 8086
based microcomputer kit.
CO4 Design the Interfacing of 8255 and 8085/8086.
CO5 Design & develop Interfacing of microprocessor with
Timing Devices1
CO6 Evaluate & Develop projects on embedded system
using the foundation of microprocessor
Contact
UNIT CONTENTS
Hrs
Total 45
Text Books:
Reference Books:
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Discuss various asymptotic notations to analyse time
and space complexity of algorithms
CO2 Analyse the various paradigms for designing efficient
algorithms using concepts of design and conquer,
greedy and dynamic programming techniques
CO3 Provide solutions to complex problems using the
concept of back tracking and branch and bound
techniques.
CO4 Apply algorithm design techniques to predict the
complexity of certain NP complete problems.
CO5 Implement Dijkstra’s, Bellman-ford, Prims, Kruskal’s
algorithms to solve the real world problems like
traveling salesman problem, job sequencing, packet
routing etc.
CO6 Apply pattern matching algorithms like Rabin Karp
Algorithm, Brute-force techniques etc, to find a
particular pattern.
Contact
UNIT CONTENTS
Hrs
Graph Algorithms
Representation of Graphs, Breadth-first search (BFS),
depth-first search (DFS), topological sort, Difference
between BFS and DFS Data structures for disjoint
sets - Finding cycle in a graph, Finding strongly
connected components
Unit – III Minimum spanning trees - Kruskal and Prim 12
algorithms (Greedy Algorithms) Single source
shortest paths - Dijkstra (Greedy Approach) and
Bellman ford (Dynamic Programming) algorithms,
Working on -ve edge & cycle, difference & similarity.
Total 50
Text Books:
Reference Books:
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Discuss the different paradigms of cloud computing.
CO2 Contrast parallel and distributed computing.
CO3 Identify the concept of virtualization technique.
CO4 Apply virtualization technique in cloud computing
platform.
CO5 Describe the architectures of cloud computing.
CO6 Demonstrate the Use case of the virtualization and
cloud computing services.
Contact
UNIT CONTENTS
Hrs
Introduction to Cloud Computing
Why Cloud Computing (CC)? Different Perspectives on CC,
Different Stakeholders in CC, Total cost of ownership (TCO) of
on-premises IT, Cloud Computing Taxonomy, Characteristics
of cloud computing, Characteristics of cloud computing as per
NIST, Cloud Definitions. Cloud Computing at a Glance, The
Unit - I 9
Vision of Cloud Computing, Cloud Computing Reference
Model, Challenges Ahead, Historical Developments,
Distributed Systems, Virtualization, Web 2.0, Service-Oriented
Computing, Utility-Oriented Computing, Building Cloud
Computing Environments, Application Development,
Infrastructure and System Development, Computing Platforms
and Technologies, Amazon Web Services (AWS), Google
AppEngine, Microsoft Azure, Hadoop, Force.com and
Salesforce.com
Virtualization
Introduction, Characteristics of Virtualized Environments,
Taxonomy of Virtualization Techniques, Execution
Virtualization, Types of hardware virtualization: Full
virtualization - partial virtualization - para virtualization
Desktop virtualization: Software virtualization – Memory
Unit - II 9
virtualization - Storage virtualization – Data Virtualization –
Network virtualization, Virtualization and Cloud Computing,
Pros and Cons of Virtualization, Technology Examples, Xen:
Para virtualization, VMware: Full Virtualization, Microsoft
Hyper-V.
Virtual Machines
Virtual machines basics, Process virtual machines: Memory
architecture emulation, Instruction emulation, Operating system
Unit –
emulation, Dynamic binary optimization, High level VN 8
III
architecture, System virtual machines: Resource virtualization
(Processors, Memory, Input/Output), Case Study of Intel VT-x
Reference Books:
2. Contact Hours: L: 3 T: 1 P: 0
3. Examination Duration (Hrs): Theory 3 Practical 0
4. Relative Weight: CIE 25 MSE 25 ESE 50
5. Credits: 3
6. Semester: IV
7. Category of Course: DSE
8. Pre-requisite: Engineering Mathematics-I (TMA101), Programming for problem
solving(TCS 201), Fundamental of Cloud Computing and Bigdata(TCS351)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Understand the concepts of statistics
CO2 Apply the probability distribution techniques in different
applications.
CO3 Understand the needs of data pre-processing
CO4 Implement the manipulation and processing of data in R
CO5 Apply the concepts of functions in R
CO6 Understand the use of R in data Analytics
Contact
UNIT CONTENTS
Hrs
Text Books:
Reference Books:
2. Contact Hours: L: 4 T: 0 P: 0
3. Examination Duration (Hrs): Theory 3 Practical 0
4. Relative Weight: CIE 25 MSE 25 ESE 50
5. Credits: 3
6. Semester: IV
7. Category of Course: DSE
8. Pre-requisite: Introduction to Cryptography (TCS392)
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Explain different cyber threats and attacks
CO2 Know the working of various cyber-attacks and cyber
security protocols
CO3 Analyse the different cyber security protocols.
CO4 Use scripting language to implement security protocols.
CO5 Apply security techniques to secure web applications
CO6 Develop cyber security protocols.
The client-server model for the web, various web threats and
4 attacks, web cross site scripting (XSS) attack and use of 9
scripting languages, phishing attacks, spear phishing, SQL
injection attack, use of web penetration testing tools.
