CSE 2019 Scheme Auto Syllabus
CSE 2019 Scheme Auto Syllabus
FOR
Text/Reference Books:
1 Management and Entrepreneurship , N V R Naidu ,T Krishna Rao 4th reprint.
Law relating to Intellectual Property rights , B. L. Wadhera, 5th edition,Universal Law
2
Publishing, 2011
3 Principles of Management, P C Tripathi, P N Reddy, 5th edition, TataMcGraw Hill, 2012
Dynamics of Entrepreneurial Development & Management, Vasant Desai, Himalaya
4
publishing house, 2009
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 2 2
CO2 2 2 2 2
CO3 2 2 2 2
CO4 2 2 2 2
CO5 2 2 2 2
CO4 Apply the concepts of Normalization and design database which possess no anomalies.
Text/Reference Books:
Fundamentals of Database Systems, Ramez Elmasri and Shamkant B. Navathe, 7th Edition,
1
2017, Pearson
Database management systems, Ramakrishnan, and Gehrke, 3rd Edition, 2014, McGraw
2
Hill
Silberschatz Korth and Sudharshan, Database System Concepts, 6th Edition, McGrawHill,
3
2013.
Database Principles Fundamentals of Design, Implementation and Management,
4
Cengage Learning 2012.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 1 3 3 2 3 - - - 1 - - 2 2 -
CO2 3 3 3 2 2 - - - 1 - - 2 1 -
CO3 3 3 3 2 2 - - - 1 - - 2 2 2
CO4 2 3 3 2 2 - - - 1 - - 2 2 3
CO5 2 3 3 3 3 - - - 2 - - 2 - 1
Networks – Network Types – Protocol Layering – TCP/IP Protocol suite – OSI Model – Physical
Layer: Performance – Transmission media – Switching – Circuit-switched Networks – Packet
Switching.
http://www.nptelvideos.in/2012/11/computer-networks.html
RBT Level
Module-2 DATA-LINK LAYER & MEDIA ACCESS Hours 10
L1,L2, L3
Introduction – Link-Layer Addressing – DLC Services – Data-Link Layer Protocols – HDLC – PPP
- Media Access Control - Wired LANs: Ethernet - Wireless LANs – Introduction – IEEE 802.11,
Bluetooth – Connecting Devices.
http://www.nptelvideos.in/2012/11/computer-networks.html
RBT Level
Module-3 NETWORK LAYER Hours 10
L1,L2, L3
Network Layer Services – Packet switching – Performance – IPV4 Addresses – Forwarding of IP
Packets - Network Layer Protocols: IP, ICMP v4 – Unicast Routing Algorithms – Protocols –
Multicasting Basics – IPV6 Addressing – IPV6 Protocol.
Text/Reference Books:
1 Behrouz A. Forouzan, Data Communications and Networking, Fifth Edition TMH, 2013.
Larry L. Peterson, Bruce S. Davie, Computer Networks: A Systems Approach, Fifth Edition,
2
Morgan Kaufmann Publishers Inc., 2012.
William Stallings, Data and Computer Communications, Tenth Edition, Pearson Education,
3
2013.
Nader F. Mir, Computer and Communication Networks, Second Edition, Prentice Hall,
4
2014.
Ying-Dar Lin, Ren-Hung Hwang and Fred Baker, Computer Networks: An Open Source
5
Approach, McGraw Hill Publisher, 2011.
James F. Kurose, Keith W. Ross, Computer Networking, A Top-Down Approach Featuring
6
the Internet, Sixth Edition, Pearson Education, 2013.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - 1 - - - - - - 2 - -
CO2 3 3 3 - - - - - 1 - 1 2 1 -
CO3 2 2 2 1 3 - - - - - 1 3 - 1
CO4 3 2 3 - - - - - - 2 3 2 - -
CO5 3 2 3 - - - - - - 2 3 2 2 -
Website Basics, HTML5, CSS 3, Web 2.0: Web Essentials: Clients, Servers and Communication,
The Internet, Basic Internet protocols, World wide web, HTTP Request Message , HTTP Response
Message, Web Clients, Web Servers, HTML5 : Tables, Lists, Image, HTML5 control elements ,
Semantic elements , Drag and Drop, Audio, Video controls, CSS3: Inline, embedded and external
style sheets, Rule cascading, Inheritance, Backgrounds, Border Images, Colours, Shadows, Text,
Transformations.
Laboratory Sessions/ Experimental learning:
Create a simple website with following effects on Text and images
1. Add Background image/s
2. Colors effect.
3. Shadows and transformation.
Real Time Applications: Animation website
Video link / Additional online information (related to module if any):
https://youtu.be/FPtLsZ62pdA
https://nptel.ac.in/courses/106/106/106106222/
https://youtu.be/vCo6p7zrbt4
https://nptel.ac.in/courses/106/106/106106223
RBT Level
Module-2 Hours 8
L1,L2, L3
Client side Programming: An Introduction to java Script, JavaScript DOM Model, Date and
Object, Regular Expression, Exception Handling, Validation, Built-in Objects, Event Handling,
DHTML with JavaScript, JSON introduction, Syntax, Function Files, Http Request, SQL.
Laboratory Sessions/ Experimental learning:
SQL and DOM model creation in website as created in module 1.
Real Time Applications: Students results / Application form in online
Video link / Additional online information (related to module if any):
https://nptel.ac.in/courses/106/105/106105084/
https://youtu.be/uUhOEj4z8Fo (NPTEL)
https://youtu.be/3uxp7mqUIfk (NPTEL)
https://youtu.be/tfPfwDrfSP8 (NPTEL)
RBT Level
Module-3 Hours 8
L1,L2, L3
Server Side Programming: Java Servlet Architecture, Servlet Life Cycle, Form GET and POST
actions, Session handling, Installing and Configuring Apache Tomcat Web Server, Database
Connectivity: JDBC perspectives, JDBC Program Example, JSP: Understanding Java server page,
JSP Standard Tag Library (JSTL), Creating HTML form using JSP Code.
Laboratory Sessions/ Experimental learning:
Write a servlet program to display a message “Welcome to Java World” and deploy the process
using GET and POST actions.
Real Time Applications: Online ordering using any E-Commerce site.
Video link / Additional online information (related to module if any):
https://nptel.ac.in/courses/106/105/106105224/
https://youtu.be/J6qfWtQ54Ig
https://nptel.ac.in/courses/106/105/106105084/
RBT Level
Module-4 Hours 8
L1,L2, L3
PHP and XML: Introduction to PHP, PHP using PHP, Variables, Program Control, Built-in
Functions, Form Validation, Basic command with PHP examples, Connection to server, creating
Database, Selecting Database, Listing Database, listing table names Creating a table, Inserting data,
deleting data and tables, altering tables. XML: Document type definition, XML Schema DOM and
presenting XML, XML Parser and Validations, XSL and XSLT Transformation.
Laboratory Sessions/ Experimental learning:
Design, Develop and Implement a student/Employee table and perform the following operations
using PHP.
1. Insert a row
2. Delete a row
3. Alter the table.
Video link:
https://youtu.be/XlryaovT_3k
http://www.digimat.in/nptel/courses/video/106106127/L49.html
http://www.nptelvideos.in/2012/11/internet-technologies.html
RBT Level
Module-5 Hours 8
L1,L2, L3
AJAX and Web Services: AJAX: Ajax client server architecture, Xml HTTP request object, Call
back methods. Advanced JavaScript and jQuery, JavaScript Pseudo-Classes, jQuery Foundations,
Web Services: Introduction, Java web services Basics, Creating, Publishing, Testing and Describing
a web services, Database driven web service from an application, SOAP.
Laboratory Sessions/ Experimental learning:
jQuery process and AJAX services.
Video link/Lecturer/Tutorials:
https://www.w3schools.com/xml/ajax_intro.asp (Practical examples)
https://youtu.be/jMdHE4qInU4
https://youtu.be/FBDHe5T7quI
Course outcomes:
CO1 Learn web essentials, HTML5 and CSS3.
Text/Reference Books:
Jean-Paul Tremblay & Paul G. Sor Deitel and Deitel and Nieto,Internet and World Wide
1
Web,How to Program, Prentice Hall, 5th Edition, 2011.
Randy Connolly, Ricardo Hoar, "Fundamentals of Web Development”,1stEdition,
2
Pearson Education India. (ISBN:978-9332575271)
3 Stephen Wynkoop and John Burke ―Running a Perfect Website‖, QUE, 2nd Edition,1999.
Chris Bates, Web Programming – Building Intranet Applications, 3rd Edition, Wiley
4
publications, 2009.
Jeffrey C and Jackson, ―Web Technologies A Computer Science Perspective‖, Pearson
5
Education, 2011.
6 UttamK.Roy, ―Web Technologies‖, Oxford University Press, 2011
7 Gopalan N.P. and Akilandeswari J., ―Web Technology, Prentice Hall of India, 2011.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 2 - 1 - - - - - - 2 1 -
CO2 3 3 3 - 1 - - - 1 - 1 2 3 -
CO3 2 2 2 1 3 - - - - - 1 3 - -
CO4 3 2 3 - 2 - - - - 2 3 2 1 -
CO5 3 2 3 - 3 - - - - 2 3 2 3 2
High-3, Medium-2, Low-1
THEORY OF
Course Title COMPUTATION Semester 05
Finite Automata: Mathematical preliminaries and notations – Central concepts of automata theory – Finite
automata -Deterministic Finite Automata - Nondeterministic Finite Automata – Equivalence of DFA and
NFA –Finite Automata with Epsilon transitions - Application of FA
Video link / Additional online information (related to module if any):
https://nptel.ac.in/courses/106/105/106105196/
RBT Level
Module-2 Hours 8
L2 ,L3
Regular Expressions: Regular languages: Regular Expressions – Finite Automata and Regular Expressions
–Applications of Regular Expressions - Regular Grammars.
https://www.youtube.com/watch?v=OA8EY3HKZoc
RBT Level
Module-3 Hours 8
L1,L2, L3
Regular Languages: Properties of regular languages: Pumping lemma for regular languages – Closure
properties of regular languages –Equivalence and Minimization of Finite Automata. C
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=ganHwe4DU7A
RBT Level
Module-4 Hours 8
L1,L2, L3
Context Free Grammar: Context Free languages: Context Free Grammars – Parse Trees - Ambiguity in
Grammars and languages– Applications of Context Free Grammars – Pushdown automata (PDA) –
Languages of a PDA -Equivalence of PDA‘s and CFG‘s
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=FjGrU7vczyg
https://www.youtube.com/watch?v=b3OPl5wS4AQ
RBT Level
Module-5 Hours 8
L1,L2, L3
Context Free Languages: Properties of Context Free Languages: Normal Forms (CNF, GNF) for Context
Free Grammars - Pumping lemma for CFL‘s - Closure properties of CFL
Turing Machines: Turing Machines- Simple examples.
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=IhyEGNn-7Uo
Course outcomes:
CO1 Design Finite automata for different Problems
CO3 Apply pumping lemma to Regular languages and Context Free languages
CO4 Design Push down automata and write CFG for different problems
CO5 Analyze the properties of Context free languages and Turing Machine
Text/Reference Books:
J.E.Hopcroft, R.Motwani and J.D Ullman,”Introduction to Automata Theory, Languages and
1
Computations”, 3rd Edition, Pearson Education, 2011
2 J.Martin, “Introduction to Languages and the Theory of Computation”, 3rd Edition, TMH, 2007.
H.R.Lewis and C.H.Papadimitriou,”Elements of the theory of Computation”, 2nd Edition, Pearson
3
Education/PHI, 2003
4 Micheal Sipser, ―Theory and Computatio, 7th Edition, Thomson Course Technology, 2008
5 http://nptel.iitm.ac.in
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 1 - - 1 - - - - - - 1 2
CO2 3 3 1 - - 1 - - - - - - 2 -
CO3 3 3 1 - - 1 - - - - - - 2 -
CO4 3 3 1 - - 1 - - - - - - - -
CO5 3 3 1 - - 1 - - - - - - 2 -
CO4 Choose appropriate testing strategies to perform unit and integration test
Text/Reference Books:
Ilene Burnstein, Practical Software Testing, Springer Verlag International Edition,
1
Springer (India) Pvt Ltd, 2012
2 NareshChauhan, Software Testing Principles and Practices,Oxford University Press, 2013.
Edward Kit Software Testing in the Real World – Improving the Process, Pearson
3
Education, 1995
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 1 1 - 1 1 2 - - - - - - -
CO2 3 3 3 3 2 - - - - - - - 3 2
CO3 1 - - 1 1 - 2 3 3 3 3 - - -
CO4 3 3 2 2 2 - - - - - - 3 1 -
CO5 3 3 3 3 3 2 - - 3 3 3 3 1 -
Origin of Environmental Law, Concept of Pollution – Sources of Pollution, Types of Pollution, and
Effects of pollution. Nature and Scope of Environmental Law – Importance. Case Study.
Application: Environmental Law:
Video Link: https://www.digimat.in/nptel/courses/video/110106081/L01.html
RBT Level
Module-2 Hours 8
L1,L2, L3
Provisions of various labor laws – workmen’s compensation Act 1923; Disablement, Total
Permanent disablement, Temporary disablement, Formula for compensation; Minimum wages act,
1948; Payment of bonus act, 1965; Weekly holidays Act, 1942; Payment of wages Act, 1936;
employees Insurance Act, 1948.
