SPPU BE Computer 2015course Syllabus
SPPU BE Computer 2015course Syllabus
Syllabus
for
Prologue
It is with great pleasure and honor that I share the syllabi for Fourth Year of Computer
Engineering (2015 Course) on behalf of Board of Studies, Computer Engineering. We, members
of BOS are giving our best to streamline the processes and curricula design.
I am sincerely indebted to all the minds and hands who work adroitly to materialize these tasks. I
really appreciate your contribution and suggestions in finalizing the contents.
Thanks
Abbreviations:
TW: Term Work TH: Theory OR: Oral PR: Practical Sem: Semester PRE: Presentation
Syllabus for Fourth Year of Computer Engineering #4/82
Faculty of Engineering Sav itribai Phule Pune University, Pune
410252 (A) Advanced Digital Signal Processing 410253 (A) Software Defined Networks
410252 (B) Compilers 410253 (B) Human Computer Interface
410252 (C) Embedded and Real Time Operating System 410253 (C) Cloud Computing
410252 (D) Soft Computing and Optimization 410253 (D) Open Elective
Algorithms
Abbreviations:
TW: Term Work TH: Theory OR: Oral PR: Practical Sem: Semester PRE: Presentation
SEMESTER I
Course Objectives:
To Study and understand representation of signals and systems.
To learn methodology to analyze signals and systems
Study transformed domain representation of signals and systems
To explore Design and analysis of Discrete Time signals and systems
To Understand Design of filters as DT systems
To get acquainted with the DSP Processors and DSP applications
Course Outcomes:
On completion of the course, student will be able to–
Understand the mathematical models and representations of DT Signals and Systems
Understand different transforms like Fourier and Z-Transform from applications point of
view.
Understand the design and implementation of DT systems as DT filters with filter structures
and different transforms.
Design and implementation of DSP algorithms using suitable programming language
(C/C++)
To demonstrate the knowledge of signals and systems for design and analysis of small
digital systems
To apply knowledge and use of signal transforms for speech and image processing
applications
Course Contents
Unit I Signals and Systems 9 Hours
Continuous time (CT), Discrete-time (DT) and Digital signals, Basic DT signals and Operations.
Discrete-time Systems, Properties of DT Systems and Classification, Linear Time Invariant (LTI)
Systems, Impulse response, Linear convolution, Linear constant coefficient difference equations,
FIR and IIR systems, Periodic Sampling, Relationship between Analog and DT frequencies,
Aliasing, Sampling Theorem, A to D conversion Process: Sampling, quantization and encoding.
Unit II Frequency Domain Representation of Signal 8 Hours
Effective computation of DFT, Radix-2 FFT algorithms: DIT FFT, DIF FFT, Inverse DFT using
FFT, Z-transform (ZT), ZT & FT, ZT & DFT, ROC and its properties, ZT Properties, convolution,
initial value theorem, Rational ZT, Pole Zero Plot, Behaviour of causal DT signals, Inverse Z
Transform (IZT): power series method, partial fraction expansion (PFE) , Residue method
Unit IV Analysis of DT - LTI Systems 8 Hours
System function H(z), H(z) in terms of Nth order general difference equation, all poll and all zero
systems, Analysis of LTI system using H(Z), Unilateral Z-transform: solution of difference
equation, Impulse and Step response from difference equation, Pole zero plot of H(Z) and
difference equation, Frequency response of system, Frequency response from pole-zero plot using
simple geometric construction
Unit V Digital Filter Design 9 Hours
Concept of filtering, Ideal filters and approximations, specifications, FIR and IIR filters, Linear
phase response, FIR filter Design: Fourier Series method, Windowing method, Gibbs Phenomenon,
desirable features of windows, Different window sequences and its analysis, Design examples IIR
filter design: Introduction, Mapping of S-plane to Z-plane, Impulse Invariance method, Bilinear Z
transformation (BLT) method, Frequency Warping, Prewarping, Design examples, Comparison of
IIR and FIR Filters
Unit VI Filter Structures and DSP Processors 8 Hours
Filter Structures for FIR Systems: direct form, cascade form, structures for linear phase FIR
Systems, Examples, Filter structures for IIR Systems: direct form, cascade form, parallel form,
Examples DSP Processors: ADSP 21XX Features, comparison with conventional processor, Basic
Functional Block diagram, SHARC DSP Processor Introduction to OMAP (Open Multimedia
Application Platform), Introduction to Applications of DSP: Speech and Image processing
Books:
Text:
1. Proakis J., Manolakis D., "Digital signal processing", 4th Edition, Pearson Education, ISBN
9788131710005
2. Oppenheium A., Schafer R., Buck J., "Discrete time signal processing", 2nd Edition, Pearson
Education, ISBN 9788131704929
Reference:
1. Mitra S., "Digital Signal Processing: A Computer Based Approach", Tata McGraw-Hill,
1998, ISBN 0-07-044705-5
2. Ifleachor E. C., Jervis B. W., “Digital Signal Processing: A Practical Approach “, Pearson-
Education, 2002
3.
Course Contents
Unit I Introduction 06 Hours
Introduction to Software Architecture, Architecture Business Cycle- Where do architecture come from,
Software processes and the Architecture Business cycle, What makes Good Architecture.
What is software architecture- What Software Architecture is and what it is not, Other points of View,
Architectural Patterns, Reference Models, Reference Architectures, Why is Software Architecture
important, Architectural structure and Views.
Case Study-A-7E Avionics System
Unit II Quality Attributes 06 Hours
Introduction to Quality Attributes, Understanding quality attributes- Functionality and Architecture,
architecture and quality attributes, System Quality Attributes, Quality Attribute Scenario in Practice,
Other System Quality Attributes, Business Qualities, and Architecture Qualities.
Achieving quality attributes- Introducing Tactics, Availability tactics, Modifiability tactics, Performance
tactics, Security tactics, Testability tactics, Usability tactics, Relationship of tactics to Architectural
patterns, Architectural Patterns and Styles.
Case study- Air Traffic Control
Unit III Designing the Architectures and Introduction to Design Patterns 06 Hours
Architecture in Life Cycle, Designing the Architecture, Forming the team structure, Creating a skeletal
system, Case Study- Flight Simulation.
Design Patterns: What is Design Pattern?, Describing Design Patterns, The Catalog of Design Patterns,
Organizing the Catalog, How Design patterns solves design problems, How to select Design Patterns,
How to use Design Patterns.
Unit IV Design Pattern Catalog 08 Hours
Creational Patterns- Abstract Factory, Singleton.
Structural Patterns- Adaptor, Facade, Proxy.
Behavioral Patterns- Chain of Responsibility, Iterator, Mediator, Observer.
What to expect from Design Patterns.
Unit V Client Side Technologies 07 Hours
Introduction to three tier and n-Tier Web Architectures, Need of Client side technology in multi-tier
architectures, XML, Client side technologies- HTML, DHTML, Java Applets, Active X controls, DOM,
AJAX.
Case study-Mobile or portable client side technologies.
Unit VI Middleware and Server Side Technologies 07 Hours
Course Objectives:
To understand the fundamentals of Data Mining
To identify the appropriateness and need of mining the data
To learn the preprocessing, mining and post processing of the data
To understand various methods, techniques and algorithms in data mining
Course Outcomes:
On completion of the course the student should be able to-
Apply basic, intermediate and advanced techniques to mine the data
Analyze the output generated by the process of data mining
Explore the hidden patterns in the data
Optimize the mining process by choosing best data mining technique
Course Contents
Unit I Basics of Data Mining 08
Hours
Data Mining, Data Mining Task Primitives, Data: Data, Information and Knowledge;
Attribute Types: Nominal, Binary, Ordinal and Numeric attributes, Discrete versus
Continuous Attributes; Introduction to Data Preprocessing, Data Cleaning: Missing values,
Noisy data; Data integration: Correlation analysis; transformation: Min-max normalization, z-
score normalization and decimal scaling; data reduction: Data Cube Aggregation, Attribute
Subset Selection, sampling; and Data Discretization: Binning, Histogram Analysis.
