CSE Syllabus
CSE Syllabus
For
Computer Science and
Engineering
(Applicable for batches admitted from 2022-2023)
Autonomous Regulations–AR22
The following curriculum for B.Tech. CSE. M.Tech Computer Science and Engineering programmes with
regulations-R22 is conventional to outcome-based teaching-learning process. In general, TWELVE PROGRAMME
OUTCOMES (a-l) have been identified and the curriculum and syllabus have been structured in such a way such
that each of the courses meets one or more of these outcomes.
Student outcomes describe what students are expected to know and are able to do by the time of
graduation. These relate to the skills, knowledge, and behaviour that students acquire as they progress
through the program. Further,
each course in the program spells out clear instructional objectives which are mapped to the student outcomes.
b. Problem analysis: Identity, formulates, research literature, and analyse complex engineering
problems reaching substantiated conclusions using first principles of mathematics, natural sciences,
and engineering sciences.
c. Design/development of solutions: Design solutions for complex engineering problems and design system
components or processes that meet the specified needs with appropriate consideration for public health
and safety, and cultural, societal, and environmental considerations.
d. Conduct investigations of complex problems: Use research-based knowledge and research methods
including design of experiments, analysis and interpretation of data and synthesis of the information to
provide valid conclusions.
e. Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern engineering
and IT tools, including prediction and modelling of complex engineering activities, with an understanding
of the limitations.
f. The engineer and society: Apply reasoning informed by the contextual knowledge to assess societal,
health, safety, legal and cultural issues and the consequent responsibilities relevant to the professional
engineering practice.
g. Environment and sustainability: Understand the impact of the professional engineering solutions in
societal and environmental contexts, and demonstrate the knowledge of,and need for sustainable
development.
h. Ethics:Applyethicalprinciplesandcommittoprofessionalethicsandresponsibilitiesandnormsoftheen
gineering practice.
i. Individual and teamwork: Function effectively as an individual, and as a member or leader in diverse
teams, and in multi disciplinary settings.
k. Project management and finance: Demonstrate knowledge and understanding of the engineering and
management principles and apply these to one’s own work, as a member and leader in a team, to
manage projects and in multi disciplinary environments.
l. Life-long learning: Recognize the need for,and have the preparation and ability to engage in
independent and life-long learning in the broadest context of technological change.
Program Specific Objectives–CSE
Able to utilize the knowledge of latest technologies and emerging
PSO-1 technologies, for the benefit of societal requirements.
Toexplorethescientifictheories,ideas,methodologiesandthenewcuttingedgetechnologies
In software industries to solve the current and future software application problems.
PSO-2
To be able to utilize of technologies like java, spark, python, Tensor flow according
PSO-3
To industrial applications.
Prepare graduates to have knowledge and competency for careers and related to
PEO-1 computer science
SYLLABUSSTRUCTURE:
CREDITPE
SNO DESCRIPTION NUMBER CREDITS
RONE
THE ORY
01 CORESUBJECTS 26 3 78
105
35
02 COREELECTIVES 05 3 15
03 OPENELECTIVES 04 3 12
06 MANDATORYCOURSES 04 0 0
07 SKILLORIENTEDPROGRAMS 05 2 10
08 SOCIALELECTIVE 01 3 3
09 MAJORPROJECT/INTERNSHIP 01 12 12
TOTAL 65 160
DEPARTMENTOFCOMPUTER SCIENCE AND ENGINEERING COURSE
STRUCTURE FOR AR22 REGULATION
I YEAR I SEMESTER:
SNO SUBCODE COURSETITLE CATEGORY L T P CREDITS
TOTALCREDITS 19.5
I YEAR II SEMESTER:
S.N CREDIT
O SUBCODE COURSETITLE CATEGORY L TP S
TOTALCREDITS 19.5
II YEAR III SEMESTER:
II YEAR IV SEMESTER:
TOTALCREDITS 21.5
8 SUMMERINTERNSHIP4 – 8 Weeks
0 0 0 3
(MANDATORY)AFTERTHIRDYEAR(TOBEEVALUATEDDURING
VII SEMESTER)
TOTALCREDITS 23
TOTALCREDITS 12
PROFESSONALELECTIVES:
Electives (PE-III)
1. 22CS7E1- DATA VISUALIZATION
2. 22CS7E2- BIG DATA TECHNOLOGIES
3. 22CS7E3- WEB ANALYTICS
4. 22CS7E4- ETHICAL HACKING
5. 22CS7E5- INTRODUCTION TO CYBER FORENSICS
(PE-IV)
6. 22CS7E6- NATURAL LANGUAGE PROCESSING
7. 22CS7E7- FUZZY LOGIC
8. 22CS7E8-SEMANTIC WEB
9. 22CS7E9- CYBER SECURITY
10. 22CS7E10- PENETRATION TESTING
(PE-V)
Course Objectives:
The objective of the course is to
Introduce the fundamental concept of data structures and abstract data types
Emphasize the importance of data structures in developing and implementing
efficient algorithms
Describe how arrays, records, linked structures, stacks, queues, trees, and
graphs are represented in memory and used by algorithms
Course Outcomes:
After completing this course a student will be able to:
Summarize the properties, interfaces, and behaviours of basic abstract data
types Discuss the computational efficiency of the principal algorithms for
sorting & searching Use arrays, records, linked structures, stacks, queues, trees,
and Graphs in writing programs
Demonstrate different methods for traversing trees
UNIT III:TREES
Introduction, Terminology, Representation of Trees, Binary Trees, The Abstract Data Type,
Properties of Binary Tress, Binary Tree Representations, Binary Tree Traversal, Introduction, In
order Traversal Pre order Traversal, Post order Traversal, Tree traversals Binary Tree, Heaps,
Priority Queues, Definition of a Max Heap, Insertion into a Max Heap, Deletion from a Max
Heap, Binary Search Trees, Definition, Searching a Binary Search Tree, Insertion into a Binary
Search Tree, Deletion from a Binary Search Tree
UNIT IV: GRAPHS
Graphs: Basic Concepts, Representations of Graphs-Adjacency Matrix and using Linked list, Graph
Traversals (BFT & DFT), Applications- Minimum Spanning Tree Using Prims & Kruskals Algorithm,
Dijkstra’s shortest path, Sollin’s Algorithm
.
Text Books:
1) Data Structures Using C. 2nd Edition.Reema Thareja, Oxford.
2) Data Structures and algorithm analysis in C, 2nded, Mark Allen Weiss.
Reference Books:
1) Fundamentals of Data Structures in C, 2nd Edition, Horowitz, Sahni, Universities Press.
2) Data Structures: A PseudoCode Approach, 2/e, Richard F.Gilberg,
Behrouz A. Forouzon, Cengage.
3) Data Structures with C, Seymour Lipschutz TMH
Resources:
1) http://algs4.cs.princeton.edu/home/
2) https://faculty.washington.edu/jstraub/dsa/Master_2_7a.pdf
22CS3T3 L T P C
II Year – III Semester
3 0 0 3
OBJECT ORIENTED PROGRAMMING THROUGH C++
Course Objectives:
Describe the procedural and object oriented paradigm with concepts of streams,
classes, functions, data and objects
Understand dynamic memory management techniques using pointers, constructors,
destructors
Describe the concept of function overloading, operator overloading, virtual functions and
polymorphism
Classify inheritance with the understanding of early and late binding, usage of
exception handling, generic programming
Demonstrate the use of various OOPs concepts with the help of programs
Course
Outcomes:
By the end of the course, the
student
Classify object oriented programming and procedural programming
Apply C++ features such as composition of objects, operator overloads, dynamic
memory allocation, inheritance and polymorphism, file I/O, exception handling
Build C++ classes using appropriate encapsulation and design principles
Apply object oriented or non-object oriented techniques to solve bigger computing
problems
UNIT I
Introduction to C++,Variables, Constants, Data types,Keywords,Operators and Expressions.
Control and Loop statements in C++,Functions in C++
UNIT II
The Object Oriented Programming, Features of oop,Classes in C++, Members in class, Defining
Member Function, Declaring Objects, Accessing members with objects, Access Specifies and
their Scope, Overloading Member Function, Nested class, Constructors, Types of constructors
and Destructors, Constructor overloading
UNIT III
Operator Overloading, Overloading Operators, Operator Return Type, Rules for Overloading
Operators, Inheritance, Advantages and Disadvantages of Inheritance, Types of Inheritance,
Virtual Base Classes- Object as a Class Member, Abstract Classes
UNIT IV
Pointers & Binding Polymorphisms and Virtual Functions: Pointer, Features of Pointers, Pointer
Declaration, Pointer to Class, Pointer Object, The this Pointer, Pointer to Derived Classes and
Base Class, Binding Polymorphisms and Virtual Functions, Introduction, Binding in C++, Virtual
Functions, Rules for Virtual Function, Virtual Destructor
UNIT V
Definition of class Templates, Normal Function Templates, Over Loading of Template Function,
Exception Handling, Principles of Exception Handling, The Keywords try throw and catch, Multiple
Catch Statements
Text Books:
Reference Books:
UNIT I
Basic Structure of Computers: Basic Organization of Computers, Historical Perspective, Bus Structures, Data
Representation: Data types, Complements, Fixed Point Representation. Floating, Point Representation. Other
Binary Codes, Error Detection Codes.
UNIT-II
Computer Arithmetic: Addition and Subtraction, Multiplication Algorithms, Division Algorithms
Register Transfer Language and Microoperations: Register Transfer language. Register Transfer Bus and
Memory Transfers, Arithmetic Micro operations, Logic Micro Operations, Shift Micro Operations, Arithmetic
Logic Shift Unit.
.
UNIT III
Basic Computer Organization and Design: Instruction Codes, Computer Register, Computer Instructions,
Instruction Cycle, Memory – Reference Instructions. Input –Output and Interrupt, Complete Computer
Description.
UNIT IV
Central Processing Unit: General Register Organization, STACK Organization. Instruction Formats,
Addressing Modes, Data Transfer and Manipulation, Program Control, Reduced Instruction Set
Computer.Micro programmed Control: Control Memory, Address Sequencing, Micro Program example,
Design of Control Unit.
UNIT V
Memory Organization: Memory Hierarchy, Main Memory, Auxiliary Memory, Associative Memory, Cache
Memory, Virtual Memory,Input-Output Organization: Peripheral Devices, Input-Output Interface,
Asynchronous data transfer, Modes of Transfer, Priority Interrupts, Direct Memory Access.