Application: Labour Law
Video Link: https://www.digimat.in/nptel/courses/video/110106081/L01.html
RBT Level
Module-3 Hours 8
L1,L2, L3
A brief introduction to criminal liability of Engineers as per the Indian Penal Code.
Application: Indian Penal Code
Video Link: https://www.digimat.in/nptel/courses/video/110106081/L01.html
RBT Level
Module-4 Hours 8
L1,L2, L3
IPR and Law of Torts: Definition, categories of torts, Breach of Duty and Damages. Concept of
Property, Types of Property; Introduction to IPR; Types of IPR: Copyrights, Patents, Trademarks,
Designs, Trade Secrets, Plant Varieties and Geographical Indications; Infringement of IPRs and
Remedies available under the Indian Law.
Application: IPR
Video Link: https://www.digimat.in/nptel/courses/video/110106081/L01.html
RBT Level
Module-5 Hours 8
L1,L2, L3
Business Organizations and E-Governance: Sole Traders, Partnerships: Companies: The
Company’s Act: Introduction, Formation of a Company, Memorandum of Association, Articles of
Association, Prospectus, Shares, Directors, General Meetings and Proceedings, Auditor, Winding
up. E-Governance and role of engineers in E-Governance, Need for reformed engineering serving
at the Union and State level, Role of I.T. professionals in Judiciary, Problem of Alienation and
Secessionism in few states creating hurdles in Industrial development.
Applications: G2C, G2B,G2G
Video link / Additional online information (related to module if any):
https://www.digimat.in/nptel/courses/video/110105083/L01.html
Course outcomes:
CO1 Enumerate the principles of sustainable development
CO4 Understand codes of conduct, conflicts of interest and other ethical dilemmas
CO5 Correlate role of engineers with different organizations and governance models
Text/Reference Books:
1 B.S. Patil, Legal Aspects of Building and Engineering Contracts
Cornish W. R. (2008), Intellectual Property Rights, Patents, Trademarks, Copyrights & Allied
4 Rights, Sweet & Maxwell
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 3 3 2 - - - - 3 - -
CO2 3 2 2 2 3 3 2 - - - - 3 1 -
CO3 3 2 2 1 3 3 2 - - - - 3 1 -
CO4 3 2 2 2 3 3 2 - - - - 3 2 3
CO5 3 2 2 1 3 3 2 - - - - 3 1 -
PARALLEL AND
Course Title DISTRIBUTED SYSTEMS Semester 05
Distributed File Systems –Introduction – File service architecture – Andrew File system.
https://nptel.ac.in/courses/106/106/106106168/
Course outcomes:
Acquire the skills to implement software effectively and efficiently on parallel hardware
CO1 platforms
Pradeep K Sinha, “Distributed Operating Systems: Concepts and Design”, Prentice Hall of
2 India, 2007.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 2 1 - - - 2 2 - - -
CO2 3 3 3 3 2 1 - - - 2 2 - - -
CO3 3 3 3 3 2 1 - - - 2 2 - 2 1
CO4 3 3 3 3 2 1 - - - 2 2 - 2 1
CO5 3 3 3 3 2 1 - - - 2 2 - 1 -
DATABASE MANAGEMENT
Course Title SYSTEM LABORATORY Semester 05
Course outcomes:
CO1 Demonstrate the creation of relational tables using DDL/DML
CO2 Design and demonstrate the execution of simple queries retrieve information
CO5 Implement, analyze and evaluate the project developed for an application.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 1 3 1 2 1 - 1 - - 2 2 -
CO2 3 3 2 3 2 2 - - 1 - - 2 2 1
CO3 3 3 2 3 2 1 - - 1 - - 2 1 -
CO4 3 3 2 2 2 1 - - - - - 2 1 3
CO5 3 3 2 2 1 1 1 - - - - 2 1 3
COMMUNICATION
Course Title NETWORK LAB Semester 05
CO3 Use simulation tools to analyze the performance of various network protocols.
CO4 Analyze various routing algorithms
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 2 1 - - - - - - - 1 3
CO2 3 3 2 2 1 - - - - - 1 - - -
CO3 3 3 2 2 1 - - - - - 1 - 3 -
CO4 3 3 2 2 1 - - - - - 1 - 3 -
CO5 3 2 2 2 1 - - - - - - - 1 3
WEB PROGRAMMING
Course Title LABORATORY Semester 05
Course outcomes:
Construct Web pages using HTML/XML and style sheets.
CO1
Build dynamic web pages with validation using Java Script objects and by applying different
CO2
event handling mechanisms.
CO3 3 3 2 - 3 3 - - 3 - 3 2 1 2
CO4 3 3 2 - 3 3 - - 3 - 3 2 1 3
CO5 3 3 2 - 3 3 - - 3 - 3 2 2 3
High-3, Medium-2, Low-1
VI SEMESTER
PYTHON APPLICATION
Course Title PROGRAMMING Semester 06
Python Basics, Entering Expressions into the Interactive Shell, Various Interactive shells: IDLE,
Jupyter Notebook, Spyder , Google Colabs, The Integer, Floating-Point, and String Data Types,
String Concatenation and Replication, Storing Values in Variables, Dissecting Your First Program,
Flow control, Boolean Values, Comparison Operators, Boolean Operators, Mixing Boolean and
Comparison Operators, Elements of Flow Control, Program Execution, Flow Control Statements,
Importing Modules, Ending a Program Early with sys.exit(),
Functions, def Statements with Parameters, Return Values and return Statements, The None Value,
Keyword Arguments, Lambda Functions, Local and Global Scope, The global Statement, Exception
Handling, A Short Program: Guess the Number
Real Time Applications: Using github or SVN for maintaining versions of python project
Video link / Additional online information (related to module if any):
https://nptel.ac.in/courses/106/106/106106145/
https://www.youtube.com/watch?v=9MmC_uGjBsM&feature=emb_logo
https://www.youtube.com/watch?v=HGGdN94SvC8&feature=emb_logo
RBT Level
Module-2 Hours 10
L1,L2,L3,L4
Lists, The List Data Type, Working with Lists, Augmented Assignment Operators, Methods,
Example Program: Magic 8 Ball with a List,
Dictionaries and Structuring Data, The Dictionary Data Type, Pretty Printing, Using Data
Structures to Model Real-World Things,
Manipulating Strings, Working with Strings, Useful String Methods, Project: Password Locker,
Project: Adding Bullets to Wiki Markup
Real Time Applications: Analyze Craft Beer with Dictionaries
Video link / Additional online information (related to module if any):
https://www.coursera.org/learn/python-data/home/welcome
https://www.youtube.com/watch?v=lR8DWx2fcbQ&feature=emb_logo
https://www.youtube.com/watch?v=Uu4PnnWlqsA&feature=emb_logo
RBT Level
Module-3 Hours 10
L1,L2,L3,L4
Pattern Matching with Regular Expressions,
Finding Patterns of Text Without Regular Expressions, Finding Patterns of Text with Regular
Expressions, More Pattern Matching with Regular Expressions, Greedy and Nongreedy Matching,
The findall() Method, Character Classes, Making Your Own Character Classes, The Caret and Dollar
Sign Characters, The Wildcard Character, Review of Regex Symbols, Case-Insensitive Matching,
Substituting Strings with the sub() Method, Managing Complex Regexes, Combining re
.IGNORECASE, re .DOTALL, and re .VERBOSE, Project: Phone Number and Email Address
Extractor,
Reading and Writing Files, Files and File Paths, The os.path Module, The File Reading/Writing
Process, Saving Variables with the shelve Module, Saving Variables with the pprint.pformat()
Function, Project: Generating Random Quiz Files, Project: Multiclipboard,
Organizing Files, The shutil Module, Walking a Directory Tree, Compressing Files with the zipfile
Module, Project: Renaming Files with American-Style Dates to European-Style Dates, Project:
Backing Up a Folder into a ZIP File,
Debugging, Raising Exceptions, Getting the Traceback as a String, Assertions, Logging, IDLE's
Debugger.
Classes and functions, Time, Pure functions, Modifiers, Prototyping versus planning,
Classes and methods, Object-oriented features, Printing objects, Another example, A more
complicated example, The init method, The __str__ method, Operator overloading, Type-based
dispatch, Polymorphism, Interface and implementation,
Inheritance, Card objects, Class attributes, Comparing cards, Decks, Printing the deck, Add,
remove, shuffle and sort, Inheritance, Class diagrams, Data encapsulation
Real Time Applications: Python code that uses object-oriented programming to flip a coin
Video link:
https://www.udemy.com/course/python-beyond-the-basics-object-oriented-programming/
RBT Level
Module-5 Hours 10
L1,L2,L3,L4
Web Scraping, Project: MAPIT.PY with the webbrowser Module, Downloading Files from the Web
with the requests Module, Saving Downloaded Files to the Hard Drive, HTML, Parsing HTML with
the BeautifulSoup Module, Project: “I'm Feeling Lucky” Google Search, Project: Downloading All
XKCD Comics, Controlling the Browser with the selenium Module,
Working with Excel Spreadsheets, Excel Documents, Installing the openpyxl Module, Reading
Excel Documents, Project: Reading Data from a Spreadsheet, Writing Excel Documents, Project:
Updating a Spreadsheet, Setting the Font Style of Cells, Font Objects, Formulas, Adjusting Rows
and Columns, Charts,
Working with PDF and Word Documents, PDF Documents, Project: Combining Select Pages
from Many PDFs, Word Documents,
Working with CSV files and JSON data, The csv Module, Project: Removing the Header from
CSV Files, JSON and APIs, The json Module, Project: Fetching Current Weather Data,
Real Time Applications: build a real-time scraper with Python, Flask, Requests, and
Beautifulsoup!
Video link:
https://www.udemy.com/course/web-scraping-python-tutorial/
https://www.udemy.com/course/automationpython/
Course outcomes:
Understand Python syntax and semantics and be fluent in the use of Python flow control and
CO1 functions.
Implement Python Programs using core data structures like Lists, Dictionaries and use
CO3 Regular Expressions.
Text/Reference Books:
Charles R. Severance, “Python for Everybody: Exploring Data Using Python 3”, 1st Edition,
1 Create Space Independent Publishing Platform, 2016. (http://do1.drchuck.
com/pythonlearn/EN_us/pythonlearn.pdf )
Allen B. Downey, "Think Python: How to Think Like a Computer Scientist”, 2ndEdition,
2
Green Tea Press, 2015. (http://greenteapress.com/thinkpython2/thinkpython2.pdf)
Charles Dierbach, "Introduction to Computer Science Using Python", 1st Edition, Wiley
3
India Pvt Ltd. ISBN-13: 978-8126556014
Mark Lutz, “Programming Python”, 4th Edition, O'Reilly Media, 2011.ISBN-13: 978-
4
9350232873
Wesley J Chun, “Core Python Applications Programming”, 3rdEdition,Pearson Education
5
India, 2015. ISBN-13: 978-9332555365
Roberto Tamassia, Michael H Goldwasser, Michael T Goodrich, “Data Structures and
6
Algorithms in Python”,1stEdition, Wiley India Pvt Ltd, 2016. ISBN-13: 978- 8126562176
ReemaThareja, “Python Programming using problem solving approach”, Oxford university
7
press, 2017
Al Sweigart,“Automate the Boring Stuff with Python”,1stEdition, No Starch Press, 2015.
8
(Available under CC-BY-NC-SA license at https://automatetheboringstuff.com/)
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - 1 - - - - - - 2 3 -
CO2 3 3 3 - - - - - 1 - 1 2 -
CO3 2 2 2 1 3 - - - - - 1 3 2 3
CO4 3 2 3 - - - - - - 2 3 2 - -
CO5 3 2 3 - - - - - - 2 3 2 2 3
CRYPTOGRAPHY AND
Course Title NETWORK SECURITY Semester 06
RBT Level
Module-1 Hours 10
L1,L2 , L3
INTRODUCTION & NUMBER THEORY: Services, Mechanisms and attacks- Classical
Encryption techniques (Symmetric cipher model, substitution techniques, transposition techniques.
finite fields and number theory: Groups, Rings, Fields-Modular arithmetic- Euclid‟s algorithm-Finite
fields- Polynomial Arithmetic –Prime numbers-Fermat‟s and Euler‟s theorem- Testing for primality
-The Chinese remainder theorem- Discrete logarithms.
Applications: Developing cryptographic algorithms
Video link / Additional online information (related to module if any):
https://www.cc.gatech.edu/~echow/ipcc/hpc-course/
https://nptel.ac.in/courses/111/103/111103020/
RBT Level
Module-2 Hours 10
L2 , L3
BLOCK CIPHERS & PUBLIC KEY CRYPTOGRAPHY: Data Encryption Standard-Block
cipher principles-block cipher modes of operation-Advanced Encryption Standard (AES)-Blowfish-
RC5 algorithm. Public key cryptography: Principles of public key cryptosystems-The RSA
algorithm-Key management - Diffie Hellman Key exchange- Elliptic curve arithmetic-Elliptic curve
cryptography.