Measuring Data Similarity and Dissimilarity, Proximity Measures for Nominal Attributes and
Binary Attributes, interval scaled; Dissimilarity of Numeric Data: Minskowski Distance,
Euclidean distance and Manhattan distance; Proximity Measures for Categorical, Ordinal
Attributes, Ratio scaled variables; Dissimilarity for Attributes of Mixed Types, Cosine
Similarity.
Market basket Analysis, Frequent item set, Closed item set, Association Rules, a-priori
Algorithm, Generating Association Rules from Frequent Item sets, Improving the Efficiency
of a-priori, Mining Frequent Item sets without Candidate Generation: FP Growth Algorithm;
Mining Various Kinds of Association Rules: Mining multilevel association rules, constraint
based association rule mining, Meta rule-Guided Mining of Association Rules.
Introduction to: Classification and Regression for Predictive Analysis, Decision Tree
Induction, Rule-Based Classification: using IF-THEN Rules for Classification, Rule
Induction Using a Sequential Covering Algorithm. Bayesian Belief Networks, Training
Bayesian Belief Networks, Classification Using Frequent Patterns, Associative Classification,
Lazy Learners-k-Nearest-Neighbor Classifiers, Case-Based Reasoning.
Books:
Text:
1. Han, Jiawei Kamber, Micheline Pei and Jian, “Data Mining: Concepts and
Techniques”, Elsevier Publishers Second Edition, ISBN:9780123814791,
9780123814807.
1. Parag Kulkarni, “Reinforcement and Systemic Machine Learning for Decision
Making” by Wiley-IEEE Press, ISBN: 978-0-470-91999-6
References:
2. Matthew A. Russell, "Mining the Social Web: Data Mining Facebook, Twitter,
LinkedIn, Google+, GitHub, and More" , Shroff Publishers, 2nd Edition, ISBN:
9780596006068
3. Maksim Tsvetovat, Alexander Kouznetsov, "Social Network Analysis for
Startups:Finding connections on the social web", Shroff Publishers , ISBN: 10:
1449306462
Course Contents
Unit I Introduction of Distributed Systems 06 Hours
Introduction, Examples of distributed systems, Resource sharing and the Web, Challenges, System
models- Architectural models, Fundamental models.
Unit II Communication 06 Hours
Inter-Process Communication- Introduction, The API for the Internet protocols, External data
representation and marshalling, Client-server communication, Group communication, Inter process
communication in UNIX, Distributed Objects and Remote Invocation-Communication between
distributed objects, Sun RPC, Events and notifications, Java RMI.
Unit III Synchronization 06 Hours
Clocks, events and process states, Synchronizing physical clocks, Logical time and logical clocks,
Global states, Mutual exclusion, Elections, Multicast communication, Distributed transactions
Unit IV Distributed File Systems 08 Hours
Introduction, File service architecture, Sun Network File System, Andrew File System Name
Services-Name services and the Domain Name, Directory services, Global Name Service, X.500
Directory Service, Peer-to-Peer Systems.
Unit V Distributed Shared Memory 07 Hours
Design and implementation issues, Sequential consistency, Release consistency, Other consistency
models.
Unit VI Distributed System Security and Web services 07 Hours
Introduction, Potential attacks to computer systems, Cryptography, Authentication, Access control,
Digital signatures, Design principles, DCE security service, Web services-SOAP; Service
descriptions and IDL for web services, A directory service for use with web services, XML
security, Coordination of web services.
Books:
Text:
1. George Coulouris, Jean Dollimore and Tim Kindberg, “Distributed Systems, Concepts and
Design”, Fourth Edition, Addison Wesley, ISBN 0-13-214301-1
2. Pradee Pradeep K. Sinha, "Distributed Operating Systems Concepts and Design" , PHI
Publication, ISBN-13: 978-0132143011
References:
1. Shvartsman, A.A., Weatherspoon, H.; Zhao, “Future Directions in Distributed Computing
Research and Position Papers Series: Lecture Notes in Computer Science” , Vol. 2584
Schiper, (Eds.) 2003, X, 219 p., ISBN: 978-3-540- 00912-2
2. Andrew S. Tanenbaum & Maarten van Steen, “Distributed Systems –Principles and
Paradigms" , PHI Publication, ISBN 0-13-239227-5
3. Sape Mullender, “Distributed Systems, (Editor),Addison-Wesley Publication, ISBN 10:
0201624273 - ISBN13: 9780201624274
4. Kenneth, P. Birman, “eliable Distributed Systems: Technologies, Web Services, and
Applications, Springer; 1 edition, ISBN-10: 0387215093; ISBN-13: 978-0387215099
5. Galli D.L., “Distributed Operating Systems: Concepts and Practice”, Prentice-Hall 2000,
ISBN0-13-079843-6
Testing Process and number of defects found, Test teem efficiency, Mutation testing, challenges,
test team approach, Process problem faced, Cost aspect, establishing testing policy, methods,
structured approach, categories of defect, Defect/ error/ mistake in software, Developing Test
Strategy and Plan, Testing process, Attitude towards testing, approaches, challenges, Raising
management awareness for testing, skills required by tester.
Unit III Software Test Automation 6 Hours
What is Test Automation, Terms used in automation, Skills needed for automation, What to
automate, scope of automation, Design & Architecture of automation, Generic requirement for
Test Tool, Process Model for Automation, Selecting Test Tool, Automation for XP/Agile model,
Challenges in Automation, Data-driven Testing
Automation Tools like JUnit, Jmeter
Unit IV Selenium Tool 6 Hours
Introducing Selenium, Brief History of The Selenium Project, Selenium‟s Tool Suite, Selenium-
IDE, Selenium RC, Selenium Web Deiver, Selenium Grid, Test Design Considerations
Unit V Quality Management 6 Hours
Quality Concepts
Software Quality, Software Quality Dilemma, Achieving Software Quality
Software Quality Assurance
Elements of SQA, SQA Tasks, Goals, and Metrics, Formal Approaches to SQA, Statistical
Software Quality Assurance, Six Sigma for Software Engineering, ISO 9000 Quality Standards,
SQA Plan
Unit VI Software Quality Tools 6 Hours
Total Quality Management, Product Quality Metrics, In process Quality Metrics, Software
maintenance, Ishikawa's 7 basic tools, Checklists, Pareto diagrams, Histogram, Run Charts, Scatter
diagrams, Control chart, Cause Effect diagram. Defect Removal Effectiveness & Process Maturity
Level
Books:
Text:
1. M G Limaye, “Software Testing Principles, Techniques and Tools”, Tata Mcgraw Hill,
ISBN: 9780070139909 0070139903
2. Srinivasan Desikan, Gopalswamy Ramesh, “Software Testing Principles and Practices”,
Pearson, ISBN-10: 817758121X
References:
1. Naresh Chauhan, “Software Testing Principles and Practices ", OXFORD, ISBN-10:
0198061846. ISBN-13: 9780198061847
2. Stephen Kan, “Metrics and Models in Software Quality Engineering”, Pearson, ISBN-10:
0133988082; ISBN-13: 978-0133988086
Introduction, 2 person zero sum games, Maximi - Minimax principle, Principle of Dominance,
Solution for mixed strategy problems, Graphical method for 2 x n and m x 2 games. Recursive
nature of computations in Dynamic Programming, Forward and backward recursion, Dynamic
Programming Applications – Knapsack, Equipment replacement, Investment models
Books:
Text:
1. Hamdy A. Taha, “Operations Research” , Pearson Education, 8th Edition, ISBN: 978-81-
317-1104-0
2. Gillett, “Introduction to Operation Research”, TMH, ISBN: 0070232458
References:
1. S.D. Sharma, Kedarnath, Ramnath & Co, “Operations Research”, 2009, ISBN:978-81-224-
2288-7
2. Hrvey M. Wagner, “Principles of Operations Research”, Second Edition, Prentice Hall of
India Ltd., 1980, ISBN: 10: 0137095767, 13: 9780137095766..