Text Books:
1. Computer System Architecture, M. Morris Mano, Third Edition, Pearson, 2008.
2. Computer Organization, Carl Hamacher, Zvonko Vranesic, Safwat Zaky, 5/e, McGraw Hill, 2002.
Reference Books:
1. Computer Organization and Architecture, William Stallings, 6/e, Pearson, 2006.
2. Structured Computer Organization, Andrew S. Tanenbaum, 4/e, Pearson, 2005.
3. Fundamentals of Computer Organization and Design, Sivarama P. Dandamudi, Springer, 2006.
L T P C
II Year – III Semester 22CS3T5
3 0 0 3
UNIX PROGRAMMING
UNIT-II: The File system –The Basics of Files-What’s in a File-Directories and File Names
- Permissions-I Nodes-The Directory Hierarchy, File Attributes and Permissions- The File
Command knowing the File Type-The Chmod Command Changing File Permissions-The
Chowan Command Changing the Owner of a File-The Chgrp CommandChanging the
Group of a File.
UNIT-IV: Filters-The Grep Family-Other Filters-The Stream Editor Sed-The AWK Pattern
Scanning and processing Language-Good Files and Good Filters.
TEXT BOOKS:
1. The UNIX programming Environment by Brain W. Kernighan & Rob Pike,Pearson.
2. Introduction to Unix Shell Programming by M. G. Venkatesh Murthy, Pearson
REFERENCE BOOKS:
1. Unix and shell programming by B.M. Harwani, OXFORD university press
22CS3L1 L T P C
II Year – III Semester
0 0 31.5
DATA STRUCTURES LAB
1. Demonstrate how to use the following Bourne Shell commands: cat, grep, ls, more, ps,
chmod, finger, ftp, etc.
2. Use the following Bourne Shell constructs: test, if then, if then else, if then elif, for, while,
until, and case.
3. Learn tracing mechanisms (for debugging), user variables, BourneShell variables, read-
only variables, positional parameters, reading input to a BourneShell script, command
substitution, comments, and exporting variables. In addition, test on numeric values, test on
file type, and test on character strings are covered.
Program Objectives:
Week1:
a) Write a C++ program to find the sum of individual digits of a positive integer.
Week 2:
a) Write a C++ program to generate all the prime numbers between 1 and n, where n is a value
supplied by the user.
b) Write a C++ program to find both the largest and smallest number in a list of integers.
Week 3:
a) Write a C++ program to sort a list of numbers in ascending order.
b) Write a Program to illustrate New and Delete Keywords for dynamic memory allocation
Week 4:
a) Write a program Illustrating Class Declarations, Definition, and Accessing Class Members.
Week 6:
a) Write a Program to Access Members of a STUDENT Class Using Pointer to Object Members.
Week 7:
Write a C++ program to implement the matrix ADT using a class. The operations supported by this ADT are:
a) Reading a matrix.
b) Addition of matrices.
c) Printing a matrix
d)Subtraction of
matrices
. e) Multiplication of matrices
Week 8:
Write C++ programs that illustrate how the following forms of inheritance are supported:
a)Single inheritance
b) Multiple inheritance
c)Multi level inheritance
d)Hierarchical
inheritance
Week 9:
a.)Write a C++ program that illustrates the order of execution of constructors and destructors when new
class is derived from more than one base class.
b) Write a Program to Invoking Derived Class Member Through Base Class Pointer.
Week 10:
b) Write a C++ program that uses function templates to find the largest and smallest number in a list
of integers and to sort a list of numbers in ascending order.
ADDITIONAL PROGRAMS:
11. Write a Program Containing a Possible Exception. Use a Try Block to Throw it and a Catch Block to
Handle it Properly.
12. Write a Program to Demonstrate the Catching of All Exceptions.
Text Books:
References:
UNIT II
The Object Oriented Programming, Features of oop,Classes in C++, Members in class, Defining Member
Function, Declaring Objects, Accessing members with objects, Access Specifies and their Scope,
Overloading Member Function, Nested class, Constructors, Types of constructors and Destructors,
Constructor overloading, Final and Static.
UNIT III
Inheritance: Introduction, Process of Inheritance, Types of Inheritances, Universal Super Class- Object
Class, Inhibiting Inheritance of Class Using Final, Access Control and Inheritance, Multilevel Inheritance,
Application of Keyword Super, Constructor Method and Inheritance, Method Overriding, Dynamic Method
Dispatch, Abstract Classes
UNIT IV
Interfaces: Introduction, Declaration of Interface, Implementation of Interface, Multiple Interfaces,
Nested Interfaces, Inheritance of Interfaces, Default Methods in Interfaces, Static Methods in Interface,
Functional Interfaces, Annotations.Packages and Java Library: Introduction, Defining Package, Importing
Packages and Classes into Programs, Path and Class Path, Access Control, Packages in Java SE,
Java.lang Package and its Classes
UNIT V
Exception Handling: Introduction, Hierarchy of Standard Exception Classes, Keywords throws and throw,
try, catch, and finally Blocks, Multiple Catch Clauses, Class Throwable, Unchecked Exceptions, Checked
Exceptions, try-with-resources, Catching Subclass Exception, Custom Exceptions, Nested try and catch
Blocks, Rethrowing Exception, Throws Clause.
Text Books:
1) JAVA one step ahead, Anitha Seth, B.L.Juneja, Oxford.
2) The complete Reference Java, 8th edition, Herbert Schildt, TMH.
References Books:
1) Introduction to java programming, 7th edition by Y Daniel Liang, Pearson
2) Murach's Java Programming, Joel Murach
L T P C
II Year – IV Semester 22CS4T3
3 0 0 3
DATABASE
MANAGEMENT SYSTEMS
COURSE OBJECTIVES
To learn the principles of systematically designing and using large scale Database Management
Systems for various applications.
COURSE OUTCOMES
Describe a relational database and object-oriented database.
Create, maintain and manipulate a relational database using
SQL Describe ER model and normalization for database
design.
Examine issues in data storage and query processing and can formulate appropriate solutions.
Understand the role and issues in management of data such as efficiency, privacy, security,
ethical responsibility and Strategic advantage.
Design and build database system for a given real world problem
UNIT-II : SQL
SQL overview, SQL syntax, SQL data types, SQL operators, SQL expressions, DDL, DML and DCL commands,
SQL queries, SQL select, SQL clauses, SQL constraints, SQL joins, The Form of Basic SQL Query, Union,
Intersect, and Except, Nested Queries, Aggregate Operators, Null Values, Complex Integrity Constraints in
SQL, Triggers and Active Database.
UNIT-III:ER Models
The E/R Models, The Relational Model, Introduction to Database Design, Database Design and Er-
Diagrams, Entities, Attributes, and Entity Sets-Relationship and Relationship Sets-Conceptual Design With
the Er Models, The Relational Model Integrity Constraints Over Relations- Key Constraints –Foreign Key
Constraints-General Constraints,Set Operation, Renaming – Joins- Division- More Examples of Queries
UNIT-IV: Normalization
Purpose of Normalization or schema refinement, concept of functional dependency, normal forms based
on functional dependency(1NF, 2NF and3 NF), concept of surrogate key, Boyce-codd normal form(BCNF),
Lossless join and dependency preserving decomposition, Fourth normal form(4NF).
REFERENCES BOOKS:
1.Data base Systems design, Implementation, and Management, Peter Rob & Carlos Coronel 7th Edition.
2.Fundamentals of Database Systems, Elmasri Navate Pearson Education
3.Introduction to Database Systems, C.J. Date Pearson Education
L T P C
II Year – IV Semester 22CS4T4
3 0 0 3
DATA MINING
UNIT - 1
Data Warehouse and OLAP Technology for Data Mining: What is a Data Warehouse, Multi-Dimensional
Data Model, Data Warehouse Architecture, Data Warehouse Implementation, Development of Data Cube
Technology, and Data Warehousing to Data Mining?
Data Preprocessing: Why Pre-process the Data? Data Cleaning, Data Integration and Transformation, Data
Reduction, Discretization and Concept Hierarchy Generation.
UNIT - 2
INTRODUCTION TO DATA MINING: Motivation and importance, what is Data Mining, Relational Databases,
Data Warehouses, Transactional Databases, Advanced Database Systems and Advanced Database
Applications, Data Mining Functionalities, Interestingness of a pattern Classification of Data Mining
Systems, Major issues in Data Mining.
UNIT - 3
Data Mining Primitives: Mining Association rule in large Databases, Association Rule Mining, Mining
Single- dimensional Boolean Association rules from Transactional Databases, Mining Multi-dimensional
Association rules from relational databases & Data Warehouse.
UNIT - 4
Classification and Prediction: Concepts and Issues regarding Classification and Prediction, Classification
by Decision Tree Induction, Bayesian. Classification, Classification by Back-propagation, Classification
Based on Concepts from Association Rule Mining.
UNIT - 5
Cluster Analysis: What is Cluster Analysis? Types of Data in Cluster Analysis, A Categorization of
Major clustering methods, partitioning methods, Hierarchical methods, Density-Based Methods:
DBSCAN, Grid- based Method: STING; Model-based Clustering Method: Statistical approach,
Outlier analysis.
Text books:
1. Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques, Morgan Kaufman Publications
Reference Books:
1. Adriaan,Introduction to Data Mining, Addison Wesley Publication
2. A.K.Pujari Data Mining Techniques, University Press
L T P C
II Year – IV Semester 22CS4T5
3 0 0 3
OPERATING SYSTEMS
Course Objectives:
The objectives of this course is to
1. Introduce to the internal operation of modern operating systems
2. Define, explain, processes and threads, mutual exclusion, CPU scheduling,deadlock,
memory management, and file systems
3. Understand File Systems in Operating System like UNIX/Linux and Windows
4. Understand Input Output Management and use of Device Driver and Secondary
Storage (Disk) Mechanism
5. Analyze Security and Protection Mechanism in Operating System.
Course Outcomes:
1. After learning, the course the students should be able to:
2. Describe various generations of Operating System and functions of Operating System
3. Describe the concept of program, process and thread and analyze various CPU Scheduling
Algorithms and compare their performance
4. Solve Inter Process Communication problems using Mathematical Equations by various methods
5. Compare various Memory Management Schemes especially paging and Segmentation in
Operating System and apply various Page Replacement x Techniques
6. Outline File Systems in Operating System like UNIX/Linux and Windows
UNIT I
Operating Systems Overview: Operating system functions, Operating system structure, Operating
systems operations, Open-Source Operating Systems. System Structures: Operating System Services,
User and Operating- System Interface, systems calls, Types of System Calls, system programs,
operating system structure
UNIT-II:
Process Management – Process concept, The process, Process State Diagram, Process control block,
Process Scheduling- Scheduling Queues, Schedulers, Operations on Processes, Interprocess
Communication, Threading Issues, Scheduling-Basic Concepts, Scheduling Criteria, Scheduling
Algorithms.