Applications: Online transactions
Video link / Additional online information (related to module if any):
http://www.infocobuild.com/education/audio-video-courses/computer-
science/IntroductionToCryptography-Ruhr/lecture-08.html
https://www.comparitech.com/blog/information-security/diffie-hellman-key-exchange/
RBT Level
Module-3 Hours 10
L2,L3 , L4
HASH FUNCTIONS AND DIGITAL SIGNATURES: Authentication requirement –
Authentication function – MAC – Hash function – Security of hash function and MAC –MD5 - SHA
- HMAC – CMAC - Digital signature and authentication protocols – DSS – EI Gamal – Schnorr.
Applications: Cyber forensic
Video link / Additional online information (related to module if any):
https://www.educba.com/md5-alogrithm/
https://www.tutorialspoint.com/cryptography/cryptography_digital_signatures.htm
RBT Level
Module-4 Hours 10
L3,L4 , L6
SECURITY PRACTICE & SYSTEM SECURITY: Authentication applications – Kerberos –
X.509 Authentication services - Internet Firewalls for Trusted System: Roles of Firewalls – Firewall
related terminology- Types of Firewalls - Firewall designs - SET for E-Commerce Transactions.
Intruder – Intrusion detection system – Virus and related threats – Countermeasures.
Applications: Antivirus / Malware detecting software
Video link / Additional online information (related to module if any):
https://www.simplilearn.com/what-is-kerberos-article
https://searchsecurity.techtarget.com/feature/The-five-different-types-of-firewalls
RBT Level
Module-5 Hours 10
L4,L5 ,L6
E-MAIL, IP & WEB SECURITY: E-mail Security: Security Services for E-mail-attacks possible
through E-mail - establishing keys privacy-authentication of the source-Message Integrity-Non-
repudiation-Pretty Good Privacy-S/MIME. IPSecurity: Overview of IPSec - IP and IPv6-
Authentication Header-Internet Key Exchange (Phases of IKE, ISAKMP/IKE Encoding). Web
Security: SSL/TLS Basic Protocol-computing the keys- client authentication-PKI as deployed by
SSL-SET
Applications: Email and Banking applications
Video link / Additional online information (related to module if any):
https://www.barracuda.com/glossary/email-security
https://www.youtube.com/watch?v=ubHZQrECeew
Course outcomes:
CO1 Implement number theory for various identified attacks.
CO5 Design the protocols for improving security on email, web and IP.
Text/Reference Books:
William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education,
1 March 2013.
Charlie Kaufman, Radia Perlman and Mike Speciner, “Network Security”, Prentice Hall of
2 India, 2002.
3 Behrouz A. Ferouzan, “Cryptography & Network Security”, Tata Mc Graw Hill, 2007.
Man Young Rhee, “Internet Security: Cryptographic Principles”, “
4
Algorithms and Protocols”, Wiley Publications, 2003.
5 Charles Pfleeger, “Security in Computing”, 4th Edition, Prentice Hall of India, 2006.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 1 - - - - - 1 - 2 - - 2 3
CO2 3 2 2 1 - - - - - 2 - 1 2 2
CO3 2 3 1 3 - 1 1 1 - 1 - 2 2 1
CO4 3 2 2 1 - 2 - - - - 2 1 2 2
CO5 2 2 3 3 - 1 2 1 2 - 1 2 2 2
MOBILE APPLICATION
Course Title DEVELOPMENT Semester 06
http://developer.android.com/develop/index.htm
RBT Level
Module-5 Hours 8
L4,L5, L6
Technology II–IOS:Introduction to Objective C –IOS features –UI implementation–Touch
frameworks –Data persistence using Core Data and SQLite.
Video link / Additional online information (related to module if any):
https://www.codeschool.com/learn/ios
Course outcomes:
CO1 Demonstrate knowledge on basics of mobile application.
CO2 Understand the framework of mobile application and design simple interfaces
CO3 Create an application using multimedia components.
CO4 Develop and deploy application with server side connectivity.
CO5 Understand basic concepts of IOS
Text/Reference Books:
Jeff McW herter and Scott Gowell, "Professional Mobile Application Development", Wrox,
1
2012.
David Mark, Jack Nutting, Jeff LaMarche and Frederic Olsson, “Beginning iOS 6
2
Development: Exploring the iOS SDK”, Apress, 2013.
3 James Dovey and Ash Furrow, “Beginning Objective C”, Apress, 2012
Charlie Collins, Michael Galpin and Matthias Kappler, “Android in Practice”, DreamTech,
4
2012
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 1 - - - - - - - - 3 1 -
CO2 3 3 1 - - - - - - - - 3 3 -
CO3 3 3 1 2 - - - - - 1 - 3 1 -
CO4 3 3 3 3 - - - 2 2 2 - 3 2 2
CO5 3 3 3 3 - - 2 2 3 2 - 3 1 -
CO4 Define SLAs and SLOs and illustrate their importance in Cloud Computing.
List some of the common cloud providers and their associated cloud stacks and recall
CO5 popular cloud use case scenarios.
Text/Reference Books:
Cloud Computing, Principles and Paradigms, Rajkumar Buyya, James Broberg,
1
Wiley Publication
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 1 1 - 1 1 2 - - - - - 1 -
CO2 3 3 3 3 2 - - - - - - - - -
CO3 1 - - 1 1 - 2 3 3 3 3 - 2 -
CO4 3 3 2 2 2 - - - - - - 3 - -
CO5 3 3 3 3 3 2 - - 3 3 3 3 2 1
Fundamentals of Agile: The Genesis of Agile, Introduction and background, Agile Manifesto and
Principles, Overview of Scrum, Extreme Programming, Feature Driven development, Lean Software
Development, Agile project management, Design and development practices in Agile projects, Test
Driven Development, Continuous Integration, Refactoring, Pair Programming, Simple Design, User
Stories, Agile Testing, Agile Tools
RBT Level
Module-2 Hours 8
L1,L2 ,L3
Agile Scrum Framework: Introduction to Scrum, Project phases, Agile Estimation, Planning game,
Product backlog, Sprint backlog, Iteration planning, User story definition, Characteristics and
content of user stories, Acceptance tests and Verifying stories, Project velocity, Burn down chart,
Sprint planning and retrospective, Daily scrum, Scrum roles – Product Owner, Scrum Master, Scrum
Team, Scrum case study, Tools for Agile project management
RBT Level
Module-3 Hours 8
L1,L2 ,L3
Agile Testing: The Agile lifecycle and its impact on testing, Test-Driven Development (TDD),
xUnit framework and tools for TDD, Testing user stories - acceptance tests and scenarios, Planning
and managing testing cycle, Exploratory testing, Risk based testing, Regression tests, Test
Automation, Tools to support the Agile tester
Module-4 RBT Level Hours 8
L1,L2 ,L3
Agile Software Design and Development: Agile design practices, Role of design Principles
including Single Responsibility Principle, Open Closed Principle, Liskov Substitution Principle,
Interface Segregation Principles, Dependency Inversion Principle in Agile Design, Need and
significance of Refactoring, Refactoring Techniques, Continuous Integration, Automated build tools,
Version control.
RBT Level
Module-5 Hours 8
L1,L2 ,L3
Industry Trends: Market scenario and adoption of Agile, Agile ALM, Roles in an Agile project,
Agile applicability, Agile in Distributed teams, Business benefits, Challenges in Agile, Risks and
Mitigation, Agile projects on Cloud, Balancing Agility with Discipline, Agile rapid development
technologies.
Course outcomes:
Understand the background and driving forces for taking an Agile approach to software
CO1 development.
CO3 Drive development with unit tests using Test Driven Development
CO4 Deploy automated build tools, version control and continuous integration
Text/Reference Books:
Ken Schawber, Mike Beedle,” Agile Software Development with Scrum”, Pearson
1 Education.
Lisa Crispin, Janet Gregory, “Agile Testing: A Practical Guide for Testers and Agile
2 Teams” , Addison Wesley.
Robert C. Martin, “Agile Software Development, Principles, Patterns and Practices”,
3 Prentice Hall.
4 Robert Spalding: “Storage Networks the Complete Reference”, Tata McGraw-Hill, 2011.
6 Mike Cohn , “User Stories Applied: For Agile Software”, Addison Wesley
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 1 - - - - - - - - 3 1 -
CO2 3 2 1 - - - - - - - - 3 2 -
CO3 3 2 1 - - - - - - - - 3 1 1
CO4 3 2 1 - - - - - - - - 3 1 -
CO5 3 2 1 - - - - - - - - 3 2 1
SOCIAL NETWORK
Course Title ANALYSIS Semester 06
INTRODUCTION: Analyzing the Social Web, A brief history of the Social Web, Websites
discussed, Tools used.
NODES, EDGES AND NETWORK MEASURES: Basics of Network Structure, Representing
Networks, Basic Network Structures and Properties.
NETWORK STRUCTURE AND MEASURES: Describing Nodes and Edges, Describing
Networks
Video link / Additional online information (related to module if any):
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod01lec05.mp4
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod01lec07.mp4
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod02lec19.mp4
RBT Level
Module-2 Hours 8
L1,L2, L3
NETWORK VISUALIZATION: Layouts, Visualizing Network features. TIE STRENGTH:
The role of Tie Strength, Measuring Tie Strength, Tie Strength and Network Structure, Tie Strength
and Network Propagation
Video link / Additional online information (related to module if any):
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod03lec30.mp4
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod03lec31.mp4
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod04lec40.mp4
RBT Level
Module-3 Hours 8
L1,L2 ,L3
ENTITY RESOLUTION AND LINK PREDICTION: Link Prediction, Entity Resolution, Link
Prediction: Case Study – Friend Recommendation.
COMMUNITY DISCOVERY IN SOCIAL NETWORKS: Introduction to Community
Discovery, Communities in Context, Quality Functions, The Kernighan-Lin algorithm,
Agglomerative/Divisive Algorithms,
Video link / Additional online information (related to module if any):
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod06lec79.mp4
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod06lec80.mp4
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod06lec81.mp4
RBT Level
Module-4 Hours 8
L1,L2 ,L3
COMMUNITY DISCOVERY IN SOCIAL NETWORKS (CONTD): Spectral Algorithms,
Multi-level Graph Partitioning, Markov Clustering, Other Approaches.
MODELS AND ALGORITHMS FOR SOCIAL INFLUENCE ANALYSIS: Introduction to
Social Influence, Influence Related Statistics, Social Similarity and Influence, Homophily,
Existential Test for Social Influence, Influence and Actions, Influence and Interaction, Influence
Maximization in Viral Marketing, Other Applications.
Video link / Additional online information (related to module if any):
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod05lec70.mp4
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod05lec71.mp4
RBT Level
Module-5 Hours 8
L1,L2 ,L3
MODELLING, AGGREGATING AND KNOWLEDGE REPRESENTATION: Ontology and
their role in the Semantic Web: Ontology-based knowledge Representation -Ontology languages for
the Semantic Web: Resource Description Framework – Web Ontology Language – Modelling and
aggregating social network data: State-of-the-art in network data representation – Ontological
representation of social individuals – Ontological representation of social relationships –
Aggregating and reasoning with social network data – Advanced representations.
Video link / Additional online information (related to module if any):
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod10lec133.mp4
https://nptel.ac.in/content/storage2/106/106/106106169/MP4/mod12lec152.mp4
Course outcomes:
Understand and visualize the basic concepts of network structure and representation of
CO1
Social Network Analysis
CO2 Analyze the Social Network structure and its visualize them in the form of layouts
Apply the Social Network Concepts in solving problems related to social, personal,
CO3
business and international levels
CO4 Understand and Implement the algorithm for discovering communities in Social Networks
CO5 Understand the algorithm and models for social influence analysis
Text/Reference Books:
1 Jennifer Goldbeck, “Analyzing the Social Web”, Morgan Kaufmann Publications, 2013
2 Charu C. Aggarwal, “Social Network Data Analytics”, Springer Publications, 2011
3 Peter Mika, Social Networks and the Semantic Web, First Edition, Springer 2007.
Borko Furht, Handbook of Social Network Technologies and Applications, 1st Edition,
4
Springer, 2010.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - 1 - - - - - - 2 2 -
CO2 3 3 3 2 - - - - 1 - 1 2 2 2
CO3 2 2 2 1 3 - - - - - 1 3 2 2
CO4 3 2 3 2 1 - - - - 2 3 2 2 3
CO5 3 2 3 1 - - - - - 2 3 2 2 -
High-3, Medium-2, Low-1
Course Title ARTIFICIAL INTELLIGENCE Semester 06
RBT Level
Module-2 Hours 8
L1,L2 , L3
PROLOG- The natural Language of Artificial Intelligence: Introduction, Converting English to
Prolog Facts and Rules, Goals, Prolog Terminology, Variables, Control Structures, Arithmetic
operators, Matching in Prolog, Backtracking, Cuts, Recursion, Lists, Dynamic databases,
Input/Output and Streams
Using Predicate Logic: Representing simple facts in logic, representing instance and ISA
relationships, Computable Functions and Predicates, Resolution, Natural Deduction.
Experimental Learning:
Implementing programs in PROLOG to solve problems of Predicate Logic
Video Links:
https://www.youtube.com/watch?v=pzUBrJLIESU
https://www.youtube.com/watch?v=2juspgYR7as
https://www.youtube.com/watch?v=h9jLWM2lFr0
https://www.youtube.com/watch?v=-v1K9AnkAeM
RBT Level
Module-3 Hours 8
L1,L2 , L3
Heuristic search techniques: Generate and test, Hill Climbing, Best First Search, Problem
Reduction, Constraint Satisfaction, Means-ends Analysis.