3. V.K. Kapoor, “Operations Research”, S. Chand Publishers, New Delhi, 2004,
ISBN: 9788180548543, 8180548546.
4. R. Paneer Selvam, “Operations Research”, Second Edition, PHI Learning Pvt. Ltd., New
Delhi, 2008, ISBN: 10: 8120329287,: 9788120329287.
Course Contents
Unit I Introduction to Cellular Networks 06 Hours
Cell phone generation-1G to 5G, Personal Communication System (PCS), PCS Architecture,
Mobile Station,, SIM, Base Station, Base Station Controller, Mobile Switching Center, MSC
Gateways, HLR and VLR, AuC/EIR/OSS, Radio Spectrum, Free Space Path Loss, S/N Ratio, Line
of sight transmission, Length of Antenna, Fading in Mobile Environment.
Unit II Cellular Network Design 06 Hours
Performance Criterion, Handoff/Hanover, Frequency Reuse, Co-channel Interference and System
Capacity, Channel Planning, Cell Splitting, Mobility Management in GSM and CDMA.
Unit III Medium Access Control 06 Hours
Specialized MAC, SDMA, FDMA, TDMA, CDMA, Frequency Hopping Spread Spectrum (FHSS),
Direct Sequence Spread Spectrum (DSSS), GMSK Modulation, 8PSK, 64 QAM, 128 QAM and
OFDM
Unit IV GSM 08 Hours
GSM – Architecture, GSM Identifiers, Spectrum allocation, Physical and Logical Traffic and
Control channels, GSM Bursts, GSM Frame, GSM Speech Encoding and decoding, Location
Update, Incoming and Outgoing Callsetup, GPRS.
Books:
Text:
1. Jochen Schiller, “Mobile Communications”, Pearson Education, Second Edition, 2004, ISBN:
13: 978-8131724262
2. Jason Yi-Bing Lin, Yi-Bing Lin, Imrich Chlamtac, “Wireless and Mobile network
Architecture”, 2005, ISBN: 0-471-74922-2.
3. Martin Sauter, “3G, 4G and Beyond: Bringing Networks, Devices and the Web Together”,
2012, ISBN-13: 978-1118341483
References:
1. Theodore S Rappaport, “Wireless Communications – Principles and Practice” , Pearson
Education India, Second Edition, 2010, ISBN: 978-81-317-3186-4
2. William Stallings, “Wireless Communication and Networks”, Prentice Hall, Second Edition,
2014, ISBN: 978-0131918351
Course Outcomes:
On completion of the course, student will be able to–
•
Each student must perform assignments individually and/or mini-projects in a group of 2-3
students.
Course Outcomes:
On completion of the course, student will be able to–
•
Each student must perform assignments individually and/or mini-projects in a group of 2-3
students as a part of lab for each lab course under the guidance of subject teacher.
4. Find the N point DFT / IDFT of the given sequence x (n). Plot the magnitude spectrum |X(K)|
Vs K. (Analyze the output for different N and the same input sequence x(n). Also observe the
periodicity and symmetry property)
5. Find the N point circular convolution of given two sequences. Test it for Linear convolution.
Compute the circular convolution of given two sequences using DFT and IDFT.
6. Develop a program to plot the magnitude and phase response of a given system ( given: h(n):
impulse response of system S) (Observe the frequency response for different systems.
Syllabus for Fourth Year of Computer Engineering #33/82
Faculty of Engineering Sav itribai Phule Pune University, Pune
Compare the frequency response of a system (filter) for different length h(n) i.e filter
coefficients)
7. Mini-Project 1: Design and Develop the N-point radix-2 DIT or DIF FFT algorithm to find
DFT or IDFT of given sequence x (n). (Analyze the output for different N. Program should
work for any value of N and output should be generated for all intermediate stages.)
8. Mini-Project 2: Obtain the Fourier transform of different window functions to plot the
magnitude and phase spectrums. (Window functions: Rectangular, Triangular, Bartlett,
Hamming, Henning, Kaiser. Observe and compare the desirable features of window sequences
for different length. Observe the main and side lobes)
9. Mini-Project 3: Design an FIR filter from given specifications using windowing method.
(Application should work for different types of filter specifications i.e. LPF, HPF, BPF etc and
all window sequences. Plot the frequency response for different frequency terms i.e. analog
and DT frequency)
10. Mini-Project 4: Design of IIR filter for given specifications using Bilinear Transformation.
(Generalized code to accept any filter length for a transfer function H(Z). Application should
work for different types of filter specifications i.e. LPF, HPF, BPF etc. and for different
transfer functions of an analog filter)
410244(B): Software Architecture and Design Patterns
Students have to carry out any two mini-projects in a group of 2-3 students
1. Mini-Project 1: Narrate concise System Requirements Specification and organize the problem
domain area into broad subject areas and identify the boundaries of problem/system. Identify
and categorize the target system services with detailed service specifications modeled with
component diagram incorporating appropriate architectural style and coupling. Design the
service layers and tiers modeled with deployment diagram accommodating abstraction,
autonomy, statelessness and reuse. Map the service levels and primitives to appropriate
Strategies for data processing using Client-Server Technologies as applicable.
Smart Mobile Application with ambient sound / noise sensing to adjust the volume of the
phone automatically.
-OR-
Smart Mobile Application with ambient light sensing to adjust the screen brightness
automatically.
5. Mini-Project 1: Smart Mobile Application for Location-Based Messaging
Design and build an Location-Based Messaging system where users have commented on
various eating joints in the area you currently are. The mobile application should give you
inputs / recommendations / suggestions on which eating joints are preferred by whom and for
what eating items, with their ratings etc.
6. Mini-Project 2: Smart Mobile Application as a Museum Guide
Build a Mobile Application as a museum guide, the device scans the QR codes on the artifacts
and gives an interactive detailed explanation using Audio / Text / Video about the museum
artifact. using location of the user and the list of previously seen artifacts, the mobile
application can suggest / recommend which next artifacts to be seen be the user
7. Mini-Project 3: Smart Mobile Application as a Travel / Route Guide, Scenario -
You are visiting an ancient monument. There is no local guide available. The previous users
have commented on various locations where artifacts can be seen, photo are uploaded.
The smart mobile application will give you directions / recommendations / suggestions on
what to see and where, including narratives on the same.
8. Mini-Project 4: Design and build a „Multifunctional Application‟ in the Mobile and Pervasive
domain. The choice of application is to be determined so as to leverage the capabilities of
typical smart devices.
These include such characteristics as,
Location awareness and GPS systems
Accelerometers
Messaging
Sensor detection capability
Microphone & Camera
Media Player
Touch screen
Mapping Technology
Mobile Web Services
410244(D): Data Mining& Warehousing
Students have to carry out following 04 assignments individually and one mini-project in a group
of 2-3 students.
1. For an organization of your choice, choose a set of business processes. Design star / snow
flake schemas for analyzing these processes. Create a fact constellation schema by combining
them. Extract data from different data sources, apply suitable transformations and load into
destination tables using an ETL tool. For Example: Business Origination: Sales, Order,
Marketing Process.