UNIT-III:
Memory Management: Swapping, Contiguous Memory Allocation, Paging, structure of the Page Table,
Segmentation. Virtual Memory Management: Virtual Memory, Demand Paging, Page- Replacement
Algorithms, Thrashing
UNIT-IV:
Concurrency: Process Synchronization, The Critical- Section Problem, Synchronization Hardware,
Semaphores, Classic Problems of Synchronization, Monitors, Synchronization examples
UNIT-V:
Principles of deadlock – System Model, Deadlock Characterization, Deadlock Prevention,
Detection and Avoidance, Recovery form Deadlock
Text Books:
1.Silberschatz A, Galvin P B, and Gagne G, Operating System Concepts, 9th edition, Wiley, 2013.
2.Tanenbaum A S, Modern Operating Systems, 3rd edition, Pearson Education, 2008. (for
Interprocess Communication and File systems.)
Reference Books:
1.Dhamdhere D M, Operating Systems A Concept Based Approach, 3rd edition, Tata
McGraw-Hill, 2012.
2.Stallings W, Operating Systems -Internals and Design Principles, 6th edition, Pearson
Education, 2009
3.Nutt G, Operating Systems, 3rd edition, Pearson Education, 2004.
22CS4L1 L T P C
II Year – IV Semester
0 0 3 1.5
JAVA PROGRAMMING LAB
Course Objectives:
The aim of this lab is to
Practice programming in the Java
Gain knowledge of object-oriented paradigm in the Java programming
language Learn use of Java in a variety of technologies and on different
platforms
Course Outcomes:
By the end of the course student will be able to write java program for
Evaluate default value of all primitive data type, Operations, Expressions, Control-flow,
Strings Determine Class, Objects, Methods, Inheritance, Exception, Runtime
Polymorphism, User defined Exception handling mechanism
Illustrating simple inheritance, multi-level inheritance, Exception handling
mechanism Construct Threads, Event Handling, implement packages, developing
applets
Exercise - 1 (Basics)
a) Write a JAVA program to display default value of all primitive data type of JAVA
b) Write a java program that display the roots of a quadratic equation ax2+bx=0. Calculate the
discriminate D and basing on value of D, describe the nature of root.
c) Five Bikers Compete in a race such that they drive at a constant speed which may or may not
be the same as the other. To qualify the race, the speed of a racer must be more than the
average speed of all 5 racers. Take as input the speed of each racer and print back the speed of
qualifying racers.
Exercise - 2 (Operations, Expressions, Control-flow, Strings)
a) Write a JAVA program to search for an element in a given list of elements using
binary search mechanism.
b) Write a JAVA program to sort for an element in a given list of elements using bubble sort
c) Write a JAVA program to sort for an element in a given list of elements using merge sort.
d) Write a JAVA program using StringBuffer to delete, remove character.
Exercise - 3 (Class, Objects)
a) Write a JAVA program to implement class mechanism. Create a class, methods and
invoke them inside main method.
b) Write a JAVA program to implement constructor.
Exercise - 4 (Methods)
a) Write a JAVA program to implement constructor overloading.
b) Write a JAVA program implement method overloading.
Exercise - 5 (Inheritance)
a) Write a JAVA program to implement Single Inheritance
b) Write a JAVA program to implement multi level Inheritance
c) Write a java program for abstract class to find areas of different shapes
Exercise - 6 (Inheritance - Continued)
a) Write a JAVA program give example for “super” keyword.
b) Write a JAVA program to implement Interface. What kind of Inheritance can be achieved?
Exercise - 7 (Exception)
a) Write a JAVA program that describes exception handling mechanism
b) Write a JAVA program Illustrating Multiple catch clauses
Exercise – 8 (Runtime Polymorphism)
a) Write a JAVA program that implements Runtime polymorphism
b) Write a Case study on run time polymorphism, inheritance that implements in above
problem
Exercise – 9 (User defined Exception)
a) Write a JAVA program for creation of Illustrating throw
b) Write a JAVA program for creation of Illustrating finally
c) Write a JAVA program for creation of Java Built-in Exceptions
d) d)Write a JAVA program for creation of User Defined Exception
Exercise – 10 (Threads)
a)Write a JAVA program that creates threads by extending Thread class .First thread
display “Good Morning “every 1 sec, the second thread displays “Hello “every 2 seconds
and the third display “Welcome” every 3 seconds ,(Repeat the same by implementing
Runnable)
b) Write a program illustrating isAlive and join ()
c)Write a Program illustrating Daemon Threads.
ADDITIONAL PROGRAMS:
11 (Threads continuity)
OBJECTIVES:
1. To provide a sound introduction to the discipline of database management as a subject in
2. its own right, rather than as a compendium of techniques and product specific tools.
3. To familiarize the participant with the nuances of database environments towards an
information
4. oriented data-processing oriented framework
5. To give a good formal foundation on the relational model of data
6. To present SQL and procedural interfaces to SQL comprehensively
7. To give an introduction to systematic database design approaches covering conceptual design,
8. logical design and an overview of physical design
OUTCOMES:
1. Understand, appreciate and effectively explain the underlying concepts of database
technologies
2. Design and implement a database schema for a given problem-domain Normalize a
database
3. Populate and query a database using SQL DML/DDL commands.
4. Declare and enforce integrity constraints on a database using a state-of-the-art RDBMS
5. Programming PL/SQL including stored procedures, stored functions, cursors, packages.
6. Design and build a GUI application using a 4GL.
List of Experiments:
SQL
3. Queries to Retrieve and Change Data: Select, Insert, Delete, and Update
6. Queries for Creating, Dropping, and Altering Tables, Views, and Constraints
8. Queries on Working with Index, Sequence, Synonym, Controlling Access, and Locking
Rows for Update, Creating Password and Security features PL/SQL
9. Write a PL/SQL Code using Basic Variable, Anchored Declarations, and Usage of
Assignment Operation
10. Write a PL/SQL Code Bind and Substitution Variables. Printing in PL/SQL
Write a PL/SQL block using SQL and Control Structures in PL/SQL
11. Write a PL/SQL Code using Cursors, Exceptions and Composite Data Types
ADDITIONAL PROGRAMS
12. Write a PL/SQL Code using Procedures, Functions, and Packages FORMS
13. Write a PL/SQL Code Creation of forms for any Information System such as Student
Information System, Employee Information System etc.
Text Books/Suggested
Reading:
Oracle: The Complete Reference by Oracle Press
OBJECTIVES:
Practical exposure on implementation of well known data mining tasks.
Exposure to real life data sets for analysis and prediction.
Learning performance evaluation of data mining algorithms in a supervised and
anunsupervised setting.
Handling a small data mining project for a given practical domain.
OUTCOMES:
System/Software Requirements:
Intel based desktop PC WEKA TOOL
Course Objectives:
The learning objectives of this course are:
• To identify Java language components and how they work together in applications
• To learn the fundamentals of object-oriented programming
in Java, including defining classes, invoking methods, using
class libraries.
• To learn how to extend Java classes with inheritance and dynamic
bindingand how to use exception handling in Java applications
• To understand how to design applications with threads in Java
• To understand how to use Java APIs for programdevelopment
Course Outcomes:
By the end of the course, the student will be
To be familiarize with RMI and JSP
To understand the Java Servlets and Database connectivity
To Know more about the Enterprise Java Bean (EJB) Programming
UNIT- I
APPLET, AWT AND EVENT HANDLING : Applet Basics – Applet architecture – HTML APPLET
tag – -Passing parameter to AppletgetDocumentBase() and getCodeBase() – AWT classes
and Graphics – AWT Controls -Event Handling – Event Classes – Event Listener Interfaces –
Layout Managers – Menus
UNIT -II
INTRODUCING SWING & JAVA BEANS: Exploring Swing – JLabel and ImageIcon,
JTextField – The Swing Buttons – JTabbedPane -JScrollPane, JList&JcomboBox – Trees
&JTables – What Is a Java Bean? – Advantages of Java Beans – Introspection, Bound and
Constrained Properties – Persistence & Customizers
UNIT -III
RMI & NETWORKING : Remote Method Invocation – Settingup Remote Method Invocation –
RMI with Applets
Networking Basics – The Networking Classes and Interfaces – InetAddress –
Inet4Address and Inet6Address -TCP/IP Client sockets – URL – URL Connection –
HttpURLConnection .
UNIT- IV
JDBC : Presentation to JDBC CONNECTION settings – The Concept of JDBC – JDBC Driver
Types – JDBC Packages – A Brief Overview of the JDBC Process – Database
Connection – Associating the JDBC/ODBC Bridge with the Database – Statement
Objects – Result Set.
UNIT- V
SERVLETS: Background, The Life Cycle of a Servlet & The JSDK-A Simple Servlet – The
Servlet API -RolePlay-Servlet Concept – The javax.servlet Package – Reading Servlet
Parameters, The javax.servlet.http Package – Handling HTTP Request and Responses –
Using Cookies – Session Tracking.
Text Books:
OBJECTIVES
To understand the software requirements and SRS document.To understand the software life
cycle models.
To understand the importance of modeling and modeling languages.
To design and develop correct and robust software products.
To understand the quality control and how to ensure good quality software.
To understand the planning and estimation of software projects.
To understand the implementation issues, validation and verification procedures.
To understand the maintenance of software
UNIT-I:
Software and Software Engineering: The Nature of Software, The Unique Nature of Web Apps,
Software Engineering, Software Process, Software Engineering Practice, Software Myths.
Process Models: A Generic Process Model, Process Assessment and Improvement, Prescriptive
Process Models, Specialized Process Models, the Unified Process, Personal and Team Process
Models, Process Terminology, Product and Process.
UNIT-II:
Requirements Analysis and Specification: Requirements Gathering and Analysis, Software
Requirement Specification (SRS), Formal System Specification.
Software Design: Overview of the Design Process, How to Characterize a Design? Cohesion and
Coupling, Layered Arrangement of Modules, Approaches to Software Design
UNIT – III:
Function-Oriented Software Design: Overview of SA/SD Methodology, Structured Analysis,
Developing the DFD Model of a System, Structured Design, Detailed Design, Design Review, over
view of Object Oriented design.
Coding And Testing: Coding, Code Review, Software Documentation, Testing, Unit Testing, Black-
Box Testing, White-Box Testing, Debugging, Program Analysis Tool, Integration Testing, Testing
Object- Oriented Programs, System Testing, Some General Issues Associated with Testing.
UNIT – IV:
Software Reliability And Quality Management: Software Reliability, Statistical Testing, Software
Quality, Software Quality Management System, ISO 9000, SEI Capability Maturity Model.
