0% found this document useful (0 votes)
23 views77 pages

Manonmaniam Sundaranar University Tirunelveli - 12: From The Academic Year 2024 - 2025

The document outlines the syllabus for the Master of Computer Applications (M.C.A) program at Manonmaniam Sundaranar University for the academic year 2024-2025. It details the program's objectives, graduate attributes, course structure, evaluation methods, and candidate eligibility. The curriculum emphasizes core knowledge, critical analysis, project management, and professional skills, aiming to prepare students for successful careers in the IT industry.

Uploaded by

sreeee437
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views77 pages

Manonmaniam Sundaranar University Tirunelveli - 12: From The Academic Year 2024 - 2025

The document outlines the syllabus for the Master of Computer Applications (M.C.A) program at Manonmaniam Sundaranar University for the academic year 2024-2025. It details the program's objectives, graduate attributes, course structure, evaluation methods, and candidate eligibility. The curriculum emphasizes core knowledge, critical analysis, project management, and professional skills, aiming to prepare students for successful careers in the IT industry.

Uploaded by

sreeee437
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 77

MANONMANIAM SUNDARANAR UNIVERSITY

TIRUNELVELI – 12

M.C.A

Syllabus
FROM THE ACADEMIC YEAR 2024 – 2025
1. Preamble

The Department of Computer Science was established with the objective of imparting
quality education in the domain of Computer Science and Applications. With rapidly evolving
technology and the continuous need for innovation, the department has always produced quality
professionals, holding important positions in Information Technology industries in India and
abroad. The Department updates its syllabi frequently to attract young talents from all over the
country. The academic activities of the department, during the last four years, were centered on
teaching and research programmes in computer science with a view to train post-graduates and
researchers who can contribute significantly to the requirements of professional organizations in
the field.
2. General Graduate Attributes (MCA)
G.A.1 Core Knowledge Enrichment
Train the students with Deep Core subject knowledge(including the fundamental
concepts, computational models, advanced core techniques, appropriate Domain expertise).
Apply the knowledge of deep core concepts to conceptualize the computational
models.
Accredited or validated against national or international standards.
G.A.2 Critical Analysis and Decision Making
Skilled with strategic thinking, problem solving, making better use of intuition,
learning to evaluate better, and recognizing the essence of things
Analyze the complex problems and to evaluate and assess information in a practical
and technical way and ends up with the specialized computational models to provide valid
decisions.
G.A.3 Real-Time Project Design and development

Investigating the real world problems to design and develop the computational
framework to cope with real world expectations; to fit that model to the complex real-time data
and to apply appropriate research methods to synthesis the information to make appropriate
decisions

G.A.4. Project Management Capabilities

Trained to apply effective management skills to produce specific project outcomes

G.A.5. Tools usage

Capable to learn and apply recent domain specific knowledge in the computer science

and applications industry


G.A.6. Leadership and Teamwork
Skilled to work effectively as a member and also as a leader in multi- disciplinary
teams.
G.A.7. Communication Skills
Trained to communicate the technical aspects with computing professionals and
with society at large. Such ability includes listening, reading, speaking and writing, and
the ability to comprehend and effective technical report writing and document preparation.
G.A.8. Professionalism

Trained to think and act professionally to adapt themselves in their work places and
society to showcase their talents and skills smartly for their self up liftmen...Aware
about the cyber regulations and professional ethics, responsibilities and
norms of professional computing practice.

G.A.9.Advanced Technology Awareness


Trained to update themselves periodically with the current/modern
technologies and enrich their knowledge through various online MOOC Courses to cope
with the current industrial requirements.
G.A.10. Life Long Learning
To inculcate the passion for continuum learning for a successful professional career
G.A.11. Social Welfare with Ethical Values
Adapt at operating in other cultures, comfortable with different nationalities and
social contexts, able to determine and contribute to desirable social outcomes.
Avoiding unethical behavior such as fabrication, falsification of data, committing
plagiarism.
G.A.12. Entrepreneurship
Identify the timely opportunity and using innovation to pursue that opportunity to
create value and wealth for the betterment of the individual and the society at large.
3. Programme Specific Qualification Attributes
PSQA-GA Mapping
GA10

GA11

GA12
GA1
GA2

GA3

GA4

GA5

GA6

GA7

GA8

GA9

K1(Knowledge)
K2 (Understanding)
K3 (Application level)
K4 (Analytical level)
K5 (Evaluation capability level)
K6 (Scientific or Synthesis level)
4. Vision

Achieving excellence in Information Technology Enabled Services


through Teaching, Research, Extension and Consultancy.

Mission
To offer accredited post graduate and research programmes with the state-of-art
technology throughout the Nation to maintain high academic standards and teaching quality

To be a center of excellence for research and innovation in frontier areas of Computer


Science and technology relevant to the country.

5. Programme Objectives and Outcomes

Programme Educational Objectives


P.E.O.1. Sound background in fundamental core concepts and Computational principles, which
are applied for complex problems Solving
P.E.O.2.Developing the professional skills and entrepreneur skills with Team work, leadership
and communication qualities

P.E.O.3. Practicing lifelong learning for successful professional career with Ethical values
Programme Outcomes (POs) for Master of Computer Applications
P.O.1. Train the students with Deep Core subject knowledge (including the fundamental
concepts, computational models, advanced core techniques, appropriate Domain
expertise). Apply the knowledge of deep core concepts to conceptualize the
computational models. Accredited or validated against national or international
standards.
P.O.2. Skilled with strategic thinking, problem solving, making better use of in tuition, learning
to evaluate better, and recognizing the essence of things. Analyze the complex problems
and to evaluate and assess information in a practical and technical way and ends up with
the specialized computational models to provide valid decisions.

P.O.3. Investigating the real world problems to design and develop the computational
framework to cope with real world expectations; to fit that model to the complex real-
time data and to apply appropriate research methods to synthesis the information to
make appropriate decisions
P.O.4. Trained to apply effective management skills to produce specific project outcomes
P.O.5. Capable to learn and apply recent domain specific knowledge in the computer science
and applications industry
P.O.6. Skilled to work effectively as a member and also as a leader in multi- disciplinary teams.
P.O.7. Trained to communicate the technical aspects with computing professionals and with
society at large. Such ability includes listening reading, speaking and writing, and the
ability to comprehend and effective technical report writing and document preparation.
P.O.8. Trained to think and act professionally to adapt themselves in their work places and
society to show case their talents and skills smartly for their self upliftment. Aware
about the cyber regulations and professional ethics, responsibilities and norms of
professional computing practice.
P.O.9. Trained to update themselves periodically with the current/modern technologies and
enrich their knowledge through various online MOOC Courses to cope with the
current industrial requirements.
P.O.10. To inculcate the passion for continuum learning for a successful Professional career
P.O.11. Adapt at operating in other cultures, comfortable with different Nationalities and
social contexts, able to determine and contribute to desirable social outcomes.
Avoiding unethical behavior such as Fabrication, falsification of Data, committing
plagiarism
P.O.12. Identify the timely opportunity and using innovation to pursue that opportunity to
create value and wealth for the better men to the individual and the society at large.
PEO-PO Mapping

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

PEO 1

PEO 2

PEO 3
PO-GA Mapping

GA1 GA2 GA3 GA4 GA5 GA6 GA7 GA8 GA9 GA10 GA11 GA12

PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9

PO10

PO11

PO12

Programme Specific Outcomes

P.S.O.1. To develop the abilities to acquire deep knowledge of fundamental and core
theoretical and programming concepts for holistic development
P.S.O.2. Design, develop and test the software systems for real-time socio- economic
problems
P.S.O.3. Analyze and recommend appropriate IT Solutions

6. Candidate Eligibility for M.C.A. Programme Admission


Candidates who have passed in any one of the following or equivalent are eligible to
apply:
(i) BCA/Bachelor Degree in Computer Science or equivalent Degree. OR
(ii) B.Sc., /B.Com. / B.A. with Mathematics at 10th, +2 level or at Graduation Level (with
additional bridge Courses as per the norms of the concerned University).
Bridge Course on Basics in Computer Science
Course duration: 30 Hours

Course Modules:
Module1: Computer Organization and Architecture
Module2: Data Structures and Algorithms
Module3: Problem Solving Techniques
Module4: Operating Systems
Module5: Object oriented programming

Module6: Database Management System

Module 7: Software Engineering


Module 8: Computer Networks

Obtained at least 50% marks (45% marks in case of candidates belonging to reserved category)
in the qualifying Examination.

7. Duration of the Programme, Medium and training


The programme shall be of two years duration spread over four semesters under choice
based credit system. The medium of instruction/study is English. Industrial training will bring
knowledge in the software industry. Industrial visit may also be permitted to interact the
students with the people in the software industry.
8. CBCS- Structure

Component wise Credit Distribution


Credits Sem Sem Sem Sem Tota
I II III IV l
Core/Core LAB 18 14 21 53
Electives (i)Discipline– Centric 6 6 3 15

(ii Skill Enhancement 2 2 4

(iii)Summer Internship / 2 16 18
Industrial Training/ Project
Ability Enhancement / 1 1
Extension
Total Credits 24 22 28 17 91
Credit Calculation

Method of teaching Hours Credits

Lecture 1 1

Tutorial / Demonstration 1 1

Practical / Internship/self-Learning 2/1 1

9. Examinations

Examinations are conducted in semester pattern. The examination for the Semester
I & III will be held in November/December and that for the Semester II and IV will be in
the month of April/May.

10. Scheme for Evaluation and Attainment Rubrics


Evaluation will be done on a continuous basis and will be evaluated four times
during the course work. The first evaluation will be in the 7th week, the second in the
11thweek, third in the 16thweek and the end– semester examination in the 19thweek.
Evaluation maybe by objective type questions, short answers, essay so recombination of
these, but the end semester examination is a University theory examination with
prescribed question paper pattern.
Attainment of Rubrics for Theory Courses

THEORY EXAMINATION

Evaluation of Interna Assessment

Test :15 Marks (Best one out of Three Tests)


Seminar :5 Marks

Assignment :5 Marks

Total: 25Marks

*** No Internal Minimum

Evaluation of End Semester Examinations

Question Paper Pattern (Theory)

K CO
Section Approaches Mark Pattern Level Coverage
One word (Answer all 15X1 = 15
A questions) (MCQ) K1-K2 CO1-CO5
100 to 200 words 5X4 = 20
B (Analytical type K4-K6 CO1-CO5
questions)
5X8 = 40 (Essay type
C 500 to 1000 words questions) K2-K3 CO1-CO5
Attainment Rubrics for Lab Courses
PRACTICAL / MINI PROJECT EXAMINATION
Evaluation of Internal Assessment

Test 1 : 50 Marks
Test 2 : 50 Marks (Best one out of Two Tests)

Test 3 : 50 Marks

Total : 50 Marks

*** No Internal Minimum

QUESTION PAPER PATTERN

Time duration: 3 Hours


Max. Marks: 75
Two Questions may be taken from the list of practical problems Marks

(i) Practical/Mini project


▪ Record Note Book- 10
▪ Problem Understanding- 10
▪ Implementation- 10
▪ Debugging and Modification- 10
▪ For correct output and viva - 10

(ii) Industrial Training

▪ Internal Assessment- 50
▪ Joint Viva-voce - (Internal Examiner 50 and External Examiner 50)

PASSING MINIMUM

The candidate shall be declared to have passed in the theory/practical/Dissertation


examination if the candidate secures:
(i) 50% marks in the EXT and
(ii) 50% in ESE and CIA put together
M.C.A - Course Structure

Internal & External Marks

Semester I
Course Hours Maximum Marks
Title of the Credit
Code
Course s Theor Practic CIA EX Total
y al T
Core – I Discrete Mathematics 4 5 25 75 100

Core – II Advanced Python 4 5 25 75 100


Programming

Core – III Linux and Shell 4 4 25 75 100


Programming
Core Lab I Advanced Python 3 4 50 50 100
Programming Lab
Core Lab II Linux and Shell 3 4 50 50 100
Programming Lab
Elective I Advanced OS / 3 4 25 75 100
Architecture and
Frameworks / Data
Engineering and
Management
Elective II Advanced Computer 3 4 25 75 100
Networks / Network
Protocols /
Cryptography and
Network Security
Total 24 22 8
Semester II

Type Title of the Credit Hours CI EX Total


of the Course s A T
Course Theoy Practic
al
Core – IV Advanced Java 4 5 25 75 100
Programming
Core – V Advanced Data 4 5 25 75 100
Structures
Core Lab III Advanced Java 3 4 50 50 100
Programming
Lab
Core Lab IV Advanced Data 3 4 50 50 100
Structures Lab
Elective – III Artificial 3 4 25 75 100
Intelligence and
Machine Learning/
Soft Computing /
High Performance
Computing
Elective – IV Internet of Things / 3 4 25 75 100
Solution Architecture
/ Software
Development
Technologies
Skill Web Development 2 4 25 75 100
Enhancement
Course – I using PHP

22 22 8
Total
Semester III

Type Title of the Credi Hours CI EX Total


of the Course ts A T
Course Theoy Practic
al
Core – VI Dot NET 4 5 25 75 100
Technologies
Core – VII Big Data Analytics 4 4 25 75 100

Core - VIII Mobile Computing 4 4 25 25 100

Core Lab V Dot NET 3 4 50 50 100


Technologies
Lab
Mini Project 6 6 50 50 100

Elective – V Cyber Security / 3 4 25 75 100


Research
Methodology /
Computer Vision
Skill Social Networks 2 3 25 75 100
Enhancement
Course – II
Internship/ Industrial 2 - - 50 50 100
Visit/Field
Visit/Research
Knowledge Updation
Activity
28 20 10
Total