2. Consider a suitable dataset. For clustering of data instances in different groups, apply different
clustering techniques (minimum 2). Visualize the clusters using suitable tool.
3. Apply a-priori algorithm to find frequently occurring items from given data and generate
strong association rules using support and confidence thresholds.
4. Consider a suitable text dataset. Remove stop words, apply stemming and feature selection
techniques to represent documents as vectors. Classify documents and evaluate precision,
recall.
410245: Elective II
410245(A): Distributed Systems
Students have to carry out following eight assignments individually .
1. Design and develop a basic prototype distributed system (e.g. a DFS).
2. Design and implement client server application using RPC/ RMI mechanism (Java)
3. Design and implement a clock synchronization algorithm for prototype DS
4. Implement Ring or Bully election algorithm for prototype DS.
5. Implement Ricart Agrawala‟s distributed algorithm for mutual exclusion.
6. Problem solving of Wait-die and Wait –wound scheme for deadlock prevention.
7. Simulate Wait for Graph based Centralized or Hierarchical or Distributed algorithm for
deadlock detection.
8. Implementation of 2PC / Byzantine Generals Problem
410245(B): Software Testing and Quality Assurance
Students have to carry out following two mini-projects in a group of 2-3 students.
1. Mini-Project 1: Create a small application by selecting relevant system environment /
platform and programming languages. Narrate concise Test Plan consisting features to be
tested and bug taxonomy. Prepare Test Cases inclusive of Test Procedures for identified Test
Scenarios. Perform selective Black-box and White-box testing covering Unit and Integration
test by using suitable Testing tools. Prepare Test Reports based on Test Pass/Fail Criteria and
judge the acceptance of application developed.
2. Mini-Project 2: Create a small web-based application by selecting relevant system
environment / platform and programming languages. Narrate concise Test Plan consisting
features to be tested and bug taxonomy. Narrate scripts in order to perform regression tests.
Identify the bugs using Selenium WebDriver and IDEand generate test reports encompassing
exploratory testing.
410245(C):: Operation Research
Students have to carry out following two mini-projects in a group of 2-3 students.
1. The Transportation Problem:
Milk in a milk shed area is collected on three routes A, B and C. There are four chilling centers P,
Q, R and S where milk is kept before transporting it to a milk plant. Each route is able to supply on
an average one thousand liters of milk per day. The supply of milk on routes A, B and C are 150,
160 and 90 thousand liters respectively. Daily capacity in thousand liters of chilling centers is 140,
120, 90 and 50 respectively. The cost of transporting 1000 liters of milk from each route (source)
Syllabus for Fourth Year of Computer Engineering #36/82
Faculty of Engineering Sav itribai Phule Pune University, Pune
to each chilling center (destination) differs according to the distance. These costs (in Rs.) are
shown in the following table
Chilling Centers
Routes P Q R S
A 16 18 21 12
B 17 19 14 13
C 32 11 15 10
The problem is to determine how many thousand liters of milk is to be transported from each route
on daily basis in order to minimize the total cost of transportation.
2. Investment Problem:
A portfolio manager with a fixed budget of $100 million is considering the eight investment
opportunities shown in Table 1. The manager must choose an investment level for each alternative
ranging from $0 to $40 million. Although an acceptable investment may assume any value within
the range, we discretize the permissible allocations to intervals of $10 million to facilitate the
modeling. This restriction is important to what follows. For convenience we define a unit of
investment to be $10 million. In these terms, the budget is 10 and the amounts to invest are the
integers in the range from 0 to 4. Following table provides the net annual returns from the
investment opportunities expressed in millions of dollars. A ninth opportunity, not shown in the
table, is available for funds left over from the first eight investments. The return is 5% per year for
the amount invested, or equivalently, $0.5 million for each $10 million invested. The manager's
goal is to maximize the total annual return without exceeding the budget
4. Design an android Application using Google Map To Trace The Location of Device
6. Mini-Project 1: Design mobile app to perform the task of creating the splash screen for the
application using timer, camera options and integrate Google map API on the first page of the
application. Make sure map has following features:
7. Mini-Project 2: Create an app to add of a product to SQLite database and make sure to add
following features
8. Mini-Project 3: Create the module for collecting cellular mobile network performance
parameters using telephony API Manager
10. Mini-Project 5: Create the module for payment of fees for College by demonstrating the
following methods.
Course Outcomes:
On completion of the course, student will be able to–
• Solve real life problems by applying knowledge.
Analyze alternative approaches, apply and use most appropriate one for feasible solution.
Write precise reports and technical documents in a nutshell.
Participate effectively in multi-disciplinary and heterogeneous teams exhibiting team work,
Inter-personal relationships, conflict management and leadership quality.
Guidelines
Project work Stage – I is an integral part of the Project work. In this, the student shall complete the
partial work of the Project which will consist of problem statement, literature review, SRS, Model
and Design. The student is expected to complete the project up to the design phase.As a part of the
progress report of project work Stage-I, the candidate shall deliver a presentation on the
advancement in Technology pertaining to the selected project topic. The student shall submit the
duly certified progress report of Project work Stage-I in standard format for satisfactory completion
of the work by the concerned guide and head of the Department/Institute.
The examinee will be assessed by a panel of examiners of which one is necessarily an external
examiner. The assessment will be broadly based on work undergone, content delivery, presentation
skills, documentation, question-answers and report.
Course Objectives:
Course Outcome:
On completion of the course, learner will be able to–
Course Contents:
1. Introduction: Concept and Definitions, Entrepreneur v/s Intrapreneur; Role of entrepreneurship in
economic development; Entrepreneurship process; Factors impacting emergence of entrepreneurship;
Managerial versus entrepreneurial Decision Making; Entrepreneur v/s Investors; Entrepreneurial
attributes and characteristics; Entrepreneurs versus inventors; Entrepreneurial Culture; Women
Entrepreneurs; Social Entrepreneurship; Classification and Types of Entrepreneurs; EDP Programmers;
Entrepreneurial Training; Traits/Qualities of an Entrepreneurs.
2. Creating Entrepreneurial Venture : Generating Business idea- Sources of Innovation, methods of
generating ideas, Creativity and Entrepreneurship; Challenges in managing innovation; Business
planning process; Drawing business plan; Business plan failures; Entrepreneurial leadership –
components of entrepreneurial leadership; Entrepreneurial Challenges; Legal issues – forming business
entity, considerations and Criteria, requirements for formation of a Private/Public Limited Company,
Intellectual Property Protection - Patents Trademarks and Copyrights – importance for startups, Legal
Acts Governing Business in India.
3. Functional plans: Marketing plan–for the new venture, environmental analysis, steps in preparing
marketing plan, marketing mix, contingency planning; Organizational plan – designing organization
structure and Systems; Financial plan – pro forma income statements, pro forma cash budget, funds Flow
and Cash flow statements; Pro forma balance sheet; Break Eve n Analysis; Ratio Analysis.
4. Entrepreneurial Finance: Debt or equity financing, Sources of Finance - Commercial banks, private
placements, venture capital, financial institutions supporting entrepreneurs; Lease Financing; Funding
opportunities for Startups in India.
5. Enterprise Management: Managing growth and sustenance- growth norms; Factors for growth; Time
management, Negotiations, Joint ventures, Mergers & acquisitions
Books:
1. Kumar, Arya,`` Entrepreneurship: Creating and Leading an Entrepreneurial Organization‟‟,
Pearson
2. Hishrich., Peters, ``Entrepreneurship: Starting, Developing and Managing a New
Enterprise,‟‟ Irwin Taneja, ``Entrepreneurship,‟‟ Galgotia Publishers.