Computer Aided Software Engineering: Case and its Scope, Case Environment, Case Support in
Software Life Cycle, Other Characteristics of Case Tools, Towards Second Generation CASE Tool,
Architecture of a Case Environment.
UNIT – V:
Software Maintenance: Software maintenance, Maintenance Process Models, Maintenance Cost,
SoftwareConfiguration Management.
Software Reuse: what can be reused? Why almost No Reuse So Far? Basic Issues in Reuse
Approach, Reuseat Organization Level.
OUTCOMES
Define and develop a software project from requirement gathering to implementation.
Obtain knowledge about principles and practices of software engineering.
Focus on the fundamentals of modeling a software project.
Obtain knowledge about estimation and maintenance of software systems
TEXT BOOKS:
Software Engineering - A Practitioner’s Approach, Roger S. Pressman, Seventh Edition
McGrawHillInternational Edition.
1. Fundamentals of Software Engineering, Rajib Mall, Third Edition, PHI.
2. Software Engineering, Ian Sommerville, Ninth edition, Pearson education
3. Software Engineering - Concepts and Practices: Ugrasen Suman, Cengage Learning
REFERENCE BOOKS:
1. Software Engineering : A Primer, Waman S Jawadekar, Tata McGraw-Hill, 2008
2. Software Engineering, A Precise Approach, PankajJalote, Wiley India, 2010.
3. Software Engineering, Principles and Practices, Deepak Jain, Oxford University Press.
4. Software Engineering1: Abstraction and modeling, Diner Bjorner, Springer International edition, 2006.
L T P C
III Year – V Semester 22CS5T3
3 0 0 3
BIG DATA ANALYTICS
Course Objectives:
Optimize business decisions and create competitive advantage with Big Data analytics
Introducing Java concepts required for developing map reduce programs
Derive business benefit from unstructured data
Imparting the architectural concepts of Hadoop and introducing map reduce paradigm
To introduce programming tools PIG & HIVE in Hadoop echo system.
UNIT-I
Data structures in Java: Linked List, Stacks, Queues, Sets, Maps; Generics: Generic classes and Type
parameters, Implementing Generic Types, Generic Methods, Wrapper Classes, Concept of Serialization
Working with Big Data: Google File System, Hadoop Distributed File System (HDFS) – Building blocks of
Hadoop (Namenode, Datanode, Secondary Namenode, JobTracker, TaskTracker), Introducing and
Configuring Hadoop cluster (Local, Pseudo-distributed mode, Fully Distributed mode), Configuring XML
files.
UNIT-II
Writing MapReduce Programs: A Weather Dataset, Understanding Hadoop API for MapReduce Framework
(Old and New), Basic programs of Hadoop MapReduce: Driver code, Mapper code, Reducer code,
RecordReader, Combiner, Partitioner
UNIT - III
Hadoop I/O: The Writable Interface, WritableComparable and comparators, Writable Classes: Writable
wrappers for Java primitives, Text, BytesWritable, NullWritable, ObjectWritable and GenericWritable,
Writable collections, Implementing a Custom Writable: Implementing a RawComparator for speed, Custom
comparators
UNIT-IV
Pig: Hadoop Programming Made Easier Admiring the Pig Architecture, Going with the Pig Latin
Application Flow, Working through the ABCs of Pig Latin, Evaluating Local and Distributed Modes of
Running Pig Scripts, Checking out the Pig Script Interfaces, Scripting with Pig Latin
UNIT-V
Applying Structure to Hadoop Data with Hive: Saying Hello to Hive, Seeing How the Hive is Put Together,
Getting Started with Apache Hive, Examining the Hive Clients, Working with Hive Data Types, Creating and
Managing Databases and Tables, Seeing How the Hive Data Manipulation Language Works, Querying and
Analyzing Data
Course Outcomes:
Text Books:
1. Big Java 4th Edition, Cay Horstmann, Wiley John Wiley & Sons, INC
2. Hadoop: The Definitive Guide by Tom White, 3rd Edition, O’reilly
3. Hadoop in Action by Chuck Lam, MANNING Publ.
4. Hadoop for Dummies by Dirk deRoos, Paul C.Zikopoulos, Roman B.Melnyk,Bruce Brown, Rafael Coss
Reference Books:
1. Hadoop in Practice by Alex Holmes, MANNING Publ.
2. Hadoop MapReduce Cookbook, SrinathPerera, ThilinaGunarathne
PROFESSIONAL ELECTIVES III YEAR V SEM
UNIT-IV: App Services: Azure App Services-Azure Web App-Azure Mobile App-
Azure Notification Hub- Azure API Apps-App Service Backup-App Service Security-
App Service Monitoring-Azure CDN.
Text Books:
OBJECTIVES:
The student should be made to:
1. Understand the design issues in ad hoc and sensor networks.
2. Learn the different types of MAC protocols.
3. Be familiar with different types of adhoc routing protocols.
4. Be exposing to the TCP issues in adhoc networks.
5. Learn the architecture and protocols of wireless sensor networks.
OUTCOMES:
1. Explain the concepts, network architectures and applications of ad hoc and wireless sensor networks
2. Analyze the protocol design issues of ad hoc and sensor networks
3. Design routing protocols for ad hoc and wireless sensor networks with
respect to someprotocol design issues
4. Evaluate the QoS related performance measurements of ad hoc and sensor networks.
UNIT-I INTRODUCTION
Fundamentals of Wireless Communication Technology – The Electromagnetic Spectrum – Radio
propagation Mechanisms – Characteristics of the Wireless Channel -mobile ad hoc networks
(MANETs) and wireless sensor networks (WSNs) :concepts and architectures. Applications of Ad
Hoc and Sensor networks. Design Challenges in Ad hoc and Sensor Networks.
UNIT IV
WIRELESS SENSOR NETWORKS (WSNS)AND MAC PROTOCOLS
single node architecture: hardware and software components of a sensor node - WSN Network
architecture: typical network architectures-data relaying and aggregation strategies -MAC layer
protocols: self- organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
UNIT V
WSN ROUTING, LOCALIZATION & QOS
Issues in WSN routing – OLSR- Localization – Indoor and Sensor Network Localization-absolute and
relative localization, triangulation-QOS in WSN-Energy Efficient Design-Synchronization-Transport Layer
issues.
TEXT BOOK:
1. C. Siva Ram Murthy, and B. S. Manoj, “Ad Hoc Wireless Networks: Architectures and Protocols “,
Prentice Hall Professional Technical Reference, 2008.
2. Ad hoc and Sensor Networks - Theory and Applications, by Carlos Cordeiro and
Dharma P. Agrawal,World Scientific Publications, March 2006, ISBN 981-256-681-3.
3. Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas
Guibas, Elsevier Science ISBN: 978-1-55860-914-3,(Morgan Kauffman)
REFERENCES:
1. Carlos De Morais Cordeiro, Dharma Prakash Agrawal “Ad Hoc & Sensor Networks:
Theory and Applications”, World Scientific Publishing Company, 2006.
2. Feng Zhao and Leonides Guibas, “Wireless Sensor Networks”, Elsevier Publication – 2002.
3. Holger Karl and Andreas Willig “Protocols and Architectures for Wireless Sensor Networks”,
Wiley,2005
4. Kazem Sohraby, Daniel Minoli, & Taieb Znati, “Wireless Sensor Networks-Technology,
Protocols, and Applications”, John Wiley, 2007.
5. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, 2003.
Course B.Tech L T P C
INTRODUCTION TO DEEP LEARNING
Code III Year V Sem
22CS5E3 3 0 0 3
Course Objectives:
To introduce the foundations of Artificial Neural Networks
To acquire the knowledge on Deep Learning Concepts
To learn various types of Artificial Neural Networks
To gain knowledge to apply optimization strategies
Course Outcomes:
Ability to understand the concepts of Neural Networks
Ability to select the Learning Networks in modeling real world systemsAbility to use
anefficient algorithm for Deep Models
UNIT - I
Artificial Neural Networks: Introduction, Basic models of ANN, important terminologies,
Supervised Learning Networks, Perceptron Networks, Adaptive Linear Neuron, Back
propagation Network. Associative Memory Networks. Training Algorithms for pattern
association, BAM and Hopfield Networks.
UNIT - II
Unsupervised Learning Network- Introduction, Fixed Weight Competitive Nets, Maxnet,
Hamming Network, Kohonen Self-Organizing Feature Maps, Learning Vector Quantization,
Counter Propagation Networks, Adaptive Resonance Theory Networks. Special Networks-
Introduction to various networks.
UNIT - III
Introduction to Deep Learning, Historical Trends in Deep learning, Deep Feed – forward
networks, Gradient-] Based learning, Hidden Units, Architecture Design, Back Propagation and
Other Differentiation Algorithms.
UNIT - IV
Regularization for Deep Learning
Parameter norm Penalties, Norm Penalties as Constrained Optimization, Regularization and
Under- ConstrainedProblems, Dataset Augmentation, Noise Robustness,
UNIT- V
Semi-Supervised learning, Multi-task learning, Early Stopping, Parameter Typing and Parameter
Sharing, Sparse Representations, Bagging and other Ensemble Methods, Dropout, Adversarial
Training, Tangent Distance, tangent Prop and Manifold, Tangent Classifier
TEXT BOOKS:
1. Deep Learning: An MIT Press Book By Ian Good fellow and Yoshua Bengio and Aaron
Courville Neural Networks and Learning Machines, Simon Haykin, 3rd Edition, Pearson Prentice
Hall.
Course B.Tech L T P C
INTRODUCTION TO CRYPTOGRAPHY
Code III Year V Sem
22CS5E4 3 0 0 3
Course Objectives:
1. To understand basics of Cryptography and Network Security.
2. To be able to secure a message over insecure channel by various means.
3. To learn about how to maintain the Confidentiality, Integrity and
Availability of a data.
4. To understand various protocols for network security to protect against the
threats in the networks.
OUTCOMES:
1. Provide security of the data over the network.
2. Do research in the emerging areas of cryptography and network security.
3. Implement various networking protocols.
4. Protect any network from the threats in the world.
UNIT - I
Cryptography Concepts and Techniques: Introduction, plain text and cipher text,
substitution techniques, transposition techniques, encryption and decryption,
symmetric and asymmetric key cryptography, steganography, key range and key size,
possible types of attacks.
UNIT - II
Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA,
Block cipher operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm,
Elgamal Cryptography, Diffie-Hellman Key Exchange
UNIT - III
MD5 message digest algorithm - Secure hash algorithm (SHA) Digital Signatures:
Digital Signatures - authentication protocols - digital signature standards (DSS) -
proof of digital signature algorithm
RESOURCES:
Video Lectures
http://nptel.ac.in/courses/106105031/lecture by Dr.