Total 47
Text Books:
Reference Books:
9. Course After completion of the course the students will be able to:
Outcome:
CO1 Demonstrate knowledge of statistical and exploratory
data analysis data analysis techniques utilized in
decision making.
CO2 Apply principles of Data Science to the analysis of
business problems.
CO3 To use Machine Learning Algorithms to solve real-world
problems.
CO4 To provide data science solution to business problems
and visualization.
CO5 To learn the basic concepts and techniques of AI and
machine learning
CO6 To explore the various mechanism of Knowledge and
Reasoning used for building expert system
Unit 2:
Problem solving
Unit 3:
An Introduction to Data Science, Data Processing and
Visualization
Unit 4:
Statistical Data Analysis & Inference
Text Books:
Reference Books:
9. Course Outcome: After completion of the course, the students will be able to:
CO1: Define the fundamental concepts of artificial neural
networks and differentiate between perceptrons and deep
neural networks.
CO2: Describe the architecture and functionalities of
Convolutional Neural Networks (CNNs) for image
processing tasks.
CO3: Implement basic neural network architectures using
popular deep learning libraries.
CO4: Analyze the impact of different activation functions on the
performance of neural networks.
CO5: Choose suitable deep learning architectures (CNNs,
RNNs) based on the specific problem and data
characteristics.
CO6: Design and implement a deep learning model (e.g., CNN
or LSTM) to solve a simple engineering-related problem
10. Details of the Course:
Sl. Contact
Contents
No. Hours
30
UNIT 1: Introduction to Neural Networks and Deep Neural
Networks
Basics of neural networks, Perceptrons and activation functions,
1 10
Architecture of a simple neural network
Multi-layer perceptrons (MLP), Forward propagation and
backpropagation, Loss functions and optimization algorithms
UNIT 2: Convolutional Neural Networks (CNNs)
31
Scikit-Learn,
Keras &
TensorFlow
9. Course Outcome: After completion of the course, the students will be able to:
CO1: Outline the theory of big data, and explain challenges of
big data
CO2: Understand the types of Big data and its characteristics
CO3: Compare Business Intelligence Vs Big Data
CO4: Get the idea of NoSQL databases, different types of
NoSQL/NewSQL datastores
CO5: Discuss various types of Big Data analytics
CO6: Elaborate a Big Data management architecture
32
10. Details of the Course:
Sl. Contact
Contents
No. Hours
Unit 1:
Big Data and its Challenges
Defining Big Data, Characteristics of Big Data, Evolution of Big
Data, Traditional Business Intelligence vs Big Data, The Evolution
of Data Management, Understanding the Waves of Managing
1 Data, creating manageable data structures, Web and content 9
management, Managing big data. Building a Successful Big Data
Management Architecture, beginning with capture, organize,
integrate, analyze, and act, Setting the architectural foundation,
Performance matters, Traditional and advanced analytics.
Unit 2:
Big Data Types and its Sources
Defining Structured Data Exploring sources of big structured data,
Understanding the role of relational databases in big data Defining
Unstructured Data, exploring sources of unstructured data,
2 Understanding the role of a CMS in big data management. Looking 8
at Real-Time and Non Real-Time Requirements, Putting Big Data
Together, managing different data types, integrating data types
into a big data environment.
Unit 3:
Technology Foundations of Big Data
Exploring the Big Data Stack: - Layer 0: Redundant Physical
Infrastructure - Physical redundant networks, Managing hardware:
Storage and servers, Infrastructure operations - Layer 1: Security
3 9
Infrastructure, Interfaces and Feeds to and from Applications and
the Internet- Layer 2: Operational Databases. Layer 3: Organizing
Data Services and Tools. Layer 4: Analytical Data Warehouses,
Big Data Analytics, Big Data Applications.
33
Unit 4:
Introduction to NoSQL and NewSQL
Introduction to NoSQL, Uses, Features and Types, Need,
Advantages, Disadvantages and Application of NoSQL, Overview
of NewSQL. RDBMSs Are Important in a Big Data Environment.
4 8
PostgreSQL relational database. Nonrelational Databases. Key-
Value Pair Databases - Riak keyvalue database. Document
Databases MongoDB, CouchDB . Columnar Databases, HBase
columnar database. Graph Databases- Neo4J graph database.
Unit 5:
Big Data Analytics
Basic analytics, Advanced analytics, Operationalized analytics,
5 Monetizing analytics. Modifying Business Intelligence Products to 8
Handle Big Data, Studying Big Data Analytics Examples,
Terminologies used in Big Data environment.
Total 42
Text Books:
Authors Name Title Edition Publisher, Country Year
Judith Hurwitz, Alan Big Data 1st Wiley, United States 2013
Nugent , Fern Halper , for
Marcia Kaufman Dummies
Subhashini Big Data 2nd Wiley, United States 2019
Chellappan Seema and
Acharya Analytics
DT Editorial Services Big Data 1st Dreamtech Press, 2016
New Dehli
Reference Books:
Authors Name Title Edition Publisher, Country Year
Michele Big Data, Big 1st Wiley, United States 2013
Chambers, Analytics:
Michael Emerging
34
Minelli , Ambiga Business
Dhiraj Intelligence and
Analytic Trends
for Today's
Businesses
35