3. Barringer, Brace R., and R. Duane, ``Entrepreneurship,‟‟ Pearson Prentice Hall
4. Hisrich, Robert D., Michael Peters and Dean Shephered, ``Entrepreneurship,‟‟ Tata
McGraw Hill
5. Lall, Madhurima, and Shikha Sahai, ``Entrepreneurship,‟‟ Excel Books
6. Charantimath, Poornima, ``Entrepreneurship Development and Small Business
Enterprises,‟‟ Pearson Education
Course Objectives:
To Understand the various IoT Protocols
To Understand the IoT Reference Architecture and Real World Design Constraints
Course Outcome:
On completion of the course, learner will be able to–
To implement security as a culture and show mistakes that make applications vulnerable to attacks.
To understand various attacks like DoS, buffer overflow, web specific, database specific, web -
spoofing attacks.
To demonstrate skills needed to deal with common programming errors that lead to most security
problems and to learn how to develop secure applications
Course Contents:
1. Introduction
2. IRC-Based Bot Networks
3. Anatomy of a Botnet: The Gaobot Worm
4. IoT Senosors & Security : Sensors and actuators in IoT, Communication and networking in IoT,
Real-time data collection in IoT, Data analytics in IoT , IoT applications and requirements, Security
threats and techniques in IoT, Data trustworthiness and privacy in IoT, Balancing utility and other
design goals in IoT , Future of Botnets in the Internet of Things, Thingbots, Elements of Typical
IRC Bot Attack , Malicious use of Bots & Botnet
5. Service Layer Protocols & Security : Security: PHP Exploits, Cross-Site Scripting and Other
Browser-Side Exploits, Bots and Botnets, Service Layer -oneM2M, ETSI M2M, OMA, BBF –
Security in IoT Protocols –MAC 802.15.4 , 6LoWPAN, RPL, Application Layer Transport &
Session layer protocols- transport Layer (TCP, MPTCP, UDP, DCCP, SCTP) - (TLS, DTLS) –
Session Layer - HTTP, CoAP, XMPP, AMQP, MQTT
Books:
1. Bernd Scholz - Reiter, Florian Michahelles, “Architecting the Internet of Things”, Springer ISBN 978 –
3 – 642 – 19156 - 5 e - ISBN 978 – 3 -642 - 19157 - 2,
2. Threat Modeling, Frank Swiderski and Window Snyder,Microsoft Professional, 1 st Edition 2004
3. Gunter Ollmann 2007. The Phishing Guide Understanding & Preventing Phishing Attacks. IBM Internet
Security Systems.
4. Daniel Minoli, “Building the Internet of Things with IPv6 and MIPv6: The Evolving World of M2M
Communications”, ISBN: 978 – 1 – 118 – 47347 - 4, Willy Publications
Course Objectives:
Course Outcome:
On completion of the course, learner will be able to–
Course Contents:
1. Getting Started with 3D Printing: How 3D Printers Fit into Modern Manufacturing, Exploring
the Types of 3D Printing, Exploring Applications of 3D Printing.
2. Outlining 3D Printing Resources: Identifying Available Materials for 3D Printing, Identifying
Available Sources for 3D Printable Objects.
3. Exploring the Business Side of 3D Printing: Commoditizing 3D Printing, Understanding 3D
Printing's Effect on Traditional lines of Business, Reviewing 3D Printing Research.
4. Employing Personal 3D printing Devices: Exploring 3D printed Artwork, Considering
Consumer level 3D Printers, Deciding on RepEap of Your Own.
Books:
1. Richard Horne, Kalani Kirk Hausman, “ 3D Printing for Dummies”, Taschenbuch, ISBN:
9781119386315
2. Greg Norton, “3D Printing Business - 3D Printing for Beginners - How to 3D Print”
,ISBN:9781514785669
3. Liza Wallach Kloski and Nick Kloski, “ Getting Started with 3D Printing: A Hands-on
Guide to the Hardware, Software, and Services Behind the New Manufacturing
Revolution”, Maker Media, ISBN: 1680450204
4. Jeff Heldrich , “3D Printing: Tips on Getting Started with 3D Printing to Help you make
Passive income for your Business”
\
Syllabus for Fourth Year of Computer Engineering #44/82
Faculty of Engineering Sav itribai Phule Pune University, Pune
SEMESTER II
Classic and adaptive machines, Machine learning matters, Beyond machine learning-deep learning
and bio inspired adaptive systems, Machine learning and Big data.
Important Elements of Machine Learning- Data formats, Learnability, Statistical learning
approaches, Elements of information theory.
Unit II Feature Selection 08 Hours
Scikit- learn Dataset, Creating training and test sets, managing categorical data, Managing missing
features, Data scaling and normalization, Feature selection and Filtering, Principle Component
Analysis(PCA)-non negative matrix factorization, Sparse PCA, Kernel PCA. Atom Extraction and
Dictionary Learning.
Unit III Regression 08 Hours
Linear regression- Linear models, A bi-dimensional example, Linear Regression and higher
dimensionality, Ridge, Lasso and ElasticNet, Robust regression with random sample consensus,
Polynomial regression, Isotonic regression,
Logistic regression-Linear classification, Logistic regression, Implementation and Optimizations,
Stochastic gradient descendent algorithms, Finding the optimal hyper-parameters through grid
search, Classification metric, ROC Curve.
Unit IV Naïve Bayes and Support Vector Machine 08 Hours
Bayes‟ Theorom, Naïve Bayes‟ Classifiers, Naïve Bayes in Scikit- learn- Bernoulli Naïve Bayes,
Multinomial Naïve Bayes, and Gaussian Naïve Bayes.
Support Vector Machine(SVM)- Linear Support Vector Machines, Scikit- learn implementation-
Linear Classification, Kernel based classification, Non- linear Examples. Controlled Support
Vector Machines, Support Vector Regression.
Unit V Decision Trees and Ensemble Learning 08 Hours
Decision Trees- Impurity measures, Feature Importance. Decision Tree Classification with Scikit-
learn, Ensemble Learning-Random Forest, AdaBoost, Gradient Tree Boosting, Voting Classifier.
Clustering Fundamentals- Basics, K-means: Finding optimal number of clusters, DBSCAN,
Spectral Clustering. Evaluation methods based on Ground Truth- Homogeneity, Completeness,
Adjusted Rand Index.
Introduction to Meta Classifier: Concepts of Weak and eager learner, Ensemble methods,
Bagging, Boosting, Random Forests.
Unit VI Clustering Techniques 08 Hours
References:
1. Ethem Alpaydin, “ Introduction to Machine Learning”, PHI 2nd Edition-2013, ISBN 978-0-
262-01243-0
2.Peter Flach, “Machine Learning: The Art and Science of Algorithms that Make Sense of Data”,
Cambridge University Press, Edition 2012, ISBN-10: 1107422221; ISBN-13: 978-1107422223
3.Tom Mitchell “Machine Learning” McGraw Hill Publication, ISBN :0070428077
9780070428072
4.Nikhil Buduma, “Fundamentals of Deep Learning”, O‟REILLY publication, second edition
2017, ISBN: 1491925612
Overview - Computer Security Concepts, The OSI Security Architecture, Security Attacks,
Security Services, Security Mechanisms, A Model for Network Security.
Classical Encryption Techniques- Symmetric Cipher Model, Substitution Techniques,
Transposition Techniques, Rotor Machines, Steganography.
Block Ciphers and the Data Encryption Standard - Block Cipher Principles, The Data
Encryption Standard (DES) , A DES Example , The Strength of DES, Differential and Linear
Cryptanalysis, Block Cipher Design Principles.
Unit II Data Encryption Standards 08 Hours
Basic Concepts in Number Theory and Finite Fields - Divisibility and the Division Algorithm,
The Euclidean Algorithm, Modular Arithmetic, Groups, Rings, and Fields, Finite Fields of the
Form GF(p), Polynomial Arithmetic , Finite Fields of the Form GF(2N ).