Weak Slot- and- Filler Structures: Semantic Nets ,Frames.
Strong slot-and Filler Structures- Conceptual Dependency, Scripts.
Experimental Learning :
Program to implement Best first Search, A*, AO* algorithm
Video Links:
https://www.youtube.com/watch?v=ieZr_TpRwnQ
https://www.youtube.com/watch?v=lCrHYT_EhDs
RBT Level
Module-4 Hours 8
L1,L2 ,L3
Game Playing : Overview, Minimax Search Procedure, Adding alpha beta cut off, Additional
Refinements, Iterative Deepening, References on Specific games.
Learning: What is learning?, Forms of learning, Rote learning, learning by taking advice, Learning
in problem solving, Induction leaning, Explanation based learning, Discovery, Analogy, Formal
learning Theory, Neural Network Learning.
Experimental Learning :
Real time problem solving using Game Playing
Video Links:
https://www.youtube.com/watch?v=_i-lZcbWkps
https://www.youtube.com/watch?v=l-hh51ncgDI
RBT Level
Module-5 Hours 8
L1,L2 ,L3
Natural Language Processing: Syntactic Processing, Semantic Analysis, Discourse and Pragmatic
processing, Statistical Natural language processing and Spell checking.
Genetic Algorithms: A peek into the biological world, Genetic Algorithms(GAs),Significance of
genetic operators, termination parameters, niching and speciation, evolving neural network,
theoretical grounding.
Experimental Learning :
Program to implement spell checking problem
Video Links:
https://www.youtube.com/watch?v=zG8AJhVy5NY
https://www.youtube.com/watch?v=Z_8MpZeMdD4
Course outcomes:
CO1 Identify AI based problems and understand Intelligent agents
Text/Reference Books:
Artificial Intelligence: A Modern Approach, Stuart Rusell, Peter Norving, Pearson
1 Education 2nd Edition.
Dan W. Patterson, Introduction to Artificial Intelligence and Expert Systems – Prentice Hal
3 of India.
G. Luger, “Artificial Intelligence: Structures and Strategies for complex problem Solving”,
4 Fourth Edition, Pearson Education, 2002.
5 N.P. Padhy “Artificial Intelligence and Intelligent Systems” , Oxford University Press-2015
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 3 1 2 - - - - - - - 2 1 -
CO2 3 3 2 3 1 - - - - - - 2 2 2
CO3 3 3 2 3 1 - - - - - - 2 3 -
CO4 3 3 2 3 2 - - - - - - 2 3 -
CO5 3 3 2 3 2 - - - - - - 2 3 1
Course objective is to: This course will enable students to be exposed to big data
Learn the different ways of Data Analysis
Be familiar with data streams
Learn the mining and clustering
Be familiar with the visualization
RBT Level
Module-1 INTRODUCTION TO BIG DATA Hours 8
L1,L2, L3
Introduction to Big Data Platform – Challenges of conventional systems - Web data – Evolution of
Analytic scalability, analytic processes and tools, Analysis vs reporting - Modern data analytic tools,
Stastical concepts: Sampling distributions, resampling, statistical inference, prediction error.
Experimental learning: How to calculate Standard Deviation, Mean, Variance Statistics in Excel
Applications: Agriculture, Economic
Video link : https://www.youtube.com/watch?v=Vfo5le26IhY
RBT Level
Module-2 DATA ANALYSIS Hours 8
L2, L3
Regression modeling, Multivariate analysis, Bayesian modeling, inference and Bayesian networks,
Support vector and kernel methods, Analysis of time series: linear systems analysis, nonlinear
dynamics - Rule induction - Neural networks: learning and generalization, competitive learning,
principal component analysis and neural networks; Fuzzy logic: extracting fuzzy models from data,
fuzzy decision trees, Stochastic search methods.
Experimental learning:
How to read a data set using python
How to perform data preprocessing
Applications: Autonomous Vehicles
Video link : https://www.youtube.com/watch?v=Vfo5le26IhY
RBT Level
Module-3 MINING DATA STREAMS Hours 8
L2, L3
Introduction to Streams Concepts – Stream data model and architecture - Stream Computing,
Sampling data in a stream – Filtering streams – Counting distinct elements in a stream – Estimating
moments – Counting oneness in a window – Decaying window - Realtime Analytics
Platform(RTAP) applications - case studies - real time sentiment analysis, stock market predictions.
Laboratory Sessions:
Build cats classifier using neural network
Build a model to classify clothes into various categories in Fashion dataset.
Applications: Image Processing
Video link : https://www.youtube.com/watch?v=DooxDIRAkPA
RBT Level
Module-4 FREQUENT ITEMSETS AND CLUSTERING Hours 8
L2, L3
Mining Frequent itemsets - Market based model – Apriori Algorithm – Handling large data sets in
Main memory – Limited Pass algorithm – Counting frequent itemsets in a stream – Clustering
Techniques – Hierarchical – K- Means – Clustering high dimensional data – CLIQUE and
PROCLUS – Frequent pattern based clustering methods – Clustering in non-euclidean space –
Clustering for streams and Parallelism.
Laboratory Sessions: Word Count Map Reduce program to understand Map Reduce Paradigm
Installing and configuring Hadoop
Application: Social Media
Video link : https://www.youtube.com/watch?v=1vbXmCrkT3Y
RBT Level
Module-5 FRAMEWORKS AND VISUALIZATION Hours 8
L2, L3
MapReduce – Hadoop, Hive, MapR – Sharding – NoSQL Databases - S3 - Hadoop Distributed file
systems – Visualizations - Visual data analysis techniques, interaction techniques; Systems and
applications
Laboratory Sessions: Create Bar chart, Histogram, Heap Map, scatter plot, Box Plot, Corellogram,
Area Chart
Application: Customer Engagement
Video link : https://www.youtube.com/watch?v=9HR3p6MmwU0
Course outcomes:
CO1 Apply the statistical analysis methods.
Text/Reference Books:
1 Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007.
Bill Franks, Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams
3 with advanced analystics, John Wiley & sons, 2012.
Glenn J. Myatt, Making Sense of Data, John Wiley & Sons, 2007 Pete Warden, Big Data
4 Glossary, O‟ Reilly, 2011.
Jiawei Han, Micheline Kamber “Data Mining Concepts and Techniques”, Second Edition,
5 Elsevier, Reprinted 2008.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 2 - - - - - - - - - 1 -
CO2 2 2 3 - - - - - - - - - 2 -
CO3 3 3 3 - - - - - - - - - 2 -
CO4 3 3 3 - - - - - - - - - - 1
CO5 3 2 3 - - - - - - - - - - 1
High-3, Medium-2, Low-1
Introduction To Compilers: Definition of compiler, interpreter and its differences, the phases of a
compiler, role of lexical analyzer, LEX-lexical analyzer generator.
Parsing: context free grammar, derivations, parse trees, ambiguity, elimination of left recursion, left
factoring, top-down parsing– backtracking, recursive-descent parsing, predictive parsers, LL(1)
grammars.
Video link / Additional online information:
https://nptel.ac.in/courses/106/108/106108113/
RBT Level
Module-2 Hours 8
L1,L2, L3
Bottom-Up Parsing: Definition of bottom-up parsing, handles, handle pruning, stack
implementation of shift-reduce parsing, conflicts during shift-reduce parsing, LR grammars, LR
parsers-simple LR, canonical LR and Look Ahead LR parsers, handling of ambiguous grammar,
YACC-automatic parser generator.
Video link / Additional online information:
http://www.infocobuild.com/education/audio-video-courses/computer-
science/PrinciplesCompilerDesign-IISc-Bangalore/lecture-11.html
RBT Level
Module-3 Hours 8
L1,L2, L3
Syntax-Directed Translation: Syntax directed definition, construction of syntax trees, S-attributed
and L-attributed definitions, and translation schemes.
Intermediate Code Generation: Intermediate forms of source programs– abstract syntax tree,
polish notation and three address code, types of three address statements and its implementation.
Video link / Additional online information:
https://www.youtube.com/watch?v=M-wIosep5Zs
RBT Level
Module-4 Hours 8
L1,L2, L3
Semantic Analysis : Definition of type checking, type expressions, type systems, static and dynamic
checking of types, specification of a simple type checker, equivalence of type expressions.
Video link / Additional online information:
https://www.youtube.com/watch?v=ExG0ToMUsEM
RBT Level
Module-5 Hours 8
L1,L2, L3
Code Optimization: Organization of code optimizer, basic blocks and flow graphs, the principal
sources of optimization, the dag representation of basic block.
Code Generator: Design issues, object code forms, the target machine, a simple code generator,
peephole optimization.
Video link / Additional online information:
https://nptel.ac.in/courses/106/108/106108052/
Course outcomes:
CO1 Design a lexical analyzer to identify the tokens in a program
CO2 Construct a parser through the application of grammar
CO3 Understand intermediate code generation and symbol table organization techniques
CO5 Design a compiler for a small language with code generation and optimization strategies.
Text/Reference Books:
Alfred V. Aho, Ravi Sethi, Jeffrey D. Ullman (2011), Compilers–Principles, Techniques and
1 Tools, Low price edition, Pearson Education.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - 1 - - - - - - 2 1 -
CO2 3 3 3 - - - - - 1 - 1 2 2 -
CO3 2 2 2 1 3 - - - - - 1 3 2 3
CO4 3 2 3 - - - - - - 2 3 2 2 -
CO5 3 2 3 - - - - - - 2 3 2 1 2
Text/Reference Books:
Wilbent. O. Galitz ,"The Essential Guide to User Interface Design", John Wiley& Sons,
1 2001.
3 Alan Cooper, "The Essential of User Interface Design", Wiley - Dream Tech Ltd., 2002.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 1 3 - 2 1 - - - - 1 1 1 -
CO2 2 1 3 - 2 1 - - - - 1 1 1 2
CO3 2 1 3 - 2 1 - - - - 1 1 3 -
CO4 2 1 3 - 2 1 - - - - 1 1 1 -
CO5 2 1 3 - 2 1 - - - - 1 1 - -
OBJECT ORIENTED
Course Title ANALYSIS AND DESIGN Semester 06
Object Basics, Object oriented philosophy, objects, classes, attributes, object behaviour and methods,
encapsulation and information hiding, class hierarchy, polymorphism, object relationships and
associations, aggregations and object containment, case study, object identity, persistence. Object
oriented systems development life cycle: Software development process, building high quality
software, use- case driven approach, reusability.
Video links:
https://nptel.ac.in/courses/106/105/106105153/
https://www.youtube.com/watch?v=qiyMyyYqZVY
RBT Level
Module-2 Hours 8
L1,L2, L3
Object Oriented Methodologies: Rumbaugh etc all object modelling technique, Booch methodology,
Jacobson et al methodologies, patterns, frameworks, the unified approach. Unified modelling
language: Static and dynamic models, UML diagrams, UML class diagrams, use-case diagrams,
UML dynamic modelling, packages, UML extensibility and UML meta model.
Video links:
https://nptel.ac.in/courses/106/105/106105224/
RBT Level
Module-3 Hours 8
L1,L2, L3
Object Oriented Analysis Process: Business object analysis, use-case driven object oriented analysis,
business process modelling, use-case model, developing effective documentation, case study.
Classification: Classification theory, noun phrase approach, common class patterns approach, use-
case driven approach, classes, responsibilities, and collaborators, naming classes.
Video links:
https://www.digimat.in/nptel/courses/video/106105153/L01
RBT Level
Module-4 Hours 8
L1,L2, L3
Identifying Object Relationships, Attributes and Methods: Association, super-subclass relationships,
a- part of relationships, case study, class responsibility, defining attributes for via net bank objects,
object responsibility, defining methods for via net bank objects Design process and design axioms:
Corollaries, design patterns.
Video links:
https://www.digimat.in/nptel/courses/video/106105153/L16
RBT Level
Module-5 Hours 8
L1,L2 , L3
Designing Classes: UML object constraint languages, designing classes, class visibility, refining
attributes for the via net bank objects, designing methods and protocols, designing methods for the
via net bank objects, packages and managing classes. Designing access layer, case study. Designing
view layer, macro level process.
Video links:
https://www.digimat.in/nptel/courses/video/106105153/L51
Course outcomes:
Understand Object Oriented Software Development Process, Master key principles in OO
CO1 analysis, design, and development.
CO4 Understand the basics of object oriented design and design patterns.
Familiarize with the application of the Unified Modelling Language (UML) towards
CO5 analysis and design.
Text/Reference Books:
Ali Bahrami, Object Oriented Systems Development using the Unified Modelling Language,
1
McGraw Hill, Reprint 2009.
Craig Larman, ―Applying UML and Patterns: An Introduction to Object-Oriented Analysis
2
and Design and Iterative Development‖, Third Edition, Pearson Education, 2005.
Martin Fowler, ―UML Distilled: A Brief Guide to the Standard Object Modeling
3
Language‖, Third edition, Addison Wesley, 2003.
4 Grady Booch: Object-oriented analysis and design, Addison – Wesley, 1994.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 3 3 3 2 2 1 0 2 1 1 2 -
CO2 1 1 1 1 1 1 1 1 - 1 1 1 1 -
CO3 3 3 3 3 3 3 2 1 0 1 1 1 2 2
CO4 2 2 2 2 2 2 2 1 1 1 1 1 3 -
CO5 1 1 3 3 1 3 1 1 1 0 1 0 - 1
Website Basics, HTML5, CSS 3, Web 2.0: Web Essentials: Clients, Servers and Communication
,The Internet, Basic Internet protocols, World wide web, HTTP Request Message , HTTP Response
Message, Web Clients, Web Servers, HTML5 : Tables, Lists, Image, HTML5 control elements ,
Semantic elements , Drag and Drop, Audio, Video controls, CSS3: Inline, embedded and external
style sheets, Rule cascading, Inheritance, Backgrounds, Border Images, Colours, Shadows, Text,
Transformations
Laboratory Sessions/ Experimental learning:
1. Design HTML form for keeping student record.
2. Write a HTML code to generate following output.
Create an html page with following specifications
a. Title should be about my college
b. Put the image in the background
c. Place your College name at the top of the page in large text followed by address in smaller
size
d. Add names of courses offered each in a different color, style and typeface
e. Add scrolling text with a message of your choice
Video link / Additional online information:
https://www.youtube.com/watch?v=QEtWL4lWlL4
https://www.youtube.com/watch?v=JsbxB2l7QGY&list=PLVlQHNRLflP_hIZuBNjr6rZzqa2HZF
kny
https://www.youtube.com/watch?v=h_RftxdJTzs
RBT Level
Module-2 Hours 8
L1,L2, L3
Client side Programming: An Introduction to java Script, JavaScript DOM Model, Date and
Object, Regular Expression, Exception Handling, Validation, Built-in Objects, Event Handling,
DHTML with JavaScript, JSON introduction, Syntax, Function Files, Http Request, SQL.
Laboratory Sessions/ Experimental learning:
1. Write a JavaScript to design a simple calculator to perform the following operations: sum,
product, difference and quotient.
2. Write a JavaScript code that displays text “TEXT-GROWING” with increasing font size in
the interval of 100ms in RED COLOR, when the font size reaches 50pt it displays “TEXT-
SHRINKING” in BLUE color. Then the font size decreases to 5pt.
Video link / Additional online information:
https://www.youtube.com/watch?v=uDwSnnhl1Ng&list=PLsyeobzWxl7qtP8Lo9TReqUMkiOp446c
V
https://www.youtube.com/watch?v=zPTY1hKq3SU&list=PLVlQHNRLflP-
ByWEVjCZAj79kJdshKQwu
RBT Level
Module-3 Hours 8
L1,L2 , L3
Server Side Programming: Java Servlet Architecture, Servlet Life Cycle, Form GET and POST
actions, Session handling, Installing and Configuring Apache Tomcat Web Server, Database
Connectivity: JDBC perspectives, JDBC Program Example, JSP: Understanding Java server page,
JSP Standard Tag Library (JSTL), Creating HTML form using JSP Code.
Laboratory Sessions/ Experimental learning:
1. Assume four users user1, user2, user3 and user4 having the passwords pwd1, pwd2, pwd3
and pwd4 respectively. Write a servlet for doing the following.
a. Create a Cookie and add these four user id’s and passwords to this Cookie.
b. Read the user id and passwords entered in the Login form and authenticate with the
values available in the cookies.
2. Write a JSP which insert the details of the 3 or 4users who register with the web site by using
registration form. Authenticate the user when he submits the login form using the user name
and password from the database.
Video link / Additional online information:
https://www.youtube.com/watch?v=7TOmdDJc14s&list=PLsyeobzWxl7pUPF2xjjJiG4BKC9x_
GY46
https://www.youtube.com/watch?v=xve6QEgIR-
0&list=PL0zysOflRCel5BSXoslpfDawe8FyyOSZb
https://www.youtube.com/watch?v=0pzR2FGTEhk
RBT Level
Module-4 Hours 8
L1,L2, L3
PHP: Introduction to PHP, PHP using PHP, Variables, Program Control, Built-in Functions, Form
Validation, Basic command with PHP examples, Connection to server, creating Database, Selecting
Database, Listing Database, listing table names Creating a table, Inserting data, deleting data and
tables, altering tables.
Laboratory Sessions/ Experimental learning:
1. Write a PHP program to keep track of the number of visitors visiting the web page and to
display this count of visitors, with proper headings.
2. Write a PHP program to display a digital clock which displays the current time of the server.
3. Write a PHP program to sort the student records which are stored in the database using
selection sort.
4. Design an XML document to store information about a student in an engineering college
affiliated to VTU. The information must include USN, Name, and Name of the College,
Branch, Year of Joining, and email id. Make up sample data for 3 students. Create a CSS
style sheet and use it to display the document.
Video link / Additional online information :
https://www.youtube.com/watch?v=itRkLa2kq6w
https://www.youtube.com/watch?v=KJHYdkKtafU
https://www.youtube.com/watch?v=G_CFRAdbXfI&list=PL_RGaFnxSHWrjkpK2zD4TWKWMWV
feYK-b
RBT Level
Module-5 Hours 8
L1,L2, L3
AJAX: Ajax client server architecture, Xml HTTP request object, Call back methods. Advanced
JavaScript and jQuery, JavaScript Pseudo-Classes, jQuery Foundations, Web Services: Introduction,
Java web services Basics, Creating, Publishing, Testing and Describing a web services, Database
driven web service from an application.
Laboratory Sessions/ Experimental learning:
1. Creating simple application to access data base using JDBC Formatting HTML with CSS.
2. Write a Program for manipulating Databases and SQL with real time application.
3. Write a Java applet to display the Application Program screen i.e. calculator and other.
Video link / Additional online information
https://www.youtube.com/watch?v=qk9MWbyRlhE
https://www.youtube.com/watch?v=0pzR2FGTEhk
https://www.youtube.com/watch?v=HgvIox6ehkM
Course outcomes:
CO1 Construct a basic website using HTML and Cascading Style Sheets.
Build dynamic web page with validation using Java Script objects and by applying
CO2 different event handling mechanism.
CO4 Construct simple web pages in PHP and to represent data in XML format.
CO5 Use AJAX and web services to develop interactive web applications.
Text/Reference Books:
Deitel and Deitel and Nieto,Internet and World Wide Web, How to Program,
1
Prentice Hall, 5th Edition, 2011.
Randy Connolly, Ricardo Hoar, "Fundamentals of Web Development”, 1stEdition,
2
Pearson Education India. (ISBN:978-9332575271)
Stephen Wynkoop and John Burke ―Running a Perfect Website‖, QUE, 2nd
3
Edition,1999
Chris Bates, Web Programming – Building Intranet Applications, 3rd Edition, Wiley
4
Publications, 2009.
5 UttamK.Roy, ―Web Technologies‖, Oxford University Press, 2011.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 1 - 3 - - - - - - 1 - 2
CO2 3 3 1 - - - - - - - - 1 1 3
CO3 3 3 1 - - - - - - - - 1 1 2
CO4 3 3 1 - - - - - - - - 1 - 2
CO5 3 3 1 - - - - - - - - 2 1 1
High-3, Medium-2, Low-1
RBT Level
Module-5 Hours 8
L4,L5, L6
Wireless Network Security:
Cellular Networks- Wireless Ad Hoc Networks- Security Protocols- Secure Routing- Overview of
Cellular Networks- The State of the Art of Cellular Network Security- Cellular Network Attack
Taxonomy- Cellular Network Vulnerability Analysis- Radio Frequency Identification Introduction-
RFID Challenges- RFID Protections
Laboratory Sessions/ Experimental learning:
Create an application using RFID and verify the various challenges occurred in the RFID application
Applications: The logistics and supply chain is the most common industry applying RFID.
Video link / Additional online information :
How does RFID & NFC work? : https://www.youtube.com/watch?v=mzPb9QLJu8k
Course outcomes:
Understand the concepts and foundations of computer security, and identify vulnerabilities
CO1 of IT systems.
CO2 Analyse a given network and carryout protective and recovery strategies.
Text/Reference Books:
1 John R. Vacca, Network and System Security, Springer Publication
Michael T. Goodrich and Roberto Tamassia, Introduction to Computer Security,
2
Addison Wesley, 2011.
William Stallings, Network Security Essentials: Applications and Standards, Prentice Hall, 4th
3
edition, 2010.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 1 1 - 1 1 2 - - - - - 2 -
CO2 3 3 3 3 2 - - - - - - - 3 2
CO3 1 - - 1 1 - 2 3 3 3 3 - 3 2
CO4 3 3 2 2 2 - - - - - - 3 - 1
CO5 3 3 3 3 3 2 - - 3 3 3 3 - 2
RBT Level
Module-2 Hours 8
L1,L2, L3
Medium Access Control (MAC) : Motivation for a specialized MAC (Hidden and exposed
terminals, Near and far terminals), Wireless LAN/(IEEE 802.11) architecture, key IEEE802.11
a/b/c/d/e/g/i/n/T/ac/ standards.
Wireless Application Protocol (WAP): The Mobile Internet standard, WAP Gateway and Protocols,
wireless mark up Languages (WML). Wireless Local Loop(WLL): Introduction to WLL
Architecture, wireless Local Loop Technologies.
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=sx0UPzztC5o (NPTEL VIDEO)
RBT Level
Module-3 Hours 8
L1,L2, L3
Mobile Network Layer : IP and Mobile IP Network Layers, Packet Delivery and Handover
Management, Location Management, Registration, Tunneling and Encapsulation, Route Optimization
using Soft computing techniques – ANT Bee colony, Support Vector Machine, Particle Swarm
Optimization and Genetic Algorithm.
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=0QLRULNfbFg
RBT Level
Module-4 Hours 8
L1,L2, L3
Mobile Transport Layer : Conventional TCP/IP Protocols, Indirect TCP, Snooping TCP, Mobile
TCP.
Third Generation (3G) Mobile Services: Introduction to International Mobile Telecommunications
2000 (IMT 2000) vision, Wideband Code Division Multiple Access (W- CDMA) and CDMA 2000,
Quality of services in 3G.
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=KCcdF4IVrQk
https://www.youtube.com/watch?v=ymnQ5rpcYA&list=PLbMVogVj5nJSi8FUsvglRxLtN1TN9
y4nx
RBT Level
Module-5 Hours 8
L1,L2, L3
Mobile Ad hoc Networks (MANETs) : Introduction, Applications & Challenges of a MANET,
Routing, Classification of Routing Algorithms, Algorithms such as DSR, AODV, DSDV, etc. ,
Mobile Agents, Service Discovery ,case study using NS2 –traffic analysis using CBR and VBR.
Wireless Enterprise Networks: Introduction to Virtual Networks, Blue tooth technology, Blue
tooth Protocols.
Video link:
https://nptel.ac.in/courses/106/105/106105160/
https://www.digimat.in/nptel/courses/video/106105160/L01.html
Course outcomes:
CO1 Able to interpret GSM architecture and its services.
Analyze the various wireless application protocols and its different concepts for
CO2 various mobile applications.
CO3 Learn the representation of mobile network layer protocols and its functionalities.
Understand, analyze & develop any existing or new models of mobile environments
CO4 for 3G networks.
Understand, evaluate and create the platforms, protocols and related concepts along
CO5 with along with mobile in mobile environment.
Text/Reference Books:
1 Jochen Schiller, ―Mobile Communications‖, PHI, Second Edition, 2009.
2 Raj Kamal, “Mobile Computing”, Oxford University Press, 2007, ISBN: 0195686772
3 Dharma Prakash Agarval, Qing and An Zeng, "Introduction to Wireless and Mobile
systems",Thomson Asia Pvt Ltd, 2005.
Martin Sauter, “From GSM to LTE-Advanced: An Introduction to Mobile Networks
4
and Mobile Broadband,” Second Edition, Wiley.
William.C.Y.Lee,―Mobile Cellular Telecommunications-Analog and Digital
5
Systems‖, Second Edition,TataMcGraw Hill Edition ,2006.
Prasant Kumar Pattnaik, Rajib Mall, ―Fundamentals of Mobile Computing‖, PHI
6
Learning Pvt.Ltd, New Delhi – 2012
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 1 2 2 - 1 - - - - 1 - -
CO2 2 3 2 1 3 - - - - 1 - 1 2 -
CO3 2 2 3 1 2 - - - - - 1 1 1 -
CO4 3 2 2 2 1 - 1 - - - 1 1 3 2
CO5 2 2 2 2 - - - - - - - 2 3 2
PYTHON APPLICATION
Course Title PROGRAMMING Semester 06
LABORATORY
4 The celebrity problem is the problem of finding the celebrity among n people. A
celebrity is someone who does not know anyone (including themselves) but is L3 3
known by everyone. Write a Python program to solve the celebrity problem.
5 Write a Python program to construct a linked list. Prompt the user for input.
Remove any duplicate numbers from the linked list. L3 3
7 Create a menu drive Python program with a dictionary for words and their
meanings. Write functions to add a new entry (word: meaning), search for a
particular word and retrieve meaning, given meaning find words with the same L3 3
meaning, remove an entry, display all words sorted alphabetically.
8 Using Regular Expressions, develop a Python program to
a) Identify a word with a sequence of one upper case letter followed by lower
case letters.
b) Find all the patterns of “1(0+)1” in a given string. L3 3
Course outcomes:
Describe the Python language syntax including control statements, loops and functions to write
CO1 programs for a wide variety problem in mathematics, science, and games.
Examine the core data structures like lists, dictionaries, tuples and sets in Python to store, process
CO2 and sort the data.
Identify the external modules for creating and writing data to excel files and inspect the file
CO5 operations to navigate the file systems
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 2 2 3 - - - - - - 1 1 3
CO2 3 2 2 3 3 - - - - - - 1 2 3
CO3 3 3 3 2 3 - - - - - - 1 2 3
CO4 2 1 2 2 3 - - - - - - 1 1 2
CO5 2 1 2 1 3 - - - - - - 1 1 1
CRYPTOGRAPHY AND
Course Title NETWORK SECURITY Semester 06
LABORATORY
Course outcomes:
Identify the major types of threats to information security and the associated attacks,
CO1
Services and Mechanisms
CO2 Design and develop cryptographic algorithms using public key cryptography.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 1 - - - - - - 1 - 1 - -
CO2 1 1 2 - - - - - - 2 - 1 1 2
CO3 2 2 1 - - - - - - 1 - 1 - 3
CO4 2 1 1 - - - - - - 2 - 1 - 3
CO5 2 2 1 - - - - - - 2 - 1 1 2
CO4 Develop schemes for the applications of IOT in real time scenarios.
Text/Reference Books:
1 Honbo Zhou, ”The Internet of Things in the Cloud:A Middleware Perspective” -CRC Press-2012.
Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things – Key applications
4 and Protocols”, Wiley, 2012.
Luigi Atzori, Antonio Lera, Giacomo Morabito, “The Internet of Things: A Survey”, Journal on
5 Networks, Elsevier Publications, October, 2010.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 1 - - - - - - - - 3 1 -
CO2 3 3 1 - - - - - - - - 3 2 -
CO3 3 3 1 2 - - - - - 1 - 3 2 3
CO4 3 3 3 3 - - - 2 2 2 - 3 1 3
CO5 3 3 3 3 - - 2 2 3 2 - 3 2 2
Introduction: Well posed learning problems, Designing a Learning system, Perspective and Issues
in Machine Learning.
Concept Learning: Concept learning task, Concept learning as search, Find-S algorithm, Version
space, Candidate Elimination algorithm, Inductive Bias.
To understand purpose, give real time dataset(problem) and ask to students to solve in class room.
https://www.youtube.com/watch?v=rQ3oi9g8alY
https://www.youtube.com/watch?v=h0e2HAPTGF4
RBT Level
Module-2 Hours 10
L1,L2, L3
Decision Tree Learning
Decision tree representation, Appropriate problems for decision tree learning, Basic decision tree
learning algorithm, hypothesis space search in decision tree learning, Inductive bias in decision tree
learning, Issues in decision tree learning.
Laboratory Sessions/ Experimental learning:
Ask students to design a Decision Tree using freely available dataset or problem in classroom.
https://www.youtube.com/watch?v=qDcl-FRnwSU
https://www.youtube.com/watch?v=FuJVLsZYkuE
RBT Level
Module-3 Hours 10
L1,L2, L3
Bayesian Learning and Evaluating Hypotheses
Bayesian Learning: Introduction, Bayes theorem, Bayes theorem and concept learning, MDL
principle, Naive Bayes classifier, Bayesian belief networks, EM algorithm.
Evaluating Hypotheses: Estimating hypothesis accuracy, Basics of sampling theorem, General
approach for deriving confidence intervals, Difference in error of two hypothesis
Laboratory Sessions/ Experimental learning:
Ask the students to build Bayes Belief Networks for real time problem in class room.
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=480a_2jRdK0
https://www.youtube.com/watch?v=E3l26bTdtxI
RBT Level
Module-4 Hours 10
L1,L2, L3
Artificial Neural Networks and Instance based Learning
Artificial Neural Networks: Introduction, Neural Network representation, Appropriate problems,
Perceptrons, Backpropagation algorithm. Instanced Based Learning:Introduction, k-nearest neighbor
learning, locally weighted regression.
Laboratory Sessions/ Experimental learning:
Give real time problem and ask students to design an ANN using perceptrons.
Video link:
https://www.youtube.com/watch?v=xbYgKoG4x2g&list=PL53BE265CE4A6C056.
https://www.youtube.com/watch?v=BRMS3T11Cdw&list=PL3pGy4HtqwD2a
57wl7Cl7tmfxfk7JWJ9Y
RBT Level
Module-5 Hours 10
L1,L2,L3
Reinforcement Learning and Deep Learning
Reinforcement Learning:Introduction, Learning Task, Q Learning.
Deep Learning: Introduction to Deep Learning-Reasons to go Deep Learning, Introduction to
Convolutional Networks ,Restricted Boltzmann Machines,Deep Belief Nets, Recurrent Nets.
Video link:
https://www.youtube.com/watch?v=TIlDzLZPyhY&list=PLyqSpQzTE6M_FwzHF
Ayf4LSkz_IjMyjD9
https://www.youtube.com/watch?v=iOh7QUZGyiU&list=PLqYmG7hTraZDNJre23
vqCGIVpfZ_K2RZs
Course outcomes:
CO1 Identify the issues in machine learning and Algorithms for solving it.
CO2 Explain theory of probability and statistics related to machine learning.
CO3 Investigate concept learning, ANN, Bayes classifier, k nearest neighbor, Q, Learning.
CO4 Identify the difference between Machine Learning and Deep Learning and using scenario
CO5 Explain the concepts of Q learning and deep learning
Text/Reference Books:
1 Tom M. Mitchell, Machine Learning, India Edition 2013, McGraw Hill Education.
Trevor Hastie, Robert Tibshirani, Jerome Friedman, h The Elements of Statistical Learning,
2
2nd edition, springer series in statistics.
3 Ethem Alpaydın, Introduction to machine learning, second edition, MIT press.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - 1 - - - - - - 2 - -
CO2 3 3 3 - - - - - 1 - 1 2 1 -
CO3 2 2 2 1 3 - - - - - 1 3 - 1
CO4 3 2 3 - - - - - - 2 3 2 - -
CO5 3 2 3 - - - - - - 2 3 2 2 -
High-3, Medium-2, Low-1
FUNDAMENTALS
Green IT Fundamentals: Business, IT, and the Environment – Green computing: carbon foot print,
scoop on power – Green IT Strategies: Drivers, Dimensions, and Goals – Environmentally
Responsible Business: Policies, Practices, and Metrics.
Real Time Applications: how they keep data safe while in transit
Video link / Additional online information:
https://nptel.ac.in/courses/106/104/106104182/
https://www.youtube.com/watch?v=350Rb2sOc3U
RBT Level
Module-2 Hours 8
L1,L2, L3
GREEN ASSETS AND MODELING
Green Assets: Buildings, Data Centers, Networks, and Devices – Green Business Process
Management: Modeling, Optimization, and Collaboration – Green Enterprise Architecture –
Environmental Intelligence – Green Supply Chains – Green Information Systems: Design and
Development Models.
Real Time Applications: climate-smart agriculture, land restoration, groundwater management,
ecosystem-based adaptation
Video link / Additional online information:
https://nptel.ac.in/courses/110/107/110107128/
https://nptel.ac.in/courses/110/107/110107093/
RBT Level
Module-3 Hours 8
L1,L2, L3
GRID FRAMEWORK
Virtualizing of IT systems – Role of electric utilities, Telecommuting, teleconferencing and
teleporting – Materials recycling – Best ways for Green PC – Green Data center – Green Grid
framework.
Real Time Applications: ChessBrain
Video link / Additional online information:
https://nptel.ac.in/noc/courses/noc18/SEM2/noc18-ee42/
https://onlinecourses.nptel.ac.in/noc19_ee64/preview
RBT Level
Module-4 Hours 8
L1,L2, L3
GREEN COMPLIANCE
Socio-cultural aspects of Green IT – Green Enterprise Transformation Roadmap – Green
Compliance: Protocols, Standards, and Audits – Emergent Carbon Issues: Technologies and Future.
Real Time Applications: Addressing Inconsistent Date Formats, Reducing False Positives in PEP
Screening, Integrating Screening with Credit Card Approval Processes.
Video link / Additional online information:
https://onlinecourses.nptel.ac.in/noc19_ee64/preview
RBT Level
Module-5 Hours 8
L1,L2, L3
CASE STUDIES
The Environmentally Responsible Business Strategies (ERBS) – Case Study Scenarios for Trial
Runs – Case Studies Applying Green IT Strategies and Applications to a Home, Hospital, Packaging
Industry and Telecom Sector.
Real Time Applications: The energy consumption in Torrent systems with malicious content, The
use of thin client instead of desktop PC
Video link / Additional online information:
https://nptel.ac.in/courses/106/105/106105195/
https://nptel.ac.in/courses/106/104/106104182/
Course outcomes:
Acquire knowledge to adopt green computing practices to minimize negative impacts on the
CO1 environment.
CO2 Enhance the skill in energy saving practices in their use of hardware.
Evaluate technology tools that can reduce paper waste and carbon footprint by the
CO3 stakeholders.
CO4 Understand the ways to minimize equipment disposal requirements.
CO5 Carry out multiple real time case studies.
Text/Reference Books:
Bhuvan Unhelkar, “Green IT Strategies and Applications-Using Environmental
1 Intelligence”, CRC Press, June 2011
Woody Leonhard, Katherrine Murray, “Green Home computing for dummies”, August
2 2009.
Bhuvan Unhelkar, Green IT Strategies and Applications-Using Environmental Intelligence,
3 CRC Press, June 2014.
4 Woody Leonhard, Katherine Murray, Green Home computing for dummies, August 2012.
Alin Gales, Michael Schaefer, Mike Ebbers, “Green Data Center: steps for the Journey”,
5 Shoff/IBM rebook, 2011.
6 Carl speshocky, “Empowering Green Initiatives with IT”, John Wiley & Sons, 2010.
Wu Chun Feng (editor), “Green computing: Large Scale energy efficiency”, CRC Press,
7 2012.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - 1 - - - - - - 2 1 -
CO2 3 3 3 - - - - - 1 - 1 2 2 -
CO3 2 2 2 1 3 - - - - - 1 3 2 3
CO4 3 2 3 - - - - - - 2 3 2 2 -
CO5 3 2 3 - - - - - - 2 3 2 1 2
RBT Level
Module-1 Hours 8
L1,L2 ,L3
INTRODUCTION TO HACKING 99
Terminologies, Categories of Penetration Test, Writing Reports, Structure of a Penetration Testing
Report, Vulnerability Assessment Summary, Risk Assessment, Methodology, Linux Basics: File
Structure, Cron Job, Users, Common Applications , BackTrack, Services.
Applications: Network packet analysis, Password guessing and cracking
Video link / Additional online information (related to module if any):
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_process.htm
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_hacker_types.htm
RBT Level
Module-2 Hours 8
L2 , L3
INFORMATION GATHERING, TARGET ENUMERATION AND PORT SCANNING
TECHNIQUES
Active, Passive and Sources of information gathering, Copying Websites Locally, NeoTrace, Cheops-
ng, Intercepting a Response, WhatWeb, Netcraft, Basic Parameters, Xcode Exploit Scanner,
Interacting with DNS Servers, Fierce, Zone Transfer with Host Command and Automation, DNS
Cache Snooping- Attack Scenario, Automating Attacks, SNMP - Problem, Sniffing Passwords,
SolarWinds Toolset, sweep, Brute Force and Dictionary- Tools , Attack, Enumeration, Intelligence
Gathering Using Shodan, Target enumeration and Port Scanning Techniques.
Applications: Session hijacking, Session spoofing
Video link / Additional online information (related to module if any):
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_enumeration.htm
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_sniffing.htm
RBT Level
Module-3 Hours 8
L2,L3 ,L4
VULNERABILITY ASSESSMENT & NETWORK SNIFFING
Introduction to Vulnerability Assessment - Pros and Cons, NMap, Updation of database, Testing
SCADA Environments with Nmap, Nessus, Sniffing: Types, Hubs versus Switches, Modes, MITM
Attacks, ARP Protocol Basics- working, Attacks, DoS Attacks, Dsniff tool, Using ARP Spoof to
Perform MITM Attacks, Sniffing the Traffic with Dsniff, Sniffing Pictures with Drifnet, Urlsnarf and
Webspy, Sniffing with Wireshark, Ettercap- ARP Poisoning, Hijacking Session with MITM Attack,
ARP Poisoning with Cain and Abel, Sniffing Session Cookies with Wireshark, Hijacking the Session,
SSL Strip: Stripping HTTPS Traffic, Requirements, Automating Man in the Middle Attacks, DNS
Spoofing, DHCP Spoofing
Applications: Network traffic sniffing, Denial of Service attacks
Video link / Additional online information (related to module if any):
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_sniffing.htm
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_tcp_ip_hijacking.htm
RBT Level
Module-4 Hours 8
L3,L4, L6
Understanding Network Protocols: Attacking Network Remote Services, Common Target
Protocols, tools for cracking network remote services, Attacking SMTP, Attacking SQL Servers,
Client Side Exploitation Methods: E-Mails Leading to Malicious Attachments & Malicious Links,
Compromising Client Side Update, Malware Loaded on USB Sticks
Post exploitation: Acquiring Situation Awareness, Privilege Escalation, Maintaining Access, Data
Mining, Identifying and Exploiting Further Targets, Windows Exploit Development Basics.
Applications: Exploiting buffer overflow vulnerabilities
Video link / Additional online information (related to module if any):
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_sql_injection.htm
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_exploitation.htm
RBT Level
Module-5 Hours 8
L4,L5, L6
WIRELESS & WEB HACKING 99
Wireless Hacking : Requirements , Aircracking , Hidden SSIDs , Monitor Mode , Monitoring Tool-
Beacon Frames on Wireshark ,Airodump-ng , Wireless Adapter in Monitor Mode , Determining the
Target , Cracking a WPA/WPA2 Wireless Network Using Aircrack-ng , Capturing Packets and Four-
Way Handshake.
Web Hacking : Attacking the Authentication , Brute Force and Dictionary Attacks , Types of
Authentication , Crawling Restricted Links , Testing for the Vulnerability , Authentication Bypass
with Insecure Cookie Handling , SQL injection, XSS – DOM based,BeEF,CSRF, Bypassing CSRF
and BeEF with XSS, Vulnerability in FCKeditor, efront.
Applications: Cross Site Scripting, Firewall
Video link / Additional online information (related to module if any):
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_ddos_attacks.htm
https://www.tutorialspoint.com/ethical_hacking/ethical_hacking_wireless.htm
Course outcomes:
Understand the core concepts related to malware, hardware and software vulnerabilities
CO1
and their causes
CO2 Understand ethics behind hacking and vulnerability disclosure
Appreciate the Cyber Laws and impact of hacking Exploit the vulnerabilities related to
CO3
computer system and networks using state of the art tools and technologies
CO4 Learn & understand different network protocols and attack strategies
CO5 Understanding the usefulness of wireless & web hacking
Text/Reference Books:
1 Rafay Baloch ,―Ethical Hacking and Penetration Testing Guide‖, CRC Press, 2015.
Patrick Engebretson, ―The Basics of Hacking and Penetration Testing : Ethical Hacking
2
and Penetration Testing Made Easy‖, Syngress Media, Second Revised Edition, 2013.
3 Michael T. Simpson, Kent Backman, James E. Corley, ―Hands On Ethical Hacking
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 1 - - - - 1 - - - 3 2 -
CO2 3 3 1 - - - - 2 - 1 - 3 2 -
CO3 3 3 1 2 - - - - - 1 - 3 - 2
CO4 3 3 3 3 - 3 2 2 2 2 - 3 2 -
CO5 3 3 3 3 - 3 2 2 3 2 - 3 2 -
High-3, Medium-2, Low-1
Text/Reference Books:
Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response Essentials”,
1 Addison Wesley, 2002.
Nelson, B, Phillips, A, Enfinger, F, Stuart, C., “Guide to Computer Forensics and
2 Investigations, 2nd ed., Thomson Course Technology, 2006, ISBN: 0-619-21706-5.
Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River
3 Media, 2005, ISBN: 1-58450-389.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 - 3 - 2 - 2 - - - 2 2 -
CO2 3 3 - 3 2 2 - 3 - - - 2 2 -
CO3 2 2 2 2 - 3 3 3 - - - 2 3 -
CO4 3 3 2 3 - - - 3 - - - - 3 -
CO5 3 3 - 3 - - - 3 - - - 2 - -
High-3, Medium-2, Low-1
Course Title SOFT COMPUTING Semester 07
Biological background, Concept of "Genetics" and "Evolution" and its application to probabilistic
search techniques, Basic GA framework and different GA architectures, GA operators: Encoding,
Crossover, Selection, Mutation, etc., classifications and applications of GA, Solving single-objective
optimization problems using GAs.
Video link:
https://onlinecourses.nptel.ac.in/noc20_cs81
https://www.youtube.com/watch?v=ra13Sv7XZ3M
RBT Level
Module-5 Hours 8
L1,L2,L3,L4
COMPUTATIONAL INTELLIGENCE:
Computational Intelligence Paradigms, Swarm Intelligence Techniques, Basic Particle Swarm
Optimization, Applications.
Real Time Applications: Hybrid Computational Intelligence Systems for Real World Applications
Video link:
https://nptel.ac.in/courses/106/106/106106126/
Course outcomes:
CO1 Learn about soft computing techniques and their applications.
Analyze various neural network architectures and Understand perceptrons and counter
CO2
propagation networks.
CO3 Define the fuzzy systems and applications.
CO4 Analyze the genetic algorithms and their applications.
CO5 Analyze Computational Intelligence Paradigms and applications of CI.
Text/Reference Books:
Fuzzy Logic: A Practical approach, F. Martin, Mc neill, and Ellen Thro, AP Professional,
1
2000.
2 Fuzzy Logic with Engineering Applications (3rd Edn.), Timothy J. Ross, Willey, 2010.
Foundations of Neural Networks, Fuzzy Systems, and Knowledge Engineering, Nikola K.
3
Kasabov, MIT Press, 1998.
4 An Introduction to Genetic Algorithms, Melanie Mitchell, MIT Press, 2000.
Genetic Algorithms In Search, Optimization And Machine Learning, David E. Goldberg,
5
Pearson Education, 2002.
6 Soft Computing, D. K. Pratihar, Narosa, 2008.
Neuro-Fuzzy and soft Computing, J.-S. R. Jang, C.-T. Sun, and E. Mizutani, PHI Learning,
7
2009.
Practical Genetic Algorithms, Randy L. Haupt and sue Ellen Haupt, John Willey & Sons,
8
2002.
Real World Applications of Computational Intelligence, Mircea Gh. Negoita, Bernd Reusch,
9
Part of the Studies in Fuzziness and Soft Computing book series (STUDFUZZ, volume 179)
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - 1 - - - - - - 2 1 -
CO2 3 3 3 - - - - - 1 - 1 2 2 1
CO3 2 2 2 1 3 - - - - - 1 3 - -
CO4 3 2 3 - - - - - - 2 3 2 2 1
CO5 3 2 3 - - - - - - 2 3 2 2 1
https://nptel.ac.in/content/storage2/106/105/106105215/MP4/mod01lec01.mp4
https://nptel.ac.in/content/storage2/106/105/106105215/MP4/mod01lec02.mp4
https://nptel.ac.in/content/storage2/106/105/106105215/MP4/mod01lec03.mp4
RBT Level
Module-2 Hours 8
L1,L2 , L3
Deep Feed forward Networks: Learning XOR , Gradient based learning, hidden units , Architecture
design, Back propagation and other differentiation algorithms
Real Time Applications: Self Driving Cars, News Aggregation and Fraud News Detection, Natural
Language Processing, Virtual Assistants, Entertainment, Visual Recognition, Fraud Detection,
Healthcare.
Video link / Additional online information (related to module if any):
https://nptel.ac.in/content/storage2/106/105/106105215/MP4/mod06lec26.mp4
https://nptel.ac.in/content/storage2/106/105/106105215/MP4/mod06lec27.mp4
https://nptel.ac.in/content/storage2/106/106/106106184/MP4/mod04lec33.mp4
RBT Level
Module-3 Hours 8
L1,L2 , L3
Optimization for Training Deep Models: how learning differs from optimization, challenges, basic
algorithms , parameter initialization strategies, algorithms with adaptive learning rates
https://nptel.ac.in/content/storage2/106/106/106106184/MP4/mod02lec19.mp4
https://nptel.ac.in/content/storage2/106/106/106106184/MP4/mod04lec40.mp4
RBT Level
Module-4 Hours 8
L1,L2 , L3
Convolutional Networks: The convolution operation, motivation, pooling, variants of basic
convolution function, efficient convolution learning algorithms, random or unsupervised features.
Real Time Applications: Social media, online shopping etc.
Video link:
1. https://nptel.ac.in/content/storage2/106/106/106106184/MP4/mod10lec86.mp4
2. https://nptel.ac.in/content/storage2/106/106/106106184/MP4/mod10lec88.mp4
3. https://nptel.ac.in/content/storage2/106/106/106106184/MP4/mod10lec89.mp4
RBT Level
Module-5 Hours 8
L1,L2 , L3
Deep Learning Research: Probabilistic PCA and factor analysis , independent component analysis,
slow feature analysis
Research Ideas:
Efficient Net: Rethinking Model Scaling for Convolutional Neural Networks
Deep Learning for Anomaly Detection
The Deep Learning Revolution and Its Implications for Computer Architecture and Chip
Design.
Course outcomes:
CO1 Classify patterns using Bayesian Decision Theory
Text/Reference Books:
Deep Learning (Adaptie Computation and machine learning series), Ian Goodfellow,
1
Yoshua Bengio and Aaron Courville.
2 Deep Learning from Scratch: Building with Python from First Principles, Seith Weidman
3 Deep Learning with python, François Chollet
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - 1 - - - - - - 2 2 -
CO2 3 3 3 2 - - - - 1 - 1 2 1 -
CO3 2 2 2 1 3 - - - - - 1 3 2 1
CO4 3 2 3 2 1 - - - - 2 3 2 - -
CO5 3 2 3 1 - - - - - 2 3 2 1 2
NATURAL LANGUAGE
Course Title PROCESSING Semester 07
RBT Level
Module-1 Hours 8
L3
RBT Level
Module-2 Hours 8
L3
WORD LEVEL AND SYNTACTIC ANALYSIS: Ngrams Models of Syntax - Counting Words -
Unsmoothed Ngrams-Smoothing-Back off Deleted Interpolation – Entropy – EnglishWord Classes -
Tag sets for English-Part of Speech Tagging-Rule Based Part of Speech Tagging - Stochastic Part of
Speech Tagging - Transformation-Based Tagging -Issues in PoS tagging – Hidden Markov and
Maximum Entropy models.
RBT Level
Module-4 Hours 8
L3
SEMANTICS AND PRAGMATICS: Representing Meaning - Meaning Structure of Language -
First Order Predicate Calculus-Representing Linguistically Relevant Concepts –Syntax Driven
Semantic Analysis - Semantic Attachments –Syntax Driven Analyzer- Robust Analysis – Lexemes
and Their Senses - Internal Structure - Word Sense Disambiguation -Information Retrieval.
CO4 To design a tag set to be used for statistical processing for real-time applications
CO5 To compare the use of different statistical approaches for different types of NLP applications
Text/Reference Books:
Daniel Jurafsky, James H. Martin―Speech and Language Processing: An Introduction to
1 Natural Language Processing, Computational Linguistics and Speech, Pearson Publication,
2014.
2 C. Manning and H. Schutze, “Foundations of Statistical Natural Language Processing”, MIT
Press. Cambridge, MA:1999
Steven Bird, Ewan Klein and Edward Loper, ―Natural Language Processing with Python, First
3
Edition, OReilly Media, 2009.
4 Natural Language Processing and Information Retrieval: Tanvier Siddiqui, U.S.Tiwary
5 Allen, James, Natural Language Understanding, Second Edition, Benjamin/Cumming, 1995.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 - - - - - - - - - - -
CO2 3 3 3 - - - - - - - - - 2 2
CO3 3 3 3 - - - - - - - - - 1 3
CO4 3 3 3 - - - - - - - - - 1 2
CO5 2 2 2 - - - - - - - - - 2 -
HUMAN COMPUTER
Course Title INTERACTION Semester 07
RBT Level
Module-2 Hours 8
L1,L2, L3
SOFTWARE PROCESS & DESIGN RULES- Interaction design basics – user focus – scenarios –
navigation – screen design & layout; HCI in software process – life cycle – Usability engineering –
Interactive design & prototyping ; Design rules – Principles for usability – standards – guidelines –
golden rules – HCI patterns
https://nptel.ac.in/courses/106/103/106103115/
https://nptel.ac.in/courses/106/106/106106177/
https://www.tutorialspoint.com/human_computer_interface/index.htm
Course outcomes:
CO1 Design effective dialog for HCI.
CO2 Design effective HCI for individuals and persons with disabilities.
CO4 Explain the HCI implications for designing multimedia/ ecommerce/ e-learning Web sites
Text/Reference Books:
1 Alan Dix , Janet Finlay, Gregory D.Abowd, Russell Beale, “ Human Computer Interaction”,
Third Edition, Pearson Education, 2004
John M.Carrol, “Human Computer Interaction in the New Millennium”, Pearson Education,
2 2002
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
2 1 3 - 2 1 - - - - 1 1 2 2
CO1
CO2 2 1 3 - 2 1 - - - - 1 1 2 2
CO3 2 1 3 - 2 1 - - - - 1 1 - -
CO4 2 1 3 - 2 1 - - - - 1 1 2 -
CO5 2 1 3 - 2 1 - - - - 1 1 1 3
BLOCKCHAIN
Course Title TECHNOLOGY Semester 07
CO4 Design, build, and deploy smart contracts and distributed applications.
Text/Reference Books:
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven
1 Goldfeder, Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction,
Princeton University Press (July 19, 2016).
2 Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies.
3 Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System.
DR. Gavin Wood, “ETHEREUM: A Secure Decentralized Transaction Ledger,”Yellow
4
paper.2014.
Nicola Atzei, Massimo Bartoletti, and Tiziana Cimoli, A survey of attacks on Ethereum
5
smart contracts
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 1 - - - - - - - - 3 1 -
CO2 3 3 1 - - - - - - - - 3 1 -
CO3 3 3 1 2 - - - - - 1 - 3 2 -
CO4 3 3 3 3 - - - 2 2 2 - 3 2 3
CO5 3 3 3 3 - - 2 2 3 2 - 3 1 -
Introduction to Python: The basic elements of python, variable, expression, Branching Programs,
Control Structures, Strings and Input, Iteration.
Laboratory Sessions/ Experimental learning:
1. Write a Python program to display the current date and time.
2. Write a Python program which accepts the radius of a circle from the user and compute the
area.
3. Write a python program for taking multiple inputs from user.
Video link / Additional online information:
https://www.youtube.com/watch?v=Y3Ri2GdYfYg&list=PLqftY2uRk7oXvERQEgATSr-
KzAh8WLW_D
https://www.youtube.com/watch?v=TqPzwenhMj0
https://www.youtube.com/watch?v=gzDPuWKjmGQ
RBT Level
Module-2 Hours 8
L1,L2, L3
Functions, Scoping and Abstraction: Functions and scoping, Specifications, Recursion, Global
variables, Modules, Files, System Functions and Parameters
Laboratory Sessions/ Experimental learning:
1. Write a Python program to find the Max of three numbers using function.
2. Write a Python program to reverse a string.
3. Python Program to Read a List of Words and Return the Length of the Longest One.
Video link / Additional online information:
https://www.youtube.com/watch?v=oSPMmeaiQ68
https://www.youtube.com/watch?v=LoIe_9cTtPE
https://www.youtube.com/watch?v=ixdr6V2vRC4
RBT Level
Module-3 Hours 8
L1,L2, L3
Structured Types, Mutability and Higher-Order Functions: Strings, Tuples, Lists and
Dictionaries, Lists and Mutability, Functions as Objects
Laboratory Sessions/ Experimental learning:
1. Python Program to Remove All Tuples in a List of Tuples with the USN Outside the Given
Range.
2. Python Program to form a New String Made of the First 2 and Last 2 characters from a Given
String.
3. Python Program to Sum All the Items in a Dictionary.
4. Python Program to Concatenate Two Dictionaries into One.
Video link / Additional online information:
https://www.youtube.com/watch?v=lSItwlnF0eU
https://www.youtube.com/watch?v=mzx74TdGYbg
https://www.youtube.com/watch?v=BL5bAt8fgvU
RBT Level
Module-4 Hours 8
L1,L2, L3
Classes and Object-Oriented Programming: Abstract Data Types and Classes, Inheritance,
Encapsulation and Information Hiding
Debugging, Exceptions and Assertions: Debugging, Handling Exceptions, Assertions
Laboratory Sessions/ Experimental learning:
1. Write a Python class to convert an integer to a roman numeral.
2. Write a Python class named Rectangle constructed by a length and width and a method which
will compute the area of a rectangle.
Video link / Additional online information :
https://www.youtube.com/watch?v=ZDa-Z5JzLYM
https://www.youtube.com/watch?v=8O5kX73OkIY
https://www.youtube.com/watch?v=NMTEjQ8-AJM
RBT Level
Module-5 Hours 8
L1,L2, L3
Simple Algorithms and Data structures: Search Algorithms, Sorting Algorithms, Hash Tables
Laboratory Sessions/ Experimental learning:
1. Write a Python program to create an Enum object and display a member name and value.
Sample data :
Afghanistan = 93
Albania = 355
Algeria = 213
Andorra = 376
Angola = 244
Antarctica = 672
Expected Output :
Member name: Albania
Member value: 355
2. Write a Python program to sort a list of elements using the bubble sort algorithm.
Video link / Additional online information :
https://www.youtube.com/watch?v=KW0UvOW0XIo
https://www.youtube.com/watch?v=m9n2f9lhtrw
Course outcomes:
Understand Python syntax and semantics and be fluent in the use of Python flow control and
CO1
functions.
CO2 Demonstrate proficiency in handling Strings and File Systems.
Implement Python Programs using core data structures like Lists, Dictionaries and use
CO3
Regular Expressions.
CO4 Interpret the concepts of Object-Oriented Programming as used in Python.
Implement exemplary applications related to Network Programming, Web Services and
CO5
Databases in Python.
Text/Reference Books:
Charles R. Severance, “Python for Everybody: Exploring Data Using Python 3”, 1st Edition,
1 CreateSpace Independent Publishing Platform, 2016. (http://do1.drchuck.
com/pythonlearn/EN_us/pythonlearn.pdf ) (Chapters 1 – 13, 15)
Allen B. Downey, "Think Python: How to Think Like a Computer Scientist”, 2ndEdition,
2 Green Tea Press, 2015. (http://greenteapress.com/thinkpython2/thinkpython2.pdf) (Chapters
15, 16, 17)(Download pdf files from the above links)
Charles Dierbach, "Introduction to Computer Science Using Python", 1st Edition, Wiley
3
India Pvt Ltd. ISBN-13: 978-8126556014.
Mark Lutz, “Programming Python”, 4th Edition, O’Reilly Media, 2011.ISBN-13: 978-
4
9350232873.
Wesley J Chun, “Core Python Applications Programming”, 3rdEdition,Pearson Education
5
India, 2015. ISBN-13: 978-9332555365.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 1 - 3 - - - - - - 1 2 -
CO2 3 3 1 - - - - - - - - 1 1 -
CO3 3 3 1 - - - - - - - - 1 1 3
CO4 3 3 1 - - - - - - - - 1 2 -
CO5 3 3 1 - - - - - - - - 2 1 3
Text/Reference Books:
Nelson Phillips and EnfingerSteuart, ―Computer Forensics and Investigations‖, Cengage
1 Learning, New Delhi, 2009.
4 Bernadette H Schell, Clemens Martin, Cybercrime, ABC , CLIO Inc, California, 2004
Study Material for Professional Programme Intellectual Property Rights, Law and Practice, The
5 Institute of Company Secretaries of India, Statutory Body Under an Act of Parliament, September
2013.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 - 3 - 2 - 2 - - - 2 2 -
CO2 3 3 - 3 2 2 - 3 - - - 2 2 -
CO3 2 2 2 2 - 3 3 3 - - - 2 3 -
CO4 3 3 2 3 - - - 3 - - - - 3 -
CO5 3 3 - 3 - - - 3 - - - 2 - -
MOBILE APPLICATION
Course Title AND DEVELOPMENT Semester 07
RBT Level
Module-1 Hours 8
L1,L2, L3
https://www.endivesoftware.com/blog/real-time-solutions-in-mobile-apps/
https://aws.amazon.com/mobile/mobile-application-development/
https://developer.android.com/guide/topics/providers/content-providers
RBT Level
Module-5 Hours 8
L4,L5, L6
ADVANCED APPLICATIONS: Building apps with Multimedia, Building apps with Graphics &
Animations, Building apps with Sensors, Bluetooth, Camera, Telephony Services, Building apps with
Location Based Services and Google maps.
Applications: Native Mobile Applications
Video link / Additional online information (related to module if any):
https://nptel.ac.in/courses/106/106/10610615
https://www.endivesoftware.com/blog/real-time-solutions-in-mobile-apps/
https://www.coursera.org/specializations/advanced-app-android
* Programming Assignments are Mandatory.
Course outcomes:
CO1 Understand the basics of Android devices and Platform
CO3 Interpret and use the data storage, file sharing and IPC in android platform.
CO4 Develop the skills in designing and building mobile applications using android platform.
Build mobile applications using multimedia graphics and animations, Publish Android
CO5 applications in to Android Market
Text/Reference Books:
Google Developer Training, "Android Developer Fundamentals Course – Concept
Reference”, Google Developer Training Team, 2017.https://www.gitbook.com/book/google-
1
developer-training/ android developer fundamentals course-concepts/details.(Download pdf
file from the above link).
RetoMeier;ProfessionalAndroid2ApplicationDevelopment;WileyIndiaPvt.ltd;1stEdition;2012;
2
ISBN-13:9788126525898.
Phillips, Stewart, Hardy and Marsicano; Android Programming, 2nd edition -Big Nerd Ranch
3
Guide;2015; ISBN-13978-0134171494.
Android Application Development for Java Programmers, James C Sheusi, Cengage
4
Learning, 2013.
MarkMurphy; Beginning Android3; A press Springer India Pvt Ltd.; 1st Edition; 2011; ISBN-
5
13: 978-1-4302-3297-1
Eric Hellman; Android Programming– Pushing the limits by Hellman; Wiley; 2013; ISBN
6
13:978 1118717370.
Phillips, Stewart, Hardy and Marsicano; Android Programming, 2nd edition -Big Nerd Ranch
7
Guide;2015; ISBN-13978-0134171494.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 3 1 - - - - - - - - 3 2 -
CO2 3 3 1 - - - - - - - - 3 - -
CO3 3 3 1 2 - - - - - 1 - 3 1 1
CO4 3 3 3 3 - - - 2 2 2 - 3 2 3
CO5 3 3 3 3 - - 2 2 3 2 - 3 - 3
Introduction:Well posed learning problems, Designing a Learning system, Perspective and Issues in
Machine Learning.
Concept Learning: Concept learning task, Concept learning as search, Find-S algorithm, Version
space, Candidate Elimination algorithm, Inductive Bias.
Laboratory Sessions/ Experimental learning: Use Case study to understand purpose, ask to
students to solve in class room.
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=rQ3oi9g8alY
https://www.youtube.com/watch?v=h0e2HAPTGF4
RBT Level
Module-2 Hours 8
L1,L2, L3
Decision Tree Learning :Decision tree representation, Appropriate problems for decision tree
learning, Basic decision tree learning algorithm, hypothesis space search in decision tree learning,
Inductive bias in decision tree learning, Issues in decision tree learning.
Laboratory Sessions/ Experimental learning: Use Case Study and ask students to design a
Decision Tree.
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=qDcl-FRnwSU
https://www.youtube.com/watch?v=FuJVLsZYkuE
RBT Level
Module-3 Hours 8
L1,L2, L3
Bayesian Learning: Introduction, Bayes theorem, Bayes theorem and concept learning, MDL
principle, Naive Bayes classifier, Bayesian belief networks.
Evaluating Hypotheses: Estimating hypothesis accuracy, Basics of sampling theorem.
Laboratory Sessions/ Experimental learning:
Give Real Time Case study and ssk the students to build Bayes Belief Networks .
Video link / Additional online information (related to module if any):
https://www.youtube.com/watch?v=480a_2jRdK0
https://www.youtube.com/watch?v=E3l26bTdtxI
RBT Level
Module-4 Hours 8
L1,L2, L3
Artificial Neural Networks: Introduction, Neural Network representation, Appropriate problems,
Perceptrons, Backpropagation algorithm. Instanced Based Learning: Introduction, k-nearest neighbor
learning, locally weighted regression.
Laboratory Sessions/ Experimental learning: Give real time Case Study and ask students to
design an ANN.
Video link:
https://www.youtube.com/watch?v=xbYgKoG4x2g&list=PL53BE265CE4A6C056.
https://nptel.ac.in/courses/106/106/106106184/
RBT Level
Module-5 Hours 8
L1,L2, L3
Reinforcement Learning: Introduction, Learning Task, Q Learning.
Deep Learning: Introduction to Deep Learning-Reasons to go Deep Learning,
Video link:
https://nptel.ac.in/courses/106/106/106106143/
https://nptel.ac.in/courses/106/105/106105215/
Course outcomes:
CO1 Identify the issues in machine learning and Algorithms for solving it.
CO2 Explain theory of probability and statistics related to machine learning.
CO3 Investigate concept learning, ANN, Bayes classifier, k nearest neighbor, Q, Learning.
CO4 Identify the difference between Machine Learning and Deep Learning and using scenario
CO5 Explain the concepts of Q learning and deep learning
Text/Reference Books:
Tom M. Mitchell, Machine Learning, India Edition 2013, McGraw Hill Education.
1
2 Trevor Hastie, Robert Tibshirani, Jerome Friedman, h The Elements of Statistical Learning,
2nd edition, springer series in statistics.
3 Ethem Alpaydın, Introduction to machine learning, second edition, MIT press.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - 1 - - - - - - 2 - -
CO2 3 3 3 - - - - - 1 - 1 2 1 -
CO3 2 2 2 1 3 - - - - - 1 3 2 3
CO4 3 2 3 - - - - - - 2 3 2 1 -
CO5 3 2 3 - - - - - - 2 3 2 1 -
High-3, Medium-2, Low-1
INTERNET OF THINGS
Course Title LABORATORY Semester 07
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 1 1 - - - - - - 2 - 1 2 -
CO2 2 1 1 - - - - - - 2 - 1 1 3
CO3 2 1 1 - - - - - - 2 - 1 2 3
CO4 2 1 1 - - - - - - 2 - 1 1 3
CO5 2 1 1 - - - - - - 2 - 1 2 2
MACHINE LEARNING
Course Title LABORATORY Semester 07
Course outcomes:
Understand the implementation procedures for the machine learning algorithms.
CO1
CO4 Identify and apply Machine Learning algorithms to solve real world problems.
CO-PO/PSO Mapping
CO/PO PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 1 1 - - - - - - 2 - 1 2 -
CO2 2 1 1 - - - - - - 2 - 1 1 3
CO3 2 1 1 - - - - - - 2 - 1 1 2
CO4 2 1 1 - - - - - - 2 - 1 1 1
CO5 2 1 1 - - - - - - 2 - 1 1 3
High-3, Medium-2, Low-1