Semester IV

Title of the Course Credits Hours


Project with Viva Voce 16

Extension Activity 1

17

Total Credits : 91
Internship (minimum of 30 hours): The students should submit certificate of attendance from the
industry stating the nature of work done, duration and role played along with report (minimum of 20
pages) at the end of III semester for external evaluation.
Industrial Visit/Field Visit : A report based on the observation and learning outcome to be
submitted (minimum of 10 pages) along with suitable evidences at the end of III semester for
external evaluation.
Research Knowledge Updation Activity : A report to be submitted (minimum of 10 pages) based
on the study made along with the completion certificate stating the work done (MOOC/NPTEL) at
the end of III semester for external evaluation.
Internship/Industrial Visit/Field Visit/Research Knowledge Updation Activity:
Internal –50 Marks, External – 50 Marks

Mini Project & Project: Individual Project report should be submitted at the end of the
respective semester for external evaluation.
Internal – 50 Marks, External – 50 Marks

Extension Activity (Minimum of 10 hours): Extension activity should be able to reflect,


realize and apply his /her knowledge acquired during the course of study to the community in
terms of but not limited to:
• Awareness Campaign
• Conduct of literacy programme
• Developing an application
• Formulation of a framework.
• Conduct of certificate programme.
A report should be submitted along with suitable evidences at the end of IV semester for external
evaluation(Minimum of 10 Pages).
Internal – 50 Marks, External – 50 Marks
CORE COURSES
SEMESTER I
Discrete Mathematics
Course Objectives
• To know the concepts of relations and functions
• To distinguish among different normal forms and quantifiers
• To solve recurrence relations , permutations & combinations
• To know and solve matrices, rank of matrix & characteristic equations
• To study the graphs and its types
Unit-I

Relations- Binary relations-Operations on relations- properties of binary relations in a set – Equivalence


relations–– Representation of a relation by a matrix -Representation of a relation by a digraph – Functions-
Definition and examples-Classification of functions-Composition of functions-Inverse function
Unit-II

Mathematical Logic-Logical connectives -Well formed formulas – Truth table of well formed formula –
Algebra of proposition –Quine’s method- Normal forms of well formed formulas- Disjunctive normal form-
Principal Disjunctive normal form-Conjunctive normal form-Principal conjunctive normal form-Rules of
Inference for propositional calculus – Quantifiers- Universal Quantifiers- Existential Quantifiers
Unit-III

Recurrence Relations- Formulation -solving Recurrence Relation by Iteration- solving Recurrence Relations-
Solving Linear Homogeneous Recurrence Relations of Order Two- Solving Linear Non homogeneous
Recurrence Relations. Permutations-Cyclic permutation- Permutations with repetitions- permutations of sets
with indistinguishable objects- Combinations- Combinations with repetition
Unit-IV

Matrices- special types of matrices-Determinants- Inverse of a square matrix-Cramer’s rule for solving linear
equations-Elementary operations -Rank of a matrix-solving a system of linear equations-characteristic roots
and characteristic vectors-Cayley-Hamilton Theorem-problems

Unit-V
Graphs -Connected Graphs -Euler Graphs- Euler line-Hamiltonian circuits and paths –planar graphs –
Complete graph-Bipartite graph-Hyper cube graph-Matrix representation of graphs

Text book
1. N. Chandrasekaran and M. Umaparvathi, Discrete mathematics, PHI Learning Private Limited, New
Delhi, 2010.
Reference Books
1. Kimmo Eriksson &Hillevi Gavel, Discrete Mathematics & Discrete Models, Studentlitteratur AB,
2015.
2. Kenneth H. Rosen Discrete Mathematics and applications, Mc Graw Hill, 2012
Course Outcomes

On the successful completion of the course, students will be able

To understand the concepts of relations and functions distinguish among K2 I


CO1:
normal forms O

CO2: To analyze and evaluate the recurrence relations H


K4, K5
O
K5 H
CO3: To distinguish among various normal forms and predicate calculus
O
K1 L
CO4: To solve and know various types of matrices
O
K5 H
CO5: To evaluate and solve various types of graphs
O

K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
Advanced Python Programming

Course Objectives:

• To acquire programming skills in core Python


• To learn Strings and function
• To develop object oriented skills in Python
• To comprehend various Python Packages
• To develop web applications using Django
Unit I

Introduction: Fundamental ideas of Computer Science - Strings, Assignment and Comments - Numeric Data
types and Character sets – Expressions – Loops and Selection Statements: Definite iteration: the for Loop -
selection: if and if-else statements - Conditional iteration: the while Loop

Unit II
Strings and Text Files: Accessing Characters and substrings in strings - Data encryption -Strings and Number
systems- String methods – Text - Lists and Dictionaries: Lists – Dictionaries – Design with Functions: A
Quick review - Problem Solving with top-down Design - Design with recursive Functions - Managing a
Program’s namespace - Higher-Order Functions

Unit III
Design with Classes: Getting inside Objects and Classes – Data-Modeling Examples – Building a New Data
Structure – The Two – Dimensional Grid - Structuring Classes with Inheritance and Polymorphism –
Graphical User Interfaces - The Behavior of terminal-Based programs
and GUI-Based programs - Coding Simple GUI-Based programs - Windows and Window Components -
Command Buttons and responding to events

Unit IV
Working with Python Packages: NumPy Library-Ndarray – Basic Operations – Indexing, Slicing and Iteration
– Array manipulation - Pandas –The Series – The Data Frame - The Index Objects – Data Visualization with
Matplotlib – The Matplotlib Architecture – pyplot – The Plotting Window – Adding Elements to the Chart –
Line Charts – Bar Charts – Pie charts

Unit V
Django: Installing Django – Building an application – Project Creation – Designing the Data Schema -
Creating an administration site for models - Working with Query Sets and Managers – Retrieving Objects –
Building List and Detail Views
Text Book:

1. K.A. Lambert, “Fundamentals of Python: first programs”, Second Edition, Cengage Learning, 2018
(Unit - I, II and III)
2. Fabio Nelli, “Python Data Analytics: With Pandas, NumPy, and Matplotlib”, Second Edition, Kindle
Edition, 2018 (Unit - IV)
3. Antonio Mele, “Django 3 By Example”, Third Edition, 2020 (Unit - V)
Course Outcomes

On the successful completion of the course, students will be able to


Comprehend the programming skills in python and develop applications
CO1
using conditional branches and loop
CO2 Create Python applications with strings and functions
Understand and implement the Object Oriented Programming paradigm K1- K6
CO3
with the concept of objects and classes, Inheritance and polymorphism
Evaluate the use of Python packages to perform numerical computations
CO4
and data visualization
CO5 Design interactive web applications using Django
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create

Mapping with Programme Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S S M S M S S S S M S S

CO2 S S S M S S S S S S M S

CO3 S M S S M S M S S M S S

CO4 S S S S S S S M S S M S

CO5 S S S S S S S S S M M S

S- Strong; M-Medium; L-Low


Linux and Shell Programming
Course Objectives
● To teach principles of operating system including File handling utilities, Basic Linux commands,
Scripts and filters.
● To familiarize fundamentals of shell (bash), shell programming, pipes, Control structures, arithmetic in
shell interrupt processing, functions, debugging shell scripts.
● To impart fundamentals of file concepts kernel support for file, File structure related system calls (file
API’s).
● To facilitate students in understanding Inter process communication, semaphore and shared memory.
● To explore real-time problem solution skills in Shell programming.

Unit-I

Basic bash Shell Commands: Interacting with the shell-Traversing the file system-Listing files and
directories-Managing files and directories-Viewing file contents. Basic Script Building: Using multiple
commands-Creating a script file-Displaying messages-Using variables-Redirecting input and output-Pipes-
Performing math-Exiting the script. Using Structured Commands: Working with the if-then statement-
Nesting ifs-Understanding the test command-Testing compound conditions-Using double brackets and
parentheses-Looking at case.

(Book-1, Chapters: 3, 11, and 12)

Unit-II

More Structured Commands: Looping with for statement-Iterating with the until statement-Using the while
statement-Combining loops-Redirecting loop output. Handling User Input: Passing parameters-Tracking
parameters-Being shifty-Working with options-Standardizing options-Getting user input. Script Control:
Handling signals-Running scripts in the background-Forbidding hang-ups -Controlling a Job-Modifying script
priority-Automating script execution.

(Book-1, Chapters: 13, 14, and 16)

Unit-III

Creating Functions: Basic script functions-Returning a value-Using variables in functions-Array and variable
functions-Function recursion-Creating a library-Using functions on the command line. Writing Scripts for
Graphical Desktops: Creating text menus-Building text window widgets-Adding X Window graphics.
Introducing sed and gawk: Learning about the sed Editor-Getting introduced to the gawk Editor-Exploring
sed Editor basics.

(Book-1, Chapters: 17, 18, and 19)

Unit-IV

Regular Expressions: Defining regular expressions-Looking at the basics-Extending our patterns-Creating


expressions. Advanced sed: Using multiline commands-Understanding the hold space-Negating a command-
Changing the flow-Replacing via a pattern-Using sed in scripts-Creating sed utilities. Advanced gawk:
Reexamining gawk-Using variables in gawk-Using structured commands-Formatting the printing-Working
with functions.

(Book-1, Chapters: 20, 21, and 22)


Unit-V

Working with Alternative Shells: Understanding the dash shell-Programming in the dash shell-Introducing
the zsh shell-Writing scripts for zsh. Writing Simple Script Utilities: Automating backups-Managing user
accounts-Watching disk space. Producing Scripts for Database, Web, and E-Mail: Writing database shell
scripts-Using the Internet from your scripts-Emailing reports from scripts. Using Python as a Bash Scripting
Alternative: Technical requirements-Python Language-Hello World the Python way-Pythonic arguments-
Supplying arguments-Counting arguments-Significant whitespace-Reading user input-Using Python to write
to files-String manipulation.

(Book-1, Chapters: 23, 24, 25, and Book-2, Chapter: 14)

Text Book:

1. Richard Blum, Christine Bresnahan, “Linux Command Line and Shell Scripting BIBLE”, Wiley
Publishing, 3rd Edition, 2015.Chapters: 3, 11 to 14, 16 to 25.
2. Mokhtar Ebrahim, Andrew Mallett, “Mastering Linux Shell Scripting”, Packt Publishing, 2 nd Edition,
2018. Chapter: 14.

Reference Books:

1. Clif Flynt, Sarath Lakshman, Shantanu Tushar, “Linux Shell Scripting Cookbook ”, Packt Publishing,
3rd Edition, 2017.
2. Stephen G. Kochan, Patrick Wood, “Shell Programming in Unix, Linux, and OS X”, Addison Wesley
Professional, 4th Edition, 2016.
3. Robert Love, “Linux System Programming”, O'Reilly Media, Inc, 2013
4. W.R. Stevens, “Advanced Programming in the UNIX environment”, 2nd Edition, Pearson Education,
2013
5. Graham Glass, King Ables, “ UNIX for Programmers and Users”, 3rd Edition, Pearson Education,
2003
Course Outcomes

On the successful completion of the course, students will be able

To understand, apply and analyze the concepts and methodology of Linux K1-K6
CO1:
shell programming
To comprehend, impart and apply fundamentals of control structure and K1-K6
CO2:
script controls

To understand, analyse and evaluate the functions, graphical desktop K1-K6


CO3:
interface and editors

To collaborate, apply and review the concepts and methodology of regular K1-K6
CO4:
expression and advanced gawk
To comprehend, use and illustrate the advance concepts such as alternate K1-K6
CO5:
shell script, data connectivity and bash scripting using python
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
Mapping with Programme Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S S S - S L - M M M M S

CO2 S S M - S L - M M M M S

CO3 S S M - S L - M M S S S

CO4 S S M - S L - M M M M S

CO5 S S M - S L - M M M M S
S- Strong; M-Medium; L-Low
Advanced Python Programming Lab
Course Objectives:
This course enables the students:
● To master the fundamentals of writing Python scripts
● To create program using elementary data items
● To implement Python programs with conditionals and loops
● To use functions for structuring Python programs
● To develop web programming with Django
Implement the following in Python:

1. Program using elementary data items, lists, dictionaries and tuples


2. Program using conditional branches, loops
3. Program using functions
4. Program using classes and objects
5. Program using inheritance
6. Program using polymorphism
7. Program using Numpy
8. Program using Pandas
9. Program using Matplotlib
10. Program for creating dynamic and interactive web pages using forms

Course Outcomes

On the successful completion of the course, students will be able to

CO1 Comprehend the programming skills in Python and write scripts


Create python applications with elementary data items, lists, dictionaries
CO2
and tuples
Implement the Object Oriented Programming concepts such as objects and K1- K6
CO3
classes, Inheritance and polymorphism
Assess the use of Python packages to perform numerical computations and
CO4
perform data visualization
CO5 Create interactive web applications using Django
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
Mapping with Programme Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S S M S S S S S S M S S

CO2 S S S S S S S S S S M S

CO3 S S S S S S M S S M L S

CO4 S S S S S S S M S S S S

CO5 S S S S L S M S S M M S

S- Strong; M-Medium; L-Low


Linux and Shell Programming Lab
Course Objectives
● To enable the students to study and understand the efficiency of Linux shell script.
● To demonstrate the File Backup process.
● To develop and implement the shell script for GUI processing.
● To develop and implement the shell script for IPC and Networking.
● To demonstrate PostgreSQL.

List of Programs

1. Write a Shell Script program to calculate the number of days between two dates.
2. Write a Shell Script program to check systems on local network using control structures with user
input.
3. Write a Shell Script program to check systems on local network using control structures with file input.
4. Write a Shell Script program to demonstrate the script control commands.
5. Write a Shell Script program to demonstrate the Shell script function.
6. Write a Shell Script program to demonstrate the Regular Expressions.
7. Write a Shell Script program to demonstrate the sed and awk Commands.
8. Write a Shell Script program to demonstrate the File Backup process through creating a daily archive
location.
9. Write a Shell Script program to create a following GUI tools.
a) Creating text menus
b) Building text window widgets
10. Write a Shell Script program to demonstrate to connect a PostgreSQL database and performing CRUD
operations.

Course Outcomes

On the successful completion of the course, students will be able

To understand, apply and analyze the concepts and methodology of Linux shell K1-K6
CO1:
programming
To comprehend, impart and apply fundamentals of control structure and script K1-K6
CO2:
controls
To understand, analyse and evaluate the functions, graphical desktop interface and K1-K6
CO3:
editors

To collaborate, apply and review the concepts and methodology of regular K1-K6
CO4:
expression and advanced gawk
To comprehend, use and analyze the advance concepts such as alternate shell K1-K6
CO5:
script, dy and bash scripting using PostgreSQL
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
Mapping with Programme Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S S S - S - - - M - - -

CO2 S S S - S - - - M - - -

CO3 S S S - S - - - M S S S

CO4 S S S - S - - - M - - -

CO5 S S S - S - - - M S S S
S- Strong; M-Medium; L-Low
SEMESTER II

Advanced Java Programming

Course Objectives:

The main objectives of this course are to


1. Enable the students to learn the basic functions, of advanced java programming.
2. Provide knowledge on concepts needed for distributed Application
Architecture.
3. Learn JDBC, Servlet packages, JQuery, Java Server Pages and JAR
file format.

Unit:1 Basics of Java


Java Basics Review: Components and event handling–Threading concepts– Networking
features –Media techniques.

Unit:2 Remote Method Invocation


Remote Method Invocation-Distributed Application Architecture Creating stubs and skeletons-
Defining Remote objects- Remote Object Activation- Object Serialization-Java Spaces.

Unit:3 Database
Java in Databases-JDBC principles–database access-Interacting-database search–Creating
multimedia databases – Database support in web applications.

Unit:4 Servlets
Java Servlets: Java Servlet and CGI programming- A simple java Servlet- Anatomy of a java
Servlet-Reading data from a client-Reading http request header-sending data to a client and
writing the http response header-working with cookies Java Server Pages: JSP Overview-
Installation-JSP tags-Components of a JSP page-Expressions- Scriptlets-Directives-
Declarations-A complete example.

Unit:5 Advanced Techniques


JAR file format creation–Internationalization–Swing Programming–Advanced java techniques.

Text Books

1.Herbert Schildt, “Java the Complete Reference”, 9th edition, McGraw Hill Publication, 2017.
2.Tony Goddis, “Starting out with Java from Control Structures Through Objects”, 6th Edition,
Pearson Education Limited, 2016.
3.Jamie Jaworski, “Java Unleashed”, SAMS Tech media Publications,1999.
Reference Books
1. JimKeogh,”The Complete ReferenceJ2EE”,TataMcGrawHill Publishing Company Ltd,2010
2.Campione, Walrath and Huml, “The Java Tutorial”, Addison Wesley,1999.
3.John Dean, Raymond Dean, “Introduction to Programming with JAVA – A Problem Solving
Approach”, TMGH Publishing Company Ltd, New Delhi, 2012.
4.David Sawyer McFarland,“Java Script and JQuery-The Missing Manual” Oreilly
Publications,3rd Edition,2011.
5.Deitel and Deitel, “Java How to Program”, Third Edition, PHI/Pearson Education
Asia.

Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]


https://www.javatpoint.com/servlet-tutorial
https://www.tutorialspoint.com/java/index.htm
https://onlinecourses.nptel.ac.in/noc19_cs84/preview

Expected Course Outcomes:


On the successful completion of the course, student will be able to
1 Understand the advanced concepts of Java Programming K1,K2
2 Understand JDBC and RMI concepts K2,K3
3 Apply and analyze Java in Database K3,K4
Handle different event in java using the delegation event model, event
4 K5
listener and class
5 Design interactive applications using Java Servlet, JSP and JDBC K5,K6
K1-Remember;K2-Understand;K3-Apply; K4-Analyze;K5-Evaluate; K6-Create

Mapping with Programming Outcomes


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S S M M M S
CO2 S S S S S S S M S S
CO3 S S S S S S S M S S
CO4 S S S S S S S M S S
CO5 S S S S S S S M S S
Advanced Data Structures

Course Objectives:
● To get a clear understanding of various ADT structures.
● To understand how to implement different ADT structures with real-time scenarios.
● To analyze the various data structures with their different implementations.
● To get an idea of applying right models based on the problem domain.
● To realize, and understand how and where to implement modern data structures with Python language.

Unit-I
Abstract Data Types: Introduction-Date Abstract Data Type-Bags-Iterators. Arrays: Array Structure-Python
List-Two Dimensional Arrays-Matrix Abstract Data Type. Sets, Maps: Sets-Maps- Multi-Dimensional
Arrays.

Unit-II
Algorithm Analysis: Experimental Studies-Seven Functions-Asymptotic Analysis. Recursion: Illustrative
Examples-Analyzing Recursive Algorithms-Linear Recursion- Binary Recursion-Multiple Recursion.

Unit-III
Stacks, Queues, and Deques: Stacks- Queues- Double-Ended Queues Linked. Lists: Singly Linked Lists-
Circularly Linked Lists-Doubly Linked Lists. Trees: General Trees-Binary Trees-Implementing Trees-Tree
Traversal Algorithms.

Unit-IV
Priority Queues: Priority Queue Abstract Data Type- Implementing a Priority Queue- Heaps-Sorting with a
Priority Queue. Maps, Hash Tables, and Skip Lists: Maps and Dictionaries-Hash Tables- Sorted Maps-Skip
Lists-Sets, Multisets, and Multimaps.

Unit-V
Search Trees: Binary Search Trees-Balanced Search Trees-AVL Trees-Splay Trees. Sorting and Selection:
Merge sort-Quick sort-Sorting through an Algorithmic Lens- Comparing Sorting Algorithms-Selection.
Graph Algorithms: Graphs-Data Structures for Graphs-Graph Traversals-Shortest Paths-Minimum Spanning
Trees.

Text book:
1. Rance D. Necaise, “Data Structures and Algorithms Using Python”, John Wiley & Sons, 2011. (Unit –
1) Chapters: 1, 2, 3.
2. Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser, “Data Structures and Algorithms in
Python”, John Wiley & Sons, 2013. (Unit – 2, 3, 4, and 5) Chapters: 3 to 12, and 14.
Reference books:
1. Dr. Basant Agarwal; Benjamin Baka, “Hands-On Data Structures and Algorithms with Python: Write
complex and powerful code using the latest features of Python 3.7”, Packt Publishing, 2018.
2. Magnus Lie Hetland, “Python Algorithms: Mastering Basic Algorithms in the Python Language”,
Apress, 2014.

Course Outcomes:
On the successful completion of the course, students will be able to

CO1 Understand various ADT concepts

Familiar with implementation of ADT models with Python language and


CO2
understand how to develop ADT for the various real-time problems

CO3 Apply with proper ADT models with problem understanding K1-K6

CO4 Apply and analyze right models based on the problem domain

CO5 Evaluate modern data structures with Python language

K1- Remember, K2 - Understand, K3 - Apply, K4 - Analyze, K5 - Evaluate, K6 -Create

Mapping with Programme Outcomes:


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S M L L L L S S S L M M
CO2 S M S M M L L L L L M M
CO3 S S S L L L M M M M M L
CO4 S S S L L L M M M L L L
CO5 S S S L M M S S S S M L
L - Low, M- Medium, S - Strong
Advanced Java Programming LAB

Course Objectives:

The main objectives of this course are to


• Enable the students to implement the simple programs using JSP, JAR
• Provide knowledge on using Servlets, Applets
• Introduce JDBC and navigation of records
• Understand RMI & its implementation
• Introduce to Socket programming

LIST OF PROGRAMS

1. Display a welcome message using Servlet.


2. Design a Purchase Order form using Html form and Servlet.
3. Develop a program for calculating the percentage of marks of a student using JSP.
4. Design a Purchase Order form using Html form and JSP.
5. Prepare a Employee pay slip using JSP.
6. Write a program using JDBC for creating a table, Inserting, deleting
records and list out the records.
7. Write a program using Java servlet to handle form data.
8. Write a simple Servlet program to create a table of all the headers it receives
along with their associated values.
9. Write a program in JSP by using session object.
10. Write a program to build a simple Client Server application using RMI.
11. Create an apple for a calculator application.
12. Program to send a text message to another system and receive the text message from the
system (use socket programming).

Expected Course Outcomes:


On the successful completion of the course, student will be able to:
Understand to the implement concepts of Java using HTML forms
1 ,JSP & JAR K1,K2
2 Capable of implementing JDBC and RMI concepts K3,K4
3 Able to write Applets with Event handling mechanism K4,K5
4 Create interactive web based applications using servlets and JSP K5,K6
K1-Remember;K2-Understand;K3-Apply;K4-Analyze;K5-Evaluate; K6-Create

Mapping with Programming Outcomes


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M S S S M M S M
CO2 S S S S S S S M S S
CO3 S S S S S S S S S S
CO4 S S S S S S S S S S
*S-Strong; M-Medium; L-Low
Advanced Data Structures Lab

Course Objectives:
● To understand Stack , Queue and Doubly Linked ADT structures.
● To implement different ADT structures with real-time scenarios.
● To analyze the recursion concepts.
● To apply different sorting and tree techniques.
● To implement modern data structures with Python language.

Implement the following problems using Python 3.4 and above


1. Recursion concepts.
i) Linear recursion
ii) Binary recursion.
2. Stack ADT.
3. Queue ADT.
4. Doubly Linked List ADT.
5. Heaps using Priority Queues.
6. Merge sort.
7. Quick sort.
8. Binary Search Tree.
9. Minimum Spanning Tree.
10. Depth First Search Tree traversal.

Course Outcomes:
On the successful completion of the course, students will be able to

CO1 Strong understanding in various ADT concepts

CO2 To become a familiar with implementation of ADT models

CO3 Apply sort and tree search algorithms K1-K6

CO4 Evaluate the different data structure models

CO5 Learn how to develop ADT for the various real-time problems

K1- Remember, K2 - Understand, K3 - Apply , K4 - Analyze, K5 - Evaluate, K6 -Create


Mapping with Programme Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S M L L L L S S M M S S
CO2 S M S M M L S M S L M M
CO3 S S S L L L M M M M S L
CO4 S S S M M S M M S S S L
CO5 S S S S L M S M M M M L
L - Low, M- Medium, S - Strong
SEMESTER III

Dot Net Technologies

Course Objectives:
• To get strong understanding of .NET Framework and C# programming.
• To get advanced programming skills in Visual Studio with C# language.
• To get advanced methods of manipulating data using Microsoft SQL Server.
• To get clear idea of how to develop real-time standalone, web applications using .NET Technologies.
• To get clear understanding and get experience in Microsoft Azure.

Unit-I

Introducing C#: .NET Framework - C# language - Visual Studio 2017 - Writing a C# Program: Visual Studio
2017 Development Environment - Console Applications - Desktop Applications - Variables and Expressions:
Basic C# Syntax - Basic C# Console Application Structure - Variables - Expressions - Flow Control: Boolean
Logic – Branching - Looping.

Unit-II

More About Variables: Type Conversion - Complex Variable Types - String Manipulation – Functions:
Defining and Using Functions - Variable Scope - The Main Function - Struct Functions - Overloading
Functions - Using Delegates - Debugging and Error Handling: Debugging in Visual Studio - Error Handling -
Introduction to Object Oriented Programming: Object-Oriented Programming - OOP Techniques - OOP in
Desktop Applications.

Unit-III
Defining Classes: Class Definitions in C# - System .Object - Constructors and Destructors - OOP Tools in
Visual Studio - Class Library Projects - Interfaces Versus Abstract Classes - Struct Types - Shallow Copying
Versus Deep Copying - Defining Class Members: Member Definitions - Additional Class Member Topics -
Interface Implementation - Partial Class Definitions - Partial Method Definitions - The Call Hierarchy
Window - Basic Cloud Programming: Cloud, Cloud Computing, and the Cloud Optimized Stack - Cloud
Patterns and Best Practices - Using Microsoft Azure C# Libraries to Create a Storage Container - Creating an
ASP.NET 4.7 Web Site That Uses the Storage Container - Advanced Cloud Programming and Deployment:
Creating an ASP.NET Web API - Deploying and Consuming an ASP.NET Web API on Microsoft Azure -
Scaling an ASP.NET Web API on Microsoft Azure.

Unit-IV

.NET Standard and .NET Core: Cross-Platform Basics and Must Know Terms – Need of .NET - Referencing
and Targeting Frameworks - .NET Core - Building and Packaging a.NET Standard Library - Building a .NET
Core Application with Visual Studio - Porting from .NET Framework to .NET Core - ASP.NET and
ASP.NET Core: Overview of Web Applications – Use of ASP.NET - ASP.NET Web Forms - Creating
ASP.NET Core Web Applications – Files: File Classes for Input and Output – Streams - Monitoring the File
System - XML and JSON: XML Basics - JSON Basics - XML Schemas - XML Document Object Model -
Converting XML to JSON - Searching XML with XPath.
Unit-V

LINQ: LINQ to XML - LINQ Providers - LINQ Query Syntax - LINQ Method Syntax - Ordering Query
Results - Understanding the order by Clause - Querying a Large Data Set -Using Aggregate Operators - Using
the Select Distinct Query - Ordering by Multiple Levels -Using Group Queries - Using Joins – Databases:
Using Databases - Installing SQL Server - Express - Entity Framework - Code First Database - Finding the
Database - Navigating Database Relationships - Handling Migrations - Creating and Querying XML from an
Existing Database - Universal Apps: Windows Universal Apps - App Concepts and Design - App
Development - Common Elements of Windows Store Apps - Windows Store.

Text book:

1. Benjamin Perkins, Jacob Vibe Hammer, Jon D. Reid, “Beginning C#7 Programming with Visual
Studio 2017”, Wiley Publishing, 2018.Chapters: 1 to 10, 16 to 23, and 25.

Reference books:

1. Nagel, Christian, “Professional C 7 and .NET Core 2.0 ”, Wrox Publishing, 2018.
2. Mehboob Ahmed Khan, Ovais, “C# 7 and .NET Core 2.0 High Performance”, Packt Publishing, 2018

Course Outcomes:

On the successful completion of the course, students will be able to,


Understand and learn .NET Framework and C#
CO1 K1, K2 LO
.NET
Apply the concepts to develop the applications for IO
CO2 K3
real-time problem in C# .NET and ASP .NET
Analyse the feasibility of using .NET for real time
CO3 K4,K5 HO
problems

K1- Remember, K2 - Understand, K3 - Apply, K4 - Analyze, K5 - Evaluate, K6 -Create

Mapping with Programme Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S L M L L L - - - - - L

CO2 S M L M M L - L - L - L

CO3 S S S M M L - L - L - L

L - Low, M- Medium, S - Strong


Big Data Analytics
Course Objectives
● To introduce big data tools & Information Standard formats.
● To understand the basic concepts of big data.
● To learn Hadoop, HDFS and Map Reduce concepts.
● To teach the importance of NoSQL.
● To explore the big data tools such as Hive, HBase and Pig.

UNIT I
Big Data and Analytics: Classification of Digital Data: Structured Data- Semi Structured Data and
Unstructured Data.
Introduction to Big Data: Characteristics – Evolution – Definition - Challenges with Big Data - Other
Characteristics of Data - Big Data - Traditional Business Intelligence versus Big Data - Data Warehouse and
Hadoop.
Environment Big Data Analytics: Classification of Analytics – Challenges - Big Data Analytics important -
Data Science - Data Scientist - Terminologies used in Big Data Environments – Basically Available Soft State
Eventual Consistency - Top Analytics Tools.
UNIT II
Technology Landscape: NoSQL, Comparison of SQL and NoSQL, Hadoop -RDBMS Versus Hadoop -
Distributed Computing Challenges – Hadoop Overview - Hadoop Distributed File System - Processing Data
with Hadoop - Managing Resources and Applications with Hadoop YARN - Interacting with Hadoop
Ecosystem
UNIT III
MongoDB and Map reduce Programming: MongoDB: MongoDB - Terms used in RDBMS and Mongo DB
- Data Types - MongoDB Query Language.
MapReduce: Mapper – Reducer – Combiner – Partitioner – Searching – Sorting – Compression
UNIT IV
Hive: Introduction – Architecture - Data Types - File Formats - Hive Query Language Statements – Partitions
– Bucketing – Views - Sub- Query – Joins – Aggregations - Group by and Having – RCFile - Implementation
- Hive User Defined Function - Serialization and Deserialization.
UNIT V
Pig: Introduction - Anatomy – Features – Philosophy - Use Case for Pig - Pig Latin Overview - Pig Primitive
Data Types - Running Pig - Execution Modes of Pig - HDFS Commands - Relational Operators - Eval
Function - Complex Data Types - Piggy Bank - User-Defined Functions - Parameter Substitution – Diagnostic
Operator - Word Count Example using Pig - Pig at Yahoo! - Pig Versus Hive
Text Book:
1. Seema Acharya, Subhashini Chellappan, “Big Data and Analytics”, Wiley Publications, First
Edition,2015
Reference Book:
1. Judith Huruwitz, Alan Nugent, Fern Halper, Marcia Kaufman, “Big data for dummies”, John Wiley &
Sons, Inc. (2013)
2. Tom White, “Hadoop The Definitive Guide”, O’Reilly Publications, Fourth Edition, 2015
3. Dirk Deroos, Paul C. Zikopoulos, Roman B. Melnky, Bruce Brown, Rafael Coss, “Hadoop For
Dummies”, Wiley Publications, 2014
4. Robert D.Schneider, “Hadoop For Dummies”, John Wiley & Sons, Inc. (2012)
5. Paul Zikopoulos, “Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming
Data, McGraw Hill, 2012 Chuck Lam, “Hadoop In Action”, Dreamtech Publications, 2010
Course Outcomes

On the successful completion of the course, students will be able

To understand, illustrate and evaluate the concepts and techniques of Data


CO1: K1-K6
Science, Big Data Analytics and its tools
To collaborate, apply and review the computing for big data in Hadoop, and
CO2: K1-K6
NoSQL environment.
To comprehend, implement and review the concepts of data science and
CO3: K1-K6
big data analytics projects using MapReduce, and MongoDB
To understand, use and analyze the concepts of big data analytics projects
CO4: K1-K6
using HIVE database.
To illustrate, develop and review the concepts of Pig database in Hadoop
CO5: K1-K6
environment.
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5 Evaluate, K6- Create

Mapping with Programme Outcomes


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S - - - - L - - - - - -

CO2 S - M - M L - - - - - -

CO3 S - S - S L - - - S S S

CO4 S - S - S L - - - S S S

CO5 S - S - S L - - - S S S
S- Strong; M-Medium; L-Low
Mobile Computing
Course Objectives:
● To introduce the concepts of wireless devices with signal, Antenna, Radio Frequencies, Signal
Propagation.
● To introduce wireless communication and networking principles, that support connectivity to cellular
networks, Wireless LAN, GSM, CDMA.
● To introduce the WAP Architecture, MANET and Routing
Unit-I
Introduction – Applications – History of wireless communication – A Simplified reference model - Wireless
transmission – Frequencies for radio transmission – Regulations – Signals –Antennas - Signal propagation:
Path loss of radio signals - Additional signal propagation effects - Multi-path propagation – Multiplexing –
Modulation Chapters: 1, 2.1 to 2.6

Unit-II
Spread spectrum – Direct sequence spread spectrum – Frequency hopping spread spectrum – Cellular
systems. Medium access control: Hidden and exposed terminals – Near and far terminals – SDMA, FDMA,
TDMA, Fixed TDM, Classical Aloha, slotted Aloha, Carrier sense multiple access – Reservation TDMA –
Multiple access with collision avoidance – Polling – CDMA – Spread Aloha multiple access. Chapters: 3.1 to
3.3, 3.4.1 to 3.4.4, 3.4.7 to 3.4.9, 3.5.1

Unit-III
GSM - Mobile services – System architecture – Radio interface – Protocols – Localization and calling –
Handover – Security – New Data services. UMTS and IMT-2000 - Satellite Systems: Applications – Basics –
Routing – Localization – Handover. Chapters: 3.6, 4.1.1 to 4.1.8, 4.4, 5.2 to 5.6

Unit-IV
Wireless LAN: Infrared vs. radio transmission – Infrastructure and ad-hoc network – IEEE 802.11 – System
architecture – Protocol architecture – Physics layer – Medium access control layer – MAC management –
Blue tooth. Mobile network layer: Mobile IP: Goals, assumptions and requirements – entities and terminology
– packet delivery – Agent discovery – Registration – Tunneling and encapsulation Recent technologies
Chapters: 7.1 to 7.3.5, 7.5, 8.1.1 to 8.1.6

Unit-V
WAP: Architecture – wireless datagram Protocol, Wireless transport layer security, Wireless transaction
protocol, Wireless session protocol, Wireless application environment, Mobile ad-hoc networks – MANET
Characteristics – Classification of MANETs, Routing of MANETs, Proactive Routing Protocol - DSDV,
Reactive Routing Protocols – DSR, AODV.Chapter10.3.1 to 10.3.6 (Text Book 2- 6.1, 6.2, 6.4, 6.5, 6.6)
Text Books:
1. Jochen Schiller, “Mobile Communications”, Second Edition, Pearson Education, 2013.
2. Kum Kum Garg, “Mobile Computing Theory and Practice”, Pearson Education, 2014.
Reference Books:
1. Rifaat A. Dayen, “Mobile Data & Wireless LAN Technologies”, Prentice Hall,1997.
2. Steve Mann and Scoot Schibli, “The Wireless Application Protocol”, John Wiley & Inc., 2000.

Course Outcomes:
On the successful completion of the course, students will be able to

Understand the basic concepts of Mobile and Wireless


CO1 K1, K2 LO
Communication
Understand the basic concepts of Spread Spectrum. Analysing the
CO2 K3 IO
concepts of Medium Access Control.
Analyse the concepts of Global System for Mobile Communication
CO3 and Satellite Communications. Understanding the basic concepts of K4
HO
Wireless LAN
Understand the basic concepts of Wireless LAN. Evaluate the
CO4 K2, K5 HO
performance of Mobile Network Layer
Understand the basic concepts of Wireless Application Protocol and
K2, K4,
CO5 create a Mobile App with real time application. Analysing the HO
K6
concepts of Routing Protocols in MANET
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- Evaluate, K6- Create

Mapping Course outcomes with Programme outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

L - - - - - - - - - - -
CO1

S M M M M - M - - - - -
CO2

S M M M M - M - - L - M
CO3

CO4 S M M M M - M - - L - M

CO5 S M M M M - M - - L - M

S- Strong; M-Medium; L-Low


Dot Net Technologies Lab

Course Objectives:

• To get strong understanding of .NET Framework and C# programming.


• To get advanced programming skills in C# .NET OOPs Concepts
• To get advanced methods of manipulating data using Microsoft SQL Server.
• To get clear idea of how to develop real-time standalone, web applications using ASP .NET.
• To get clear understanding and get experience in Microsoft Azure.

Implement the following problems using C# with Visual Studio 2017

1. Demonstrate method overloading and method overriding


2. Class and Objects
3. Multilevel Inheritance
4. Interfaces
5. Demonstrate multiple type of Exceptions
6. Azure Storage Container Using the Microsoft Azure Storage Client Library
7. Read and Write a Data using Random Access Files
8. Employee management database using LINQ
9. Student management system using ASP.NET
10. Demonstrates simple Universal App.

Course Outcomes:

• Get a strong understanding of .NET Visual Studio platform


• Become a strong knowledge in C# .NET.
• Getting real-time application developing using .NET Cloud Technologies.
ELECTIVE COURSES
SEMESTER I

Advanced Operating Systems

Course Objectives:
The main objectives of this course are to:
1. Enable the students to learn the different types of operating systems and their
functioning.
2. Gain knowledge on Distributed Operating Systems
3. Gain insight into the components and management aspects of real time and mobile
operating systems.
4. Learn case studies in Linux Operating Systems

Unit:1 Basics of Operating Systems

Basics of Operating Systems: What is an Operating System? – Main frame Systems –Desktop
Systems – Multiprocessor Systems – Distributed Systems – Clustered Systems –Real-Time
Systems – Handheld Systems – Feature Migration – Computing Environments -Process
Scheduling – Cooperating Processes – Inter Process Communication- Deadlocks –Prevention –
Avoidance – Detection – Recovery.
Unit:2 Distributed Operating Systems

Distributed Operating Systems: Issues – Communication Primitives – Lamports Logical


Clocks –Deadlock handling strategies – Issues in deadlock detection and resolution-distributed
file systems –design issues

Unit:3 Real Time Operating System

Realtime Operating Systems : Introduction – Applications of Real Time Systems – Basic Model
of Real Time System – Characteristics – Safety and Reliability - Real Time Task Scheduling

Unit:4 Handheld System


Operating Systems for Handheld Systems: Requirements–Technology Overview–Handheld
Operating Systems–Palm OS-Symbian Operating System-Android–Architecture of android–
Securing handheld systems

Unit:5 Case Studies


Case Studies : Linux System: Introduction – Memory Management – Process Scheduling –
Scheduling Policy - Managing I/O devices – Accessing Files- iOS :Architecture and SDK
Framework - Media Layer - Services Layer - Core OS Layer - File System.

Text Books
1. Abraham Silberschatz; Peter Baer Galvin; Greg Gagne, “Operating System
Concepts”, Seventh Edition, John Wiley & Sons, 2004.
2.Mukesh Singhal and Niranjan G. Shivaratri, “Advanced Concepts in Operating
Systems –Distributed, Database, and Multiprocessor Operating Systems”, Tata
McGraw-Hill, 2001.
Reference Books
1 Rajib Mall, “Real-Time Systems: Theory and Practice ”,Pearson Education,
India,2006
Pramod Chandra P. Bhatt, An introduction to operating systems, concept and
2
practice, PHI,Third edition, 2010.
3 Daniel.P.Bovet&MarcoCesati,“UnderstandingtheLinuxkernel”,3 rdedition,O‟ R
eilly,2005
4 Neil Smyth, “iPhone iOS 4Development Essentials–Xcode”, Fourth Edition,
Payload media,2011.

Related Online Contents [MOOC, SWAYAM,NPTEL, Websites etc.]


1 https://onlinecourses.nptel.ac.in/noc20_cs04/preview
2 https://www.udacity.com/course/advanced-operating-systems--ud189
3 https://minnie.tuhs.org/CompArch/Resources/os-notes.pdf

Expected Course Outcomes:


Understand the design issues associated with operating systems K1,K2
Master various process management concepts including
K3,K4
scheduling, deadlocks and distributed file systems
Prepare Real Time Task Scheduling K4,K5
Analyze Operating Systems for Handheld Systems K5
Analyze Operating Systems like LINUX and IOS K5,K6
K1-Remember;K2-Understand;K3-Apply;K4-Analyze;K5-Evaluate; K6-Create

Mapping with Programming Outcomes


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M S S S S M M M M
CO2 S M S S S S S M S M
CO3 S M S S S S S M S M
CO4 S M S S S S S M S M
CO5 S M S S S S S M S M
*S-Strong; M-Medium; L-Low
Architecture and Frameworks

Course Objectives
● To understand the basics, benefits and purpose of software architecture
● Understand the quality attributes to fulfil the software requirements and relates the software with an
organization
● Explore the design patterns, best practice and paradigms of efficient software development
● Understand the performance and security measures of software architecture
● Enable the developers to advance their carrier in software domain

Unit – I

Software architecture introduction – Importance of Software architecture –Software architecture consumers –


Architect role - software architecture in an organization – Types of software architects – Software
development methodologies – Project management – Office politics – Software risk management –
Configuration management – Software product lines

Unit – II

Domain Knowledge – Developing business acumen – Domain-driven design – requirement engineering –


requirement elicitation –Software Quality attributes: Maintainability – Usability –Availability – Portability –
Interoperability - Testability

Unit – III

Software Architectures design – Importance - Top-down Versus bottom-up design approaches – Architectural
drivers – Documenting the Software architecture design – Systematic approach - Attribute-driven design –
Microsoft’s technique for architecture and design –Architecture-centric design method – Architecture
development method – Tracking the progress of the software architecture’s design

Unit – IV

Designing orthogonal software systems – Minimizing complexity – SOLID design principles – Software
architecture patterns – layered – Event-driven architecture – Model-View patterns – Service-oriented
architecture

Unit – V

Architecting Modern Applications.- Importance of Performance – Performance improvement - Server side


caching – Web application performance – Database performance -Securing software systems – Threat
modelling – Secure by design

Text Book
1. Joseph Ingeno, “Software Architect’s Handbook” Packt Publishing 2018.
Reference books

1. Oliver Vogel, Indo Arnold, ArifChughtai and TImoKehrer, “Software Architecture” Springer-Verlag,
2011.
2. Ian Gorton, “Essential Software architecture”, Second Edition, Springer, 2011
3. Len Bass, Paul Clements and Rick Kazman, “Software architecture in practice”, Third edition, Addison-
Wesley, 2013

Course Outcomes
On the successful completion of the course, students will be able to

Understand, analyze and evaluate the purpose of Software architecture and K1-K6
CO1 development methodologies with consideration of risk management

Comprehend, apply and evaluate the domain knowledge for software


K1-K6
CO2 development process and determine the impact of quality attributes.

CO3 Understand, track and examine the systematic approach for various software
K1-K6
design models with effective document process
CO4 Illustrate and summarize the functions of orthogonal systems with complexity,
design principles and design pattern for software architecture K1-K6

CO5 Comprehend, analyze and evaluate the performance and security measures for
Server, Web and Database applications in order to create the secure software K1-K6
systems for various domain applications

K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- evaluate and K6- Create

Mapping with Programme Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO M S - L M S M M L S - -
1

CO M S - M M L S S M M S -
2

CO S M - S S M S M M S M -
3

CO S M L S M L S L S M S M
4

CO M S M L S L M S L S - M
5
S- Strong; M-Medium; L-Low
Data Engineering and Management

Course Objectives:

● To understand Data Management concepts


● To get brief knowledge on Data Modeling
● To analyze the techniques used in Distributed Databases
● To assess Distributed database and Business Modelling
● To get familiar with CRM tools

Unit-I

Database Development: Database architecture of an information system-Overview of the database


development process-Conceptual data modeling-Relational data analysis-Roles of a data model-Physical
database design. Data Management: Problems encountered without data management-Data management
responsibilities-Data management activities-Roles within data management-Benefits of data management-
Relationship between data management and enterprise
Unit-II

Corporate Data Modelling: Need for a corporate data model-Nature of a corporate data model- Develop a
corporate data model - Corporate data model principles. Data Definition and Naming: Elements of a data
definition-Data naming conventions. Data Quality: Issues associated with poor data quality-Causes of poor
data quality-Dimensions of data quality-Data model quality-Improving data quality. Data Accessibility: Data
security-Data integrity-Data recovery
Unit-III:

Use Of Packaged Application Software: Application software packages-Impact on data management.


Distributed Data and Databases: Rationale for distributing data-Perfect distributed database system-Top down
fragmentation and partitioning. Bottom up integration-The management of replication. Business Intelligence:
Data ware housing-Multidimensional model of data-Standard reporting tools-Online analytical processing
OLAP-Relational schema for a data warehouse.
Unit-IV:

CRM: Three main pillars of CRM. Getting To Know Your Customer: 360-degree client view. Utilizing
Artificial Intelligence and Machine Learning in Your CRM Strategy: Evolution of AI-Current state of AI-
Teaming up AI with people-Applying AI to your CRM solution-ethical aspects of AI-An example of AI in
CRM processes.
Unit-V:

Cloud Versus On Premise Versus Hybrid: Factors influencing vendor selection-Hybrid deployment-what
are your options. CRM Differentiators: It’s not about the feature list; it’s about the ecosystem-Fourth industrial
revolution and CRM-AI and smart cloud-To cloud or not to cloud-Leveraging smart cloud into CRM-Big
data-Social selling and advertising-Implementation tools-Sustainable CRM platform.
Text Books:
1. Keith Gordon, “Principles of Data Management Facilitating Information Sharing”, BCS Learning,
2013. (Chapters:1-5, 7,8,12,13,14)
2. Max Fatouretchi, “The Art of CRM”, Packt Publishing, 2019.(Chapters: 1,2,5,8,9)
Reference Books:

1. Peter Ghavami, “Big Data Management_ Data Governance Principles for Big Data Analytics”, De
Gruyter, 2020.
2. Francis Buttle, Stan Maklan, Customer Relationship Management Concepts and Technologies,
Routledge, 2019.

Course Outcome:

On the successful completion of the course, students will be able to,


Course Knowledge
Description
Outcome Level
Comprehend the Data Management concepts and analyse the
CO1
relationship with the enterprise
CO2 Analyse Data Modelling concepts and assess its quality K1- K6
CO3 Understand and implement business modelling techniques
Evaluate the use of Artificial Intelligence and Machine Learning in
CO4
CRM
CO5 Develop CRM applications in cloud

K1- Remember, K2 - Understand, K3 - Apply, K4 - Analyze, K5 - Evaluate, K6 -Create

Mapping with Programme Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S S M S M S S S S M S S

CO2 S S S M S S S S S S M S

CO3 S M S S M S M S S M S S

CO4 S S S S S S S M S S M S

CO5 S S S S S S S S S M M S

L - Low, M- Medium, S – Strong


Advanced Computer Networks
Course Objectives:
The main objectives of this course are to:
1. Have a detailed knowledge on the concept of networks
2. Know the idea on protocols, OSI layers and its functions.
3. Get knowledge on protocols used in different layers.
4. Know about the function of Internet

Unit:1 INTRODUCTION
Introduction- data communications – networks – The internet – Protocols and standards OSI
model - layers in OSI model – TCP/IP protocol suite – addressing – guided media – Unguided
media.

Unit:2 DATA LINK LAYER


Switching – Circuit switched networks – datagram networks – virtual circuit networks – Framing
–Flow and error control Multiple access – random access – wired Lan – wireless Lan – Cellular
telephony – satellite networks

Unit:3 NETWOR K LAYER


Network layer – IP V4 addressing – IPV6 addressing – ICMP – IGMP –Network layer
delivery –forwarding – unicast and multicast routing protocols

Unit:4 TRANSPORT LAYER


Transport layer – Process to process delivery – UDP -TCP -Congestion – congestion
control – QoS– Techniques to improve QoS

Unit:5 APPLICATION LAYER


Domain name system – name space – domain name space – distribution of name space – DNS
in the internet – remote logging - email – file transfer -Network management system – SNMP
Protocol

Text Book

1.Data communications and networking – Behrouz A Forouzan McGraw Hill 4thReprint

Reference Books

1.Computer Networks – Tenenbaum -Pearson -2022


2.Computer networking –Kurose James F, Ross Keith W -Pearson – 2017
3.Data and computer communications – William Stallings – Pearson 2017
4.Computer networks and Internet – Douglas E Comer – Pearson - 2018
Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]
https://nptel.ac.in/courses/106105080
https://www.tutorialspoint.com/computer-networks/index.asp
1https://www.javatpoint.com/computer-network-tutorial

Expected Course Outcomes:


On the successful completion of the course, student will be able to:
1 Understand fundamental underlying principles of computer networking K1,K2

2 Understand details and functionality of layered network architecture. K2,K3

3 Apply mathematical foundations to solve computational problems in K3,K4


computer Networking.

4 Analyze and evaluate performance of various communication protocols.


K4,K5,
K6
5 Compare and create new routing algorithms. K6
K1-Remember; K2-Understand; K3-Apply; K4-Analyze; K5-Evaluate; K6-Create

Mapping with Programming Outcomes


CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 S M M M M M S L M L
CO2 S M M S M M S L M L
CO3 S S M S S M S M M M
CO4 S S S S S M S M M M
CO5 S S S S S S S M M M
Network Protocols

Course Objectives
● To understand the basic concepts of Transmission Control Protocol/Internet Protocol and associated
functions
● Explore to describe the internet architecture and its processes associated with the data transfer and to
provide the quality of service
● To understand technologies and services associated with network protocols along with the challenges
of data transfer.
● Learners will understand the importance and functioning of Routing Protocols over communication
service.
● Empower the learners to comprehend and manage the issues associated with IP protocols like data
traffic problems, security and mobility.

Unit I
Transmission Control Protocol/Internet Protocol: Fundamental Architecture - Internet Protocol Basics -
Routing - Transport-Layer Protocols : Transmission Control Protocol - User Datagram Protocol - Stream
Control Transmission Protocol - Real-Time Transport Protocol.
Unit II
Internet Architecture: Internet Exchange Point - History of Internet Exchange Points - Internet Service
Provider Interconnection Relationships - Peering and Transit - IP Routing Protocols: Overview of Routing
Protocols - Routing Information Protocol - Open Shortest Path First - Border Gateway Protocol -
Multiprotocol Label Switching.
Unit III
IP Quality of Service: Introduction - Quality of Service in IP Version 4 - Integrated Services - Differentiated
Services - Quality of Service with Nested Differentiated Services Levels - IP Multicast and Any cast:
Addressing - Multicast Routing - Routing Protocols –Any casting- IPv6 Any cast Routing Protocol: Protocol
Independent Any cast—Sparse Mode - Transport over Packet: Draft-Martini Signaling and Encapsulation -
Layer-2 Tunneling Protocol.
Unit IV
Virtual Private Wired Service - Types of Private Wire Services - Generic Routing Encapsulation - Layer-2
Tunneling Protocol - Layer-3 Virtual Private Network 2547bis, Virtual Router - IP and Optical Networking:
IP/Optical Network Evolution - Challenges in Legacy Traditional IP/Optical Networks - Automated
Provisioning in IP/Optical Networks - Control Plane Models for IP/Optical Networking - Next-Generation
Multilayer Network Design Requirements - Benefits and Challenges in IP/Optical Networking - IP Version 6:
Addresses in IP Version 6 - IP Packet Headers - IP Address Resolution - IP Version 6 Deployment: Drivers
and Impediments.
Unit V
IP Traffic Engineering: Models of Traffic Demands - Optimal Routing with Multiprotocol Label Switching -
Link-Weight Optimization with Open Shortest Path First - Extended Shortest-Path-Based Routing Schemes -
IP Network Security: Introduction - Detection of Denial-of-Service Attack - IP Trace back- Edge Sampling
Scheme - Advanced Marking Scheme - Mobility Support for IP: Mobility Management Approaches - Security
Threats Related to IP Mobility - Mobility Support in IPv6 - Reactive Versus Proactive Mobility Support -
Relation to Multihoming - Protocols Supplementing.
Text Book :
1. “Advanced Internet Protocols, Services and Applications”, Eiji Oki, Roberto Rojas-Cessa, Mallikarjun
Tatipamula, Christian Vogt, Copyright © 2012 by John Wiley & Sons, Inc.
Reference Books :
1. “TCP/IP Protocol Suite”, Behrouz A.Forouzan, Fourth Edition, Tata Mcgraw-Hill Edition 2010.
2. “Computer Communications and Networking Technologies” - Michael A. Gallo & William M.
Hancock- BROOKS&COLE
3. “Computer Networks and Internets” -Douglas E. Comer- PEARSON.
4. Data and Computer Communications- Eighth Edition- William Stallings- Pearson Education.
5. Network Security Bible, 2nd edition, Eric Cole, Wiley Publishers.
6. Data communication and networks –James Irvine and David Harley- Publishers: Wiley India

Course Outcomes:
On the successful completion of the course, students will be able to
Understand, analyse and examine the concepts of Communication Protocols with K1- K6
CO1 its architecture and functions
Illustrate and apply the appropriate internet architecture along with efficient K1- K6
CO2 protocol models for the user defined communication environment

Comprehend, categorize and formulate the appropriate IP routing protocol to K1- K6


CO3 establish a efficient data transfer
Comprehend, analyse and evaluate the concepts of Virtual wired service and K1- K6
CO4 IP/optical networking with its functions and deployment

Elucidate, analyse and inspect the IP traffic engineering and its models along with K1- K6
CO5
the security mechanisms
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- evaluate and K6- Create

Mapping with Programme Outcome

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 M S - L M S M M - S - -

CO2 S M - S M L M S - M - -

CO3 S S - M S S S M - S - -

CO4 S M L S M L S L - M L -

CO5 M S M L S L M S - S L

S- Strong; M-Medium; L-Low


Cryptography and Network Security

Course Objectives
• To familiarize classical encryption techniques and advanced encryption standards
● To explore the working principles and utilities of various cryptographic algorithms including secret
key cryptography, hashes and message digests, and public key algorithms
● To recognize different encryption and decryption techniques to solve problems related to
confidentiality and authentication
● To develop the ability to use existing cryptographic utilities to build programs for secure
communication.
● To learn the need of digital signatures to secure the document with key management

Unit-I
Overview: Computer Security Concepts – The OSI Security Architecture – Security Attacks – Security
Services – Security Mechanisms –A Model for Network Security – Classical Encryption Techniques:
Symmetric Cipher Model – Substitution Techniques – Transposition Techniques – Rotor Machines –
Steganography.
Unit-II
Block Ciphers and the Data Encryption Standard: Traditional Block Cipher Structure –The Data Encryption
Standard – The DES Example – The Strength of DES – Block Cipher Design Principles – Basic Concepts in
Number Theory and Finite Fields: Divisibility and the Division Algorithm – The Euclidean Algorithm –
Modular Arithmetic – Groups, Rings, and Fields – Finite Fields of the Form GF(p) – Polynomial Arithmetic.
Unit-III
Advanced Encryption Standard: Finite Field Arithmetic– AES Structure – AES Transformation Functions –
AES Key Expansion –Block Cipher Operation: Multiple Encryption and Triple DES – Stream Ciphers – RC4
– Public-Key Cryptography and RSA: Principles of Public-Key Cryptosystems – The RSA Algorithm –Diffe-
Hellman Key Exchange – Elgamal Cryptographic System – Elliptic Curve Arithmetic – Elliptic Curve
Cryptography – Pseudorandom Number Generation Based on an Asymmetric Cipher.
Unit-IV
Cryptographic Hash Functions: Applications of Cryptographic Hash Functions - Two Simple Hash Functions
– Requirements and Security – Hash Functions Based on Cipher Block Chaining – Secure Hash
Algorithm(SHA) – SHA-3 – Message Authentication Codes: Requirements – Functions – Security of MACs –
MACs Based on Hash Functions: HMAC – MACs based on Block Ciphers: DAA and CMAC – Authenticated
Encryption: CCM and GCM – Key Wrapping.
Unit-V
Digital Signatures – Elgamal Digital Signature Scheme – Schnorr Digital Signature Scheme – NIST Digital
Signature Algorithm – Elliptic Curve Digital Signature Algorithm – RSA-PSS Digital Signature Algorithm –
Key Management and Distribution: Symmetric Key Distribution Using Symmetric Encryption – Symmetric
Key Distribution Using Asymmetric Encryption – Distribution of Public Keys – X.509 Certificates – Public-
Key Infrastructure.
Text Books
1. William Stallings, “Cryptography and Network Security – Principles and Practices”, Pearson
Education PHI, 7th Edition.
2. Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography And Network Security”, McGraw Hill
Education, 3rd Edition.
Reference Books
1. Bernard Menezes, “Network Security and Cryptography”, Cengage,1st Edition, 2010.
2. William Stallings, “Cryptography and Network Security”, Pearson Education India, Sixth Edition,
2016.
3. V.K. Jain, “Cryptography and Network Security”, Khanna Book Publishing, New Delhi, 2016.
4. C.K. Shyamala, N. Harini, Dr. T. R. Padmanabhan, “Cryptography and Security”, Wiley India Pvt.
Ltd.,2011
Course Outcomes :
On the successful completion of the course, students will be able to:

Comprehend and analyze the security concepts to apply and evaluate the
CO1: K1-K6
encryption techniques in various models

Understand and examine the various data encryption standards and number
CO2: theory. Illustrate and evaluate the various techniques in different K1-K6
applications

Grasp the knowledge of AES techniques and apply to evaluate the


CO3: K1-K6
performance with different key types

Comprehend and analyze the basics of hash function and MAC that helps
CO4: K1-K6
to develop the encryption models in various application

Understand and illustrate the need of digital signature to examine the


CO5: method of providing good security to the document and also learn the K1-K6
concept of key management
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- evaluate and K6- Create

Mapping with Programme Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 M S - L M S M M - S - -

CO2 M S - M M L M S - M - -

CO3 S S - M S M S M - S - -

CO4 S M L S M L S M - M - -

CO5 M S M L S L M S - S - -

S – Strong, M – Medium, L - Low


SEMESTER II

Artificial Intelligence & Machine Learning

Course Objectives:
The main objectives of this course are to
1. Enable the students to learn the basic functions of AI, Heuristic Search Techniques.
2. Provide knowledge on concepts of Representations and Mappings and Predicate
Logic.
3. Introduce Machine Learning with respect Data Mining, Big Data and Cloud.
4. Study about Applications & Impact of ML.

Unit:1 INTRODUCTION
Introduction: AI Problems - Al techniques - Criteria for success. Problems, Problem Spaces,
Search: State space search - Production Systems - Problem Characteristics - Issues in design of
Search.
Unit:2 SEARCH TECHNIQUES
Heuristic Search techniques: Generate and Test - Hill Climbing- Best-First, Problem
Reduction, Constraint Satisfaction, Means-end analysis. Knowledge representation issues:
Representations and mappings - Approaches to Knowledge representations - Issues in
Knowledge representations - Frame Problem.

Unit:3 PREDICATE LOGIC


Using Predicate logic: Representing simple facts in logic - Representing Instance and Isa
relationships - Computable functions and predicates - Resolution – Natural deduction.
Representing knowledge using rules: Procedural Vs Declarative knowledge- Logic
programming-Forward Vs Backward reasoning -Matching-Control knowledge.

Unit:4 MACHINE LEARNING


Understanding Machine Learning: What Is Machine Learning? - Defining Big Data - Big
Data in Context with Machine Learning - The Importance of the Hybrid Cloud - Leveraging
the Power of Machine Learning - The Roles of Statistics and Data Mining with Machine
Learning-Putting Machine Learning in Context-Approaches to Machine Learning.

Unit:5 APPLICATIONS OF MACHINE LEARNING


Looking Inside Machine Learning: The Impact of Machine Learning on Applications – Data
Preparation -The Machine Learning Cycle.
Text Books
Elaine Rich and Kevin Knight, "Artificial Intelligence", Tata McGraw Hill
1
Publishers company Pvt Ltd, Second Edition, 1991.
2 George F Luger, "Artificial Intelligence", 4thEdition,Pearson Education
Publ,2002.

Reference Book
Machine Learning for Dummies ®,IBM Limited Edition by Judit Hurwitz,
1
Daniel Kirsch.

Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]


1 https://www.ibm.com/downloads/cas/GB8ZMQZ3
2 https://www.javatpoint.com/artificial-intelligence-tutorial
3 https://nptel.ac.in/courses/106/105/106105077/

Expected Course Outcomes:


On the successful completion of the course, student will be able to
1 Demonstrate AI problems and techniques K1,K2
2 Understand machine learning concepts K2,K3
Apply basic principles of AI in solutions that require
3 problem solving inference, perception, knowledge K3,K4
representation, and learning
4 Analyze the impact of machine learning on applications K4,K5
Analyze and design are all world problem for implementation and
5 understand the dynamic behavior of a system K5,K6
K1-Remember; K2-Understand; K3-Apply; K4-Analyze; K5-Evaluate; K6-Create

Mapping with Programme Outcomes


CO PO1 PO2 PO3 PO4 PO 5 PO6 PO7 PO8 PO9 PO10

CO1 S S S S S S S M M S
CO2 S S S S S S S M S S
CO3 S S S S S S S M S S
CO4 S S S S S S S M S S
CO5 S S S S S S S M S S
Soft Computing

COURSE OBJECTIVES:

● Develop the skills to gain a basic understanding of neural network theory and fuzzy logic theory.
● To understand supervised and unsupervised learning algorithms
● To enable the students to gain a basic understanding of neural networks.
● To know about fuzzy logic, fuzzy inference systems, and their functions.
● To impart basic knowledge on Genetic algorithms and their applications.

UNIT-I

INTRODUCTION TO SOFT COMPUTING: Artificial Neural Networks- Biological Neurons- Basic


Models of Artificial Neural Networks-Connections-Learning-Activation Functions- Important Terminologies
of ANNs- Muculloch and Pitts Neuron-Linear Separability- Hebb Network-Flowchart of Training Process-
Training Algorithm.
UNIT - II
SUPERVISED LEARNING NETWORK : Perceptron Networks–Perceptron Learning Rule-Architecture-
Flowchart for Training Process-Perceptron Training Algorithms for Single Output Classes-Perceptron
Training Algorithm for Multiple Output Classes-Perceptron Network Testing Algorithm - Adaptive Linear
Neuron-Delta Rule for Single Output Unit-Flowchart for training algorithm-Training Algorithm – Testing
Algorithm - Multiple Adaptive Linear Neurons-Architecture-Flowchart of Training Process-Training
Algorithm-Back Propagation Network-Architecture-Flowchart for Training Process-Training Algorithm-
Learning Factors of Back-Propagation Network-Radial Basis Function Network- Architecture-Flowchart for
Training Process-Training Algorithm.
UNIT-III
UNSUPERVISED LEARNING NETWORK: Associative Memory Networks - Auto Associative Memory
Network-Architecture-Flowchart for Training Process-Training Algorithm-Testing Algorithm- Bidirectional
Associative Memory- Architecture-Discrete Bidirectional Associative Memory-Iterative Auto Associative
Memory Networks - Linear Auto Associative Memory-Kohonen Self-Organizing Feature Map- Architecture-
Flowchart for Training Process-Training Algorithm.
UNIT-IV
INTRODUCTION TO FUZZY LOGIC: Classical Sets –Operations on Classical Sets- Fuzzy sets - Fuzzy
Sets- Properties of Fuzzy Sets- Fuzzy Relations –Membership Functions: Fuzzification- Methods of
Membership Value Assignments – Defuzzification – Lambda-Cuts for Fuzzy sets and Fuzzy Relations –
Defuzzification Methods–Max-Membership Principle-Centroid Method-Weighted Average Method-Mean
Max Membership-Center of Sums-Center of Largest Area-First of Maxima - Fuzzy Set Theory - Fuzzy
Arithmetic And Fuzzy Measures: Fuzzy Measures – Belief and Plausibility Measures-Probability Measures-
Possibility and Necessity Measures- Formation of Rules –Fuzzy Inference Systems (FIS) – Fuzzy Decision
Making – Fuzzy Logic Control Systems.
UNIT-V
GENETIC ALGORITHM: Introduction - Biological Background - Traditional Optimization and Search
Techniques -Gradient Based Local Optimization Method-Random Search-Stochastic Hill Climbing-Simulated
Annealing-Symbolic Artificial Intelligence-Operators in Genetic Algorithm -Encoding-Selection-Crossover-
Mutation - Stopping Conditions for Genetic Algorithm Flow-Genetic Programming-Working of Genetic
Programming-Characteristics of Genetic Programming-Data Representation.
TEXT BOOKS

1. Principles of Soft Computing, S.N. Sivanandam, S.N.Deepa, Wiley, Third Edition, 2019.
UNIT I: Chapter 1: 2.1,2.3,2.4,2.5,2.6,2.7
UNIT II: Chapter 2: 3.2,3.3,3.4,3.5,3.6
UNIT III: Chapter 3: 4.3,4.4,4.7,5.3
UNIT IV: Chapter 4: 7.2,7.3,8.4,9.3,9.4,10,10.2,10.3,10.4,11.4,12.8,14
UNIT V: Chapter 5: 15,15.2,15.3,15.4,15.9,15.10
REFERENCE BOOKS

1. Das, A. (2018). Artificial Intelligence and Soft Computing for Beginners.


2. Amit, K. (2018). Artificial intelligence and soft computing: behavioral and cognitive modeling of the
human brain. CRC press.
3. Rajasekaran, S., & Pai, G. V. (2011). Neural networks, fuzzy logic and genetic algorithm: synthesis and
applications (with cd). PHI Learning Pvt. Ltd.
4. Jang, J. S. R., Sun, C. T., &Mizutani, E. (2004). Neuro-fuzzy and soft computing-a computational
approach to learning and machine intelligence [Book Review]. IEEE Transactions on automatic
control, 42(10), 1482-1484.
5. Gupta, M. M. (2004). Soft computing and intelligent systems: theory and applications. Elsevier.

COURSE OUTCOMES:

● On the successful completion of the course, students will be able to

Provide an introduction to the basic principles, techniques and K1- K2 LO


CO1
applications of soft computing

Get familiar with Neural network architectures and supervised learning IO


CO2 K3
algorithms

Understand the architectures and algorithms of unsupervised Learning K3-K4 HO


CO3
techniques

Develop the skills to gain a basic understanding of fuzzy logic theory K4 IO


CO4
and fuzzy inference systems

Ability to learn traditional optimization and search techniques and K5 HO


CO5
genetic programming
MAPPING WITH PROGRAMME OUTCOMES

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S M S M S S S M S M S S

CO2 M S M S M M M S M S S M

CO3 M M S S S M M S S S S S

CO4 S S M M M S S S S M M M

CO5 S S S S S M S M M S S M

S- STRONG; M-MEDIUM; L-LOW


High Performance Computing
Course Objectives:

• To get a clear idea of High Performance Computing concept.


• To get brief knowledge about how to function the HPC systems.
• To get idea of what techniques used in HPC models.
• To understand Parallel computing concepts.
• To get familiar with OpenMP technology that is widely used in HPC technology.

Unit-I
Modern processors: Stored-program computer architecture-General purpose cache based microprocessor
architecture-Memory hierarchies-Multi core processors-Multithreaded processors-Vector processors. Basic
optimization techniques for serial code: Scalar profiling-Common sense optimizations-Simple measures,
large impact-The role of compilers-C++ optimizations.

Unit-II
Data access optimization: Balance analysis and light speed estimates-Storage order-Algorithm classification
and access optimizations-The Jacobi algorithm-Algorithm classification and access optimizations-Sparse
matrix-vector multiply. Parallel computers: Taxonomy of parallel computing paradigms-Shared-memory
computers-Distributed memory computers-Hierarchical systems-Networks.

Unit-III

Basics of parallelization: Introduction to Parallelism -Parallel scalability. Shared memory parallel


programming with OpenMP: Short introduction to OpenMP-OpenMP-parallel Jacobi algorithm.

Unit-IV

Efficient OpenMP programming: Profiling OpenMP programs-Performance pitfalls-Parallel sparse matrix-


vector multiply. Locality optimizations on ccNUMA architectures: Locality of access on ccNUMA-
ccNUMA optimization of sparse MVM-Placement pitfalls-ccNUMA issues with C++.

Unit-V

Distributed-memory parallel programming with MPI: Message passing-A short introduction to MPI-MPI
parallelization of a Jacobi solver. Efficient MPI programming: MPI performance tools-Communication
parameters-Synchronization, serialization, contention-Reducing communication overhead-Understanding
intranode point-to-point communication.

Text book:

1. Georg Hager, Gerhard Wellein “Introduction to High Performance Computing for Scientists and
Engineers”, CRC Press, 2011. Chapters: 1 to 10.
Reference books:

1. Michael W. Berry, Kyle A. Gallivan, Efstratios Gallopoulos, Ananth Grama, Bernard Philippe, Yousef
Saad, Faisal Saied, “High-performance scientific computing: algorithms and applications”, Springer,
2012.
2. Victor Eijkhout, “Introduction to High Performance Scientific Computing”, MIT Press, 2011.

Course Outcome:

On the successful completion of the course, students will be able to,

CO1 Understand of the HPC and ccNUMA concepts


CO2 Design and develop a parallel programming with modern C, C++ and new
version of FORTRAN
CO3 Apply with parallel computing K1 - K6
CO4 Develop an efficient OpenMP programming

CO5 Evaluate an efficient MPI programming


K1- Remember, K2 - Understand, K3 - Apply , K4 - Analyze, K5 - Evaluate, K6 -Create

Mapping with Programme Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S L M L L L S S S S M L

CO2 S M L M M L S L S L S L

CO3 S S S M M L M L M L S L

CO4 S S S M S L M L M S S S

CO5 S S S M M L M M M M S L

L - Low, M- Medium, S - Strong


Internet of Things
Course Objectives:

The main objectives of this course are to

● To get familiar with the evolution of IoT with its design principles.
● To outline the functionalities and protocols of internet communication.
● To analyze the hardware and software components needed to construct IoT applications.
● To identify the appropriate protocol for API construction and writing embedded code.
● To realize various business models and ethics in Internet of Things.

Unit:1 INTRODUCTION
Internet of Things: An Overview : IoT Conceptual Framework - IoT Architectural View -
Technology Behind IoT - Sources of IoT - M2M Communication - Examples of IoT - Design
Principles for Connected Devices : IoT/M2M Systems Layers and Designs Standardization -
Communication Technologies - Data Enrichment, Data Consolidation and Device
Management at Gateway
Unit:2 Design Principles for Web Connectivity
Communication Protocols for Connected Devices– Message Communication Protocols for
Connected Devices – Web Connectivity for Connected Devices – Network using
Gateway , SOAP, REST, HTTP, RESTful and Web Sockets -Internet Connectivity
Principles Internet Connectivity - Internet Based Communication – IP Addressing in
the IoT – Media Access Control – Application Layer Protocols: HTTP, HTTPS, FTP,
Telnet and Others
Unit:3 Data Acquiring, Organizing, Processing and Analytics
Data Acquiring and Storage – Organizing the Data – Transactions, Business Processes,
Integration and Enterprise Systems – Analytics – Knowledge Acquiring, Managing and Storing
Processes – Data Collection, Storage and Computing Using a Cloud Platform: Cloud
Computing Paradigm for Data Collection, Storage and Computing – Everything as a Service
and Cloud Service Models.
Unit:4 SENSORS AND ACTUATORS
Sensors, Participatory Sensing, RFIDs, and Wireless Sensor Networks : Sensor Technology –
Wireless Sensor Networks Technology - Prototyping the Embedded Devices for IoT and M2M
:Embedded Computing Basics – Embedded Platforms for Prototyping.

Unit:5 Prototyping and Designing the Software for IoT Applications


Prototyping Embedded Device Software - Devices, Gateways, Internet and Web/ Cloud Services
Software Development – Prototyping online Component APIs and Web APIs – Security for IoT
:Vulnerabilities, Security Requirements and Threat Analysis – IoT Security Tomography and
Layered Attacker Model – Security Models, Profiles and Protocols for IoT – IoT Application
Case Study : Design Layers, Design Complexity and Designing using Cloud PaaS – IoT / IoT
Applications in the premises, Supply – Chain and Customer Monitoring – Connected Car and
its Applications and Services.
Text Book
1. Raj Kamal , “ Internet of Things Architecture and Design Principles”, McGraw
Hill, 2017
Reference Books
1. Ovidiu Vermesan and Peter Friess, “Internet of Things – From Research and
2. Innovation to Mark Deployement” , River Publishers, 2014.
3. Peter Waher, “Learning Internet of Things” , Packt Publishing, 2015.
4. Donald Norris, “The Internet of Things: Do-It-Yourself at Home Projects for
Arduino, Raspberry Pi and Beagle Bone Black”, Mc Graw Hill, 2015

Related Online Contents [MOOC, SWAYAM, NPTEL, Websites etc.]


1 https://onlinecourses.nptel.ac.in/noc20_cs66/preview
2 https://www.javatpoint.com/iot-internet-of-things
3 https://www.tutorialspoint.com/internet_of_things/index.htm

Expected Course Outcomes:


On the successful completion of the course, student will be able to
1 Understand about IoT, its Architecture and its Applications K1,K2
2 Comprehend the IoT evolution with its architecture and sensors K2,K3
3 Assess the embedded technologies and develop prototypes for the IoT K4
products
4 Evaluate the use of Application Programming Interface and design an K5,K6
API for IoT in real-time

Design IoT in real time applications using today’s internet & wireless
5 Technologies K6

K1-Remember;K2-Understand;K3-Apply;K4-Analyze;K5-Evaluate; K6-Create

Mapping with Programming Outcomes


CO P1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10

CO1 M M M S M S M M S M
CO2 M S M S M S M S S S
CO3 S S S S M S M S S S
CO4 S S S S S S S S S S
CO5 S S S S S S S S S S
Solution Architecture

Course Objectives:

● To get familiar with the evolution of solution architecture


● To outline the functionalities of Solution Architecture Design
● To assess the Performance Considerations of Solution Architecture
● To analyze the Architectural Reliability Considerations
● To identify the design principles for cost optimization

UNIT I
Evolution of solution architecture - The benefits of solution architecture - Solution architecture in the public
cloud - Solution Architects in an Organization - Types of solution architect role - Understanding a solution
architect's responsibilities - Attributes of the Solution Architecture - Scalability and elasticity - Security and
compliance - Cost optimization and budget

UNIT II
Principles of Solution Architecture Design - Scaling workload - Building resilient architecture - Design for
performance - Using replaceable resources - Cloud Migration and Hybrid Cloud Architecture Design -
Benefits of cloud-native architecture - Creating a cloud migration strategy - Steps for cloud migration -
Creating a hybrid cloud architecture - Designing a cloud-native architecture

UNIT III
Solution Architecture Design Patterns - Building an n-tier layered architecture - Creating multi-tenant SaaS-
based architecture - Building stateless and stateful architecture designs - Understanding SOA - Performance
Considerations - Design principles for architecture performance - Technology selection for performance
optimization - Managing performance monitoring

UNIT IV
Architectural Reliability Considerations - Design principles for architectural reliability - Technology selection
for architecture reliability - Improving reliability with the cloud - Operational Excellence Considerations -
Designing principles for operational excellence - Selecting technologies for operational excellence -
Achieving operational excellence in the public cloud

UNIT V
Cost Considerations - Design principles for cost optimization - Techniques for cost optimization - Cost
optimization in the public cloud - Architecting Legacy Systems - Learning the challenges of legacy systems -
Defining a strategy for system modernization - Looking at legacy system modernization techniques - Defining
a cloud migration strategy for legacy systems
Text Book:

1. Saurabh Shrivastava and Neelanjali Srivastav, “ Solutions Architect's Handbook”, Packt Publishing,
2020
Reference Books:

1. Alan McSweeney , “Introduction to Solution Architecture”, Kindle Edition, 2019


2. Bernard, Scott A. An introduction to holistic enterprise architecture. Author House, 2020.
Course Outcomes

On the successful completion of the course, students will be able to

CO1 Comprehend the types, benefits and attributes of solution architecture

CO2 Assess the cloud architecture and create hybrid cloud architecture
K1- K6
CO3 Analyse the design patterns for solution architecture

CO4 Understand Architecture Reliability and Operational Excellence

CO5 Optimize the cost in cloud and assess the legacy system
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create

Mapping with Programme Outcomes

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S S S S S S S S S M S S

CO2 S S S S S S S S S S M S

CO3 S M S S S S M S S S S S

CO4 S S S M S S S S S S M S

CO5 S S S S M S S S S M M S

S- Strong; M-Medium; L-Low


Software Development Technologies

Course Objectives
● To learn and implement Micro services
● To analyze the Azure Kubernetes Service
● To learn and analyze .NET DevOps for Azure and its applications
● To build code for .NET core applications
● To get familiarized with Azure pipelines

Unit -I
Implementing Microservices: Client to microservices communication, Interservice communication, data
considerations, security, monitoring, microservices hosting platform options. Azure Service Fabric:
Introduction, core concepts, supported programming models, service fabric clusters, develop and deploy
applications of service fabric. Monitoring Azure Service Fabric Clusters: Azure application, resource manager
template, Adding Application Monitoring to a Stateless Service using Application Insights, Cluster
monitoring, Infrastructure monitoring.
Unit-II
Azure Kubernetes Service (AKS): Introduction to kubernetes and AKS, AKS development tools, Deploy
applications on AKS. Monitoring AKS: Monitoring, Azure monitor and analytics, monitoring AKS clusters,
native Kubernetes dashboard, Prometheus and Grafana. Securing Microservices: Authentication in
microservices, Implementing security using API gateway pattern, Creating application using Ocrlot and
securing APIs with Azure AD. Database Design for Microservices: Data stores, monolithic approach,
Microservices approach, harnessing cloud computing, database options on MS Azure, overcoming application
development challenges. Building Microservices on Azure Stack: Azure stack, Offering IaaS, PaaS on-
premises simplified, SaaS on Azure stack.
Unit-III
.NET DevOps for Azure: DevOps introduction, Problem and solution. Professional Grade DevOps
Environment: The state of DevOps, professional grade DevOps vision, DevOps architecture, tools for
professional DevOps environment, DevOps centered application. Tracking work: Process template, Types of
work items, Customizing the process, Working with the process. Tracking code: Number of repositories, Git
repository, structure, branching pattern, Azure repos configuration, Git and Azure.
Unit-IV
Building the code: Structure of build, using builds with .NET core and Azure pipelines, Validating the code:
Strategy for defect detection, Implementing defect detection. Release candidate creation: Designing release
candidate architecture, Azure artifacts workflow for release candidates, Deploying the release: Designing
deployment pipeline, Implementing deployment in Azure pipelines. Operating and monitoring release:
Principles, Architectures for observability, Jumpstarting observability.
Unit-V
Introduction to APIs: Introduction, API economy, APIs in public sector. API Strategy and Architecture: API
Strategy, API value chain, API architecture, API management. API Development: Considerations, Standards,
kick-start API development, team orientation. API Gateways: API Gateways in public cloud, Azure API
management, AWS API gateway. API Security: Request-based security, Authentication and authorization.
Text Books
1. Harsh Chawla and Hemant Kathuria, Building Microservices Applications on Microsoft Azure-
Designing, Developing, Deploying, and Monitoring, Apress, 2019.
2. Jeffrey Palermo , NET DevOps for Azure A Developer’s Guide to DevOps Architecture the Right
Way, Apress, 2019.
3. Thurupathan and Vijayakumar, Practical API Architecture and Development with Azure and AWS -
Design and Implementation of APIs for the Cloud, Apress, 2018.
Reference Books
1. Karl Matthias and Sean P. Kane, Docker: Up and Running, O'Reilly Publication, Second Edition 2018.
2. Len Bass,IngoWeber, Liming Zhu,”DevOps, A Software Architects Perspective”, AddisonWesley-
Pearson Publication, First Ediiton 2015.
3. John Ferguson Smart, ”Jenkins, The Definitive Guide”, O'Reilly Publication, First Ediiton 2011.

Course Outcomes

On the successful completion of the course, students will be able to

Understand, apply and summarize the basic concepts of Micro services


CO1: communication Microsoft Azure and Dev Ops for software development K1-K6
life cycle
Illustrate, and implement Azure Kubernetes Service tools for software
CO2: K1-K6
development life cycle
Recognize, analyze and summarize the functionalities of .NET Dev Ops
CO3: K1-K6
for Azure applications
Understand, design and evaluate the principles and architecture service
CO4: K1-K6
tools for software development life cycle.
Comprehend, implement and review the functionalities of API and API
CO5: K1-K6
gateways for cloud and Azure applications
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create

Mapping with Programme Outcomes


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S S M - M - - - S - - -

CO2 S S M - M - - - S - - -

CO3 S S S - S - - - S S S S

CO4 S S M - M - - - S - - -

CO5 S S M - M - - - S - - -

S- Strong; M-Medium; L-Low


SEMESTER III
Cyber Security
Course Objectives:
● To understand the basics of Cybercrime and Computer forensics with protecting mechanism
● To explore the working principles of WLAN, Email and Smartphone along with security mechanism and
guidelines
● To gain the ability to understand the importance of cyber investigations with its functioning role and learn
the basics of WiFi and its security measures
● To understand and learn the method of seize the digital evidence

● To learn and analyze the concepts of digital forensics with cybercrime prevention techniques

Unit – I
Introduction to cybercrime: Classification of cybercrimes – reasons for commission of cybercrime –
malware and its type – kinds of cybercrime – authentication – encryption – digital signatures – antivirus –
firewall – steganography – computer forensics – why should we report cybercrime – introduction counter
cyber security initiatives in India – generating secure password – using password manager-enabling two-
step verification – security computer using free antivirus.
Unit – II
Tips for buying online: Clearing cache for browsers – wireless LAN-major issues with WLAN-safe
browsing guidelines for social networking sites – email security tips – introduction-smart phone security
guidelines – purses, wallets, smart phones – platforms, setup and installation-communicating securely with
a smart phone.
Unit – III
Cyber investigation roles: Introduction – role as a cybercrime investigator – the role of law enforcement
officers – the role of the prosecuting attorney – incident response: introduction-post mortem versus live
forensics – computer analysis for the hacker defender program-network analysis – legal issues of
intercepting Wi-Fi transmission – Wi-Fi technology – Wi-Fi RF-scanning RF – eavesdropping on Wi-Fi –
fourth amendment expectation of privacy in WLAN.
Unit – IV
Seizure of digital information: introduction – defining digital evidence – digital evidence seizure methodology
– factors limiting the wholesale seizure of hardware – other options for seizing digital evidence – common
threads within digital evidence seizure – determining the most appropriate seizure method– conducting cyber
investigations–demystifying computer/cybercrime – IP addresses – the explosion of networking –
interpersonal communication.
Unit – V
Digital forensics and analyzing data: Introduction – the evolution of computer forensics–phases of digital
forensics-collection – examination-analysis – reporting – Cybercrime prevention: Introduction – crime
targeted at a government agency.
Text books:
1. Dr. JeetendraPande, “Introduction to Cyber Security” Published by Uttarakhand Open University,
2017.(Chapter: 1.2-6.4,9.3-12.2)
2. Anthonyreyes, Kevin o’shea, Jim steele, Jon R. Hansen, Captain Benjamin R. Jean Thomas Ralph,
“Cyber-crime investigations” - bridging the gaps between security professionals, law enforcement,
and prosecutors, 2007.(Chapter: 4, 5, 6, 7, 8, 9,10)

Reference Books:
1. Sebastian Klipper, “Cyber Security” EinEinblickfur Wirtschafts wissens chaftler Fachmedien
Wiesbaden,2015
2. John G.Voller Black and Veatch, “Cyber Security” Published by John Wiley & Sons, Inc., Hoboken,
New Jersey Published simultaneously in Canada ©2014.

Course Outcomes
On the successful completion of the course, students will be able to

Understand, describe, analyze and examine the basics of Cyber security


CO1: concepts and its implementation in India K1- K6

Comprehend and demonstrate the security tips in browsers, WLAN,


social networks, Email security and Smart phone. Apply the K1- K6
CO2: investigations in post mortem and Forensics

CO3: Understand, apply and evaluate the various investigation roles and Wi
Fi protecting mechanisms.
K1- K6
CO4: Understand, illustrate and evaluate the method of seize the digital
information and evidences forensics data and evaluate the forensics
K1- K6
reports
CO5: Comprehend, apply and appraise the methods digital forensics with
cybercrime prevention techniques
K1- K6

K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- Evaluate, K6- Create

Mapping with Programme Outcomes

CO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S L - L M L M M - M - -

CO2 M S - L M L M M - M - -

CO3 M S L L M L M M - M M L

CO4 S M L S M L S M - M - -

CO5 M S M L S L M S - S - -

S- Strong; M-Medium; L-Low


RESEARCH METHODOLOGY
UNIT I
Introduction - Meaning of Research – Objectives of Research – Types of Research – Motivation of Research –
Research approaches – Significance of Research – Research Methods versus Methodology – Research and
Scientific method – Research process – Criteria of good Research – Problems encountered by Researchers in
India. Defining the Research Problem: What is a Research problem - Selecting the Problem – Technique
involved Defining a problem. Research Design: Meaning – Need for Research Design – Features of Good
Design – Important concept relating to Research design – Different Research designs – Basic Principles of
Experimental Designs

UNIT II
Sampling Design : Census and Sample Survey – Implications of a sample design – Steps in sample design -
Criteria of selecting a sampling procedure – Characteristics of a good sample design – Different types of
sample design – How to select a random sample – Random sample from an infinite Universe – Complex
random sampling designs. Measurements and Scaling techniques : Measurement in Research – Measurement
scales – Sources of error in Measurement – Test and sound Measurements – Technique of developing
measurement tools – Scaling, Meaning of scaling – Scale classification bases – Important scaling techniques –
Scale Construction techniques.

UNIT III
Chi-Square Test for large samples – Definition of Chi-Square – Limitations of Chi Square test - Chi-Square
test as a test of goodness of fit and as a test of independence – Yate’s correction and its applications. Analysis
of Variance (ANOVA): Concept – One way ANOVA – ANOVA in test in Latin Square Design

UNIT IV
Data Collection: Methods of Data Collection – Collection of Primary Data – Observation Method – Interview
method – Collection of data through Questionnaires – Collection of data through Schedules – Some other
methods of data collection – Collection of secondary data – Selection of appropriate method for data
collection. Interpretation and Report Writing: Meaning of interpretation – Why interpretation – Technique of
interpretation – Precaution in Interpretation – Significance of Report

UNIT – V
Introduction – Algorithmic Research Problems – Types of Solution Procedure/ Algorithm – Steps of
Development of Algorithm – Steps of Algorithmic research – Design of Experiments and Comparison of
Algorithms – Meta Heuristics for Combinational Problems. The Computer – Its role in Research – The
Computer and Computer Technology – The Computer System – Important Characteristics - Computer
Applications – Computer and Researchers.
Reference Books:
1. C.R.Kothari, “Research Methodology Methods and Techniques”, Second edition, New Age
International Publishers, 2020.
2. R.Panneerselvam, “Research Methodology”, PHI, 2009.
3. S.C Gupta and V.K Kapoor, “Fundamentals of Mathematical statistics”, Sulthan Chand &
Sons, Delhi, 2020.
4. Deepak Chawla and NeenaSondhi,” Research Methodology: Concepts and Cases”,Vikas
Publishing House, 2016.
5 David M.Levine, David F Stephen,e al., “Business Statistics”, Pearson Publisher, 7th edition,2017.
6. Ranjit Kumar “Research Methodology: A Step-by-step Guide for Beginners”, Sage
Publications Ltd, 2019.
Computer Vision
Course Objectives:
● To get understanding about Computer Vision techniques behind a wide variety of real- world
applications.
● To get familiar with various Computer Vision fundamental algorithms and how to implement and
apply.
● To get an idea of how to build a computer vision application with Python language.
● To understand various machine learning techniques that are used in computer vision tasks.
● To incorporate machine learning techniques with computer vision systems.

Unit-I
Basic Image Handling and Processing: PIL – the Python Imaging Library-Matplotlib-NumPy-SciPy-
Advanced example: Image de-noising. Local Image Descriptors: Harris corner detector-SIFT - Scale-
Invariant Feature Transform-Matching Geotagged Images.
Unit-II
Image to Image Mappings: Homographies-Warping images-Creating Panoramas. Camera Models and
Augmented Reality: The Pin-hole Camera Model-Camera Calibration-Pose Estimation from Planes and
Markers-Augmented Reality.
Unit-III
Multiple View Geometry: Epipolar Geometry-Computing with Cameras and 3D Structure-Multiple View
Reconstruction-Stereo Images. Clustering Images: K-means Clustering-Hierarchical Clustering-Spectral
Clustering.
Unit-IV
Searching Images: Content based Image Retrieval-Visual Words-Indexing Images- Searching the Database
for Images-Ranking Results using Geometry-Building Demos and Web Applications. Classifying Image
Content: K-Nearest Neighbors-Bayes Classifier-Support Vector Machines-Optical Character Recognition.
Unit-V
Image Segmentation: Graph Cuts-Segmentation using Clustering-Variational Methods. OpenCV: Python
Interface-OpenCV Basics-Processing Video-Tracking.

Course Outcomes:

On the successful completion of the course, students will be able

CO1 To understand and recall computer vision and its application areas
CO2 To build a computer vision system
To apply and analyse a design range of algorithms for image processing and
CO3
computer vision K1-K6
CO4 To incorporate machine learning techniques with computer vision system

CO5 To apply and analyse image segmentation and image registration

K1- Remember, K2 - Understand, K3 - Apply , K4 - Analyze, K5 - Evaluate, K6 -Create


Mapping with Programme Outcomes:

PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S L M L L L M M M S S L

CO2 S M L M M L S L S L S L

CO3 S S S M M L M L M L M L

CO4 S S S M M L M L M L S L

CO5 S S S M M L S L S L S L

L - Low, M- Medium, S - Strong


Skill Enhancement Courses
SEMESTER II

Web Development using PHP

UNIT I
Introduction to PHP as a programming Language: - Advantages of PHP, the server side
architecture, overview of PHP, history, object oriented support, benefits in running PHP as a
server side script.

The basics of PHP: - data types, variables, constants, operators, Conditional statements (if
statement, Executing Multiple Statements, else if clause and switch statement), Iterations (for
loop, while loop, Arrays, controlling an array using a while loop, do while statement.

UNIT II
Functions, user defined functions, functions with arguments, built in functions (print(),
includer(), header(), phpinfo() ), Working with Strings.

Working with files and directories: reading files, writing files, processing directories and
performing other file and directory operations.

UNIT III
Working with Cookies and Sessions: setting, reading and removing cookies, creating and
removing sessions and session variables, Handling errors: handling script errors and using
exceptions

UNIT IV
Working with forms, form elements (Text Box, Text Area, Password, Radio Button, Checkbox,
The Combo Box, Hidden Field and image), adding elements to a form

UNIT V
Data base connectivity using PHP (MySQL, ODBC, ORACLE, SQL) Performing, executing
Commands, different types of Data Base Operations like Insertion, deletion, update and query on
data.

Text Books Books:


1. Mastering PHP, WebTech Solutions, Khanna Publishing House
2..The Complete Reference PHP, Steven Holzner, McGraw Hill Professional, 2008.
3.Programming PHP, Kevin Tatroe, Peter Maclntyre & Rasmaus Lerdorf, Orelly
Reference Books:
1.Robert W. Sebesta, “Programming the World Wide Web”, Seventh Edition, Pearson
Education, 2015.
2.Raj Kamal: Internet and Web Technologies, McGraw Hill Education.
3. Learning PHP, Ramesh Bangia, Khanna Publishing House
SEMESTER III

Social Networks
Course Objectives
● To learn about Social media, Social networking and Webcasts
● To understand and build a Word Press Powered Website
● To analysis the Social Networking & Micro-Blogging.
● To learn and analyze the Widgets & Badges.
● To explore the importance of Website optimization.

UNIT I: Introduction: Social Media Strategy-Important First Decisions -Websites, Blogs - RSS
Feeds Mapping -Preparation - Multimedia Items Gathering Content for Blog Posts RSS Feeds &
Blogs-RSS Feeds-The Feed Reader-The Feed-Options for Creating an RSS Feed-Planning Feed-
Blogs-Options for Starting. Blog and RSS Feed-Feed or Blog Content-Search Engine
Optimization (SEO)-Feed Burner-RSS Feed and Blog Directories-An Optimization Plan for Blog
or RSS Feed
UNIT II: Building a Word Press Powered Website: Word Press as A CMS - Diversity of Word
Press Sites-The Anatomy of a Word Press Site -a Brief Look at the Word Press Dashboard
Planning - Site Themes Plug-ins setting up Sidebars Building Pages- Posting Blog Entries.
Podcasting, Vidcasting, & Webcasting- Publishing Options for Podcast- Creating and Uploading
Podcast Episodes-Publishing Podcast Optimizing Podcast- Webcasting
UNIT III: Social Networking & Micro-Blogging: Facebook-The Facebook Profile -Myspace
LinkedIn-Twitter-Niche Social Networking Sites-Creating Own Social Network-Promoting
Social Networking Presence- Social Bookmarking & Crowd-Sourcing - Social Bookmarking-A
Social Bookmarking Strategy- Crowd-Sourced News Sites- Preparation And Tracking Progress
Media Communities-Image Sharing Sites-Image Sharing Strategy-Video Sharing Sites-Video
Sharing Strategy-Searching And Search Engine Placement-Connecting With Others.
UNIT IV: Widgets & Badges: Highlighting Social Web Presence-Sharing and Syndicating
Content Making Site More Interactive-Promoting Products and Making Money-Using Widgets
In Word Press-Widget Communities And Directories- Working Widgets Into Strategy Social
Media Newsrooms-Building Social Media Newsroom - Populating The Newsroom-Social Media
News Releases-Social Media Newsroom Examples. More Social Tools-Social Calendars-Social
Pages Wikis-Social Search Portals-Virtual Worlds.
Unit V: Website optimization: A Website Optimization Plan-Streamlining Web Presence-An
Integration Plan- Looking to the Future-Life streaming: The Future of Blogging-Distributed
Social Networking-Social Ranking, Relevancy, and ―Defriending-Web 3.0 or The Semantic
Web-Mobile Technology- Measuring Your Success-A Qualitative Framework-A Quantitative
Framework-Tools to Help You Measure-Come to Your Own Conclusions
Text Book:
1. Deltina hay ―A Survival Guide To Social Media and Web 2.0 Optimization‖, Dalton
Publishing, 2009
Reference Books:
1. Miriam Salpeter , Social Networking for Career Success, Learning Express, 2011.
2. Miles, Peggy, Internet world guide to webcasting, Wiley, 2008
Professionals”, Wiley Publication,2015.

Course Outcomes:

On the successful completion of the course, students will be able

To understand, impart and summarize the concepts of Social media, Social K1-K6
CO1:
networking and Webcasts
To comprehend, design and develop a Word Press Powered Website K1-K6
CO2:
To understand, implement and perform evaluation of Social Networking and K1-K6
CO3:
Micro-Blogging
To collaborate, implement and analyze the Widgets and Badges in social K1-K6
CO4
networking environment
To understand, illustrate and perform evaluation of web optimization for K1-K6
CO5
social networks
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create

Mapping with Programme Outcomes:


PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12

CO1 S S S - S L - S - S S S

CO2 S S S - S L - S - S S S

CO3 S S S - S L - S - S S S

CO4 S S S - S L - S - S S S

CO5 S S S - S L - S - S S S
S- Strong; M-Medium; L-Low

You might also like