2024-25 Mtech Syllabus Updated
2024-25 Mtech Syllabus Updated
MTech
in
Computer Science & Engineering
Academic year2024-2025
1
CONTENTS
Syllabus of MTech in Computer Science and
Engineering
FIRST YEAR SYLLABUS
I Semester
Sl.No Subject Code Subject Name
II SEMESTER
Sl.No Subject Code Subject Name
2
MATHEMATICS FOR
Course Title MACHINE LEARNING Semester I
2. Kreyzig, “AdvancedEngineeringMathematics”.
R.E, Walpole, R.H.Myres, S.L.Myres and Keying Ye, “Probability and Statistics for Engineers
3. and Scientists”, 9th Edition, Pearson, 2012.
Web links and Video Lectures (e-Resources):
HMC Calculus Tutorial: Geometry of Linear Transformations
3 (math.hmc).
Activity-Based Learning (Suggested Activities in Class)/ Practical Based learning
The students with the help of the course teacher can take up technical –activities which will enhance their skill
Or the students should interact with industry (small, medium and large), understand their problems or fore see
whatcan be undertaken for study in the form of research/testing/projects, and for creative and innovative
methods to solve the identified problem.Thepreparedreportshall beevaluatedforCIEmarks.
Course outcomes:
Solve problems using concepts of vector spaces and represent linear transformations with
CO1 matrices.
CO3 Analyze and interpret data using probability distributions and statistical measures.
CO4 Utilize multivariate calculus techniques to solve optimization and differentiation problems.
CO5 Solve linear systems and compute eigenvalues and eigenvectors for practical applications.
CO-PO Mapping
CO/ PO PO PO PO PO PO PO PO PO1 PO1 PO1 PSO PSO
PO1
PO 2 3 4 5 6 7 8 9 0 1 2 1 2
CO1 3 3 3 3 3 1 1
CO2 3 3 3 2 2 1 1
CO3 3 3 3 2 2 1 1
CO4 3 3 3 2 2 1 1
CO5 3 3 3 2 2 1 1
Reference Books:
Ellis Horowitz, SartajSahni, S. Rajasekharan. Fundamentals of Computer Algorithms.
1.
Universities Press. 2nd Edition, 2007.
2. “The Design and Analysis of Computer Algorithms” by Aho, Hopcroft, Ullman.
3. Kenneth A. Berman. Algorithms. Cengage Learning. 2002.
Web links and Video Lectures (e-Resources):
https://pages.cs.wisc.edu/~shuchi/courses/787-F07/about.html 6
Activity-Based Learning (Suggested Activities in Class)/ Practical Based learning
Case Study: Comparison of Algorithm Design Strategies based on CPU, Memory, Disk and
Network usage.
The students with the help of the course teacher can take up relevant technical –activities like
presentation or demonstration of workflow/ implementation of an algorithm which will enhance their
skills. The prepared report shall be evaluated for CIE marks.
Course outcomes:
CO1 Study advanced/novel methods of designing complexity theory and analyzing algorithms.
Applying graph algorithm in the field of network theory and polynomial representation of a
CO2 mathematical model
Engage in applying number theoretic algorithms in the field of cryptography and
CO3 cybersecurity.
CO-PO Mapping
PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO
CO/PO PO1
2
CO1 3 2 1 1 3 - - - - - 1 1 3 3
CO2 2 1 1 1 2 - - - - - 1 1 3 -
CO3 2 1 1 1 2 - - - - - - 1 3 1
CO4 2 1 1 1 2 - - - - - - 1 3 -
CO5 2 1 1 1 2 - - - - - 1 1 3 1
Data Analytics for IoT – Introduction, Apache Hadoop, Using HadoopMapReduce for Batch Data
Analysis, Apache
Oozie, Apache Spark, Apache Storm, Using Apache Storm for Real-time Data Analysis, Structural
Health Monitoring Case Study.
CO-PO Mapping
PO PO3 PO4 PO PO6 PO7 PO PO9 PO10 PO11 PO12 PSO1 PSO2
CO/PO PO1
2
Course outcomes: 5 8
Suggested Learning
Develop 2 for the applications of IOT in real time scenarios
Resources:
schemes 2
CO1
CO1
Textbooks:
CO2
CO2 Manage the Internet resources 3 3
The students with the help of the course teacher can take up relevant technical –activities which will
enhance their skill. The prepared report shall be evaluated for CIE marks.
Course outcomes:
List and classify network services, protocols and architectures, explain why they are
CO1
layered.
Choose key Internet applications and their protocols and apply to develop their own
CO2
applications (e.g. Client Server applications, Web Services) using the sockets API.
Develop effective communication mechanisms using techniques like connection
CO3
establishment, queuing theory, recovery Etc.
CO-PO Mapping
CO/ PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PS
PO1
PO O2
CO1 3 3 3 3 1 1
CO2 2 2 3 3 1
CO3 3 3 3 1
13
Course Title Fundamentals of Data Sciences Semester I
Programing data science concepts and Big Data, modelling using R language.
Analyze Basic tools of EDA, Data science process with case studies and Different algorithms.
Optimize & solve real life problems with different spam filter.
Explore Feature Generation and Feature Selection.
Find different data visualization tools.
Module-1 RBT Level: L2,L3 Hours:10
Introduction: What is Data Science? Big Data and Data Science hype – and getting past the hype,
Why now? – Datafication, Current landscape of perspectives, A data Science Profile, Skill sets.
Statistical Inference, Populations and samples, Big Data, new kinds of data, modelling, statistical
modeling, how to build a model, probability distributions, fitting a model, Introduction to R –
Features, Applications, Constants, Variables, Basic data types, Basic Objects, Summary Tables in R.
14
A Deep Dive into Matplotlib: Overview of Plots in Matplotlib, Pyplot Basics, Basic Text and Legend
Functions, Basic Plots, Layouts, Images, Writing Mathematical Expressions.
Simplifying Visualizations Using Seaborn: Introduction, Controlling Figure Styles, Color Palettes,
Advanced Plots in Seaborn, Multi-Plots in Seaborn, Regression Plots, Squarify.
15
16
SL NO EXPERIMENTS
1. Load the ‘mtcars’ dataset of R.
Find the dimensions of the data set, view the names of the variables and get the name of
each row in the first column, which is the name of each car
Get the dimensions of the dataset in terms of number of rows and number of columns
and summarize the dataset.
Prepare frequency table for the variables ‘mpg’, ‘wt’, ‘disp’ and ‘hp’.
Compute and print the mean and the standard deviation for each of the variables. Which
measurement would you consider “best”, if you were to guess the car species based only
on those four values?
Prepare a variance covariance matrix of the variables ‘mpg’, ‘wt’, ‘disp’ and ‘hp’ and
interpret the values.
1. Cathy O Neil, Rachel Schutt, 2014, “Doing Data Science-Straight Talk from the
Frontline”, Orielly
2. Jure Leskovek, Anand Rajaraman, Jeffrey Ullman, 2014 Mining of Massive Data Sets,
Cambridge University Press
Reference Books:
1. Kevin Murphy, 2013, Machine learning: A Probabalistic Perspective,
2. Peter Bruce, Andre Bruce, Practical Statistics for Data Scientists, Orielly Series
Web links and Video Lectures (e-Resources):
1.
The students with the help of the course teacher can take up activities which will enhance their
activity based learning like Quizzes, Assignments and Seminars.
Course outcomes:
CO1 Explain and program Data Science, Big data and fitting model
CO2 Explore Data Analysis, Data Science Process, R Programs for the algorithms.
CO3 Analyse the Feature Selection algorithms and Recommendation Systems
CO4 Design MapReduce solutions
CO-PO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
1 2 1
CO1
CO2 2 2 2
CO3 2 3 3 1 2
CO4 1 1 1 1 1 1
PART-A
Course outcomes:
Implement the single source shortest path from a vertex to all other vertices in a weighted
CO2 graph
CO-PO Mapping
PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PS
CO/PO PO1 O2
CO1 3 2 1 1 3 1 1 3 3
CO2 2 1 1 1 2 1 1 3
CO3 2 1 1 1 2 1 3 1
CO4 2 1 1 1 2 1 3
23
CIE methods /question paper is designed to attain the different levels of Bloom’s taxonomy as per the
outcome defined for the course.
24
Course objective is to:
To introduce various technologies of conducting research.
To learn the concept of Literature Review.
To choose an appropriate research design for the chosen problem.
Choose appropriate tool for the conduction of research and to Understand the hypotheses
testing and procedure for hypotheses testing.
To explain the art of interpretation and the art of writing research reports. And to learn Ethics
in Engineering Research.
Module-1 RBT Level: L1, L2 Hours: 10
What is Research: Introduction, Meaning of Research, Objectives of Research, Motivation in
Research, Types of Research, Research Approaches, Significance of Research, Research Methods
versus Methodology, Research and Scientific Method, Importance of Knowing How Research is
Done, Research Process, Criteria of Good Research, and Problems Encountered by Researchers in
India.
Defining the Research Problem: Research Problem, Selecting the Problem, Necessity of Defining the
Problem, Technique Involved in Defining a Problem,
Case study: converting a specific problem into research problem.
Text Book 1: Chapters:1,2
Module-2 RBT Level:L1, L2 Hours: 10
Reviewing the literature: Place of the literature review in research, bringing clarity and focus to your
research problem, improving research methodology, Broadening knowledge base in research area,
enabling contextual findings, how to review the literature, searching the existing literature, reviewing
the selected literature, developing a theoretical framework, developing a conceptual framework,
writing about the literature reviewed. Case study.
Text Book 2: Chapter:3
Module-3 RBT Level:L1, L2, L3 Hours: 10
Research Design: Meaning of Research Design, Need for Research Design, Features of a Good
Design, Important Concepts Relating to Research Design, Different Research Designs, Basic
Principles of Experimental Designs, Important Experimental Designs. Sampling design, Methods of
data collection, Case study.
Text Book 1: Chapter: 3,4 and 6
Module-4 RBT Level:L1, L2, L3 Hours: 10
Suggested
Free Writing Learning Resources:
and mining for ideas, Attributes and reasons of technical writing, Patent or Technical
Paper? writing Strategies, journal paper: structure and approach, Language Skills, writing styles, and
Textbooks:
editing, rules of mathematical writing, publish articles to get cited or perish. Case study.
Students self learning topics are METHODOLOGY
“RESEARCH Hypothesis Testing. METHODS and TECHNIQUES”, C.R.
1.Text Book 3: Chapters: 6
KOTHARI.
Module-5 ” Research Methodology a step-by-step guide for RBTBeginners”,
Level: L1, Ranjith
L2, L3 Kumar,3rd
Hours: 10
2.
Edition.
Presentation skills: oral presentations,
“ENGINEERING poster presentations,
RESEARCH METHODOLOGY presentation preparation
“a practical guidelines,
insight for
3.Bibliometrics and research quality. Ethics in engineering Research: Ethics in Engineering research
researchers, Dipankar Deb, Rajeeb Dey, Valentina E. Balas.
practice, types of research misconduct, ethical issues related to authorship. Case study.
Reference
Text BookBooks:
3: Chapters:5,9,10
DAVID V. THIEL” RESEARCH METHODS FOR ENGINEERS” CAMBRIDGE
1.
UNIVERSITY PRESS.
“Bordens, K. S. and Abbott, B. B., Research Design and Methods” – A Process
2.
Approach, 8th Edition, McGraw-Hill, 2011.
Web links and Video Lectures (e-Resources):
https://doi.org/10.1007/978-981-13-2947-0 25
Activity-Based Learning (Suggested Activities in Class)/ Practical Based learning
The students with the help of the course teacher can take up relevant technical –activities like
Research or presentation or demonstration of workflow/ implementation of an algorithm which will
enhance their skills. The prepared report/research paper shall be evaluated for CIE marks.
Course outcomes:
CO1 Understand some basic concepts of research and its methodologies.
Know the procedure for literature review define and apply appropriate parameters and
CO2
research problems.
CO3 Develop skills to draft a research paper.
Analyse and comprehend the ethical practices in conducting research and dissemination of
CO4
results in different forms.
CO-PO Mapping
CO/ PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO1 PO1 PSO PSO
PO1
PO 0 1 2 1 2
CO 1 1 1 1 2
1
CO 2 2 2 2 2
2
CO 3 3 3 3 3 1 2
3
CO 4 4 4 4 4 1
4
CO 5 5 5 5 5 1 2
5
High-3, Medium-2, Low-1
MASTERING MACHINE
Course Title Semester II
LEARNING
Course Code PCS551 CIE 50
Total No. of Contact Hours 40 SEE 50
No. of Contact Hours/week 4 Total 100
Credits 4 Exam. Duration 3 Hours
Teaching Dept Computer Science and Engineering
27
Course
Suggestedobjective is to:Resources:
Learning
To be able to formulate machine learning problems corresponding to different applications.
Textbooks:
To understand a range of machine learning algorithms along with their strengths and weaknesses.
To apply the algorithms
Machine to a real-world
Learning: Theory andproblem,
Practiceoptimize
by M Nthe models
Murty andlearned and report on
Ananthanarayana the
V S,
1.
expected accuracy
ISBN: 9789393
that can330697
be achieved
| Year:
by 2024.
applying the models.
2.
Module-1 Deep Learning Foundations and Concepts Christopher RBTM Bishop
Level: L1,L2,L3 Hours: 8
Reference
Evolution Books:
of Machine Learning, Paradigms for ML: Supervised Learning, Unsupervised
ReinforcementStephen
Learning. Types of “Machine
Marsland, Data. Stages in Machine
Learning: Learning, AutoML
An Algorithmic (Automated
Perspective”, Machine
Chapman &
1.
Learning frameworks): Auto-sklearn toolkit.
Hall/CRC, 2nd Edition, 2014.
Text Book 1: Chapter
2. 1
Kevin Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012
Self-Learning: Meta-Learning: Introduction and applications in image classification.
Web links and Video Lectures (e-Resources):
Module-2 RBT Level: L1,L2,L3 Hours: 8
1. https://pages.cs.wisc.edu/~shuchi/courses/787-F07/about.html
Introduction to Clustering: Partitioning of Data, Data Re-organization, Data Compression |
Summarization, Matrix Factorization, Clustering of Patterns, Data Abstraction. Clustering
Activity-Based LearningClustering,
Algorithms: Divisive (SuggestedAgglomerative
Activities in Class)/ Practical
Clustering, Based learning
Partitional Clustering: (K-Means
Clustering, K-Means++ Clustering, Soft Partitioning, Soft Clustering, Hard Clustering, Expectation
The students with the Clustering,
Maximization-Based help of the course
Spectralteacher can take
Clustering), up relevant
DBSCAN, technicalLarge
Clustering –activities
Data like
Sets, Divide-
and-ConquerorMethod.
presentation demonstration of workflow/ implementation of an algorithm which will enhance their
Text Book 1: Chapter 7 shall be evaluated for CIE marks.
skills. The prepared report
Self-Learning:
Fuzzy C-Means
Need for machine learning. Clustering
Prediction and classification methods. Use cases in application
Module-3 RBT Level:L1,L2,L3 Hours: 8
domains. Interpretation of results. Limitations of various techniques.End to end Machine
Introduction to Decision Trees: Decision Trees for Classification, Impurity Measures for Decision
learning - data collection, data preparation, model selection.
Tree Construction, Properties of the Decision Tree Classifier (DTC), Applications in Breast Cancer
Data. Ensemble Methods: Random Forests for Classification, Gradient Boosting Machines (GBM)
and XGBoost. The Bayes Classifier: Introduction to the Bayes Classifier, Probability, Conditional
Probability and Bayes’ Rule, Bayes’ Rule and Inference, Naive Bayes Classifier (NBC)..
Text Book 1: Chapter 3, 4
Self-Learning: Markov Chain Monte Carlo (MCMC) methods.
Module-4 RBT Level: L1,L2,L3 Hours: 8
Neural Networks: The basic building blocks of deep learning, Training of Neural Networks.
Initializing Weights, Improved Optimization Methods, Adaptive Optimization, Loss Functions,
Regularization. Deep Neural Networks: Autoencoders, Variational Autoencoders (VAEs), and
attention mechanisms.
. Text Book 1: Chapter 9
Self-learning: Object Detection: YOLO, Faster R-CNN), Image Segmentation: U-Net for medical
imaging.
Module-5 RBT Level: L1,L2,L3 Hours: 8
Convolution Neural Network: Definition, Need, the basic building blocks of CNNs, Convolution,
Padding Zero Rows and Columns, Pooling to Reduce Dimensionality. CNN Architecture: ResNet,
DenseNet. Introduction to Recurrent Neural Networks: The basic building blocks of RNNs and
other architectural details, Training an RNN. Encoder–Decoder Models: Generative Adversarial
Networks, Applications.
Text Book 1: Chapter 9, Text Book 2: Chapter 10
Self-Learning: RNN Variants (Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU)
models)
28
Course outcomes:
To understand the concepts and mathematical foundations of machine learning and types of
CO1 problems tackled by machine learning
CO2 To explore the different supervised learning techniques including ensemble methods
CO-PO Mapping
CO/ PO PO2 PO3 PO4 PO5 PO6 PO7 PO PO9 PO1 PO1 PO1 PSO PSO2
PO 1 8 0 1 2 1
3 2 2 2 2 1 1 1 1
CO1
CO2 2 2 2 2 2 1 1 1
CO3 3 3 2 2 2 1 1 1
CO4 3 3 2 2 2 2 1 1
CO5 3 3 2 2 2 2 1 1 1 1
29
Course Title CLOUD COMPUTING Semester II
Course
CO-PO outcomes:
Mapping
CO1 PO1
CO/PO Compare
PO2 the
PO3strengths
PO4 and
PO5limitations
PO6 of
PO7cloudPO8
computing
PO9 PO10 PO11 PO12 PSO1 PSO
2
CO2 Identify the architecture, infrastructure and delivery models of cloud computing
1 2 1
CO1
Demonstrate the working of VM and VMM on any cloud platforms(public/private), and run a
CO3
CO2 software
1 service on that 1 1
Identify the known threats, risks, vulnerabilities and privacy issues associated with Cloud
CO4
CO3 2 based IT services. 2 2
CO5 Compare the strengths and limitations of cloud computing
CO4 1
33
Course objective is to:
Understand the Fundamentals of Vision Systems:
Learn Digital Image Processing Techniques:
Apply various image enhancement techniques in spatial and frequency domains, and
understand the principles and methods of image compression.
Perform Advanced Image Segmentation and Morphological Operations
Explore Neural Networks and Deep Learning for Image Processing
Module-1 RBT Level: L1,L2,L3 Hours:8
Computer Vision: Introduction to vision, human vision,computer, image processing, Case study on
Scene understanding and object recognition. Image Formation Models: Imaging systems,
Orthographic & Perspective Projection, Camera calibration and basics of image processing.
Text Book 1: Ch 1,2,3
Module-2 RBT Level: L1,L2,L3 Hours:8
Steps in digital image processing-Elements of visual perception- brightness adaptation, Mach band
effect. Interesting Problems in image processing, Some Basic Relationships between pixels, point,
line and edge detection. Point Detection, Edge detection, Sampling, Quantization,Histograms.
Image enhancement in spatial and frequency domain,smoothning and sharpening filters, Gaussian
filters, Homomorphic filtering, Histogram equalization.
Text Book 2: Ch: 1-3.4, 6, 6.1-6.9, 7, 7.8,7.9.
Module-3 RBT Level:L1,L2,L3 Hours:8
Fundamental of color image processing: color models, RGB, CMY, YIQ, HIS. Pseudo Color Image
processing.Case study on colour adjustment of image.
Image Compression: concept of redundancy,huffman encoding,run length coding, block transform,
An insight to process video frames, check quality of fusion image before and after compression.
Text Book 2: Ch: 8.1-8.9
Module-4 RBT Level: L1,L2,L3 Hours:8
Erosion, dilation, open and closing , boundary extraction, hole filling,Thinning, Region growing,
region shrinking. Breif overview on background substraction through examples. Fuzzy clustering,
Watershed algorithm, Thresholding – global, using Otsu’s method ,Segmentation basics,
Segmentation using region-growing and region-merging ,Segmentation using morphological
operations. Case study on semantic segmentation.
Text Book 2: Ch: 9, 10, 9.1-9.6, 10.1-10.5
Module-5 RBT Level:L1,L2,L3 Hours:8
Edge detection through fourier series, Hough transform, shape skeletonization, Boundary descriptors
and algorithms, Moments, Texture descriptors, Neural Networks and Deep Learning, Deep
convolution Neural Network. Future aspects of image processing. Neural Net applications on image
classification.
Text Book 2: Ch: 3.5-3.6, 4, 7, 4.7-4.10, 7.8,7.9,11.5
Course outcomes:
CO1 Be familiar with the theoretical aspects of images, introduction to computer vision
To Gain practical aspects of computing with images ,exposure to object and scene
CO2 recognition and categorization.
CO3 Identify and describe operation of different smoothing and sharpening filters.
CO5 Outline the various feature extraction techniques for image analysis.
CO-PO Mapping
CO/ PO PO PO PO PO PO PO PO PO PO1 PO1 PO1 PSO PSO2
PO 1 2 3 4 5 6 7 8 9 0 1 2 1
3 2 1 2 1 1 3 1 1
CO1
CO2 2 2 1 1 1 1 2 1
CO3 2 2 2 3 1 2 3 1
CO4 2 2 2 3 1 2 3
CO5 2 2 2 2 1 1 2 2 1
Natural Language
Course Title Semester II
Processing
1. Daniel Jurafsky, James H. and Martin, Speech and Language Processing, Second
Edition, Prentice Hall, 2008.
2. Christopher D.Manning and HinrichSchutze, Foundations of Statistical Natural
Language Processing, MIT Press, 1999.
Reference Books:
1. Siddiqui and Tiwary U.S., Natural Language Processing and Information Retrieval,
Oxford University Press, 2008.
37
2. Daniel M Bikel and ImedZitouni ― Multilingual natural language processing
applications:
3. Alexander Clark, Chris Fox, Shalom Lappin ― The Handbook of Computational
Linguistics and Natural Language Processing, John Wiley and Sons, 2012.
4. Nitin Indurkhya and Fred J. Damerau, ―Handbook of Natural Language Processing,
Second Edition, Chapman and Hall/CRC Press, 2010.
Web links and Video Lectures (e-Resources):
http://www.cse.iitb.ac.in/~cs626-449
http://cse24-iiith.virtual-labs.ac.in/#
https://nptel.ac.in/courses/106105158
Activity-Based Learning (Suggested Activities in Class)/ Practical Based learning
The students with the help of the course teacher can take up relevant technical –activities like
Research or presentation or demonstration of workflow/ implementation of an algorithm which will
enhance their skills. The prepared report/research paper shall be evaluated for CIE marks.
Course outcomes:
CO1 To describe the field of natural language processing.
CO2 To design language model for word level analysis for text processing.
CO4 To design, implement and test algorithms for semantic and pragmatic analysis.
CO-PO Mapping
PO PO2 PO3 PO4 PO PO6 PO7 PO8 PO9 PO10 PO1 PO12 PSO1 PSO2
CO/PO
1 5 1
CO1 3 2 1 3 2
CO2 3 3 2 2 1 3 2
CO3 3 3 3 2 1 3 2
CO4 3 3 3 3 2 1 3 2
CO5 3 3 3 3 2 2 3 3
NETWORK GROWTH MODELS: Properties of real-world networks, Random network model, Ring
Lattice Network Model, Watts Strogatz model. Preferential Attachment model, Price’s model.
LINK ANALYSIS: Applications, Signed networks, Strong and weak Ties, Link analysis and
algorithms, Page Rank, Personalized Page Rank, Divrank, Simrank.
Module-3 RBT Level: L1,L2,L3 Hours: 8
COMMUNITY STRUCTURE IN NETWORKS: Applications, Types of communities, Community
detection methods, Disjoint community detection, overlapping community detection, local community
detection, community detection vs community search, evaluation.
LINK PREDICTION: Applications, temporal changes in a network, Problem definition, evaluating
link prediction networks, Heuristic Models, probabilistic Models, Supervised Random Walk,
Information- theoretic model.
Module-4 RBT Level: L1,L2 Hours: 8
CASCADE BEHAVIOR AND NETWORK EFFECTS: Preliminaries, Cascade model, case study,
probabilistic cascades, epidemic models, independent cascade models, Cascade prediction.
ANOMALY DETECTION IN STATIC NETWORKS: Outliers vs Network-based anomalies,
challenges, Anomaly detection in static and dynamic networks.
Module-5 RBT Level: L1,L2,L3 Hours: 8
GRAPH REPRESENTATION LEARNING: Machine learning pipelines, Intuition behind
representation learning, benefits, criteria of GRL, GRL pipelines, representation learning methods.
APPLICATION AND CASE STUDIES: Malicious activities on OSNs, Sock puppets in
OSNs, Modeling the spread of COVID 19, Recommendation System.
Course outcomes:
CO1 Understand the concept of social network and related applications.
CO-PO Mapping
CO/ PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO PSO
PO1
PO 1 2
1 1 2 1 2
CO1
CO2 2 2 2 1
CO3 3 3 3 3 1
CO4 4 4 4 4 4 1 2
CO5 5 5 5 1 2
Course outcomes:
CO1 Explain the need for DevOps and list down the primary benefits of DevOps from
perspective of business and IT teams
CO2 List the ways in which DevOps uses new tools/technologies to deliver quality software more
rapidly.
CO3 Illustrate the practices of version control and configuration management.
CO4 Summarize the essentials of continuous integration (CI) and outline the principles and
practices of continuous delivery (CD)
CO5 Implement an automated deployment pipeline and create a DevOps toolchain
CO-PO Mapping
PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PS
CO/PO PO1
O2
CO1 1 2 3 3 3 3
CO2 2 3 3 3 3 3
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
CO5 3 3 3 3 3 3
45
Introduction, Sources of Threats: Threat Actors and their Motivations, What is a Cyberattack? Tools
and Methods Used in Cyberattacks/Cybercrimes, Responding to Cyberattacks and the Cyber Kill
Chain, Cyberattacks: Organizational Implications, Cyberattacks Impacting Citizens and Communities,
What is a Cybercrime? Classification of Cybercrimes, Forms of Cybercrimes, Cyber Scams and
Frauds, Prevention of Cybercrime, National Cybersecurity Policy, Online Code of Conduct and
Computer Ethics.
Text Book 1: Chapter 2
Module-3 RBT Level: L1,L2,L3 Hours: 8
Overview of Cybersecurity Management, Information Classification Process, Security Policies,
Security Procedures and Guidelines, Information Security Governance and Risk Management, Cyber
Risk Management, Cybersecurity Frameworks, Cyber Resilience, Industry-specific Cybersecurity
Frameworks, The Human Factor in Cybersecurity, Algorithms and Techniques for Cybersecurity.
Text Book 1: Chapter 4, 6
Module-4 RBT Level: L1,L2,L3 Hours: 8
Introduction, What is Personal Cybersecurity? Common Causes of Personal Security Breaches,
Personal Cybersecurity Best Practices, Privacy Regulations and Cybersecurity, The Role of Ethics in
Cybersecurity, Future Challenges in Cybersecurity, Artificial Intelligence for Cybersecurity, Quantum
Computing and Cybersecurity, Other Evolving Aspects of Cybersecurity.
Text Book 1: Chapter 8
Module-5 RBT Level: L1,L2,L3 Hours: 8
Case Study 1: Financial Fraud in Cyber Domain
Financial fraud in the banking and credit card sectors is a critical and growing concern, characterized
by increasingly sophisticated methods such as phishing, social engineering, card skimming, data
breaches, account takeovers, and identity theft. These fraudulent activities result in substantial
financial losses, damage to institutional reputation, and significant inconvenience to customers. By
examining case studies of financial fraud incidents within these sectors, organizations can better
understand the tactics employed by fraudsters and develop more effective strategies to mitigate these
risks. This analysis can provide valuable insights into enhancing security measures, improving
detection capabilities, and fostering a culture of vigilance and proactive defense against financial
fraud.
Case Study 2: Digital Signature
Fraud involving digital signatures poses a significant risk to the integrity and security of digital
transactions and documents. By studying case studies of such fraud incidents, organizations can better
understand the tactics used by fraudsters and develop more effective strategies to safeguard their
digital signature infrastructure. This analysis can provide crucial insights into enhancing key
management, securing Certificate Authorities, protecting communication channels, and mitigating
insider threats, ultimately strengthening the overall security posture against digital signature fraud.
Text Book 4: Chapter 11
The students with the help of the course teacher can take up relevant technical –activities like
presentation or demonstration of workflow/ implementation of an algorithm which will enhance their
skills. The prepared report shall be evaluated for CIE marks.
Course outcomes:
CO1 Understand the core concepts of Information and Network Security.
CO-PO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 1 1 3 1 1
CO2 3 3 2 3 2 1 1
CO3 3 3 3 3 3 1 1
CO4 3 2 3 2 3 1 1
47
. Each test shall be conducted for 25 marks. The first test will be administered after 40-50% of the
coverage of the syllabus, and the second test will be administered after 85- 90% of the coverage of the
syllabus. The average of the best of two tests shall be scaled down to 25 marks.
Two assignments must be planned properly by the course teacher in advance. If an assignment is
project-based then only one assignment for the course shall be planned.The teacher should not conduct
two assignments at the end of the semester if two assignments are planned. Each assignment shall be
conducted for 25 marks. (If two assignments are conducted then the sum of the two assignments shall
be scaled down to 25 marks).
The final CIE marks of the course out of 50 will be the sum of the scale-down marks of tests and
assignment/s marks.
The students with the help of the course teacher can take up relevant technical –activities which will
enhance their skill.
CO-PO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
2 2 2
CO1
CO2 2 2 2
CO3 1 2
CO4 3 2 1
CO5 2 1 1 1
49
High-3, Medium-2, Low-1
Question Paper Pattern:
19. CIE Assessment Pattern:
The weightage of Continuous Internal Evaluation (CIE) is 50%. The minimum passing mark for the
CIE is 40% of the maximum marks (20 marks out of 50).
50
Course Title Mini Project with Seminar Semester II
Course Code PCS553 CIE 50
Total No. of Contact Hours 20 SEE --
No. of Contact Hours/week 3 Total 50
Exam.
Credits 2 --
Duration
Teaching Dept Computer Science and Engineering
Mini-Project with seminar: Students will engage in hands-on practice, surveys, data analysis,
coding, app development, field visits, system modeling, simulation, and case studies. Students shall
involve in carrying out the project work jointly in constant consultation with internal guide, and
prepare the project report as per the norms avoiding plagiarism.
Activity 1: Exploration into Emerging Technologies /Research RBT Levels: L1, 3 Hours
Domains & selection of Topic L2
Activity 2: Define the Project Objective RBT Levels: L1, 3 Hours
L2
Activity 3: Literature Review and a Project Plan RBT Levels: L1, 3 Hours
L2,L3
Activity 4: Implement the Project RBT Levels: 6 Hours
L4,L5
Activity 5: Report RBT Levels: L1, 3 Hours
L2,L3,L4,L5
Course outcomes:
CO1 Present the mini-project and be able to defend it.
Make links across different areas of knowledge and to generate, develop and evaluate ideas
CO2 and information so as to apply these skills to the project task.
51
CIE procedure for Mini - Project:
The Continuous Internal Evaluation (CIE) marks awarded for Mini - Project, shall be based on the
evaluation of Mini - Project Work & Report, Project Presentation skill and Question and Answer
session in the ratio 50:25:25. CIE will be awarded by a committee comprising the HoD, the project
guide/co-guide, and a senior faculty member.
Mandatory Participation: Participation in the seminar, where students present their Mini Project, is
mandatory for all postgraduate students in the program. The Mini Project with Seminar is a required
course for progression and the award of the degree.
Completion Requirements: Students who do not complete the Mini Project and Seminar will be
declared as failing the course and must complete it in the subsequent semester, with no Semester End
Examination (SEE) for this course.
52
Advanced Machine Learning Lab
PART-A
55
Suggested Learning Resources:
Textbooks/ Reference Books:
Course outcomes:
CO4 Design and apply various reinforcement algorithms to solve real time complex problems.
CO5 Understand the basic concepts of deep neural network model and design the same..
56
CO-PO Mapping
CO/ PO2 PO3 PO4 PO PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
PO1
PO 5
CO1 3 2 1 1 3 - - - - - 1 1 3 3
CO2 2 1 1 1 2 - - - - - 1 1 3 -
CO3 2 1 1 1 2 - - - - - - 1 3 1
CO4 2 1 1 1 2 - - - - - - 1 3 -
CO5 2 1 1 1 2 - - - - - - 1 1 1
57
Syllabus of MTech in Computer Science
and Engineering
SECOND YEAR SYLLABUS
III Semester
Sl.No Subject Code Subject Name
13 PCS605 Internship
58
Advances in DataBase
Course Title Semester III
Management
Course Code PCS601 CIE 50
Total No. of Contact Hours 50 SEE 50
No. of Contact Hours/week 3 Total 100
Credits 4 Exam. Duration 3 Hours
Teaching Dept Computer Science and Engineering
Course objective is to:
Understand Database Concepts and Architecture:
Master Query Processing and Optimization
Explore Analytical Databases and Vertica Integration
Learn Graph Databases and Neo4j
Understand and Utilize Vector Databases
Module-1 RBT Level: L1,L2,L3 Hours: 10
Review of database terminology. Database system concepts and architecture- Data Models , Schemas
and instances Conceptual Data modelling. Conceptual data model design. Relational Data model and
Relational Data model constraint.
Text book 1:. 1,2,3,5
Module-2 RBT Level: L1,L2,L3 Hours: 10
Strategies for Query Processing,Translating SQL Queries into Relational Algebra, and Other
Operators, Algorithms for External Sorting , Algorithms for SELECT Operation, Implementing the
JOIN Operation, Algorithms for PROJECT and Set Operations , Implementing Aggregate Operations
and Different Types of JOINs, Combining Operations Using Pipelining , Parallel Algorithms for
Query Processing. Query Trees and Heuristics for Query Optimization, Choice of Query Execution
Plans. Use of Selectivities in Cost-Based Optimization. Cost Functions for SELECT Operation , Cost
Functions for the JOIN.
Text Book 1: Chapter 18,19.
Module-3 RBT Level: L1,L2,L3 Hours: 10
Why to use Analytical database, Key Characteristics of an Analytics Database? OLAP vs OLTP.
Examples of analytical databases. Integrate Vertica with your environment, Transform and analyze
data with the power of Vertica, Add scripts, SQL functions, and external libraries that automate tasks
and extend Vertica functionality.
Text Book 1:
Module-4 RBT Level: L1,L2,L3 Hours:10
Graph Databases Theoretical Module Introduction, Graph Theory usage in Graph Databases, Graph
database comparison with Relational database. Graph database use cases. Neo4j Data Modelling,
Symbolic Representation of Graph, Neo4j query Cypher Language, Datatype in Neo4j, Neo4j create
node command, delete node command, Neo4j create constraint, Basic Queries , Neo4j clauses ,
Example query in Neo4J.
TextBook 1: Chapter 24
Module-5 RBT Level: L1,L2,L3 Hours: 10
Fundamentals of Vector Database, How vector database store data? How do vector database
works? . SQLite Database ,Storing and Retrieving Vector Data in SQLite, Vectors and Embeddings,
Create Embeddings using OpenAI, Vector Similarity Search, Chroma DB-Local Vector Data.
Introduction to ChromaDB, Methods on Collection, storing “The Matrix Collection” , adding
document associated embeddings, Query with ‘Where’ filter.
59
Suggested Learning Resources:
Textbooks:
Course outcomes:
CO1 Understand and analyze the RDBMS and its internal organization .
CO2 Implement optimized the query by using the algorithm.
CO-PO Mapping
CO/ PO PO PO PO PO PO PO PO PO PO1 PO1 PO1 PSO PSO
PO 1 2 3 4 5 6 7 8 9 0 1 2 1 2
CO1 3 2 1 1 2 1 1 1
CO2 3 3 2 2 3 1 1
CO3 2 2 2 2 3 1 1
CO4 3 2 3 2 3 1 1
CO5 2 2 2 2 3 1 1
61
Course Title Blockchain Technology Semester III
Course Code PCS671 CIE 50
Total No. of Contact Hours 40 SEE 50
No. of Contact Hours/week 3 Total 100
Credits 3 Exam. Duration 3 Hours
Teaching Dept Computer Science and Engineering
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven
1. Goldfeder, Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction,
First Edition, Princeton University, 2016
Imran Bashir, Mastering Blockchain: Distributed ledgers, Decentralization and Smart
2.
Contracts explained. 2nd Edition, March62 2018.
Reference Books:
Arshdeep Bahga and Vijay K MAdisetti, Blockchain Applications: A Hands-on
1.
Approach, VPT, ISBN: 9780996025560, 2017.
Andreas M. Antonopou. Mastering Bitcoin: Unlocking Digital Cryptocurrencies,
2.
O’Reilly Media, First Edition, 2014
Web links and Video Lectures (e-Resources):
http://www.digimat.in/nptel/courses/video/106105184/L03.html
https://www.digimat.in/nptel/courses/video/106104220/L01.html
The students with the help of the course teacher can take up relevant technical –activities like
presentation or demonstration of workflow/ implementation of an algorithm which will enhance their
skills. The prepared report shall be evaluated for CIE marks.
Course outcomes:
CO1 Understand how Blockchain systems works
CO2 Analyzing the Blockchain decentralization and cryptography concepts
CO-PO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
3 1 0 1 0 1 0 0 1 2 1 2
CO1
CO2 3 3 2 2 2 0 0 1 1 1 1 2
CO3 3 2 2 1 2 1 0 1 2 0 1 2
CO4 3 2 1 0 2 1 1 0 2 0 1 2
CO5 3 2 2 0 1 3 2 0 2 2 1 3
64
Course Title Big Data Analytics Semester III
DT Editorial Services, “Big Data, Black Book: Covers Hadoop 2, MapReduce, Hive,
1.
YARN, Pig, R and Data Visualization”
David Dietrich, Barry Hiller, “Data Science and Big Data Analytics”, EMC education
2.
services, Wiley publications, 2012, ISBN0-07-120413-X
Mohammed Guller, “Big Data Analytics with Spark: A Practitioner's Guide to Using
3.
Spark for Large Scale Data Analysis”, ISBN-13:978-1484209653
David Loshin, “Big Data Analytics From Strategic Planning to Enterprise Integration
4.
with Tools, Techniques, NoSQL, and Graph”, Morgan Kaufmann
Reference Books:
1. Venkat Ankam, “Big Data Analytics”, Packt Publishing
Jenny Kim, Benjamin Bengfort, “Data Analytics with Hadoop”, O'Reilly Media, Inc.,
2.
ISBN: 9781491913734
Glenn J. Myatt, “Making Sense of Data: A Practical Guide to Exploratory Data
3.
Analysis and Data Mining”
Ebook Hector Cuesta and Dr Sampath Kumar, “Practical Data Analysis”, 2nd Edition
Web links and Video Lectures (e-Resources):
https://nptel.ac.in/courses/111/104/111104120/
https://nptel.ac.in/courses/110/106/110106064/
https://nptel.ac.in/courses/106/104/106104189/
https://hadoop.apache.org/
http://spark.apache.org/
Activity-Based Learning (Suggested Activities in Class)/ Practical Based learning
The students with the help of the course teacher can take up relevant technical –activities like
presentation or demonstration of workflow/ implementation of an algorithm which will enhance their
skills. The prepared report shall be evaluated for CIE marks.
Course outcomes:
CO1 To understand the big data concepts and big data analytics lifecycle
CO3 To understand the importance of big data visualization tools and techniques
CO4 To get acquainted with advancements in tools and techniques used for big data analytics
67
Object Oriented Software
Course Title Semester III
Engineering
Reference Books:
Object-Oriented Software Engineering, Bernd Bruegge, Alan H Dutoit, Pearson
1.
Education, 3 rd edition,2014.
Object oriented software engineering, David C. Kung, Tata McGraw Hill 2015. “The
2.
Design and Analysis of Computer Algorithms” by Aho, Hopcroft, Ullman.
3. Object oriented software engineering, Stephan R. Schach, Tata McGraw Hill 2008.
Applying UML and Patterns, Craig Larman, Pearson Education 3rd ed, 2005.
4.
Web links and Video Lectures (e-Resources):
1. https://medium.com/javarevisited/my-favorite-courses-to-learn-object-oriented-programming-anddesign-in-
2019-197bab351733
2. https://www.youtube.com/watch?v=BqVqjJq7_vI
The students with the help of the course teacher can take up relevant technical –activities like presentation or
demonstration of workflow/ implementation of an algorithm which will enhance their skills. The prepared report shall be
evaluated for CIE marks.
Course outcomes:
CO1 Study Object Oriented Software Engineering approach in every aspect of software project
CO2 Understand software domain requirements and Analyze based on constraints.
CO3 Adapt appropriate object oriented design aspects in the development process
CO5 Gain knowledge on Project Management approaches and the use of DevOps.
CO3 2 3 - - - - - 1
CO4 2 2 - - - - - 1
CO5 3 1 1 1 1
70
Innovative Strategies Of
Course Title Semester III
Teaching And Learning
1. "Teaching and Learning STEM: A Practical Guide" by Richard M. Felder and Rebecca Brent
Reference Books:
1. "Engineering Education: Research and Development in Curriculum and Instruction" by John Heywood.
Web links and Video Lectures (e-Resources):
https://onlinecourses.swayam2.ac.in/cec22_ed10/preview
https://onlinecourses.nptel.ac.in/noc20_ge21/preview
https://iucee.org/engineering-educator-certification-iieecp/
The students with the help of the course teacher can take up relevant technical –activities like
presentation, Role-Playing Scenarios and Collaborative Learning Projects which will enhance their
skills. The prepared report shall be evaluated for CIE marks.
Course outcomes:
CO1 Analyze and critique theoretical frameworks of innovation in education.
CO5 Evaluate the effectiveness of innovative teaching methods through various assessment tools.
CO-PO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
3 3 3 3 3 2 2 2 2
CO1
CO2 3 3 3 3 3 1 1 1
CO3 3 3 2 2 2 1 1 1
CO4 2 2 2 2 2 1 1
CO5 2 2 2 2 1 2 1 1
73
Open Source Software
Course Title Semester III
Engineering
OPEN SOURCE DEVELOPMENT MODELS: Cathedral and Bazaar Model, Open Source Project
Structure, Governance Models, Development Workflow, Open Source Contribution Process, Version
Control Systems (Git), Bug Tracking Systems, Communication Tools and Platforms, Documentation
in Open Source Projects.
Text Book 1: Ch 2, 3
Module-2 RBT Level: L1,L3,L4 Hours: 8
OPEN SOURCE LICENSES: Categories of Open Source Licenses, Popular Open Source Licenses
(GPL, MIT, Apache, BSD), License Compatibility and Conflicts, Intellectual Property Rights, Legal
Implications of Using Open Source Software, Compliance and Risk Management, Open Source
License Management Tools.
Text Book 1: Ch 4
Module-3 RBT Level: L2,L3,L4 Hours: 8
QUALITY ASSURANCE IN OPEN SOURCE SOFTWARE: Importance of Quality Assurance,
Testing in Open Source Projects, Types of Testing (Unit, Integration, System, Acceptance), Test
Automation Tools (Selenium, JUnit), Continuous Integration and Continuous Deployment (CI/CD) in
Open Source, Code Review Practices, Static Analysis Tools, Metrics and Measurement in Open
Source Projects, Advanced Git Techniques (Branching Strategies, Merging, Rebasing, Git
Workflows).
Text Book 2: Ch 5,6
Module-4 RBT Level: L2,L3,L4 Hours: 8
SECURITY IN OPEN SOURCE SOFTWARE: Common Security Issues in Open Source Software,
Secure Coding Practices, Security Testing Tools, Vulnerability Management, Patch Management,
74 and Best Practices in Open Source Projects.
Encryption and Secure Communication, Security Policies
Text Book 1: Ch:5
Module-5 RBT Level: L2,L3,L5 Hours: 8
MANAGING OPEN SOURCE SOFTWARE PROJECTS: Project Planning and Scheduling,
Resource Management, Community Management and Engagement, Collaboration and Coordination,
Conflict Resolution, Financial and Funding Models, Sustainability of Open Source Projects, Case
Studies of Successful Open Source Projects, Git in Project Management (Repository Management,
Collaborative Development, Pull Requests, Issue Tracking with Git).
Text Book 1: Ch:7,8
The students with the help of the course teacher can take up relevant technical –activities which will
enhance their skill.
Course outcomes:
CO1 Describe the development models and tools used in open source software engineering
CO2 Understand and apply the various open source licenses and their compliance requirements
Explain and implement quality assurance practices and tools used in open source software
CO3 projects
CO4 Identify and implement security measures in open source software (L2 - Understand,
Demonstrate the management of open source software projects, including the use of Git for
CO5 project management
CO-PO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 1 1 3 1 1 1
CO2 3 2 2 3 2 1 1 1
CO3 3 3 3 3 3 1 1 1
CO4 3 3 3 2 3 1 1 1
CO5 3 3 3 2 3 1 1 1
75
Assessment Details (both CIE and SEE)
The weightage of Continuous Internal Evaluation (CIE) is 50% and for Semester End Exam (SEE) is 50%.
The minimum passing mark for the CIE is 50% of the maximum marks. Minimum passing marks in SEE is
40% of the maximum marks of SEE. A student shall be deemed to have satisfied the academic requirements
and earned the credits allotted to each subject/ course if the student secures not less than 50% (50 marks out
of 100) in the sum total of the CIE (Continuous Internal Evaluation) and SEE (Semester End Examination)
taken together.
CIE-Continuous Internal Evaluation:
Three Unit Tests each of 20 Marks
Two assignments each of 20 Marks or one Skill Development Activity of 40 marks to attain the COs and
POs The sum of three tests, two assignments/skill Development Activities, will be scaled down to 50 marks
CIE methods /question paper is designed to attain the different levels of Bloom’s taxonomy as per the
outcome
defined for the course.
76
Course Title User Experience Design Semester III
77
Interactive Session: Redesign a webpage with a focus on visual design, develop and high-fidelity
prototypes using Figma or Adobe XD
Module-5 RBT Level: L1,L2,L3 Hours: 8
Usability Testing, Evaluation and Advanced UX Topics: Usability Testing: Importance of Usability
Testing, Planning and Conducting Usability Tests, Metrics and KPIs for UX,
Analyzing and Reporting Usability Test Results
Advanced UX Topics: UX for Emerging Technologies (AR/VR, AI), Inclusive Design and
Accessibility.
Interactive Session: Conduct usability testing sessions, analyze usability test results and present
findings, Design a UX solution for an emerging technology.
Course outcomes:
CO1 Understand the definition and principles of UX Design in order to design with intention
Achieve a deep understanding of the entire life cycle of design—the process, purpose, and
CO2 tools
CO3 Discover the industry-standard tools and specific project deliverables in UX.
CO4 Explain why you made design decisions, through presentations of assignments
CO-PO Mapping
PO PO2 PO3 PO4 PO PO6 PO7 PO8 PO9 PO10 PO1 PO12 PSO1 PSO2
CO/PO
1 5 1
2 2 2
CO1
CO2 3 2
78
CO3 2 3
CO4 3 2
79
Software Engineering in
Course Title Semester III
Practice
Activities:
UML Modeling
Activities:
Install CUnit.
5. Write unit tests for basic arithmetic functions (add, Hours :2 COs: 5
subtract, multiply, divide).
Execute tests and generate a report.
Interpret test results and improve code quality.
Activities:
The students with the help of the course teacher can also take up relevant technical –activities which
will enhance their skill. The prepared report shall be evaluated for CIE marks. The skills can be
project presention/paper publication for the respective project done.
Course outcomes:
CO1 Understand Software Development Lifecycle
84