Debdeep MukhopadhyayIIT Kharagpur
https://ocw.mit.edu/courses/electrical-engineering-and-computer-
science/6-033- computer-system-engineering-spring-2009/video-lectures/
lecture by Prof. Robert Morris and Prof. Samuel Madden MIT.
Text Books
William Stallings, “Crpyptography and Network security Principles and
Practices”, Pearson/PHI.
Wade Trappe, Lawrence C Washington, “ Introduction to Cryptography with
coding theory”, Pearson.
Reference Books
W. Mao, “Modern Cryptography – Theory and Practice”, Pearson Education.
Charles P. Pfleeger, Shari Lawrence Pfleeger – Security in computing – Prentice
Hall of India.
Course B.Tech L T P C
DATA SCIENCE USING CLOUD
Code III Year V Sem
22CS5E5 3 0 0 3
OBJECTIVES:
The student will learn about the cloud environment, building software systems and components
that scale to millions of users in modern internet cloud concepts capabilities across the
various cloud service models including Iaas, Paas, Saas, and developing cloud based software
applications on top of cloud platforms.
OUTCOMES:
Understanding the key dimensions of the challenge of Cloud Computing
Assessment of the economics , financial, and technological implications for selectingcloud
computing forown organization
Assessing the financial, technological, and organizational capacity of employer’s
foractively initiating andinstalling cloud-based applications.
Assessment of own organizations’ needs for capacity building and training in
cloudcomputing-related IT areas
UNIT-I: Systems modeling, Clustering and virtualization
Scalable Computing over the Internet, Technologies for Network based systems, System models
for Distributed and Cloud Computing, Software environments for distributed systems and clouds,
Performance, Security And Energy Efficiency
BEANS PROGRAMMING
1. Write a quiz applet and use gauge bean to update the score
2. Create a time zone list and retrieve any time which is given with zone using java beans
3. Develop a bean program that display a sequece of images in the form of slide show
4. Create a bean that displays a 3D plot of the following function Z = f(x,y)
= 0.01 *(x^2 – y^2)
5. Create a frame that instantiates the beans registers paints to receive color event
notifications from selectors adds the beans to the frame and makes the frame visible
6. Create a bean that displays a pie chart and use pie customizer to update the pie chart
7. Develop a bean that takes date and year and represent it in the local language in the
form of a calender For (Eg.) French , Italian etc
SERVLETS PROGRAMMING
Week 1, 2:
2. (i)Perform setting up and Installing Hadoop in its three operating modes: Standalone, Pseudo
distributed, fully distributed (ii) Use web based tools to monitor your Hadoop setup.
Week 5:
5. Write a Map Reduce program that mines weather data. Weather sensors collecting data every hour at
manylocations across the globe gather a large volume of log data, which is a good candidate for analysis
with Map Reduce, since it is semi structured
and record-oriented.
Week 8:
7. Install and Run Pig then write Pig Latin scripts to sort, group, join, project, and filter your data.
Week 11, 12:
8. Install and Run Hive then use Hive to create, alter, and drop databases, tables, views, functions, and
indexes.
Course B. Tech L T P C
Code COMPUTER NETWORKS
III Year VI Sem
22CS6T1 3 0 0 3
OBJECTIVES:
Understand state-of-the-art in network protocols, architectures, and applications. Process of networking
research Constraints and thought processes for networking research Problem
Formulation—Approach—Analysis.
Understand protocols and LAN technologies Design applications using internet protocolsUnderstand routing
OUTCOMES:
Understand OSI and TCP/IP models
Analyze MAC layer and congestion control algorithms understand how internet works
UNIT – I:
Introduction: Network Topologies WAN, LAN, MAN. Reference models- The OSI Reference Model- the TCP/IP
Reference Model - A Comparison of the OSI and TCP/IP Reference Models
UNIT – II:
Physical Layer – Fourier analysis – Bandwidth Limited Signals – The Maximum Data Rate of a Channel -
Guided Transmission Media, Digital Modulation and Multiplexing: Frequency Division Multiplexing, TimeDivision
Multiplexing, and Code Division Multiplexing
Data Link Layer Design Issues, Error Detection and Correction, Elementary Data Link Protocols, Sliding Window
Protocols
UNIT – III:
The Data Link Layer - Services Provided to the Network Layer – Framing – Error Control – Flow Control, Error
Detection and Correction – Error-Correcting Codes – Error Detecting Codes, Elementary Data Link Protocols- A
Utopian Simplex Protocol-A Simplex Stop and Wait Protocol for an Error free channel-A Simplex Stop and Wait
Protocol for a Noisy Channel, Sliding Window Protocols
UNIT – IV:
The Medium Access Control Sublayer-The Channel Allocation Problem-Static Channel Allocation- Assumptions
for Dynamic Channel Allocation, Multiple Access Protocols-Aloha-Carrier Sense Multiple Access Protocols-
Collision-Free Protocols-Limited Contention Protocols-Wireless LAN Protocols, Ethernet-Classic Ethernet
Physical Layer-Classic Ethernet MAC Sublayer Protocol-Ethernet Performance- Fast Ethernet Gigabit Ethernet-
10-Gigabit Ethernet- Retrospective on Ethernet, Wireless Lans-The 802.11 Architecture and Protocol Stack-The
802.11 Physical Layer- The802.11 MAC Sublayer Protocol-The 805.11 Frame Structure-Services
UNIT – V:
Design Issues-The Network Layer Design Issues – Store and Forward Packet Switching-Services Provided to
the Transport layer- Implementation of Connectionless Service-Implementation of Connection Oriented Service
-Comparison of Virtual Circuit and Datagram Networks, Routing Algorithms-The Optimality principle-Shortest
path Algorithm, Congestion Control Algorithms, Transport Layer – The Internet Transport Protocols: Udp, the
Internet Transport Protocols: Tcp Application Layer –The Domain Name System: The DNS Name Space,
Resource Records, Name Servers,Electronic Mail: Architecture and Services, The User Agent, Message Formats,
Message Transfer, FinalDelivery
TEXT BOOKS:
Tanenbaum and David J Wetherall, Computer Networks, 5th Edition, Pearson Edu, 2010
Computer Networks: A Top Down Approach, Behrouz A. Forouzan, Firouz Mosharraf, McGraw HillEducation
REFERENCE BOOKS:
Larry L. Peterson and Bruce S. Davie, “Computer Networks - A Systems Approach” (5th ed), Morgan
Kaufmann/ Elsevier, 2011
Course B.Tech OBJECT ORIENTED ANALYSIS AND L T P C
Code III Year VI Sem DESIGN
22CS6T3 3 0 0 3
OBJECTIVES:
To understand how to solve complex problems
Analyze and design solutions to problems using object oriented approach
Study the notations of Unified Modeling Language
OUTCOMES:
Ability to find solutions to the complex problems using object oriented approach
Represent classes, responsibilities and states using UML notation
Identify classes and responsibilities of the problem domain
UNIT-I:
Introduction: The Structure of Complex systems, The Inherent Complexity of Software, Attributes of
Complex System, Organized and Disorganized Complexity, Bringing Order to Chaos, Designing
Complex Systems, Evolution of Object Model, Foundation of Object Model, Elements of Object Model,
Applying the Object Model.
UNIT-II:
Classes and Objects: Nature of object, Relationships among objects, Nature of a Class, Relationship
among Classes, Interplay of Classes and Objects, Identifying Classes and Objects, Importance of
Proper Classification, Identifying Classes and Objects, Key abstractions and Mechanisms.
UNIT-III:
Introduction to UML: Why we model, Conceptual model of UML, Architecture, Classes, Relationships,
Common Mechanisms, Class diagrams, Object diagrams.
UNIT-IV:
Basic Behavioral Modeling: Interactions, Interaction diagrams, Use cases, Use case Diagrams, Activity
Diagrams.
UNIT-V:
Advanced Behavioral Modeling: Events and signals, state machines, processes and Threads, time and
space, state chart diagrams.
REFERENCE BOOKS:
“Object-oriented analysis and design using UML”, Mahesh P. Matha, PHI
“Head first object-oriented analysis and design”, Brett D. McLaughlin, Gary Pollice, Dave West, O‟Reilly
“Object-oriented analysis and design with the Unified process”, John W. Satzinger, Robert B. Jackson,
Stephen D. Burd, Cengage Learning
The Unified modeling language Reference manual” , James Rumbaugh, Ivar Jacobson, Grady Booch,
Addison-Wesley
Course B. Tech L T P C
WEB TECHNOLOGIES
Code III Year VI Sem
22CS6T2 3 0 0 3
OBJECTIVE:
This course is designed to introduce students with no programming experience to the
programming languages and techniques associated with the World Wide Web. The course will
introduce web-based media-rich programming tools for creating interactive web pages.
UNIT-I: HTML
HTML overview, Standard HTML Document Structure, Basic HTML tags, HTML elements, Text
Markup tags, HTML attributes, HTML formatting, HTML phrase tags, HTML comments, Images,
Hypertext text, image and email Links, Lists, Tables, HTML frames, HTML blocks, HTML
backgrounds, HTML colors, HTML fonts, HTML Audio, HTML video
UNIT-III: CSS
CSS overview, CSS syntax, CSS selectors, Levels of Style Sheets, Style Specification Formats,
Types of CSS, Selector Forms, The Box Model, Conflict Resolution, CSS colors, CSS fonts, CSS
backgrounds, Setting text properties, Setting image properties, Setting link properties, Setting
table properties
OUTCOMES:
Analyze a web page and identify its elements and attributes.
Create web pages using HTML and Cascading Styles sheets. Build dynamic web
pages. Build web applications using PHP.
TEXT BOOKS:
Programming the World Wide Web, Robet W Sebesta, 7ed, Pearson. Web Technologies, Uttam
KRoy, Oxford The Web Warrior Guide to Web Programming, Bai, Ekedahl, Farrelll, Gosselin, Zak,
Karparhi,Maclntyre, Morrissey, Cengage
REFERENCE BOOKS:
Ruby on Rails Up and Running, Lightning fast Web development, Bruce Tate, Curt Hibbs,
Oreilly (2006)
Programming Perl, 4ed, Tom Christiansen, Jonathan Orwant, Oreilly (2012)
Web Technologies, HTML JavaScript, PHP, Java, JSP, XML and AJAX, Black book, Dream Tech.An
Introduction to Web Design, Programming, Paul S Wang, Sanda S Katila, Cengage Learning
PROFESSIONAL ELECTIVES III YEAR VI SEM
Course B.Tech FORMAL LANGUAGES AND L T P C
Code III Year VI Sem AUTOMATA THEORY
22CS6E1 3 0 0 3
COURSE OBJECTIVE:
Introduce the student to the concepts of Theory of computation in computer science
The students should acquire insights into the relationship among
formal languages,formalGrammars and automata
COURSE OUTCOMES:
• Classify machines by their power to recognize languages,
• Employ finite state machines to solve problems in computing,
• Explain deterministic and non-deterministic machines,
• Comprehend the hierarchy of problems arising in the computer science
UNIT 1
UNIT 2
Regular sets, Regular expressions, Operations and applications of regular expressions,
Identity rules, Conversion of a given regular expression into a finite automaton, Conversion
of finite automata into a regular expression, Pumping lemma for regular sets, Closure
properties of regular sets
UNIT 3
Formal Languages, Grammars, Classification of Grammars, Chomsky Hierarchy Theorem,
Context Free Grammar, Leftmost and Rightmost Derivations, Parse Trees, Ambiguous
Grammars, Simplification of Context Free Grammars-Elimination of Useless Symbols,
EProductions and Unit Productions,Normal Forms for Context Free Grammars-Chomsky
NormalForm and Greibach Normal Form ,Applications of Context Free Grammars.
UNIT 4
Pushdown Automata, Definition, Model, Graphical Notation, Instantaneous Description
Language Acceptance of pushdown Automata, Design of Pushdown Automata,
Deterministic and Non – Deterministic Pushdown Automata, Equivalence of Pushdown
Automata and Context Free Grammars Conversion, Two Stack Pushdown Automata,
Application of Pushdown Automata.
UNIT 5
Turing Machine, Definition, Model, Representation of Turing Machines-Instantaneous
Descriptions, Transition Tables and Transition Diagrams, Language of a Turing Machine,
Design of Turing Machines, Techniques for Turing Machine Construction, Types of Turing
Machines, Church’s Thesis, Universal Turing Machine, Restricted Turing Machine
TEXT BOOKS:
1. Introduction to Automata Theory, Languages and Computation, J.E.Hopcroft,
R.Motwani andJ.D.Ullman,3rd Edition, Pearson, 2008.
2. Theory of Computer Science-Automata, Languages and
Computation, K.L.P.MishraandN.Chandrasekharan, 3rd Edition, PHI,
2007.
REFERENCE BOOKS:
1. A Textbook on Automata Theory Nasir S.F.B, P.K Srimani, Cambridge university
press FormalLanguage and Automata Theory, K.V.N.Sunitha and N.Kalyani,
Pearson, 2015.
2. Introduction to Automata Theory, Formal Languages and Computation, Shyamalendu
Kandar, Pearson,2013.
Course B.Tech L T P C
EMBEDDED SYSTEMS
Code III Year VI Sem
22CS6E2 3 0 0 3
Course Objectives:
The objective of this course is to equip the students with the basic concepts of embedded
system, applications in which they are used, 8051 microcontroller programming concepts
and various aspects of embedded system design from Hardware and Software points of
view and it describes tools and methodologies needed for embedded system design. It
provides RTOS concepts for coding the embedded system software routines. It tells what
makes a system a real-time system and describes the characteristics of latency in real-
time systems.
Course Outcomes:
At the end of this course student will:
CO1) Understand the microprocessor architecture and its components used in embedded
systems CO2) Write the 8051 assembly language code for specific purposes
CO3) impliment code for interfacing various devices.
CO4) Develop simple embedded systems for real time operations
CO5) Compose simple embedded system with error free software to obtain target system
Syllabus:
UNIT 1
The 8051 Architecture : Introduction, 8051 Micro controller Hardware, Input/output Pin
Ports and Circuits, External Memory, Serial data Input/output, Interrupts.
UNIT 3
Basic Assembly Language Programming Concepts: The Assembly Language Programming Process,
Programming Tools and Techniques, Programming the 8051.
UNIT 4
Moving Data: Introduction, Addressing Modes, External Data Moves, Code Memory Read-Only
Data Moves, Push and Pop Opcodes, Data Exchanges.
Basic Design Using a Real-Time Operating System: Message Queues, Mailboxes and
Pipes, Timer Functions, Events, Memory Management, Interrupt Routines in an RTOS
Environment
UNIT 5
Embedded Software Development Tools: Host and Target machines, Linker/Locators for
Embedded Software, Getting Embedded Software into the Target System; Debugging Techniques:
Testing on Host Machine, Using Laboratory Tools, An Example System.
Learning Resource
Text
Books
Course Objective: To develop algorithms that use AI and machine learning along with human
interaction and feedback to help humans make choices/decisions and to understand how
Cognitive computing supports human reasoning by evaluating data in context and presenting
relevant findings along with the evidence that justifies the answers.
Pre-requisite: A course on AI should be studied by students, to study this course.
Course Outcome:
After studying this course, the students will be able to:
Understand basics of Cognitive Computing and its differences from traditional
Approaches of Computing. . Plan and use the primary tools associated with cognitive
computing.
Plan and execute a project that leverages Cognitive Computing.
Pedagogy: Classroom teaching which focuses upon relating the textbook concepts with real
world phenomena, along with periodic tutorial classes in case studies to enhance the
problemsolving ability. UNIT I:
Cognitive science and cognitive Computing with AI, Cognitive Computing - Cognitive Psychology - The
Architecture of the Mind - The Nature of Cognitive Psychology – Cognitive architecture –
Cognitive processes
UNIT-II
The Cognitive Modeling Paradigms - Declarative / Logic based Computational cognitive
modeling – connectionist models – Bayesian models. Introduction to Knowledge-Based AI –
Human Cognition on AI – Cognitive Architectures
UNIT III :
Cognitive Computing With Inference and Decision Support Systems: Intelligent Decision making,
Fuzzy Cognitive Maps, Learning algorithms: Non linear Hebbian Learning – Data driven NHL -
Hybrid learning, Fuzzy Grey cognitive maps, Dynamic Random fuzzy cognitive Maps.
UNIT IV:
Cognitive Computing with Machine Learning: Machine learning Techniques for cognitive
decision making – Hypothesis Generation and Scoring - Natural Language Processing -
Representing Knowledge - Taxonomies and Ontologies - Deep Learning.
UNIT V :
Cognitive Systems in health care – Cognitive Assistant for visually impaired – AI for cancer
detection, Predictive Analytics - Text Analytics - Image Analytics -Speech Analytics – IBM
Watson
Text Books
Hurwitz, Kaufman, and Bowles, Cognitive Computing and Big Data Analytics, Wiley, Indianapolis,
IN, 2005, ISBN: 978-1-118-89662-4. 2 Masood, Adnan, Hashmi, Adnan ,Cognitive Computing
Recipes- Artificial Intelligence Solutions Using Microsoft Cognitive Services and TensorFlow,
2015
Reference Books
1 Peter Fingar, Cognitive Computing: A Brief Guide for Game Changers, PHI Publication, 2015 2
Gerardus Blokdyk ,Cognitive Computing Complete Self-Assessment Guide, 2018 3 Rob High,
Tanmay Bakshi, Cognitive Computing with IBM Watson: Build smart applications using Artificial
Intelligence as a service, IBM Book Series, 2019
Course B.Tech L T P C
SOFT COMPUTING
Code III Year VI Sem
22CS6E4 3 0 0 3
UNIT1
Introduction to Soft Computing:
Concept of computing systems, "Soft" computing versus "Hard"
computing,
Characteristics of Soft computing, Some applications of Soft computing
techniques
UNIT2
UNIT3
UNIT4
UNIT5
UNIT I
IoT and Edge Computing Definition and Use Cases
Introduction to Edge Computing Scenario's and Use cases - Edge computing purpose and
definition, Edge computing use cases, Edge computing hardware architectures, Edge platforms,
Edge vs Fog Computing, Communication Models - Edge, Fog and M2M.
UNIT II
IoT Architecture and Core IoT Modules-A connected ecosystem,IoT versus machine-to-machine
versus, SCADA, The value of a network and Metcalfe's and Beckstrom's laws, IoT and edge
architecture, Role of an architect, Understanding Implementations with examples-Example use
case and deployment, Case study – Telemedicine palliative care, Requirements, Implementation,
Use case retrospective.
UNIT III
RaspberryPi: Introduction to RaspberryPi, About the RaspberryPi Board: Hardware Layout and
Pinouts, Operating Systems on RaspberryPi, Configuring RaspberryPi, Programming RaspberryPi,
Connecting Raspberry Pi via SSH, Remote access tools, Interfacing DHT Sensor with Pi, Pi as
Webserver, Pi Camera, Image & Video Processing using Pi.
UNIT IV
Implementation of Microcomputer RaspberryPi and device Interfacing, Edge to Cloud Protocols-
Protocols,MQTT, MQTT publish-subscribe, MQTT architecture details, MQTT state transitions,
MQTT packet structure, MQTT data types, MQTT communication formats, MQTT 3.1.1 working
example.
UNIT V
Edge computing with RaspberryPi, Industrial and Commercial IoT and Edge, Edge computing and
solutions.
TEXT BOOKS
3) IoT and Edge Computing for Architects - Second Edition, by Perry Lea, Publisher:
Packt Publishing, 2020, ISBN: 9781839214806
4) Raspberry Pi Cookbook, 3rd Edition, by Simon Monk, Publisher: O'Reilly Media,
Inc., 2019, ISBN: 978149204322.
REFERENCES
4) Fog and Edge Computing: Principles and Paradigms by Rajkumar Buyya, Satish
Narayana Srirama, wiley publication, 2019, ISBN: 9781119524984.
5) David Jensen, “Beginning Azure IoT Edge Computing: Extending the Cloud to the Intelligene
Course B. Tech L T P C
Code COMPUTER NETWORKS LAB
III Year VI Sem
22CS6L1 0 0 3 1.5
TEXT BOOKS:
Tanenbaum and David J Wetherall, Computer Networks, 5th Edition, Pearson Edu, 2010
Computer Networks: A Top Down Approach, Behrouz A. Forouzan, Firouz
Mosharraf,
McGraw HillEducation
REFERENCE BOOKS:
OBJECTIVES:
To acquire knowledge of XHTML, Java Script and XML to develop web
applications Ability to develop dynamic web content using Java Servlets and JSP
To understand JDBC connections and Java Mail API
To understand the design and development process of a complete web applicationDesign the
following static web pages required for an online book store web site.
9. Design the static web page HOME PAGE required for an online book store web site.
10. Design the static web page LOGIN PAGE required for an online book store web site.
11. Design the static web page CATOLOGUE PAGE required for an online book store web site.
12. Design the static web page REGISTRATION PAGE required for an online book store web site.
13. Write JavaScript to validate the following fields of the Registration page.
First Name (Name should contains alphabets and the length should not be less
than 6 characters).
b. Password (Password should not be less than 6 characters length).
c. E-mail id (should not contain any invalid and must follow the standard
pattern name@ domain.com)
d. Mobile Number (Phone number should contain 10 digits only).
e. Last Name and Address (should not be Empty)
14. Develop and demonstrate the usage of inline, internal and external style sheet using CSS
15. Create student registration form using text box, text area, check box, radio button, select,
submit button. And display user inserted value in new PHP page
16. Write Ruby program reads a number and calculates the factorial value of it and prints the same.
17. Write a Ruby program which counts number of lines in a text files using its regular Expressions
facility.
18. Write a Ruby program that uses iterator to find out the length of a string. Write
simple Ruby programs thatuses arrays in Ruby.
20. Write Ruby program which uses Math module to find area of a triangle.
22. Define complex class in Ruby and do write methods to carry operations on complex objects.
OUTCOMES:
Students will be able to develop static web sites using XHTML and Java
Scripts To implement XMLand XSLT for web applications
Develop Dynamic web content using Java Servlets and JSP
To develop JDBC connections and implement a complete Dynamic web page
Course Code B. Tech L T P C
OBJECT ORIENTED ANALYSYS ANDDESIGN
22CS6L3 III Year VI Sem USING UML LAB 0 0 3 1.5
OBJECTIVES:
Construct UML diagrams for static view and dynamic view of the system.
Generate creational patterns by applicable patterns for given context.
Create refined model for given Scenario using structural patterns.
Construct behavioral patterns for given applications.
OUTCOMES:
List of Experiments
Week 1:
Week 2, 3 & 4:
Week 5 & 6:
UNIT I :
Introduction to Data Visualization: Acquiring and Visualizing Data, Simultaneous acquisition and
visualization, Applications of Data Visualization, Keys factors of Data Visualization (Control of
Presentation, Faster and Better JavaScript processing, Rise of HTML5, Lowering the
implementation Bar)
Exploring the Visual Data Spectrum: charting Primitives (Data Points, Line Charts, Bar Charts, Pie
Charts, Area Charts), Exploring advanced Visualizations (Candlestick Charts, Bubble Charts, Surface
Charts, Map Charts, Infographics). Making use of HTML5 CANVAS, Integrating SVG
UNIT II :
Basics of Data Visualization – Tables: Reading Data from Standard text files ( .txt, .csv, XML),
Displaying JSON content Outputting Basic Table Data (Building a table, Using Semantic Table,
Configuring the columns), Assuring Maximum readability (Styling your table, Increasing
readability, Adding dynamic Highlighting), Including computations, Using data tables library,
relating data table to a chart
UNIT III :
Visualizing data Programmatically: Creating HTML5 CANVAS Charts (HTML5 Canvas basics,
Linear interpolations, A Simple Column Chart, Animations), Starting with Google charts (Google
Charts API Basics, A Basic bar chart, A basic Pie chart, Working with Chart Animations).
Introduction to D3.js: Getting setup with D3, Making selections, changing selection’s attribute,
Loading and filtering External data : Building a graphic that uses all of the population distribution
data, Data formats you can use with D3, Creating a server to upload your data, D3’s function for
loading data, Dealing with Asynchronous requests, Loading and formatting Large Data Sets
UNIT IV :
Advanced Data Visualization: Making charts interactive and Animated: Data joins, updates and
exits, interactive buttons, Updating charts, Adding transactions, using keys Adding a Play Button:
wrapping the update phase in a function, Adding a Play button to the page, Making the Play button
go, Allow the user to interrupt the play, sequence.
UNIT V :
Information Dashboard Design: Introduction, Dashboard design issues and assessment of needs,
Considerations for designing dashboard-visual perception, Achieving eloquence, Advantages of
Graphics
_Library of Graphs, Designing Bullet Graphs, Designing Sparklines, Dashboard Display Media,
Critical Design Practices, Putting it all together - Unveiling the dashboard.
Text Books:
1. Fundamentals of mathematical statistics; S.C. Gupta, V.K. Kapoor; Sultan Chand & Sons.
2. Probability and statistics; Murray R. Spiegel, John Schiller and R. Alu Srinivasan;Sschaum’s
outline series, Mcgraw-hill.
3. The Elements of Statistical leaning; Trevor Hastie, Robert Tibshirani, Jerome Friedman;
Springer. Reference Books:
1. Applied Linear Statistical Models, Michael H. Kutner, Christopher J. Nachtsheim, John Neter;
McGraw Hill
2. Applied logistic Regression, David W. Hosme, Stanley lemeshow; Wiley
3. Practical Statistics for Data Scientists, Peter Bruce & Andrew Bruce, O’Reilly
Course B.Tech BIG DATA TECHNOLOGIES L T P C
Code IV Year VII Sem
22CS7E2 3 0 0 3
Course Objectives: -
The growth of information systems has given rise to large amount of data which do not qualify as
traditional definition of data. This scenario has given us new possibilities but at same time pose
serious challenges.
Such challenges lie in effective storage, analysis and search of such large set of data. Fortunately,
a number of technologies have been developed that answer such challenges. This course
introduces this scenario along with technologies and how they answer these challenges.
In this context, the specific objective of the course is to introduce student to current scenarios of
big data and provide various facets of big data. It also provides them opportunity to be familiar
with the technologies playing key role in it and equips them with necessary knowledge to use
them for solving various big data problems in different domains.
UNIT-1 Introduction to Big Data Big Data Overview, Background of Data Analytics, Role of Distributed
System in Big Data, Role of Data Scientist, Current Trend in Big Data Analytics
UNIT-V Searching and Indexing Big Data, Full text Indexing and Searching,Indexing with
Lucene,Distributed Searching with elasticsearch
Course B.Tech WEB ANALYTICS L T P C
Code IV Year VII Sem
22CS7E3 3 0 0 3
Course Objective: To Assess that how website visitors view and interact with a site’s pages
and features, and business intelligence, which would allow using data on customer
purchasing patterns, demographics, and demanding trends to make effective strategic
decisions.
UNIT-I Introduction: Definition, Process, Key terms: Site references, Keywords and Key
phrases; building block terms: Visit characterization terms, Content characterization terms,
Conversion metrics; Categories: Offsite web, On site web; Web analytics platform, Web
analytics evolution, Need for web analytics, Advantages, Limitations.
UNIT-II Data Collection: Clickstream Data: Web logs, Web Beacons, JavaScript tags, Packet Sniffing;
Outcomes
Data: E-commerce, Lead generation, Brand/Advocacy and Support; Research data: Mindset,
Organizational structure, Timing; Competitive Data: Panel-Based measurement, ISP-based
measurement, Search Engine data.
Qualitative Analysis: Heuristic evaluations: Conducting a heuristic evaluation, Benefits of
heuristic evaluations; Site Visits: Conducting a site visit, Benefits of site visits; Surveys:
Website surveys, Post-visit surveys, Creating and running a survey, Benefits of surveys.
UNIT-III Web Analytic fundamentals: Capturing data: Web logs or JavaScripts tags,
Separate data serving and data capture, Type and size of data, Innovation, Integration,
Selecting optimal web analytic tool, Understanding clickstream data quality, Identifying
unique page definition, Using cookies, Link coding issues.
Web Metrics: Common metrics: Hits, Page views, Visits, Unique visitors, Unique page views,
Bounce, Bounce rate, Page/visit, Average time on site, New visits; Optimization(e-commerce,
non e- commerce sites): Improving bounce rates, Optimizing adwords campaigns; Real time
report, Audience report, Traffic source report, Custom campaigns, Content report, Google
analytics, Introduction to KPI, characteristics, Need for KPI, Perspective of KPI, Uses of KPI.
UNIT-IV Web analytics 2.0: Web analytics 1.0, Limitations of web analytics 1.0, Introduction to
analytic 2.0,
Competitive intelligence analysis : CI data sources, Toolbar data, Panel data ,ISP data, Search
engine data, Hybrid data, Website traffic analysis: Comparing long term traffic trends, Analyzing
competitive site overlap and opportunities.
Google Analytics: Brief introduction and working, Adwords, Benchmarking, Categories of
traffic: Organic traffic, Paid traffic; Google website optimizer, Implementation technology,
Limitations, Performance concerns, Privacy issues.
UNIT-V Relevant technologies:Internet & TCP/IP, Client / Server Computing, HTTP
(HyperText Transfer Protocol), Server Log Files & Cookies, Web Bugs.
Laboratory Work:to analyzing the web for various functionalities given in the subject and
using various tools and technologies to do the experimentation. It also involves installation
and working on tools and technologies in this domain.
Recommended Books:
Clifton B., Advanced Web Metrics with Google Analytics, Wiley Publishing, Inc. (2010), 2nd
ed. Kaushik A., Web Analytics 2.0 The Art of Online Accountability and Science of Customer
Centricity, Wiley Publishing, Inc. (2010),1st ed.
Sterne J., Web Metrics:Proven methods for measuring web site success, John Wiley and
Sons (2002),1sted
Course B.Tech Ethical L T P C
Code IV Year VII Sem Hacking
22CS7E4 3 0 0 3
Program Objectives
This Seminar will educate the student into an interactive environment where they will be shown
about how to scan, test, hack and secure their systems. Students will understand how our
defense measure works and then scan their networks & attack their own. On completion of the
session students will be able to identify the different threats posed by hackers and other
malicious attackers and how to protect our network & devices from those attacks.
Learning Outcome
At the conclusion of course students are able to:
infrastructure UNIT-I
Information Security Overview – Information Security Threats and Attack Vectors – Hacking Concept
Ethical Hacking Concepts – Information Security Controls – Penetration Testing Concepts –
Information Security Laws and Standards
UNIT-II
Footprinting Concepts – Footprinting through Search Engines – Footprinting through Web
Services – Footprinting through Social Networking Sites – Website Footprinting – Email
Footprinting – Competitive Intelligence – Whois Footprinting – DNS Footprinting – Network
Footprinting – Footprinting Through Social Engineering – Footprinting Tools – Footprinting
Countermeasures – Footprinting Penetration Testing
UNIT-III
Network Scanning Concepts – Scanning Tools – Scanning Techniques – Scanning Beyond
IDS and Firewall – Banner Grabbing – Draw Network Diagrams – Scanning Pen Testing
UNIT-IV
Cyptography Concepts – Encryption Algorithms – Cryptography Tools – Public Key Infrastructure –
Email Encryption Disk Encryption Cryptanalysis – Countermeasures
UNIT-V
Key issues plaguing the information security world, Various types of footprinting, footprinting
tools, competitive intelligence gathering and countermeasures.
Network scanning techniques and scanning countermeasures.
Enumeration techniques and enumeration countermeasures.