Advanced Encryption Standard - The Origins AES, AES Structure, AES Round Functions, AES
Key Expansion, An AES Example.
Unit III Cipher Operation 08 Hours
Block Cipher Operation- Multiple Encryption and Triple DES, Electronic Codebook Mode,
Cipher Block Chaining Mode, Cipher Feedback Mode, Output Feedback Mode, Counter Mode.
Pseudorandom Number Generation and Stream Ciphers- Principles of Pseudorandom Number
Generation, Pseudorandom Number Generators, Pseudorandom Number Generation Using a Block
Cipher, Stream Ciphers, RC5, True Random Numbers.
Unit IV Key Management 08 Hours
Course Contents
Unit I DFT and Applications Hours
DFT and Applications – Linear filtering, spectral leakage, Spectral resolution and selection of
Window Length, Frequency analysis, 2-D DFT, applications in Image & Speech Processing
Unit II Adaptive FIR and IIR filter Design Hours
Adaptive FIR and IIR filter Design – DT Filters, FIR and IIR filters, Adaptive FIR Filter design:
Steepest descent and Newton method, LMS method, Applications, Adaptive IIR Filter design:
Pade Approximation, Least square design, Applications
Unit III Multi-rate DSP and applications Hours
Adaptive FIR and IIR filter Design – DT Filters, FIR and IIR filters, Adaptive FIR Filter design:
Steepest descent and Newton method, LMS method, Applications, Adaptive IIR Filter design:
Pade Approximation, Least square design, Applications
Unit IV Spectral Estimation Hours
Spectral Estimation – Estimation of density spectrum, Nonparametric method, Parametric method,
Evaluation ,DCT and WT – DCT and KL transform, STFT, WT, Harr Wavelet and Dubecheis
Wavelet, Applications of DCT and WT
References:
1. Chanda, Muzumdar, “Digital Image Processing and Analysis,” Estern Economy Edition,
PHI, 2nd Ed., ISBN: 978-81-203-4096-1
2. TarunRawat, “Digital Signal Processing”, Oxford University Press, 2015, ISBN-10:
0198062281
3. Roberto Crist, “Modern Digital Signal Processing,” Thomson Brooks/Cole 2004,
ISBN:978-93-80026-55-8.
4. Nelson Morgan and Ben Gold, “ Speech and Audio Signal Processing: Processing and
Perception Speech and Music”, 1999, John Wiley & Sons, ISBN: 0387951547
5. Raghuveer. M. Rao, AjitS.Bopardikar, “Wavelet Transforms: Introduction to Theory and
applications,” Pearson Education, Asia, 2000.Dale Grover and John R. (Jack) Deller,
“Digital Signal Processing and the Microcontroller”, Prentice Hall, ISBN:0-13-754920-2
Code Generation - Issues in code generation, basic blocks, flow graphs, DAG representation of
basic blocks, Target machine description, peephole optimization, Register allocation and
Assignment, Simple code generator, Code generation from labeled tree, Concept of code generator.
Unit VI Code Optimization 6 Hours
Need for Optimization, local, global and loop optimization, Optimizing transformations, compile
time evaluation, common sub-expression elimination, variable propagation, code movement,
strength reduction, dead code elimination, DAG based local optimization, Introduction to global
data flow analysis, Data flow equations and iterative data flow analysis.
Books:
Text:
1. V Aho, R Sethi, J D Ullman, “Compilers: Principles, Techniques, and Tools", Pearson
Edition, ISBN 81-7758-590-8
2. Dick Grune, Bal, Jacobs, Langendoen, “ Modern Compiler Design”, Wiley, ISBN 81-265-
0418-8
References:
6. Anthony J. Dos Reis, “Compiler Construction Using Java”, JavaCC and Yacc Wiley, ISBN
978-0-470-94959-7
7. K Muneeswaran, “Compiler Design", Oxford University press, ISBN 0-19-806664-3
8. J R Levin, T Mason, D Brown, “Lex and Yacc", O'Reilly, 2000 ISBN 81-7366-061-X
Introduction to real-time operating systems. Hard versus soft real-time systems and their timing
constraints. Temporal parameters of real-time process: Fixed, Jittered and sporadic release times,
execution time. Types of real-time tasks, Precedence constraints and data dependency among real-
time tasks, other types of dependencies for real-time tasks. Functional parameters and Resource
parameters of real-time process, Real-time applications: Guidance and control, Signal processing,
Multimedia, real-time databases
Real-time task and task states, task and data. Approaches to real-time scheduling: clock driver,
weighted round-robin, priority-driven- Fixed priority and dynamic priority algorithms –Rate
Monotonic (RM), Earliest-Deadline-First (EDF), Latest-Release-Time (LRT), Least-Slack-Time-
First (LST). Static and Dynamic systems, on-line and off-line scheduling, Scheduling aperiodic and
sporadic real-time tasks
Unit V Inter-process communication 07 Hours
Resources and resource access control-Assumption on resources and their usage, Enforcing mutual
exclusion and critical sections, resource conflicts and blocking, Effects of resource contention and
resource access control - priority inversion, priority inheritance.
Inter-process communication-semaphores, message queues, mailboxes and pipes. Other RTOS
services-Timer function, events, Interrupts - enabling and disabling interrupts, saving and restoring
context, interrupt latency, shared data problem while handling interrupts. Interrupt routines in an
RTOS environment
Unit VI Multiprocessor Scheduling 07 Hours
Multiprocessor Scheduling, resource access control and synchronization in Real-time Operating
system. Real-time communication: Model, priority-based service disciplines for switched networks,
weighted round-robin service disciplines, Medium access-control protocols for broadcast networks,
internet and resource reservation protocols, real-time protocols. Software development process for
embedded system: Requirements engineering, Architecture and design of an embedded system,
Implementation aspects in an embedded system, estimation modeling in embedded software.
Validation and debugging of embedded systems. Embedded software development tools.
Debugging techniques
Real-time operating systems: Capabilities of commercial real-time operating systems,
QNX/Neutrino, Microc/OS-II, VxWorks, Windows CE and RTLinux
Books:
Text:
1. Raj Kamal, “Embedded Systems: Architecture, programming and Design”, 2 nd Edition,
McGraw-Hill, ISBN: 13: 9780070151253
2. Jane W. S. Liu, “Real-Time Systems”, Pearson Education, ISBN: 10: 0130996513
1. David E. Simon, “An Embedded Software Primer”, Pearson Education, ISBN: :8177581546
References:
1. Sriram V. Iyer, Pankaj Gupta, “Embedded Real-time Systems Programming”, Tata
McGraw-Hill, ISBN: 13: 9780070482845
2. Dr. K. V. K. K. Prasad, “Embedded Real-Time Systems: Concepts: Design and
Programming”, Black Book, Dreamtech Press, ISBN: 10: 8177224611,13: 9788177224610
References:
1. Siman Haykin, “Neural Netowrks”, Prentice Hall of India, ISBN: 0-7923-9475-5
2. Timothy J. Ross, “Fuzzy Logic with Engineering Applications” , Wiley India, ISBN: 978-0-
470-74376-8
3. Eiben and Smith, “Introduction to Evolutionary Computation", Springer, ISBN-10:
3642072852
Books:
Text:
1. Paul Goransson and Chuck Black, “Software Defined Networks: A Comprehensive
Approach”, Morgan Kaufmann, 2014, ISBN: 9780124166752, 9780124166844.
2. Siamak Azodolmolky, “Software Defined Networking with Open Flow, Packt Publishing,
2013, ISBN: 9781849698726
3. Thomas D. Nadeau, Ken Gray, “SDN: Software Defined Networks, An Authoritative
Review of Network Programmability Technologies”, 2013, ISBN : 10:1-4493-4230-2,
978-1-4493-4230-2
References:
1. Vivek Tiwari, “SDN and OpenFlow for Beginners”, Digital Services, 2013, ISBN: 10: 1-
940686-00-8, 13: 978-1-940686-00-4
2. Fei Hu, “Network Innovation through OpenFlow and SDN: Principles and Design”, CRC
Press, 2014, ISBN: 10: 1466572094
3. Open Networking Foundation (ONF) Documents, https://www.opennetworking.org, 2015
Predictive Models, Cognitive Models. Interaction with Natural Languages, Next Generation
Interface. Socio-organizational Issues and Stakeholder Requirements. Heuristic Evaluation,
Evaluation with Cognitive Models, Evaluation with Users.
Unit VI Task Models and Dialogs 06 Hours
Task Analysis, DOET (Design of Everyday Things). Design Dialogs Notations, Warnings, and Error
messages. Model-based Evaluation. User Testing, Usability Testing, User Acceptance Testing.
Books:
Text:
1. Alan J, Dix. Janet Finlay, Rusell Beale, "Human Computer Interaction", Pearson
Education, 3rd Edition, 2004, ISBN 81-297-0409-9
2. Jenny Preece, Rogers, Sharp, “Interaction Design-beyond human-computer interaction”,
WILEY-INDIA, ISBN 81-265-0393-9
References:
1. Jonathan Lazar, Jinjuan Feng, Harry Hochheiser, “Research Methods in Human-Computer
Interaction", Third Edition, Morgan Kaufmann, 2017, ISBN: 9780128053904.
2. Mary Beth Rosson and John M. Carroll, “Usability Engineering: Scenario-Based
Development of Human-Computer Interaction”, Morgan Kaufmann, 2001, ISBN-13: 978-
1558607125
Services offered by Amazon Hands-on Amazon, EC2 - Configuring a server, Virtual Amazon
Cloud, AWS Storage & Content Delivery Identify key AWS storage options Describe Amazon EBS
Creating an Elastic Block Store Volume Adding an EBS Volume to an Instance Snapshotting an EBS
Volume and Increasing Performance Create an Amazon S3 bucket and manage associated objects.
AWS Load Balancing Service Introduction Elastic Load Balancer Creating and Verifying Elastic
Load Balancer.
Unit V Ubiquitous Clouds and the Internet of Things 07 Hours
Cloud Trends in Supporting Ubiquitous Computing, Performance of Distributed Systems and the
Cloud, Enabling Technologies for the Internet of Things (RFID, Sensor Networks and ZigBee
Technology, GPS), Innovative Applications of the Internet of Things (Smart Buildings and Smart
Power Grid, Retailing and Supply-Chain Management, Cyber-Physical System), Online Social and
Professional Networking
Unit VI Future of Cloud Computing 07 Hours
How the Cloud Will Change Operating Systems, Location-Aware Applications, Intelligent Fabrics,
Paints, and More, The Future of Cloud TV, Future of Cloud-Based Smart Devices, Faster Time to
Market for Software Applications, Home-Based Cloud Computing, Mobile Cloud, Autonomic Cloud
Engine, Multimedia Cloud, Energy Aware Cloud Computing, Jungle Computing. Docker at a
Glance: Process Simplification, Broad Support and Adoption, Architecture, Getting the Most from
Docker, The Docker Workflow.
Books:
Text:
1. Anthony T. Velte Toby J. Velte, Robert Elsenpeter, “Cloud Computing: A Practical
Approach”, 2010, The McGraw-Hill.
2. Dr. Kris Jamsa, “ Cloud Computing: SaaS, PaaS, IaaS, Virtualization and more” , Wiley
Publications, ISBN: 978-0-470-97389-9
3. Gautam Shrof, “ENTERPRISE CLOUD COMPUTING Technology Architecture,
Applications, Cambridge University Press, ISBN: 9780511778476
References:
1. Dr. Kumar Saurabh,"Cloud Computing", Wiley Publication, ISBN10: 8126536039
2. Barrie Sosinsky,"Cloud Computing", Wiley India, ISBN: 978-0-470-90356-8
3. Kailash Jayaswal, “Cloud computing", Black Book, Dreamtech Press
4. Thomas Erl, Zaigham Mahmood and Ricardo Puttini, “Cloud Computing: Concepts,
Technology & Architecture”, Pearson, 1st Edition, ISBN :978 9332535923, 9332535922,
5. Rajkumar Buyya, “Clod Computing principles and paradigms” , Wiley Publication, ISBN
978-0-470-88799-8
6. Tim Mather, Subra K, Shahid L.,Cloud Security and Privacy, Oreilly, ISBN-13 978-81-8404-
815-5
Course Outcomes:
On completion of the course, student will be able to–
•
Course Teacher or Lab instructor is expected to frame the assignments by understanding the
prerequisites, technological aspects, utility and recent trends related to the topic. The assignment
framing policy need to address the average students and inclusive of an element to attract and promote
the intelligent students. The instructor may set multiple sets of assignments and distribute among
batches of students. It is appreciated if the assignments are based on real world problems/applications.
Encourage students for appropriate use of Hungarian notation, proper indentation and comments. Use
of open source software is to be encouraged.
In addition to these, instructor may assign one real life application in the form of a mini-project based
on the concepts learned. Instructor may also set one assignment or mini-project that is suitable to
respective branch beyond the scope of syllabus.
Each student must perform assignments individually and/or mini-projects in a group of 2-3
students as a part of lab for each lab course.
6. Mini-Project 2 on SVM:
Apply the Support vector machine for classification on a dataset obtained from UCI ML
repository.
For Example: Fruits Classification or Soil Classification or Leaf Disease Classification
7. Mini-Project 3 on PCA:
Apply the Principal Component Analysis for feature reduction on any Company Stock Market
Dataset
1. Implementation of S-DES
2. Implementation of S-AES
3. Implementation of Diffie-Hellman key exchange
4. Implementation of RSA.
5. Implementation of ECC algorithm.
6. Mini Project 1: SQL Injection attacks and Cross -Site Scripting attacks are the two most
common attacks on web application. Develop a new policy based Proxy Agent, which classifies
the request as a scripted request or query based request, and then, detects the respective type of
attack, if any in the request. It should detect both SQL injection attack as well as the Cross-Site
Scripting attacks.
7. Mini Project 2:This task is to demonstrate insecure and secured website. Develop a web site and
demonstrate how the contents of the site can be changed by the attackers if it is http based and
not secured. You can also add payment gateway and demonstrate how money transactions can be
hacked by the hackers. Then support your website having https with SSL and demonstrate how
secured website is.
Course Outcomes:
On completion of the course, student will be able to–
•
prerequisites, technological aspects, utility and recent trends related to the topic. The assignment
framing policy need to address the average students and inclusive of an element to attract and promote
the intelligent students. The instructor may set multiple sets of assignments and distribute among
batches of students. It is appreciated if the assignments are based on real world problems/applications.
Encourage students for appropriate use of Hungarian notation, proper indentation and comments. Use
of open source software is to be encouraged.
In addition to these, instructor may assign one real life application in the form of a mini-project based
on the concepts learned. Instructor may also set one assignment or mini-project that is suitable to
respective branch beyond the scope of syllabus.
Each student must perform assignments individually and/or mini-projects in a group of 2-3
students as a part of lab for each lab course under the guidance of subject teacher.
Students have to carry out any 04 assignments individually using sample data and two mini-
projects in a group of 2-3 students using datasets. Use -
A] MATLAB or other equivalent software working with speech and image signals/files and for
analysis purpose.
B] C++ or JAVA for working with sampled data ( n – point data samples of DT/Digital signal)
algorithm
6. Feature Extraction of speech signal
A] Using LPC and other methods
B] Apply different coding methods: harmonic coding, vector quantization
7. Mini-Project 1: Discrete Cosine Transform (DCT)
A] To find DCT of NxN image block
B] To plot spectrum of the speech signal using DCT and find the correlation of DCT
transformed signal
C] Image filtering using DCT : LPF, edge detection
D] Image compression using DCT, Image resizing
8. Mini-Project 2: Wavelet Transform (WT)
A] To get compression using wavelet decomposition of a signal
B] Denoising using wavelet decomposition
C] To get compression using wavelet decomposition of a signal (Harr Wavelet)
D] To get low-pass filtered and high pass filtered speech signal using Haar wavelet
E] Image filtering using WT
9. Mini-Project 3: Image Processing
A] Histogram and Equalization
B] Image Enhancement Techniques
C] Image Filtering: LPF, HPF, Sobel/Prewitt Masks
D] Image Smoothing with special filters: Median, Weiner, Homomorphic filters
3. Implement Union, Intersection, Complement and Difference operations on fuzzy sets. Also
create fuzzy relation by Cartesian product of any two fuzzy sets and perform max-min
composition on any two fuzzy relations.
4. The figure shows a single hidden layer neural network. The weights are initialized to 1‟s as
shown in the diagram and all biases are initialized to 0‟s. Assume all the neurons have linear
activation functions. The neural network is to be trained with stochastic (online) gradient
descent. The first training example is [x1=1, x2=0] and the desired output is 1. Design the
back-propagation algorithm to find the updated value for W11 after backpropagation. Choose
the value that is the closest to the options given below: [learning rate =0.1]
Solve Air Conditioner Controller using MATLAB Fuzzy logic toolbox or Octave or Python.
410253: Elective III
Course: 410253 (A) Software Defined Networks
Students have to carry out following all assignments as a part of laboratory individually.
1. Phase I:Set up Mininet network emulation environment using Virtual Box and Mininet.
Demonstrate the basic commands in Mininet and emulate different custom network topology
(Simple, Linear, and Tree).View flow tables.
2. Phase II:Study open source POX and Floodlight controller. Install controller and run custom
topology using remote controller like POX and floodlight controller. Identify inserted flows by
the controllers.
3. Phase III:Create a SDN environment on Mininet and configure a switch to provide a firewall
functionality using POX controller.
Ref:https://github.com/mininet/openflow-tutorial/wiki/Create- Firewall
4. Phase IV:Build your own Internet Router using Mininet as an Emulator and POX controller.
Write a simple router with a static routing table. The router will receive raw Ethernet frames. It
will process the packets just like a real router, and then forward them to the correct outgoing
interface. Make sure you receive the Ethernet frame and create the forwarding logic so packets
go to the correct interface. Ref:https://github.com/mininet/mininet/wiki/Simple-Router
5. Phase V: Emulate a Data Center and manage it via a Cloud Network Controller: create a multi-
rooted tree-like (Clos) topology in Mininet to emulate a data center. Your second task is to
implement specific SDN applications on top of the network controller in order to orchestrate
multiple network tenants within a data center environment, in the context of network
virtualization and management. Ref:
https://opencourses.uoc.gr/courses/pluginfile.php/13576/mod_resource/content/2/exercise5.pdf
Course:410253 (B) Human Computer Interface
Students have to carry out following all assignments as a part of laboratory individually.
1. Identify specialized users and related facilities for a selected product / system and make
necessary suggestions for its improved accessibility design.
2. Design user persona for the users of selected product / system.
3. Conduct a contextual inquiry for selected product / system.
4. Design an interface prototype for selected product / system.
5. Evaluate an interface using usability evaluation technique.
Course: 410253 (C) Cloud Computing
List of Mini-projects: Students have to carry out following two mini-projectsin a group of 2-3 students.
3. Mini-Project 1: Setup your own cloud for Software as a Service (SaaS) over the existing LAN
in your laboratory. In this assignment you have to write your own code for cloud controller
using open source technologies without HDFS. Implement the basic operations may be like to
upload and download file on/from cloud in encrypted form.
4. Mini-Project 2: Setup your own cloud for Software as a Service (SaaS) over the existing LAN
in your laboratory. In this assignment you have to write your own code for cloud controller
using open source technologies to implement with HDFS. Implement the basic operations may
be like to divide the file in segments/blocks and upload/ download file on/from cloud in
encrypted form.
Course: 410253 (D) Open Elective
Respective College is requested to design suitable programming assignments/Mini-projects and
get approved along with course curriculum.
Syllabus for Fourth Year of Computer Engineering #74/82
Faculty of Engineering Sav itribai Phule Pune University, Pune
Course Outcomes:
On completion of the course, student will be able to–
Show evidence of independent investigation
Critically analyze the results and their interpretation.
Report and present the original results in an orderly way and placing the open questions in
the right perspective.
Link techniques and results from literature as well as actual research and future research lines
with the research.
Appreciate practical implications and constraints of the specialist subject
Guidelines
In Project Work Stage–II, the student shall complete the remaining project work which consists of
Selection of Technology and Tools, Installations, UML implementations, testing, Results,
performance discussions using data tables per parameter considered for the improvement with
existing/known algorithms/systems and comparative analysis and validation of results and
conclusions. The student shall prepare the duly certified final report of Project work in standard
format for satisfactory completion of the work by the concerned guide and head of the
Department/Institute.
Course Objectives:
To develop problem solving abilities using Mathematics
To apply algorithmic strategies while solving problems
To develop time and space efficient algorithms
To study algorithmic examples in distributed, concurrent and parallel environments
Course Outcome:
On completion of the course, learner will be able to–
To solve problem in projects
To develop SRS in the projects
To solve problems for multi-core or distributed, concurrent/Parallel environments
Course Contents:
1.Concepts with Mathematical treatment : Introduction to data, Information and knowledge,
Decision Support System, Theory of Operational data and informational data, Introduction to
Business Intelligence, Determining BI Cycle, BI Environment and Architecture, Identify BI
opportunities, Benefits of BI. Role of Mathematical model in BI, Factors Responsible for
successful BI Project, Obstacle to Business Intelligence in an Organization
2. Decision Making Concepts : Concepts of Decision Making, Techniques of Decision Support
System (DSS), Development of Decision Support System (DSS), Applications of DSS, Role of
Business Intelligence in DSS.
3. Data-Warehouse : Introduction: Data warehouse Modeling, data warehouse design, data-ware-
house technology, Distributed data warehouse, and materialized view
4.Data Pre-processing and outliers: Data Analytics life cycle, Discovery, Data preparation,
Preprocessing requirements, data cleaning, data integration, data reduction, data transformation,
Data discretization, and concept hierarchy generation, Model Planning, Model building,
Communicating Results & Findings, Operationalizing, Introduction to OLAP. Real-world
Applications, types of outliers, outlier challenges, Outlier detection Methods, Proximity-Based
Outlier analysis, Clustering Based Outlier analysis.
5.Designing and managing BI systems : Determining infrastructure requirements, planning for
scalability and availability, managing and maintenance of BI systems, managing BI operations
or business continuity
1. Books:
2. 1. R. Sharda, D. Delen, & E. Turban, Business Intelligence and Analytics. Systems for Decision
Support,10th Edition. Pearson/Prentice Hall, 2015. ISBN-13: 978-0-13-305090-5, ISBN-10: 0-13-
305090-4;
3. 2. Business Process Automation, Sanjay Mohapatra, PHI.
4. 3. Introduction to business Intelligence and data warehousing, IBM, PHI, ISBN:
8120339274, 9788120339279
Books: