24 Msccs
24 Msccs
NAAC A++Grade - State University - NIRF Rank 59, NIRF Innovation Band of 11 to 50
Salem – 636 011
TANSCHE Based
OBE REGULATIONS AND SYLLABUS
(Effective from the academic year 2023-2024 and thereafter)
CONTENTS
i. PO and PSO Description
ii. PG – Template
iii. Methods of Evaluation & Methods of Assessment
iv. Semester Index.
v. Subjects – Core, Elective, Non major, Skill Enhanced, Ability Enhanced, Extension
Activity, Environment, Professional Competency
1) Course Lesson Box
2) Course Objectives
3) Units
4) Learning Outcome
5) Reference and Text Books
6) Web Sources
7) PO & PSO Mapping tables
2
PO 9 Multicultural competence
Possess knowledge of the values and beliefs of multiple cultures and
a global perspective.
PO 10: Moral and ethical awareness/reasoning
Ability to embrace moral/ethical values in conducting one’s life.
Programme PSO1 – Placement
Specific Outcomes To prepare the students who will demonstrate respectful engagement
(PSOs) with others’ ideas, behaviors, beliefs and apply diverse frames of
reference to decisions and actions.
PSO 2 - Entrepreneur
To create effective entrepreneurs by enhancing their critical thinking,
problem solving, decision making and leadership skill that will
facilitate startups and high potential organizations.
PSO3 – Research and Development
Design and implement HR systems and practices grounded in
researches that comply with employment laws, leading the
organization towards growth and development.
PSO4 – Contribution to Business World
To produce employable, ethical and innovative professionals to
sustain in the dynamic business world.
PSO 5 – Contribution to the Society
To contribute to the development of the society by collaborating with
stakeholders for mutual benefit.
3
Master of Computer Science
(2023-24)
Semester – I
Semester - II
4
Elective – II Lab Lab
Generic Elective - II Elective-IV Fundamentals of Human 1 1
23UPPGC1H01 Rights
Total 26 30
Semester - III
Semester IV
5
Type of Courses Component No. of Credits Total
Courses Credits
Theory courses 10 04 40
Lab courses 07 02 14
Core Professional Competency Skill - 01 02 02
Mini project
Major Project 01 13 13
Internship/Industrial activity 01 02 02
Discipline Centric -Theory courses 03 03 09
Discipline Centric - Lab courses 03 01 03
Elective Generic Centric courses 01 01 01
(Soft Skill Development Lab)
Generic Centric courses 01 01 01
(Fundamental of Human Rights)
Credit Seminar 01 02 02
NME-I Skill enhancement courses / Online 01 02 02
courses (SWAYAM / Naan
Mudhalvan)/NME-I
NME-II NME-II (Supportive course) 01 02 02
Extension 01 01 01
Activity
Total Credits 92
6
PROGRAMME OUTCOMES (PO) - PROGRAMME SPECIFIC OUTCOMES (PSO)
MAPPING
A candidate who has passed B.Sc. Computer Science / B.C.A / B.Sc. Computer
Technology / B.Sc. Information Science / Technology / B.Sc. Computer Science with Artificial
Intelligence / B.Sc. Computer Science with Cyber Security / B.Voc AR & VR degree of this
University or any of the degree of any other University accepted by the syndicate as equivalent
thereto subject to such conditions as may be prescribed therefore shall be permitted to appear and
qualify for the M.Sc. Computer Science degree examination of this University after a course of study
of two academic years.
The programme shall be of two years duration spread over four semesters under choice based
credit system. The Maximum duration to complete the course shall be two academic years after
normal completion of the programme. The medium of instruction/study is English.
7
SCHEME OF EXAMINTAION FOR EACH SEMESTER - M. Sc. COMPUTER SCIENCE
SEMESTER- I
SEMESTER II
8
Discipline Elective Course -
Centric Theory 3 3 25 75 100 3
Elective – II
Discipline Elective Course-
Centric Lab 1 2 40 60 100 3
Elective – II lab
23UPCSC2P01 Mini Project 2 - 2 40 60 100 3
NME-I Non-Major
Elective – I 2 2 - - 100 3
(Online Courses)
Generic Elective - Fundamentals of
II Human Rights 1 1 25 75 100 3
23UPPGC1H01
23UPCSC2X01 Extension Activity 1 - - - - 100 3
Total 26 16 14 285 675 1100 -
SEMESTER III
Course Code Title of the Credits Maximum Total Exam
Course Hours Marks
T P CIA ESE Duration
23UPCSC2C07 Mobile
4 4 25 75 100 3
Computing
23UPCSC2C08 Cloud Computing 4 4 25 75 100 3
23UPCSC2C09 Soft Computing 4 4 25 75 100 3
23UPCSC2C10 Artificial
Intelligence and 4 4 25 75 100 3
Machine Learning
23UPCSC2L05 Mobile
Application 2 2 40 60 100 3
Development Lab
23UPCSC2L06 Cloud Computing
2 3 40 60 100 3
Lab
23UPCSC2L07 Web Application
Development and 2 2 40 60 100 3
Hosting
NME-II Non-Major
2 2 25 75 100 3
Elective II
Discipline Elective Course -
Centric Theory 3 3 25 75 100 3
Elective – III
Discipline Elective Course-
Centric Lab
1 2 40 60 100 3
Elective – III
Lab
23UPCSC2I01 Internship/
2 - 100 100 3
Industrial Activity
Total 30 21 9 410 690 1100 -
9
SEMESTER – IV
Course Code Title of the Course Credits Hours Maximum Total Exam
Marks Duration
T P CIA ESE
23UPCSC2P01 Project with viva voce 13 50 150 200 3
23UPCSC2I02 Credit Seminar
(Industry / 2 4 - 100 - 100 3
Entrepreneurship)
15 150 150 300 -
Total
Grand Total 92 56 34 1105 2055 3300 -
10
LIST OF ELECTIVE SUBJECTS
ELECTIVE – 01
ELECTIVE – 02
ELECTIVE – 03
NON-MAJOR ELECTIVE – II
23UPCSC1N01 - Advanced Microsoft Office Lab
11
CREDIT CALCULATION
K CO
Section Approaches Mark Pattern Level Coverage
A One word (Answer all questions) 20×1 = 20 (Multiple
K1-K2
Choice Questions)
B 100 to 200 words (Answer any three 3×5 = 15 CO1, CO2,
out of five questions) (Analytical type K3-K6 CO3, CO4,
questions) CO5
C 500 to 1000 words 5×8 = 40 (Essay
type questions) K1-K6
12
ATTAINMENT RUBRICS FOR LAB COURSES
Test 1 : 20 Marks
Test 2 : 20 Marks (Best one out of Two Tests)
Test 3 : 20 Marks
---------
Total : 40 Marks
---------
*** No Internal Minimum
(iii) Dissertation
o Internal Assessment - 50
o Report Evaluation by External Examiner - 50
o Joint Viva-Voce - 100
(Internal Examiner 50 and External Examiner 50)
13
REGULATIONS FOR DISSERTATION WORK
PASSING MINIMUM
The candidate shall be declared to have passed in the Theory/Practical/Dissertation Examination if the
candidate secures:
i. 50% marks in the ESE and
GRADING SYSTEM
Evaluation of performance of students is based on ten-point scale grading system as given below.
14
CORE COURSES
I – SEMESTER
CO2 Analyze a problem and identify the computing requirements appropriate for its
solution.
CO3 Create, implement, and evaluate a Dynamic Programming algorithm to meet K1-K6
desired needs.
CO4 Create, implement, and evaluate a Backtracking and Knapsack to meet desired needs.
CO5 Evaluate the algorithmic principles and efficiency of NP and NP-Complete problems
– Approximation algorithms for NP-hard problems – Travelling salesman problem –
Knapsack problem.
K1-Remember; K2-Understand; K3-Apply; K4-Analyze; K5-Evaluate; K6-Create
15
Unit:3 DYNAMIC PROGRAMMING 15 hours
Dynamic Programming - Computing a binomial coefficient – Warshall’s and Floyd’ Algorithm –
Application of Warshall’s Algorithm to the digraph – Floyd’s Algorithm for the all pairs shortest
paths Problem - The Knapsack problem and Memory function.
Text Books
1 Anany Levitin “Introduction to the Design and Analysis of Algorithms”
Pearson Education 2011. (Chapters 1.1-1.3, 2.1, 2.2, 2.3, 2.4, 4.5, 4.6, 8.2, 8.4, 9.1-9.3, 11.3,
12.1,12.2, 12.3)
Reference Books
1 Aho, Alfred V., et al. Data Structures and Algorithms. Addison-Wesley, 1983.
2 Horowitz, Ellis, et al. Computer Algorithms. Galgotia Publications, 1999.
3 Skiena, Steven S. The Algorithm Design Manual. Springer, 2012.
4 Levitin, Anany. Introduction to the Design & Analysis of Algorithms. Pearson, 2012.
5 Sedgewick, Robert. An Introduction to the Analysis of Algorithms. Addison Wesley, 2013.
16
Mapping with Programming Outcomes
Cos PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M S M S L M L S M
CO2 S S S S S M S M S M
CO3 S S S S S M S M S M
CO4 S S S S S M S M S M
CO5 S S S S S M S M S M
*S-Strong; M-Medium; L-Low
17
I – SEMESTER
18
Unit:4 INHERITANCE AND OVERLOADING 13 hours
Arrays – Pointers – Characters, C-Strings and More About the string Class – Structured Data –
Advanced File Operations.
Text Books
Booch, Grady et al. Object-Oriented Analysis and Design with Applications. Addison-Wesley
1 Longman, Third Edition, 2007.
UNIT I: (Chapters: 2,1.2.3,2.4,3.1,3.2)
UNIT II: (Chapters:3.3.3.4,3.5,4.1,4.2,4.3)
Tony Gaddis, Starting out with C++From Control Structures through Objects, 8th Edition,
2 Pearson Education, 2015.
UNIT III: (Chapters: 2, 3, 4, 5, and 6)
UNIT IV: (Chapters: 7, 9, 10.1 to 10.4, 11, and 12)
UNIT V: (Chapters: 13, 14, 15, 16.1, 16.2, and 16.4)
Reference Books
1 Kamthane Ashok. Object-Oriented Programming with ANSI and Turbo C++,
Pearson, Education Canada, 2009.
2 Balagurusamy, E. Object Oriented Programming with C. Tata McGraw-Hill, 2008.
19
I – SEMESTER
20
Adding Elements to the Chart – Line Charts – Bar Charts – Pie charts
Text Books
1LuBanovic, Bill. Introducing Python: Modern Computing in Simple Packages. O’Reilly Media,
Inc., 2020.
UNIT I: (Chapters: 2,3)
UNIT II: (Chapters:4)
UNIT III: (Chapters: 5,6)
2 Fabio Nelli, “Python Data Analytics: With Pandas, NumPy, and Matplotlib”, Second Edition, Kindle
Edition, 2018 (Unit - IV)
22
Text Books
1 Michael T. Goodrich, Data Structures and Algorithms in Java, 3RD ED. India, Wiley India Pvt.
Limited, 2008.
2 Skiena,”The Algorithm Design Manual”, Second Edition, Springer,2008
Reference Books
Anany Levith,”Introduction to the Design and Analysis of algorithm”, Pearson Education Asia,
1
2003.
Robert Sedgewick, Phillipe Flajolet,”An Introduction to the Analysis of Algorithms”,
2
Addison-Wesley Publishing Company,1996.
23
I – SEMESTER
Text Books
1 Lubanovic, Bill. Introducing Python: Modern Computing in Simple Packages. O’Reilly Media,
Inc., 2020.
2 Lutz, Mark. Learning Python. O’Reilly, 2013.
24
Reference Books
25
I – SEMESTER
Text Books
1 Uma Narula, “Development Communication: Theory and Practice”, Revised Edition, Har-
Aanad Publication, 2019.
2 Annette Capel and Wendy Sharp, “Cambridge English: Objective First”, Fourth Edition,
Cambridge University Press, 2013.
3 Emma Sue-Prince, “The Advantage: The 7 Soft Skills You Need to Stay One Step Ahead”,
First Edition, FT Press, 2013.
5 Norman Lewis, “How to Read Better & Faster”, Binny Publishing House, New Delhi, 1978.
Reference Books
1 Michael McCarthy and Felicity O‘Dell, “English Vocabulary in Use:100 Units of Vocabulary
Reference and Practice”, Cambridge UniversityPress,1996.
27
II – SEMESTER
Course code 23UPCSC2C04 DATA SCIENCE AND ANALYTICS L T P C
Core / Elective Core 4 4
1. Introduce the students to data science, big data and its eco system.
2. Learn data analytics and its life cycle.
3. To explore the programming language R, with respect to the data mining algorithms.
4. Relate the relationship between artificial intelligence, machine learning and data science.
5. Learn clustering and regression
28
Unit:4 CLUSTERING 15 hours
Overview of Clustering : K-means – Use Cases – Overview of the Method – Perform a K-means
Analysis using R –Classification – Decision Trees – Overview of a Decision Tree – Decision
Tree Algorithms – Evaluating a Decision Tree – Decision Tree in R – Bayes’ Theorem – Naïve
Bayes Classifier – Smoothing – Naïve Bayes in R.
Text Books
Davy Cielen, Arno D. Meysman, Mohamed Ali, Introducing Data Science : Big-Data,
1
Machine Learning, and more, using Python Tools, 2016, Manning Shelter Island, Manning
Publications Co.,
Unit 1- Chapter-1,2,3
2 David Dietrich, Barry Heller, Beibei Yang, Data Science & Big Data Analytics : Discovering,
Analyzing, Visualizing and Presenting Data – EMC Education Services, 2015 John Wiley &
Sons Inc., Indianapolis, Indiana
(https://aitskadapa.ac.in/e-
books/AI&DS/BIG%20DATA/Data%20Science%20_%20Big%20Data%20Analytics%20(%20P
DFDrive%20).pdf)
Unit-2-Chapter-2,10,11
Unit-3-Chapter 3-3.1 and 3.2
Unit-4:Chapter 4-4.2.1,4.2.2,Chapter 7-7.1,7.2
Unit-5: Chapter-5,6,10
Reference Books
1 A simple introduction to Data Science-Lars Nielson 2015
Introducing Data Science Davy Cielen, Arno D.B.Meysman, Mohamed Ali 2016 Manning
2
Publication
3 R Programming for Data Science-Roger D.Peng 2015Lean Publication
4 Data Science & Big Data Analytics: Discovering, Analyzing, Visualizing and Presenting Data
29
3 https://nptel.ac.in/courses/106/106/106106179/
30
II – SEMESTER
ADVANCED OPERATING L T P C
Course code 23UPCSC2C05
SYSTEMS
Core / Elective Core 4 4
31
Operating Systems for Handheld Systems: Requirements – Technology Overview – Handheld
Operating Systems – PalmOS - Symbian Operating System- Android –Architecture of android –
Securing handheld systems.
Text Books
Silberschatz, Abraham, Peter Baer Galvin, and Greg Gagne, “Operating system Concepts”. 7th
1
Edition (2004) and 9th Edition (2012), John Wiley & Sons.
Unit – I (Chapter 1,3,7,20)
Unit – II (Chapter 17)
Unit – III (Chapter 19,20 7th edition)
Unit – V (Chapter 18)
Singhal, Mukesh, and Niranjan G. Shivaratri, “Advanced concepts in operating systems”,
2
McGraw-Hill, Inc., 2011.
Unit – II (Chapter 5,7,9)
Smyth, Neil, "iPhone iOS 4 Development Essentials–Xcode”, Payload media (2014).
3
Unit V (Chapter – 3).
Reference Books
1 Mall, Rajib, “Real-time systems: theory and practice”, Pearson Education India, 2009.
Bhatt, Pramod Chandra P. An Introduction to Operating Systems: Concepts and Practice.
2
Prentice-Hall of India Pvt. Ltd, 2019.
3 Bovet, Daniel P and Marco Cesati, “Understanding the Linux Kernel: from I/O ports to
process management ",O'Reilly Media, Inc.", 2005.
32
Mapping with Programming Outcomes
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S M S S S S M M M M
CO2 S M S S S S S M S M
CO3 S M S S S S S M S M
CO4 S M S S S S S M S M
CO5 S M S S S S S M S M
*S-Strong; M-Medium; L-Low
33
II – SEMESTER
34
Actions - JSP’s Tag Extension Mechanism - JSTL and EL.
Text Books
1 Herbert Schildt, “Java the Complete Reference”, 9 Edition, McGraw Hill Publishing Company
th
publication 2012.
Unit- IV (Chapter 2, 4)
Reference Books
Keogh, James, “J2ME: The complete reference”, Osborne, 2003.
1
McFarland, David Sawyer, “Javascript & jQuery: the missing manual", O'Reilly Media, Inc.",
2
2011.
3 Deitel, Paul J, “Java how to program”, Pearson Education India, 2002.
4 Campione, Mary, Kathy Walrath, and Alison Huml, “The Java tutorial: a short course on the
basics”, Addison-Wesley Professional, 2001.
35
Mapping with Programming Outcomes
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S M S S S S S
CO2 S S S S M S S S S L
CO3 S S M S L S S M S M
CO4 M S M S S S S M S M
CO5 S M M L M L M M L M
*S-Strong; M-Medium; L-Low
36
II-SEMESTER
37
Text Books
Introducing-Data-Science-Big-Data-Machine-Learning-and-more-using-Python-tools-2016
1
A simple introduction to Data Science-Lars Nielson 2015
2
Reference Books
1 Introducing Data Science Davy Cielen, Arno D.B.Meysman, Mohamed Ali 2016 Manning
Publication
2 Data science in big data analytics-Wiley2015 John Wiley& Sons
38
II – SEMESTER
Course code ADVANCED JAVA L T P C
23UPCSC2L04
PROGRAMMING LAB
Core / Elective Core 4 2
39
Text Books
1 Herbert Schildt, “Java the Complete Reference”, 9 Edition, McGraw Hill Publishing Company
th
40
23UPPGC1H01 - FUNDAMENTALS OF HUMAN RIGHTS
UNIT I: INTRODUCTION
Meaning and Definitions of Human Rights - Characteristics and Importance of Human Rights
- Evolution of Human Rights - Formation, Structure and Functions of the UNO - Universal
Declaration of Human Rights - International Covenants - Violations of Human Rights in the
Contemporary Era.
UNIT III
Rights of Marginalized and other Disadvantaged People: Rights of Women - Rights of
Children - Rights of Differently Abled - Rights of Elderly - Rights of Scheduled Castes -
Rights of Scheduled Tribes - Rights of Minorities - Rights of Prisoners - Rights of Persons
Living with HIVAIDS - Rights of LGBT.
UNIT IV
Human Rights Movements: Peasant Movements (Tebhaga and Telangana) - Scheduled
Caste Movements (Mahar and Ad-Dharmi) - Scheduled Tribes Movements (Santhal and
Munda) - Environmental Movements (Chipko and Narmada Bachao Andolan) - Social
Reform Movements (Vaikom and Self Respect).
UNIT V
Redressal Mechanisms: Protection of Human Rights Act, 1993 (Amendment 2019) -
Structure and Functions of National and State Human Rights Commissions - National
Commission for SCs - National Commission for STs - National Commission for Women -
National Commission for Minorities - Characteristics and Objectives of Human Rights
Education.
REFERENCES
1. Sudarshanam Gankidi, Human Rights in India: Prospective and Retrospective, Rawat
Publications, Jaipur, 2019.
2. Satvinder Juss, Human Rights in India, Routledge, New Delhi, 2020.
3. Namita Gupta, Social Justice and Human Rights in India, Rawat Publications, Jaipur,
2021.
4. Mark Frezo, The Sociology of Human Rights, John Willy & Sons, U.K. 2014.
5. Chiranjivi J. Nirmal, Human Rights in India: Historical, Social and Political Perspectives,
Oxford University Press, New York, 2000.
6. Dr. S. Mehartaj Begum, Human Rights in India: Issues and perspectives, APH Publishing
Corporation, New Delhi, 2010.
7. Asha Kiran, The History of Human Rights, Mangalam Publications, Delhi, 2011.
8. Bani Borgohain, Human Rights, Kanishka Publishers & Distributors, New Delhi-2, 2007.
9. Jayant Chudhary, A Textbook of Human Rights, Wisdom Press, New Delhi, 2011.
41
III - SEMESTER
42
GSM - Mobile services – System architecture – Radio interface – Protocols – Localization and
calling – Handover – Security – New Data services. UMTS and IMT-2000 - Satellite Systems:
Applications – Basics – Routing – Localization – Handover. Chapters: 3.6, 4.1.1 to 4.1.8, 4.4, 5.2 to
5.6
Text Books
1 Jochen Schiller, “Mobile Communications”, Second Edition, Pearson Education, 2013.
2 Kum Kum Garg, “Mobile Computing Theory and Practice”, Pearson Education, 2014.
Reference Books
1 Rifaat A. Dayen, “Mobile Data & Wireless LAN Technologies”, Prentice Hall, 1997.
2 Steve Mann and Scoot Schibli, “The Wireless Application Protocol”, John Wiley & Inc., 2000.
43
MAPPING COURSE OUTCOMES WITH PROGRAMME OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 L L L L L L L L L L
CO2 S M M M M L M L L L
CO3 S M M M M L M L L L
CO4 S M M M M L M L L L
CO5 S M M M M L M L L L
44
III – SEMESTER
Course code 23UPCSC2C08 CLOUD COMPUTING L T P C
Core / Elective Core 4 4
45
Unit:5 STORING AND SHARING 13 hours
STORING AND SHARING Understanding cloud storage, evaluating on line file storage,
exploring on line book marking services, exploring on line photo editing applications, exploring
photo sharing communities, controlling it with web based desktops.
Text Books
1 Miller, Michael. Cloud computing: Web-based applications that change the way you work and
collaborate, Pearson Publishing, 2008.
UNIT III: (Chapters: 1, 2,3)
UNIT IV: (Chapters: 4,5,6)
UNIT V: (Chapters: 7,8,9,10,11,12,13,14)
UNIT IV: (Chapters: 18,19,20)
UNIT V: (Chapters: 15,16,17)
Reference Books
1 Velte, Anthony T., et al. "Cloud computing: a practical approach." (2010).
46
III - SEMESTER
Course code 23UPCSC2C09 SOFT COMPUTING L T P C
Core / Elective Core 4 4
47
Unit:3 UNSUPERVISED LEARNING NETWORK 15 hours
UNSUPERVISED LEARNING NETWORK: Associative Memory Networks - Auto Associative
Memory Network-Architecture-Flowchart for Training Process-Training Algorithm-Testing
Algorithm- Bidirectional Associative Memory- Architecture-Discrete Bidirectional Associative
Memory-Iterative Auto Associative Memory Networks - Linear Auto Associative Memory-Kohonen
Self-Organizing Feature Map- Architecture-Flowchart for Training Process-Training Algorithm.
Text Books
1 S.N. Sivanandam, S.N.Deepa, “Principles of Soft Computing”, Wiley, Third Edition, 2019.
UNIT I: Chapter 1: 2.1,2.3,2.4,2.5,2.6,2.7
UNIT II: Chapter 2: 3.2,3.3,3.4,3.5,3.6
UNIT III: Chapter 4 and 5: 4.1,4.3,4.5,4.6,4.7,5.3
UNIT IV: Chapter 7: 7.2,7.3,8.4,9.3,9.4,10.1,10.2,10.3,10.4
UNIT V: Chapter 5: 15.1,15.2,15.3,15.4,15.5,15.6,15.10
Reference Books
1 Das, A. (2018), “Artificial Intelligence and Soft Computing for Beginners”
2 Amit, K. (2018), “Artificial intelligence and soft computing: behavioral and cognitive
modeling of the human brain”, CRC press.
3 Rajasekaran, S., &Pai, G. V. (2011), “Neural networks, fuzzy logic and genetic algorithm:
synthesis and applications (with cd)”, PHI Learning Pvt. Ltd.
4 Jang, J. S. R., Sun, C. T., & Mizutani, E. (2004), “Neuro-fuzzy and soft computing-a
computational approach to learning and machine intelligence”, IEEE Transactions on
automatic control, 42(10), 1482-1484
5 Gupta, M. M. (2004), “Soft computing and intelligent systems: theory and applications”,
Elsevier.
48
6 Jang, J. S. R., Sun, C. T., & Mizutani, E. (1997). Neuro-fuzzy and soft computing-a
computational approach to learning and machine intelligence [Book Review]. IEEE
Transactions on automatic control, 42(10), 1482-1484.
49
III - SEMESTER
ARTIFICIAL INTELLIGENCE
Course code 23UPCSC2C10 AND MACHINE LEARNING L T P C
Core / Elective Core 4 4
50
Unit:4 MACHINE LEARNING 15 hours
Understanding Machine Learning: Defining Big Data – Big Data in Context with Machine
Learning-The Importance of the Hybrid Cloud-Leveraging the Power of Machine Learning-The
Roles of Statistics and Data Mining with Machine Learning-Putting Machine Learning in
Context- Approaches to Machine Learning.
51
III - SEMESTER
52
MAPPING COURSE OUTCOMES WITH PROGRAMME OUTCOMES
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S L S L L M L L
CO2 S S M L M L L M M S
CO3 S S S L S L L S S S
CO4 S S S L S L L S S S
CO5 S S S L S L L S S S
53
III - SEMESTER
Text Books
1 Michael Miller, “Cloud Computing”, Pearson Education, New Delhi, 2009.
54
Reference Books
Anthony T. Velte, “Cloud Computing: A Practical Approach”, 1st Edition, Tata McGraw
1
Hill Education Private Limited, 2009.
55
III – SEMESTER
WEB APPLICATION
Course code 23UPCSC2L07
DEVELOPMENT HOSTING LAB L T P C
Core / Elective Core 4 2
56
10. Create a web page consisting of Multimedia objects
Total Lecture hours 60 hours
Text Books
Ivan Bayross, “Web Enabled Commercial Applications Development Using HTML,
1
JavaScript, DHTML and PHP”, BPB Publications, 4th Revised Edition, 2010.
Reference Books
2 A. K.Saini and Sumint Tuli, “Mastering XML”, First Edition, NewDelhi, 2002.
57
ELECTIVE COURSES
ELECTIVE COURSE – I (I - SEMESTER)
DATA ENGINEERING AND L T P C
Coursecode 23UPCSC2E01 MANAGEMENT
58
USE OF PACKAGED APPLICATION SOFTWARE: Application software packages-Impact on
data management. DISTRIBUTED DATA AND DATABASES: Rationale for distributing data-
Perfect distributed database system-Top down fragmentation and partitioning. Bottom up
integration-The management of replication. BUSINESS INTELLIGENCE: Data warehousing-
Multidimensional model of data-Standard reporting tools-Online analytical processing OLAP-
Relational schema for a data warehouse.
Text Books
1. Keith Gordon, “Principles of Data Management Facilitating Information Sharing”, BCS
1
Learning, 2013. (Chapters:1-5, 7,8,12,13,14)
Reference Books
1 Peter Ghavami, “Big Data Management_ Data Governance Principles for Big Data
Analytics”, De Gruyter, 2020.
Francis Buttle, Stan Maklan, Customer Relationship Management Concepts and Technologies,
2 Routledge, 2019.
59
Mapping with Programme Outcomes:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M S M S S S S M
CO2 S S S M S S S S S S
CO3 S M S S M S M S S M
CO4 S S S S S S S M S S
CO5 S S S S S S S S S M
*S-Strong; M-Medium; L-Low
60
ELECTIVE COURSE – I (I – SEMESTER)
61
Mapping with Programme Outcomes:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S M S S S M
CO2 S S S S S S S S S S
CO3 S M S S M S M S S S
CO4 S S S M S S S L S S
CO5 S S S S M S S S S S
62
ELECTIVE COURSE – I (I - SEMESTER)
ARCHITECTURE AND
Coursecode 23UPCSC2E03 L T P C
FRAMEWORKS
63
Unit:3 ARCHITECTURE DESIGN 12 hours
Text Books
1 Joseph Ingeno, “Software Architect’s Handbook” Packt. Publishing 2018.
Reference Books
1 Oliver Vogel, Indo Arnold, ArifChughtai and TImoKehrer, “Software Architecture” Springer-
Verlag, 2011.
2 Ian Gorton, “Essential Software architecture”, Second Edition, Springer, 2011.
3 Len Bass, Paul Clements and Rick Kazman, “Software architecture in practice”, Third edition,
Addison-Wesley, 2013.
64
Mapping with Programme Outcome
PO1 PO2 PO3 PO4 PO5 PO PO7 PO8 PO9 PO10
6
CO1 M S L L M S M M L S
CO2 M S M M M L S S M M
CO3 S M S S S M S M M S
CO4 S M L S M L S L S M
CO5 M S M L S L M S L S
65
ELECTIVE COURSE – I (I - SEMESTER)
ARCHITECTURE AND
Course code 23UPCSC2E04 L T P C
FRAMEWORKS - LAB
ExpectedCourseOutcomes:
On the successful completion of the course, student will be able to:
CO1 Comprehend the programming skills of Software architecture tools and packages
CO2 Understand and implement the user profiles and authentication with recovery
mechanism.
CO3 Comprehend and evaluate the access control and content representation use of FTP
server. K1-K6
CO4 Understand and implement reading and writing resources for various applications
CO5 Identify and examine the notifications, friends, and follower list of social application
protocols.
K1-Remember; K2-Understand; K3-Apply; K4-Analyze; K5-Evaluate; K6-Create
1. Find the WebID profile document and display the necessary attributes
2. Set and access the primary authentications with account recovery mechanisms
3. Set and access the secondary authentications with account recovery mechanisms
4. Design authorization and web access control
5. Find the content representation
6. Reading resources from HTTP REST API and WebSockets API
7. Writing resources from HTTP REST API and WebSockets API
8. Data notification using Social Web App protocol
66
9. Managing subscriptions and friends list using Social Web App protocol
10. Managing list of followers and following list using Social Web App protocol
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M L M S S M M S
CO2 S M S S S M M S S M
CO3 S M S M S M M S S M
CO4 S M L S M L M L M L
CO5 M S M L S L S M S L
67
ELECTIVE COURSE – I (I - SEMESTER)
68
Unit:3 IP QUALITY OF SERVICE 12 hours
IP Quality Of Service : Introduction - Quality of Service in IP Version 4 - Integrated Services -
Differentiated Services - Quality of Service with Nested Differentiated Services Levels - IP
Multicast and Any cast: Addressing - Multicast Routing - Routing Protocols –Any casting- IPv6
Any cast Routing Protocol: Protocol Independent Any cast—Sparse Mode - Transport over Packet:
Draft-Martini Signaling and Encapsulation - Layer-2 Tunneling Protocol.
Text Books
Advanced Internet Protocols, Services and Applications”, Eiji Oki, Roberto Rojas-Cessa,
1 Mallik arjun Tatipamula, Christian Vogt, Copyright © 2012 by John Wiley & Sons, Inc.
Reference Books
1 TCP/IP Protocol Suite”, BehrouzA.Forouzan, Fourth Edition, Tata Mcgraw-Hill Edition 2010
4 Data and Computer Communications- Eighth Edition- William Stallings- Pearson Education.
6 Data communication and networks –James Irvine and David Harley- Publishers: Wiley India
69
Mapping with Programme Outcome
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M S M L M S M M M S
CO2 S M M S M L M S S M
CO3 S S S M S S S M M S
CO4 S M L S M L S L L M
CO5 M S M L S L M S S S
70
ELECTIVE COURSE – I (I - SEMESTER)
a. ipconfig
b. ping
c. traceroute
d. netsat
e. nslookup
2. Implement the following server commands
a. ifconfig
b. ip
c. tracepath
d. ss
e. tcpdum
3. Connect and place the given file in the FTP server
4. Install packet tracer and connect a computer to router, switch and get a Icmp request
71
5. Implement the SSH protocols and accessing the remote device
6. Connect any two switches and get the status of each switches
9. Identify the route password of server and get the connection using telnet
10. Install wire shark for capture and analyse the packets (TCP /UDP)
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L L L L L L L L L
CO2 L
S L M L M L L L L
CO3 S L S L S L L L L S
CO4 S L S L S L L L L S
CO5 S L S L S L L L L S
S- Strong; M-Medium; L-Low
72
ELECTIVE COURSE – I (I - SEMESTER)
4. To get clear idea of how to developing real-time standalone, web applications using .NET
Technologies.
Introducing C#: .NET Framework - C# language - Visual Studio 2017 - Writing a C# Program:
Visual Studio 2017 Development Environment - Console Applications - Desktop Applications -
Variables and Expressions: Basic C# Syntax - Basic C# Console Application Structure - Variables -
Expressions - Flow Control: Boolean Logic – Branching - Looping.
More About Variables: Type Conversion - Complex Variable Types - String Manipulation –
Functions: Defining and Using Functions - Variable Scope - The Main Function - Struct Functions -
Overloading Functions - Using Delegates - Debugging and Error Handling: Debugging in Visual
Studio - Error Handling - Introduction to Object Oriented Programming: Object-Oriented
Programming - OOP Techniques - OOP in Desktop Applications.
73
Defining Classes: Class Definitions in C# - System.Object - Constructors and Destructors - OOP
Tools in Visual Studio - Class Library Projects - Interfaces Versus Abstract Classes - Struct Types -
Shallow Copying Versus Deep Copying - Defining Class Members: Member Definitions -
Additional Class Member Topics - Interface Implementation - Partial Class Definitions - Partial
Method Definitions - The Call Hierarchy Window - Basic Cloud Programming: Cloud, Cloud
Computing, and the Cloud Optimized Stack - Cloud Patterns and Best Practices - Using Microsoft
Azure C# Libraries to Create a Storage Container - Creating an ASP.NET 4.7 Web Site That Uses
the Storage Container - Advanced Cloud Programming and Deployment: Creating an ASP.NET
Web API - Deploying and Consuming an ASP.NET Web API on Microsoft Azure - Scaling an
ASP.NET Web API on Microsoft Azure.
.NET Standard and .NET Core: Cross-Platform Basics and Must Know Terms – Need of .NET -
Referencing and Targeting Frameworks - .NET Core - Building and Packaging a.NET Standard
Library - Building a .NET Core Application with Visual Studio - Porting from .NET Framework to
.NET Core - ASP.NET and ASP.NET Core: Overview of Web Applications – Use of ASP.NET -
ASP.NET Web Forms - Creating ASP.NET Core Web Applications – Files: File Classes for Input
and Output – Streams - Monitoring the File System - XML and JSON: XML Basics - JSON Basics -
XML Schemas - XML Document Object Model - Converting XML to JSON - Searching XML with
XPath.
LINQ: LINQ to XML - LINQ Providers - LINQ Query Syntax - LINQ Method Syntax - Ordering
Query Results - Understanding the order by Clause - Querying a Large Data Set -Using Aggregate
Operators - Using the Select Distinct Query - Ordering by Multiple Levels -Using Group Queries -
Using Joins – Databases: Using Databases - Installing SQL Server - Express - Entity Framework -
Code First Database - Finding the Database - Navigating Database Relationships - Handling
Migrations - Creating and Querying XML from an Existing Database - Universal Apps: Windows
Universal Apps - App Concepts and Design - App Development - Common Elements of Windows
Store Apps - Windows Store.
Text Books
1 Benjamin Perkins, Jacob Vibe Hammer, Jon D. Reid, “Beginning C# Programming with Visual
Studio 2017”, Wiley Publishing, 2018. Chapters: 1 to 10, 16 to 23, and 25.
74
Reference Books
1 Nagel, Christian, “Professional C 7 and .NET Core 2.0”, Wrox Publishing, 2018.
2 Mehboob Ahmed Khan, Ovais, “C# 7 and .NET Core 2.0 High Performance”, Packt
Publishing, 2018
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L M L L L L M L M
CO2 S M L M M L M L M L
CO3 S S S M M L M L M L
CO4 S M L M M L M L M L
CO5 S S S M M L M L M L
75
ELECTIVE COURSE – I (I - SEMESTER)
DOT NET TECHNOLOGIES LAB
Course code 23UPCSC2E08 L T P C
Core / Elective Elective 2 1
4. To get clear idea of how to developing real-time standalone, web applications using ASP
.NET.
3. Multilevel Inheritance
4. Interfaces
76
5. Demonstrate multiple type of Exceptions
6. Azure Storage Container Using the Microsoft Azure Storage Client Library
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L M L L L L L L L
CO2 S M L M M L M L M L
CO3 S S S M M L M L M L
CO4 S M L M M L M L M L
CO5 S S S M M L M L M L
77
ELECTIVE COURSE – I (I - SEMESTER)
78
Building Microservices on Azure Stack: Azure stack, Offering IaaS, PaaS on-premises simplified,
SaaS on Azure stack.
Text Books
Harsh Chawla and Hemant Kathuria, Building Micro services Applications on Microsoft
1 Azure- Designing, Developing, Deploying, and Monitoring, Apress, 2019.
Jeffrey Palermo, NET DevOps for Azure A Developer’s Guide to DevOps Architecture the
2 Right Way, Apress, 2019.
Thurupathan and Vijayakumar, Practical API Architecture and Development with Azure and
3 AWS - Design and Implementation of APIs for the Cloud, Apress, 2018.
79
Reference Books
1 Karl Matthias and Sean P. Kane, Docker: Up and Running, O'Reilly Publication, Second
Edition 2018.
2 Len Bass, Ingo Weber, Liming Zhu,” DevOps, A Software Architects Perspective”, Addison
Wesley-Pearson Publication, First Edition 2015.
3 John Ferguson Smart,” Jenkins, The Definitive Guide”, O'Reilly Publication, First Edition
2011.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M M M S M S S L
CO2 S S M M M S M S S L
CO3 S S S S S S S S S S
CO4 S S M M M S M S S L
CO5 S S M M M S M S S L
80
ELECTIVE COURSE – I (I - SEMESTER)
SOFTWARE DEVELOPMENT
Course code 23UPCSC2E10 L T P C
TECHNOLOGIES LAB
Core / Elective Elective 2 1
CO4 Design, analyze and develop the Pull based Software Configuration Management
81
9. Install and Configure Pull based Software Configuration Management and provisioning tools
using Puppet.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M L M L L L S S
L L L L S
CO2 S S M M S
CO3 S S M L M L L L S S
L L L L S
CO4 S S M M S
CO5 S S M L M L L L S S
82
ELECTIVE COURSE – II (II - SEMESTER)
CO3 Assess the embedded technologies and develop prototypes for the IoT products K1-K6
Evaluate the use of Application Programming Interface and design an API for IoT
CO4 in real time
CO5 Recognize the ethics of business models and perform security analysis
K1-Remember; K2-Understand; K3-Apply; K4-Analyze; K5 -Evaluate; K6-Create
83
Control and Data Acquisition – Application Layer Protocols: CoAP and MQTT.
Unit:4 12 hours
Prototyping Online Components: Getting started with an API - Writing a New API - Real-Time
Reactions - Other Protocols. Techniques for Writing Embedded Code: Memory Management -
Performance and Battery Life - Libraries - Debugging.
Unit:5 10 hours
Business Models: History of Business Models – Model – Internet of Starting up – Lean Startups.
Moving to Manufacture: Designing Kits - Designing Printed circuit boards – Certification – Costs -
Scaling Up Software. Ethics: Privacy – Control – Environment – Solutions.
Text Books
1 David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, ―IoT
Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things,
Cisco Press, 2017 (UNIT I and II)
2 Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, Wiley, 2014.
(UNIT III, IV and V)
Reference Books
1 OvidiuVermesan and Peter Friess, “Internet of Things – From Research and Innovation to
Market Deployement” , River Publishers, 2014.
2 Peter Waher, “Learning Internet of Things” ,Packt Publishing, 2015.
3 Donald Norris, “The Internet of Things: Do-It-Yourself at Home Projects for Arduino,
Raspberry Pi and BeagleBoneBlack”, McGraw Hill, 2015.
84
MAPPING WITH PROGRAMME OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M S S S S S S S
CO2 S S S S S S S M S S
CO3 S M S S S S M S S M
CO4 S S S S S S S S S S
CO5 S S S S M S S S S M
85
ELECTIVE COURSE – II (II - SEMESTER)
86
Mapping with Programme Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M S S S M S S S
CO2 S S S S S S S M S S
CO3 S M S S S S M S S M
CO4 S S S S S S S S S L
CO5 S S S S M S L S S M
87
ELECTIVE COURSE – II (II - SEMESTER)
Course code 23UPCSC2E13 CRYPTOGRAPHY AND NETWORK L T P C
SECURITY
Core / Elective Elective 3 3
88
Advanced Encryption Standard: Finite Field Arithmetic– AES Structure – AES Transformation
Functions – AES Key Expansion –Block Cipher Operation: Multiple Encryption and Triple DES –
Stream Ciphers – RC4 – Public-Key Cryptography and RSA: Principles of Public-Key
Cryptosystems – The RSA Algorithm –Diffe-Hellman Key Exchange – Elgamal Cryptographic
System – Elliptic Curve Arithmetic – Elliptic Curve Cryptography – Pseudorandom Number
Generation Based on an Asymmetric Cipher.
Text Books
1 William Stallings, “Cryptography and Network Security – Principles and Practices”, Pearson
Education / PHI, 7th Edition. 2017.
2 Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography And Network Security”,
McGraw Hill Education, 3rd Edition.2015.
Reference Books
1 Bernard Menezes, “Network Security and Cryptography”, Cengage,1st Edition, 2010.
2 William Stallings, “Cryptography and Network Security”, Pearson Education India, Sixth
Edition, 2016.
3 V.K. Jain, “Cryptography and Network Security”, Khanna Book Publishing, New Delhi, 2016.
4 C.K. Shyamala, N. Harini, Dr. T. R. Padmanabhan, “Cryptography and Security”, Wiley India
Pvt. Ltd.,2011
89
MAPPING WITH PROGRAMME OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M S L L M S M M L S
CO2 M S L M M L M S L M
CO3 S S L M S M S M L S
CO4 S M L S M L S M L M
CO5 M S M L S L M S L S
90
ELECTIVE COURSE – II (II - SEMESTER)
CRYPTOGRAPHY AND
NETWORK SECURITY LAB
Course code 23UPCSC2E14 L T P C
should XOR each character in the string with 0 and display the result
2. Write a program to perform encryption and decryption using the Ceaser Cipher
3. Write a program to perform encryption and decryption using the Hill Cipher
4. Write a program to perform encryption and decryption using the Vernam Cipher
5. Write a program to perform encryption and decryption using the Substitution Cipher
6. Write a program to perform encryption and decryption using the DES algorithm
91
8. Connect to switch with a computer and enable the port security
10. Identify and capture the user name and password in a same network using wireshark
Total Lecture hours 30 hours
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L L L L L L L L L
CO2 S L M L M L L L L L
CO3 S L S L S L L L L S
CO4 S L S L S L L L L S
CO5 S L S L S L L L L S
92
ELECTIVE COURSE – II (II - SEMESTER)
Unit:1 12 hours
Basic Image Handling and Processing: PIL – the Python Imaging Library-Matplotlib-NumPy-
SciPy-Advanced example: Image de-noising. Local Image Descriptors: Harris corner detector-
SIFT - Scale-Invariant Feature Transform-Matching Geotagged Images.
Unit:2 12 hours
Image to Image Mappings: Homographies-Warping images-Creating Panoramas. Camera Models
and Augmented Reality: The Pin-hole Camera Model-Camera Calibration-Pose Estimation from
Planes and Markers-Augmented Reality.
Unit:3 12 hours
Multiple View Geometry: Epipolar Geometry-Computing with Cameras and 3D Structure-Multiple
View Reconstruction-Stereo Images. Clustering Images: K-means Clustering-Hierarchical
Clustering-Spectral Clustering.
Unit:4 12 hours
Searching Images: Content based Image Retrieval-Visual Words-Indexing Images- Searching the
Database for Images-Ranking Results using Geometry-Building Demos and Web Applications.
Classifying Image Content: K-Nearest Neighbors-Bayes Classifier-Support Vector Machines-
Optical Character Recognition.
93
Unit:5 10 hours
Image Segmentation: Graph Cuts-Segmentation using Clustering-Variational Methods. OpenCV:
Python Interface-OpenCV Basics-Processing Video-Tracking.
Text Books
1 Jan Erik Solem, “Programming Computer Vision with Python: Tools and Algorithms for
Analyzing Images”, O’REILLY Media, Inc. 2012.
Reference Books
1 David A. Forsyth, Jean Ponce, “Computer Vision A Modern Approach”, Second Edition,
Pearson publication, 2012.
2 Xiaoyue Jiang, Abdenour Hadid, Yanwei Pang, Eric Granger, Xiaoyi Feng, “Deep Learning in
Object Detection and Recognition”, Springer, 2019.
3 Benjamin Planche and Eliot Andres, “Hands-On Computer Vision with TensorFlow 2:
Leverage Deep Learning to Create Powerful Image Processing Apps with TensorFlow 2.0 and
Keras”, 2019.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L M L L L M M M S
CO2 S M L M M L S L S L
CO3 S S S M M L M L M L
CO4 S S S M M L M L M L
CO5 S S S M M L S L S L
94
ELECTIVE COURSE – II (II – SEMESTER)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L M L L L M M M S
CO2 S M L M M L S L S L
CO3 S S S M M L M L M L
CO4 S S S M M L M L M L
CO5 S S S M M L S L S L
96
ELECTIVE COURSE – II (II - SEMESTER)
CO1 Understand, impart and summarize the concepts of Social media, Social
networking and Webcasts
CO2 Comprehend, design and develop a Word Press Powered Website
Understand, implement and perform evaluation of Social Networking and
CO3
Micro-Blogging K1-K6
CO4 Collaborate, implement and analyse the Widgets and Badges in social
networking environment
CO5 Understand, illustrate and perform evaluation of web optimization for social
networks
K1-Remember; K2-Understand; K3-Apply; K4-Analyze; K5 -Evaluate; K6-Create
97
Bookmarking Strategy – Crowd-Sourced News Sites- Preparation And Tracking Progress Media
Communities-Image Sharing Sites-Image Sharing Strategy-Video Sharing Sites-Video Sharing
Strategy-Searching And Search Engine Placement-Connecting With Others.
Text Books
1 Deltina hay -A Survival Guide To social Media and Web 2.0 Optimization‖, Dalton Publishing,
2009.
Reference Books
1 Miriam Salpeter ―Social Networking for Career Success‖ Learning Express, 2011.
2 Miles, Peggy, ―Internet world guide to webcasting‖ Wiley, 2008 Professionals”, Wiley
Publication, 2015.
98
Mapping with Programme Outcomes:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S L S L L S L S
CO2 S S S L S L L S L S
CO3 S S S L S L L S L S
CO4 S S S L S L L S L S
CO5 S S S L S L L S L S
99
ELECTIVE COURSE – II (II – SEMESTER)
100
Mapping with Programme Outcomes:
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M L M S L L L S
CO2 S M S S S M L L L S
CO3 S S S S S S L L L S
CO4 S M S S S M L L L S
CO5 S S S S S S L L L S
101
ELECTIVE COURSE – III (III - SEMESTER)
CO1 Understand, describe, analyze and examine the basics of Cyber security
concepts and its implementation in India
Comprehend and demonstrate the security tips in browsers, WLAN, social
CO2 networks, Email security and Smart phone. Apply the investigations in post
mortem and Forensics
Understand, apply and evaluate the various investigation roles and Wi Fi K1-K6
CO3
protecting mechanisms.
Understand, illustrate and evaluate the method of seize the digital information
CO4 and evidences forensics data and
evaluate the forensics reports
Comprehend, apply and appraise the methods digital forensics with cybercrime
CO5
prevention techniques
K1-Remember; K2-Understand; K3-Apply; K4-Analyze; K5 -Evaluate; K6-Create
102
phone security guidelines – purses, wallets, smart phones – platforms, setup and installation-
communicating securely with a smart phone.
Cyber investigation roles: Introduction – role as a cybercrime investigator – the role of law
enforcement officers – the role of the prosecuting attorney – incident response: introduction-post
mortem versus live forensics – computer analysis for the hacker defender program-network
analysis – legal issues of intercepting Wi-Fi transmission – Wi-Fi technology – Wi-Fi RF-
scanning RF – eavesdropping on Wi-Fi – fourth amendment expectation of privacy in WLAN.
Text Books
Dr. Jeetendra Pande, “Introduction to Cyber Security” Published by Uttarakhand Open
1 University, 2017.(Chapter: 1.2-6.4,9.3-12.2)
Anthony reyes, Kevin o’shea, Jim steele, Jon R. Hansen, Captain Benjamin R. Jean Thomas
2 Ralph, “Cyber-crime investigations” - bridging the gaps between security professionals, law
enforcement, and prosecutors, 2007.(Chapter: 4, 5, 6, 7, 8, 9,10)
Reference Books
1 Sebastian Klipper, “Cyber Security” Einblickfur Wirtschafts wissen schaftler Fachmedien
Wiesbaden,2015
2 John G.Voller Black and Veatch, “Cyber Security” Published by John Wiley & Sons, Inc.,
Hoboken, New Jersey Published simultaneously in Canada ©2014.
103
Mapping with Programme Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L - L M L M M - M
CO2 M S - L M L M M - M
CO3 M S L L M L M M - M
CO4 S M L S M L S M - M
CO5 M S M L S L M S - S
104
ELECTIVE COURSE – III (III - SEMESTER)
105
Mapping Course outcomes with Programme outcomes
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L L L L L L L L L
CO2 S L M L M L L L L L
CO3 S L S L S L L L L S
CO4 S L S L S L L L L S
CO5 S L S L S L L L L S
106
ELECTIVE COURSE – III (III - SEMESTER)
Course code 23UPCSC2E21 BLOCKCHAIN TECHNOLOGIES L T P C
Understand and analyse the elements of trust in a Block chain: validation, K1-K6
CO3 verification, and consensus.
Comprehend and evaluate the alternate coin, Ethereum and smart contract.
CO4
Grasp and apply the knowledge of Tools and languages for applications
CO5
K1-Remember; K2-Understand; K3-Apply; K4-Analyze; K5 -Evaluate; K6-Create
107
Ricardian contracts - Smart contract templates – Oracles - Deploying smart contracts - DAO
Unit:5 Development Tools and Frameworks, Use Cases & Security 10hours
Development Tools and Frameworks : Languages - Compilers - Tools and libraries - Frameworks
- Contract development and deployment - Layout of a Solidity source code file - Solidity language.
Use Cases: IoT – Government - Health -Finance – Media. Scalability and Other Challenges:
Scalability - Privacy - Security - Other challenges.
Text Books
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder. Bitcoin
1 and Crypto currency Technologies. Princeton University Press, 2016. ISBN 978-0691171692
Reference Books
1 Andreas Antonopoulos. Mastering Bitcoin: Programming the open block chain.Oreilly
Publishers, 2017. ISBN 978-9352135745
108
Mapping Course outcomes with Programme outcomes
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L L L L L L L L L
CO2 S L M L M L L L L L
CO3 S L S L S L L L L S
CO4 S L S L S L L L L S
CO5 S L S L S L L L L S
S- Strong; M-Medium; L-Low
109
ELECTIVE COURSE – III (III – SEMESTER)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M L M S L L L L
CO2 S M S S S M L L L L
CO3 S S S S S S L L L L
CO4 S M L S M L L L L L
CO5 M S M L S L L L L L
111
ELECTIVE COURSE – III (III - SEMESTER)
112
Unit:6 Contemporary Issues 2 hours
Expert lectures, online seminars –webinars
Text Books
1 . Kanti Swarup, P. K. Gupta and Man Mohan, Operations Research, Sultan Chand and Sons,
New Delhi, 2014. (Unit 1, 2, and 3)
2 S. S. Rao, Engineering Optimization: Theory and Practice, JOHN WILEY & SONS, INC.,
2009. (Unit 4)
3 Bo Xing and Wen-Jing Gao, Innovative Computational Intelligence: A Rough Guide to Clever
Algorithms, Springer, 2014.(Unit 5)
Reference Books
1 Hamdy A. Taha, Operations Research: An Introduction, Pearson, 2010.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M S S S M S S S
CO2 S S S S S L S M S S
CO3 S M S S M S M S S L
CO4 S S S S S S S S S S
CO5 S S S S M L S S S M
113
ELECTIVE COURSE – III (III - SEMESTER)
1. Simplex algorithm
2. North-West Corner algorithm
3. Least Cost algorithm
4. Vogel’s Approximation Algorithm
5. Modi algorithm
6. Hungarian assignment Algorithm
7. Travelling Sales man algorithm
8. Steepest Descent algorithm
9. Conjugate gradient algorithm
10. Ant Colony algorithm
Total Lecture hours 30 hours
114
Mapping Course outcomes with Programme outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S M S S S M S S S
CO2 S S S S S L S M S S
CO3 S M S S M S M S S L
CO4 S S S S S S S S S S
CO5 S S S S M L S S S M
115
ELECTIVE COURSE – III (III - SEMESTER)
116
Architectural Reliability Considerations - Design principles for architectural reliability - Technology
selection for architecture reliability - Improving reliability with the cloud - Operational Excellence
Considerations - Designing principles for operational excellence - Selecting technologies for
operational excellence - Achieving operational excellence in the public cloud.
Text Books
1 Saurabh Shrivastava and Neelanjali Srivastav, “ Solutions Architect's Handbook”, Packt
Publishing, 2020.
Reference Books
1 Alan McSweeney , “Introduction to Solution Architecture”, Kindle Edition, 2019.
2 Bernard, Scott A. An introduction to holistic enterprise architecture. Author House, 2020.
CO1 S S S S S S S S S M
CO2 S S S S S S S S S S
CO3 S M S S S S M S S S
CO4 S S S M S S S S S S
CO5 S S S S M S S S S M
117
ELECTIVE COURSE – III (III - SEMESTER)
118
Mapping with Programme Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S S S S S S S S S M
CO2 S S S S S S S S S S
CO3 S M S S S S M S S S
CO4 S S S M S S S S S S
CO5 S S S S M S S S S M
119
ELECTIVE COURSE – III (III - SEMESTER)
Course code 23UPCSC2E27 HIGH PERFORMANCE L T P C
COMPUTING
Core / Elective Elective 3 3
120
Efficient OpenMP programming: Profiling OpenMP programs-Performance pitfalls-Parallel
sparse matrix-vector multiply. Locality optimizations on ccNUMA architectures: Locality of
access on ccNUMA-ccNUMA optimization of sparse MVM-Placement pitfalls-ccNUMA issues
with C++.
Text Books
1 Georg Hager, Gerhard Wellein “Introduction to High Performance Computing for Scientists
and Engineers”, CRC Press, 2011. Chapters: 1 to 10.
Reference Books
1 Michael W. Berry, Kyle A. Gallivan, Efstratios Gallopoulos, Ananth Grama, Bernard Philippe,
Yousef Saad, Faisal Saied, “High-performance scientific computing: algorithms and
applications”, Springer, 2012.
2 Victor Eijkhout, “Introduction to High Performance Scientific Computing”, MIT Press, 2011.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L M L L L S S S S
CO2 S M L M M L S L S L
CO3 S S S M M L M L M L
CO4 S S S M S L M L M S
CO5 S S S M M L M M M M
121
ELECTIVE COURSE – III (III - SEMESTER)
HIGH PERFORMANCE L T P C
Course code 23UPCSC2E28
COMPUTING LAB
Core / Elective Elective 2 1
122
MAPPING WITH PROGRAMME OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 S L M L L L S S S S
CO2 S M L M M L S L S L
CO3 S S S M M L M L M L
CO4 S S S M S L M L M S
CO5 S S S M M L M M M M
123
SEMESTER II
SEMESTER III
SEMESTER IV
Student should attend any lecture series / workshop / panel discussion / presentation on
specific subject and submit the report with detailed description
124
NON-MAJOR ELECTIVE – II
(Supportive Course)
List of Programs
MS-Word:
1. Design an admission/enquiry form using shapes, textbooks, colors, tables with
formatting options.
2. Design a text book with cover page, content page and text using indenting options,
rulers, page layout, header/footer and hyperlinks.
3. Design Newspaper advertisement with images and texts.
4. Design mark statement copy using tables, images and watermarks.
5. Design conference/seminar invitation with logos, formatting options, margins and
borders.
6. Write a Research article with Chart, Tables, Symbols, Equations and References.
MS-Excel:
7. Design an application for student Exam Result using Data validation, Aggregate
functions and Conditional formatting.
8. Prepare Cost-Benefit Analysis for an organization using Statistical tools.
9. Develop an application to predict population of a city using analysis Macros.
MS- Access:
10. Design an Employee payroll system with Forms and Reports using Macros.
11. Develop relational integrity databases.
12. Develop applications which automatically update a table using Triggers.
13. Design an inventory database and generate conditional report.
MS-PowerPoint:
14. Prepare a presentation with embedding multimedia objects.
15. Prepare presentation with slide layout, animations, font effects, hyperlinks.
MS-Publisher:
16. Prepare an academic calendar for an institution.
Reference Books:
1. Lisa A. Bucki, “MS Office 2013 Bible”, Wiley Publications, 2013.
2. Richard Mansfield, “Mastering VBA for Microsoft office 2016”, Wiley Publications,
2016.
3. Wayne L. Winston, “Microsoft Excel Data Analysis and Business Modeling”, PHI,
2017.
4. Manisha Nigam, “Data Analysis with Excel”, BPB Publications, 2019.
5. Michael Alexander and Dick Kusleika, “Excel Power Programming with VBA”,
Wiley Publications, 2016.
6. Michael Alexander and Dick Kuskeika, “Access the Comprehensive tutorial guide”,
Wiley Publications, 2016.
125
NON-MAJOR ELECTIVE – II
List of Programs
References
1. Via, A., Rother, K., & Tramontano, A. (2014). Managing your biological data
with Python. Chapman and Hall/CRC.
2. Rocha, M., & Ferreira, P. G. (2018). Bioinformatics Algorithms: Design and
Implementation in Python. Academic Press.
3. Chun, W. (2001). Core python programming (Vol. 1). Prentice Hall
Professional.
126