System hacking methodology, steganography, steganalysis attacks, and covering tracks
Course B.Tech Introduction to cyber forensics L T P C
Code IV Year VII Sem
22CS7E5 3 0 0 3
OBJECTIVES:
• To learn computer forensics
• To become familiar with forensics tools
• To learn to analyze and validate forensics data
OUTCOMES:At the end of the course, the student should be able to:
• Understand the basics of computer forensics
• Apply a number of different computer forensic tools to a given scenario
• Analyze and validate forensics data
• Identify the vulnerabilities in a given network infrastructure
• Implement real-world hacking techniques to test system security
TEXT BOOKS:
1. Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart, ―Computer
Forensics and Investigations‖, Cengage Learning, India Edition, 2016.
2. CEH official Certfied Ethical Hacking Review Guide, Wiley India Edition, 2015.
REFERENCES
1. John R.Vacca, ―Computer Forensics‖, Cengage Learning, 2005
2. MarjieT.Britz, ―Computer Forensics and Cyber Crime‖: An Introduction‖, 3rd Edition, Prentice
Hall, 2013.
Course B.Tech L T P C
Code IV Year VII Sem Natural Language Processing
22CS7E6 3 0 0 3
Course objectives:
Understand comprehend the key concepts of NLP and identify the
NLP challenges and issues
Develop Language Modeling for various text corpora across the different
languages
Reference Books:
1. Speech and Language Processing: AnIntroduction to Natural Language Processing,
Computational Linguistics and Speech Recognition Jurafsky, David, and James H. Martin,
PEARSON
2. Foundations of Statistical Natural Language Processing, Manning, Christopher D., and Hinrich
Schütze, Cambridge, MA: MIT Press
3. Natural Language Understanding, James Allen. The Benjamin/Cummings Publishing Company Inc..
4. Natural Language Processing with Python – Analyzing Text with the Natural Language
ToolkitSteven Bird, Ewan Klein, and Edward Loper.
Course Code B.Tech L T P C
22CS7E7 IV Year VII Sem 3 0 0 3
Fuzzy Logic
Unit -5 Functions of fuzzy Sets – Extension Principle, Fuzzy Transform (Mapping), Practical
Considerations, Fuzzy Numbers Interval Analysis in Arithmetic, Approximate Methods of
Extension - Vertex method, DSW Algorithm, Restricted DSW Algorithm, Comparisons, Fuzzy
Vectors
Course B.Tech L T P C
Code IV Year VII Sem Semantic web
22CS7E8 3 0 0 3
Learning Objectives:
Querying Ontology
Ontology Reasoning
LOD Cloud
UNIT I:Foundation of Semantic Web Technologies :Introduction, Current web vs Semantic Web,
Semantic Web Technologies,A layered approach,Descriptive Logic: Introduction, Definition of the
basic formalism, Reasoning algorithms, Language extensions
RDF: Basic Ideas, RDF: XML-Based Syntax, RDF serialization, RDF Schema: Basic Ideas, RDF
Schema: The Language, RDF and RDF Schema in RDF Schema.
OWL and RDF/RDFS, Three Sublanguages of OWL, Description of the OWL Language, Layering of
OWL, Examples, OWL in OWL.
UNIT IV :SPARQL
SPARQL simple Graph Patterns, Complex Graph Patterns, Group Patterns, Queries with Data
Values, Filters, OWL Formal Semantics.
Principles of Linked Data, Web of Data, LOD Cloud, Linked Data Source : Dbpedia, Freebase
Learning Outcome:
Text Book: A Semantic Web Primer by Grigoris Antoniou Frank van Harmelen, The MIT
Press Cambridge Foundation of Semantic Web Technologies, Pascal Hitzler, Markus and
SebastianLinked Data : Evolving the Web into a Global Data space by Tom Heath,
Christian Bizer , Morgan & Claypool publication Basic Description Logic by Franz Baader, Warner Nutt
Course B.Tech L T P C
Code IV Year VII Sem Cyber security
22CS7E9 3 0 0 3
OBJECTIVES:
The Cyber security Course will provide the students with foundational
Cyber Security principles, Security architecture, risk management,
attacks, incidents, and emerging IT and IS technologies. Students will
gain insight into the importance of Cyber Security and the integral role
of Cyber Security professionals.
OUTCOMES:
Cyber Security architecture principles
Identifying System and application security threats and
vulnerabilities Identifying different classes of attacks
Cyber Security incidents to apply appropriate response
Describing risk management processes and practices
Evaluation of decision making outcomes of Cyber Security scenarios
Cyber Security: Understanding Cyber Crimes, Computer Forensics and Legal Perspectives, Nina
Godbole, SunitBelapure, Wiley.
REFERENCES:
• Use basic Unix commands and CHMOD for Perl programming.Use the Pico editor to create a Perl
program
• Describe and use Perl variables, relational operators and control statements
UNIT II.Perl Programming :Perl variables and numerical operators,Assignment operators, Control
statements and relational operators,Logical operators and complex conditions
UNIT III.
Looping and regular expressions,Substitution and translation,Arrays and array manipulation,The
anatomy of an X/HTML tag,Push and Pop,Sorting
OBJECTIVES:
Provides an introduction to the fundamentals of distributed computer
systems, assuming the availability of facilities for data transmission, IPC
mechanisms in distributed systems, Remote procedure calls. Expose
students to current technology used to build architectures to enhance
distributed Computing infrastructures with various computing principles.
OUTCOMES:
Develop a familiarity with distributed file systems.
Describe important characteristics of distributed systems and the
salient architectural features of suchsystems.
Describe the features and applications of important standard
protocols which are used in distributedsystems.
Gaining practical experience of inter-process communication in a
distributed environment
UNIT-I:
Characterization of Distributed Systems: Introduction, Examples of Distributed
Systems, Resource Sharing and the Web, Challenges.
System Models: Introduction, Architectural Models- Software Layers, System
Architecture, Variations, Interface and Objects, Design Requirements for Distributed
Architectures, Fundamental Models- Interaction Model, Failure Model, Security Model.
UNIT-II:
Inter process Communication: Introduction, The API for the Internet Protocols- the
Characteristics of Inter process communication, Sockets, UDP Datagram
Communication, TCP Stream Communication; External Data Representation and
Marshalling; Client Server Communication; Group Communication- IP Multicast- an
implementation of group communication, Reliability and Ordering of Multicast.
UNIT-III:
Distributed Objects and Remote Invocation: Introduction, Communication between
Distributed Objects- Object Model, Distributed Object Modal, Design Issues for RMI,
Implementation of RMI, Distributed Garbage Collection; Remote Procedure Call, Events
and Notifications, Case Study: JAVA RMI
UNIT-IV:
Operating System Support: Introduction, the Operating System Layer, Protection,
Processes and Threads – Address Space, Creation of a New Process, Threads.
UNIT-V:
Distributed File Systems: Introduction, File Service Architecture; Peer-to-Peer
Systems: Introduction, Napster and its Legacy, Peer-to-Peer Middleware, Routing
Overlays.
Coordination and Agreement: Introduction, Distributed Mutual Exclusion,
Elections, MulticastCommunication.
Transactions & Replications: Introduction, System Model and Group
Communication, Concurrency Control in Distributed Transactions, Distributed
Dead Locks, Transaction Recovery; Replication- Introduction, Passive (Primary)
Replication, Active Replication.
TEXT BOOKS:
Ajay D Kshem kalyani, Mukesh Sighal, “Distributed Computing, Principles,
Algorithms andSystems”, Cambridge
George Coulouris, Jean Dollimore, Tim Kindberg, “Distributed Systems- Concepts and
Design”,Fourth Edition, Pearson Publication
REFERENCE BOOKS
1. Distributed-Systems-Principles-Paradigms-Tanenbaum PHI
Course B.Tech L T P C
Code IV Year VII Sem Green computing
22CS7E13 3 0 0 3
OBJECTIVES:
• To learn the fundamentals of Green Computing.
• To analyze the Green computing Grid Framework.
• To understand the issues related with Green compliance.
• To study and develop various case studies.
UNIT I FUNDAMENTALS
Green IT Fundamentals: Business, IT, and the Environment – Green computing: carbon foot
print, scoop on power – Green IT Strategies: Drivers, Dimensions, and Goals –
Environmentally Responsible Business: Policies, Practices, and Metrics.
TEXT BOOKS:
1. Bhuvan Unhelkar, ―Green IT Strategies and Applications-Using Environmental
Intelligence‖, CRC Press, June 2014.
2. Woody Leonhard, Katherine Murray, ―Green Home computing for dummies‖, August 2012.
REFERENCES
1. Alin Gales, Michael Schaefer, Mike Ebbers, ―Green Data Center: steps for the
Journey‖, Shroff/IBM rebook, 2011.
2. John Lamb, ―The Greening of IT‖, Pearson Education, 2009.
3. Jason Harris, ―Green Computing and Green IT- Best Practices on regulations &
industry‖, Lulu.com, 2008
4. Carl speshocky, ―Empowering Green Initiatives with IT‖, John Wiley & Sons, 2010.
5. Wu Chun Feng (editor), ―Green computing: Large Scale energy efficiency‖, CRC Press
Course B.Tech L T P C
Code IV Year VII Sem Angular JS
22CS7E14 3 0 0 3
OBJECTIVES:
To acquire knowledge of basics in java scripting.
To acquire knowledge of various object models in java
script. To acquire basics of Angular JS
To apply Angular JS in developing real-time application
OUTCOMES:
Use operators, variables, arrays, control structures, functions and objects in Java
Script. Map HTML using the DOM - Document Object Model.
Use regular expressions for form validation.
Using Angular JS along with HTML and CSS
Introduction:
Browser Object Models (BOM): Window Object, History Object, Navigation Object,
Screen Object. Document Object Model (DOM): introduction- methods-Document-
Elements- HTML-CSS-Events-Event Listener-Navigation-Nodes-Node Lists
TEXT BOOKS
Course B.Tech L T P C
Code IV Year VII Sem E-
22CS7E15 commerce 3 0 0 3
UNIT I
Introduction
What is E-Commerce, Forces behind E-Commerce Industry Framework, Brief history of ECommerce,
Inter Organizational E-Commerce Intra Organizational E-Commerce, and
Telecommunication. UNIT-II
Mobile Commerce
Introduction to Mobile Commerce, Mobile Computing Application, Wireless Application
Introduction to Web security, Firewalls & Transaction Security, Client Server Network,
UNIT-III
Encryption
World Wide Web & Security, Encryption, Transaction security, Secret Key Encryption,
Issues.
UNIT - IV
Electronic Payments
Smart Cards, Credit Card I Debit Card based EPS, Emerging financial Instruments,
UNIT-V
Net Commerce
References: