Curriculum and Syllabus - Minor in CSE
Curriculum and Syllabus - Minor in CSE
Computer Science Engineering (CSE) transforms our day-to-day lives through a multitude of innovative
technologies and products. The Computer Science Engineering (CSE) minor is intended to expose students
from other disciplines to the unlimited opportunities for innovation in this exciting field, and to the
methodologies and tools used by Computer Science engineers for the exploration and design of new
technologies and products. Undergraduate students of the university who are not majoring in CSE have the
option to take a Minor in Computer Science Engineering. The program is expected to accommodate students
of diverse backgrounds.
Eligibility Criteria
A student will be permitted to pursue a Minor, if and only if, he / she fulfils the following criteria:
i. Must have secured a minimum of 7.0 CGPA* at the time of admission to a Minor
ii. There must NOT be any standing arrears / Backlogs.
iii. Must be in the active rolls of the department without any break of study or disciplinary action
pending against the student
iv. Must have NO outstanding fee dues
* CGPA cut off is subject to change based on the demand and competition.
MINOR IN COMPUTER SCIENCE ENGINEERING
Credits
Category Course Code Course Title L T P C Pre-Requisite to be
earned
Total Credits 20
Course Course Course L T P C
18CSC001J DATA STRUCTURES AND ALGORITHMS C Professional Core
Code Name Category 3 0 2 4
Pre-
Co-requisite Progressiv
requisite Nil Nil Nil
Courses e Courses
Courses
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil
Duration 15 15 15 15
15
(hour)
SLO-1 Introduction-Basic Terminology Array Stack ADT General Trees Graph Terminology
S-1 Data Structures Operations on Arrays – Insertion Stack Array Implementation Tree Terminologies Graph Traversal
SLO-2
and Deletion
SLO-1 Data Structure Operations Applications on Arrays Stack Linked List Implementation Tree Representation Topological sorting
S-2 ADT Multidimensional Arrays- Sparse Applications of Stack- Infix to Tree Traversal Minimum spanning tree – Prims
SLO-2 Algorithm
Matrix Postfix Conversion
Algorithms – Searching Linked List Implementation - Applications of Stack- Postfix Binary Tree Representation Minimum Spanning Tree - Kruskal’s
SLO-1 techniques Insertion Evaluation Algorithm
S-3 Complexity – Time , Space Trade Linked List- Deletion and Search Applications of Stack- Balancing Expression Trees Network flow problem
SLO-2 off symbols
SLO-1 Lab 1: Implementation of Lab 4 :Implementation of Array – Lab 7 :Implementation of stack Lab 10: Implementation of Tree Lab 13: Implementation of Graph
S using array using Array
Searching - Linear and Binary Insertion, Deletion. using array and Linked List
4-5 SLO-2
Search Techniques
Algorithms - Sorting Applications of Linked List Applications of Stack- Nested Binary Tree Traversal Shortest Path Algorithm-
SLO-1
Function Calls Introduction
S-6
Complexity – Time , Space Trade Polynomial Arithmetic Recursion concept using stack Threaded Binary Tree Shortest Path Algorithm: Dijkstra’s
SLO-2
off Algorithm
Mathematical notations Cursor Based Implementation – Applications of Recursion:Tower of Binary Search Tree :Construction, Hashing: Hash functions -
SLO-1 Methodology Hanoi Introduction
Searching
S-7
Asymptotic notations-Big O, Cursor Based Implementation Queue ADT Binary Search Tree : Insertion and Hashing: Hash functions
SLO-2 Omega Deletion
SLO-1 Asymptotic notations - Theta Circular Linked List Queue Implementation using array AVLTrees: Rotations Hashing : Collision avoidance
S-8 Mathematical functions Circular Linked List - Queue Implementation using AVL Tree: Insertions Hashing : Separate chaining
SLO-2
Implementation Linked List
S SLO-1 Lab 2: Implementation of sorting Lab 5: Implementation of Linked Lab 8: Implementation of Queue Lab 11:Implementation of BST Lab 14 :Implementation of Shortest
9- Techniques – Insertion sort and List - Cursor Based Implementation using Array and linked list using linked list path Algorithm
SLO-2
10 Bubble Sort Techniques
Data Structures and its Types Applications of Circular List -Joseph Circular Queue B-Trees Constructions Open Addressing
SLO-1
S- Problem
11 Linear and Non-Linear Data Doubly Linked List Implementation of Circular Queue B-Trees Search Linear Probing
SLO-2
Structures
1D, 2D Array Initialization using Doubly Linked List Insertion Applications of Queue B-Trees Deletions Quadratic probing
SLO-1
S- Pointers
12 1D, 2D Array Accessing Doubly Linked List Insertion Double ended queue Splay Trees Double Hashing
SLO-2
usingPointers variations
Declaring Structure and Doubly Linked List Deletion Priority Queue Red Black Trees Rehashing
SLO-1
S- accessing
13 Declaring Arrays of Structures Doubly Linked List Search Priority Queue - Applications Red Black Trees Insertion Extensible Hashing
SLO-2
and accessing
S SLO-1 Lab 3: Implement Structures Lab 6: Implementation of Doubly Lab 9: Applications of Stack, Queue Lab 12:Implementation of B-Trees Lab 15 :Implementation of Minimal
14- using Pointers linked List Spanning Tree
SLO-2
15
1. Seymour Lipschutz, Data Structures with C, McGraw Hill, 2014
2. R.F.Gilberg, B.A.Forouzan, Data Structures, 2nd ed., Thomson India, 2005
Learning 5. Reema Thareja, Data Structures Using C, 1st ed., Oxford Higher Education, 2011
3. A.V.Aho, J.E Hopcroft , J.D.Ullman, Data structures and Algorithms, Pearson Education,
2003 6. Thomas H Cormen, Charles E Leiserson, Ronald L Revest, Clifford Stein, Introduction to
Resources Algorithms 3rd ed., The MIT Press Cambridge, 2014
4. Mark Allen Weiss, Data Structures and Algorithm Analysis in C, 2nd ed., Pearson
Education, 2015
Learning Assessment
Bloom’s Continuous Learning Assessment (50% weightage) Final Examination (50%
Level of CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)# weightage)
Thinking Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 20% 20% 15% 15% 15% 15% 15% 15% 15% 15%
Understand
Apply
Level 2 20% 20% 20% 20% 20% 20% 20% 20% 20% 20%
Analyze
Evaluate
Level 3 10% 10% 15% 15% 15% 15% 15% 15% 15% 15%
Create
Total 100 % 100 % 100 % 100 % -
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr. Nagaveer, CEO, Campus Corporate Connect,nagaveer@campuscorporateconnect.com 1. Dr. Srinivasa Rao Bakshi, IITM, Chennai, sbakshi@iitm.ac.in 1. Mr. K. Venkatesh, SRMIST
2. Dr. Sricharan Srinivasan, Wipro Technologies, sricharanms@gmail.com 2. Dr. Ramesh Babu, N , nrbabu@iitm.ac.in 2. Dr.Subalalitha C.N, SRMIST
3. Dr.Noor Mahammad, IIITDM, Kancheepuram,noor@iiitdm.ac.in 3. Ms. Ferni Ukrit, SRMIST
Pre-
Co-requisite Progressiv
requisite Nil Nil Nil
Courses e Courses
Courses
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil
Duration (hour) 15 15 15 15 15
Comparison of Procedural and Types of constructor (Default, Feature Inheritance: Single and
SLO-1 Object Oriented Programming Generic - Templates : Introduction
Parameter) Multiple STL: Containers: Sequence and
S-1
Static constructor and copy Associative Container
SLO-2 OOPS and its features Inheritance: Multilevel Function templates
constructor
I/O Operations, Data Types, Feature Polymorphism: Constructor Example programs Function
SLO-1 Inheritance: Hierarchical Sequence Container: Vector, List
Variables, static overloading templates
S-2
Constants, Pointers, Type
SLO-2 Method Overloading Inheritance: Hybrid Class Templates Sequence Container: Deque, Array
Conversions
SLO-1 Features: Class and Objects Example for method overloading Class Templates
Method Overloading: Different
S-3 Inheritance: Example Programs Example programs for Class and STL : Stack
SLO-2 UML Diagrams Introduction parameter with different return
Function templates
values
S SLO-1 Lab 4: Constructor and Method
Lab 1: I/O operations Lab 7: Inheritance and its types Lab 10: Templates Lab 13: STL Containers
4-5 SLO-2 overloading
SLO-1 Feature :Class and Objects Operator Overloading and types Advanced Functions: Inline, Friend Exceptional Handling: try and catch
Associative Containers: Map,
S-6 Advanced Functions: Virtual, Exceptional Handling: Multilevel
SLO-2 Examples of Class and Objects Overloading Assignment Operator Multimap
Overriding exceptional
UML Class Diagram and its Advanced Function: Pure Virtual Exceptional Handling: throw and
SLO-1 Overloading Unary Operators Iterator and Specialized iterator
components function throws
S-7
Class Diagram relations and Example for Unary Operator Example for Virtual and pure virtual
SLO-2 Exceptional Handling: finally Functions of iterator
Multiplicity overloading function
Feature Abstraction and Exceptional Handling: User defined
SLO-1 Overloading Binary Operators Abstract class and Interface Algorithms: find(), count(), sort()
Encapsulation exceptional
S-8
Application of Abstraction and Example for Binary Operator
SLO-2 Example Program Example Programs using C++ Algorithms: search(), merge()
Encapsulation overloading
S SLO-1 Lab 2: Classes and Objects, Lab 5: Polymorphism : Operators Lab 8: Virtual Function and Abstract Lab 15: STL Associative containers
Lab 11: Exceptional Handling
9-10 SLO-2 Class Diagram Overloading class and algorithms
Access specifiers – public, Dynamic Modeling: Package Function Object : for_each(),
SLO-1 UML Interaction Diagrams UML State Chart Diagram
private Diagram transform()
S-11
Access specifiers - protected,
SLO-2 Sequence Diagram UML State Chart Diagram UML Component Diagram Example for Algorithms
friend, inline
UML use case Diagram, use
SLO-1 Collaboration Diagram Example State Chart Diagram UML Component Diagram Streams and Files: Introduction
case, Scenario
S-12
Use case Diagram objects and
SLO-2 Example Diagram UML Activity Diagram UML Deployment Diagram Classes and Errors
relations
Method, Constructor and
SLO-1 Feature: Inheritance UML Activity Diagram UML Deployment Diagram
Destructor Disk File Handling Reading Data
S-13
Example program for Example Package, Deployment, and Writing Data
SLO-2 Inheritance and its types Example Activity Diagram
constructor Package
S SLO-1
Lab 3: Methods and Lab 9: State Chart and Activity Lab12 : UML Component,
14- Lab 6: UML Interaction Diagram Lab15: Streams and File Handling
SLO-2 Constructor, Usecase Diagram Deployment, Package diagram
15
1. Grady Booch, Robert A. Maksimchuk, Michael W. Engle, Object-Oriented Analysis and Design with 4. Robert Lafore, Object-Oriented Programming in C++, 4th ed., SAMS Publishing,
Learning Applications, 3rd ed., Addison-Wesley, May 2007 2008
Resources 2. Reema Thareja, Object Oriented Programming with C++, 1st ed., Oxford University Press, 2015 5. Ali Bahrami, Object Oriented Systems Development”, McGraw Hill, 2004
3. Sourav Sahay, Object Oriented Programming with C++, 2nd ed., Oxford University Press, 2017 6. Craig Larmen, Applying UML and Patterns, 3rd ed., Prentice Hall, 2004
Learning Assessment
Bloom’s Continuous Learning Assessment (50% weightage) Final Examination (50%
Level of CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)# weightage)
Thinking Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 20% 20% 15% 15% 15% 15% 15% 15% 15% 15%
Understand
Apply
Level 2 20% 20% 20% 20% 20% 20% 20% 20% 20% 20%
Analyze
Evaluate
Level 3 10% 10% 15% 15% 15% 15% 15% 15% 15% 15%
Create
Total 100 % 100 % 100 % 100 % -
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc
# For the laboratory component the students are advised to take an application and apply the concepts
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Mr. Girish Raghavan, Senior DMTS Member, Wipro Ltd. 1. Dr. Srinivasa Rao Bakshi, IITM Chennai, sbakshi@iitm.ac.in 1. Ms. C.G.Anupama, SRMIST
Ms. Thamilchelvi, Solutions Architect, Wipro Ltd 2. Dr. Ramesh Babu, N, IITM Chennai, nrbabu@iitm.ac.in 2. Mr. C.Arun, SRMIST
3. Mr. Geogen George, SRMIST
4. Mr. Muthukumaran, SRMIST
Pre-
Co-requisite Progressiv
requisite Nil Nil Nil
Courses e Courses
Courses
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil
Duration 12 12 12 12
12
(hour)
Addition and subtraction of Signed Fundamental concepts of basic Parallelism , Need, types of Memory systems -Basic Concepts
SLO-1 Functional Units of a computer
numbers, processing unit, ALU operation Parallelism Memory hierarchy
S-1
Execution of complete instruction,
SLO-2 Operational concepts Problem solving applications of Parallelism Memory technologies
Branch instruction
Design of fast adders, Ripple carry
SLO-1 Bus structures Multiple bus organization Parallelism in Software RAM, Semiconductor RAM
adder
S-2
Memory locations and Carry look ahead adder , Hardwired control , Generation of Instruction level parallelism , Data
SLO-2 ROM, Types , Speed, size cost
addresses , Memory operations Multiplication of positive numbers control signals level parallelism
SLO-1 Lab 1: To recognize various
Lab-13: Study of Carry Save
S components of PC-Input Output Lab4:Study of TASM Addition and Lab-7: Design of Half Adder Design Lab-10: Study of Array Multiplier
Multiplication Program to carry out
3-4 SLO-2 systems Processing and Subtraction of 8-bit number of Full Adder Design of Array Multiplier
Carry Save Multiplication
Memory units
Instructions, Instruction
SLO-1 Signed operand multiplication Micro-programmed control- Challenges in parallel processing Cache memory , Mapping Functions
sequencing
S-5
Fast multiplication- Bit pair Microinstruction , Micro-program Architectures of Parallel Systems -
SLO-2 Addressing modes Replacement Algorithms
recoding of Multipliers Sequencing, Next address field Flynn’s classification
Introduction to Microprocessor
SLO-1 Carry Save Addition of summands Basic concepts of pipelining SISD,SIMD, MIMD, MISD Virtual Memory
, Assembly language
S-6 Hardware multithreading , Coarse
Writing of assembly language Performance considerations of
SLO-2 Problem Solving Pipeline Performance Grain parallelism, Fine Grain
programming various memories
parallelism
SLO-1 Lab-2:To understand how
different components of PC are Lab-14: Understanding Processing
S Lab 5: Addition of 16-bit number Lab-8: Study of Ripple Carry Adder
connected to work properly Lab-11: Study of Booth Algorithm unit Design of primitive processing
7-8 SLO-2 Subtraction of 16-bit number Design of Ripple Carry Adder
Assembling of System unit
Components
ARM Processor: The thumb Input Output Organization , Need
SLO-1 Integer division – Restoring Division Pipeline Hazards-Data hazards Uni-processor and Multiprocessors
instruction set for Input output devices
S-9
Processor and CPU cores ,
SLO-2 Non Restoring Division Methods to overcome Data hazards Multi-core processors Memory mapped IO
Instruction Encoding format
Instruction Hazards , Hazards on
Memory load and Store Floating point numbers and
SLO-1 conditional and Unconditional Memory in Multiprocessor Systems Program controlled IO
instruction in ARM operations
S-10 Branching
Control hazards , Influence of Cache Coherency and MESI protocol Interrupts-Hardware, Enabling and
SLO-2 Basics of IO operations. Solving Problems
hazards on instruction sets in Multiprocessor Systems Disabling Interrupts
SLO-1 Lab -3To understand how
S different components of PC are Lab-9: Study of Carry Look-ahead
Lab-6: Multiplication of 8-bit Lab-12: Program to carry out Booth Lab-15: Understanding Pipeline
11- connected to work properly Adder Design of Carry Look-ahead
SLO-2 number Factorial of a given number Algorithm concepts Design of basic pipeline.
12 Disassembling of System Adder
Components
1. Carl Hamacher, ZvonkoVranesic, SafwatZaky, Computer Organization, 5th ed., McGraw-Hill,
2015 5. William Stallings, Computer Organization and Architecture – Designing for Performance,
Learning 2. Kai Hwang, Faye A. Briggs, Computer Architecture and Parallel Processing”, 3rd ed., 10th ed., Pearson Education, 2015
Resources McGraw Hill, 2016 6. David A. Patterson and John L. Hennessy Computer Organization and Design - A Hardware
3. Ghosh T. K., Computer Organization and Architecture, 3rd ed., Tata McGraw-Hill, 2011 software interface, 5th ed., Morgan Kaufmann,2014
4. P. Hayes, Computer Architecture and Organization, 3rd ed., McGraw Hill, 2015.
Learning Assessment
Bloom’s Continuous Learning Assessment (50% weightage) Final Examination (50%
Level of CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)# weightage)
Thinking Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 20% 20% 15% 15% 15% 15% 15% 15% 15% 15%
Understand
Apply
Level 2 20% 20% 20% 20% 20% 20% 20% 20% 20% 20%
Analyze
Evaluate
Level 3 10% 10% 15% 15% 15% 15% 15% 15% 15% 15%
Create
Total 100 % 100 % 100 % 100 % -
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. T. V. Sankar, HCL Technologies Ltd, Chennai, sankar_t@hcl.com 1. Prof. A.P. Shanthi, ANNA University Chennai, a.p.shanthi@cs.annauniv.edu 1.Dr. V. Ganapathy, SRMIST
2. Dr. C. Malathy, SRMIST
3. Mrs M.S.Abirami, SRMIST
Pre-
Co-requisite Progressiv
requisite Nil Nil Nil
Courses e Courses
Courses
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil
Duration 12 12 12 12
12
(hour)
STORAGE MANAGEMENT : Mass
Operating System Objectives PROCESS SYNCHRONIZATION : MEMORY MANAGEMENT: Memory
SLO- VIRTUAL MEMORY– Background - storage structure – Overview of
and functions, role of Peterson’s solution, Management: Logical Vs Physical
1 Operating systems need of demand paging Mass storage structure – Magnetic
Synchronization Hardware address space, Swapping
S-1 Disks
The evolution of operating
SLO- Understanding the two-process
system, Major achievements, Contiguous Memory allocation – VIRTUAL MEMORY – Basic Disk Scheduling , scheduling with
solution and the benefits of the
2 from batch processing systems Fixed and Dynamic partition concepts – page fault handling respect to the disk
synchronization hardware ,
to modern complex systems
SLO- Semaphores, usage, Partition memory management FILE SYSTEM INTERFACE: File
OS Design considerations for Handling the page faults ,
S-2 implementation ,usage of the and issues: Internal fragmentation
1 Multiprocessor and Multicore Performance of Demand paging concept, File access methods
semaphores for the Mutual and external fragmentation
exclusion mechanisms problems
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, Operating systems, 9th ed., John Wiley & Sons, 3. Andrew S.Tanenbaum, Herbert Bos, Modern Operating systems, 4th ed., Pearson,
Learning
2013 2015
Resources
2. William Stallings, Operating Systems-Internals and Design Principles, 7th ed., Prentice Hall, 2012 4. Bryant O’Hallaxn, Computer systems- A Programmer’s Perspective,Pearson, 2015
Learning Assessment
Bloom’s Continuous Learning Assessment (50% weightage) Final Examination (50%
Level of CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)# weightage)
Thinking Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 20% 20% 15% 15% 15% 15% 15% 15% 15% 15%
Understand
Apply
Level 2 20% 20% 20% 20% 20% 20% 20% 20% 20% 20%
Analyze
Evaluate
Level 3 10% 10% 15% 15% 15% 15% 15% 15% 15% 15%
Create
Total 100 % 100 % 100 % 100 % -
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1.Mr. Balamurugan, Infosys,
1. Dr.Latha Parthiban, Pondicherry University, lathaparthiban@yahoo.com 1. Dr.G.Maragatham, SRMIST 3. Ms. Aruna S, SRMIST
balams@gmail.com
2. Mr. Eliazer M, SRMIST
Course Course Course L T P C
18CSE002T SOFTWARE ENGINEERING AND PROJECT MANAGEMENT E Professional Elective
Code Name Category 2 1 0 3
Pre-
Co-requisite Progressiv
requisite Nil Nil Nil
Courses e Courses
Courses
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil
Learning Assessment
Bloom’s Continuous Learning Assessment (50% weightage) Final Examination (50%
Level of CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)# weightage)
Thinking Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 40% - 30% - 30% - 30% - 30% -
Understand
Apply
Level 2 40% - 40% - 40% - 40% - 40% -
Analyze
Evaluate
Level 3 20% - 30% - 30% - 30% - 30% -
Create
Total 100 % 100 % 100 % 100 % -
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr. Girish Raghavan, Wipro Technologies 1. Dr. LathaParthiban, Pondicherry University, lathaparthiban@yahoo.com 1. Mrs. Sasi Rekha Sankar, SRMIST
2. Dr.Mariappan Vaithilingam, Amazon, Bangalore 2. V. Masilamani. IIITDM, masila@iiitdm.ac.in 2. Dr. T.S.Shiny Angel, SRMIST
3. Mr.N.Arivazhagan, SRMIST
4. Mrs K.R.Jansi, SRMIST
Pre-
Co-requisite Progressiv
requisite Nil Nil Nil
Courses e Courses
Courses
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil
Duration 12 12 12 12
12
(hour)
Using the Python Interpreter Introduction to ListsAnd List
SLO-1 Introduction to Tuples Errors - Syntax Errors Iterator
Invoking the Interpreter, Operations
S-1
Argument Passing Interactive
SLO-2 list slices, list methods, list loop Tuple Operations Exceptions - Handling Exceptions Generator
Mode
Introduction to Python Using
Python as a Calculator , mutability, aliasing, cloning lists, tuple assignment , tuple as return Raising Exceptions User-defined
SLO-1 Closure
Numbers, Strings , Lists list parameters value Exceptions
Keywords and Identifiers
S-2
Statements & Comments
Variables , Datatypes, Type Defining Clean-up Actions -
SLO-2 Arbitrary Argument Lists Examples in Tuples Decorators
Conversion, I/O and import Predefined Clean-up Actions
Operators , Namespace
SLO-1 Lab-1 : Using the Python
Lab-10: Problems in Exception Lab-13: Problems using Iterator,
S 3-4 Interpreter- Simple problems in Lab-4: Problems in Lists Lab-7: Problems on Tuples
SLO-2 handling Generator
Input output
SLO-1 Flow Control - if...else Using Lists as Stacks Introduction to Dictionaries Classes Definition Context Managers
S-5 Names and Objects - Method
SLO-2 for Loop while Loop Using Lists as Queues Examples on Dictionaries Objects RegEx
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Dr. S.S.Sridhar, SRMIST
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil
Duration
9 9 9 9 9
(hour)
SLO- Grammars: Introduction: Types of Pushdown Automata: Definitions
Introduction to Automaton Turing Machines: Introduction Undecidability :Basic definitions
1 Grammar Moves
S-
Formal definition of Turing
1 SLO- Context Free Grammars and
Mathematical concepts Instantaneous descriptions machines, Instantaneous Decidable problems,
2 Languages
descriptions
SLO- Formal Languages: Strings, Examples of undecidable problems
Derivations Deterministic pushdown automata Turing Machine as Acceptors
S- 1 Languages, Properties and Problems
2 SLO- Finite Representation : Regular Problems related to turning
Ambiguity Problems related to DPDA Rice’s Theorem
2 Expressions machine as Acceptors
Undecidable problems about Turing
SLO- Problems related to regular Relationship between derivation Non - Deterministic pushdown
Machine- Post’s Correspondence
S- 1 expressions and derivation trees automata Problems related to turning
Problem
3 machine as Acceptors
SLO- Finite Automata :Deterministic Problems related to Context free Problems related to Post’s
Problems related to NDPDA
2 Finite Automata Grammar Correspondence Problem
SLO- Turing Machine as a Computing
Nondeterministic Finite Automata
S- 1 Simplification of CFG : Elimination Problems related to DPDA and Device Properties of Recursive and
4 SLO- of Useless Symbols NDPDA Problems related to turning Turing Recursively enumerable languages
Finite Automaton with €- moves
2 Machine as a Computing Device
Problems related to Deterministic
SLO- Simplification of CFG : Unit Pushdown automata to CFL Introduction to Computational
and Nondeterministic Finite
S- 1 productions Equivalence Problems related to turning Turing Complexity: Definitions
Automata
5 Machine as a Computing Device
SLO- Problems related to Finite Simplification of CFG : Null Problems related to Equivalence of
Time and Space complexity of TMs
2 Automaton with €- moves productions PDA to CFG
SLO- Problems related to Equivalence of
Equivalence of NFA and DFA Complexity classes: Class P, Class
S- 1 Problems related to Simplification PDA to CFG Techniques for Turing Machine
NP
6 SLO- of CFG Construction
Heuristics to Convert NFA to DFA
2
Considering the state as a tuple
SLO- Equivalence of NDFA’s with and CFL to Pushdown automata
S- Chomsky normal form Considering the tape symbol as a
1 without €-moves Equivalence Complexity classes: Introduction to
7 tuple
NP-Hardness
SLO- Problems related Equivalence of Problems related to CNF Problems related to Equivalence of Checking off symbols
2 NDFA’s with and without €-moves CFG to PDA
SLO-
Minimization of DFA Modifications of Turing Machine
S- 1
Greiback Normal form Pumping lemma for CFL
8 SLO- Problems related to Minimization NP Completeness
Multi-tape Turing Machine
2 of DFA
Regular Languages : Equivalence of
SLO-
Finite Automata and Regular Non-Deterministic Turing Machine
S- 1 Problems based on pumping
Languages Problems related to GNF
9 Lemma Problem discussion
SLO- Equivalence of Finite Automata and
Semi-Infinite Tape Turing Machine
2 Regular Grammars
Learning Assessment
Bloom’s Continuous Learning Assessment (50% weightage) Final Examination (50%
Level of CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)# weightage)
Thinking Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 40 % - 30 % - 30 % - 30 % - 30% -
Understand
Apply
Level 2 40 % - 40 % - 40 % - 40 % - 40% -
Analyze
Evaluate
Level 3 20 % - 30 % - 30 % - 30 % - 30% -
Create
Total 100 % 100 % 100 % 100 % 100 %
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Dr.R.AnnieUthra
Dr.Jeyasudha
Cour L T P C
Course 18CSE005 Course se Professional
COMPUTER NETWORKS E
Code J Name Cate Elective 2 0 2 3
gory
Pre-
Co-requisite Progressive
requisite Nil Nil Nil
Courses Courses
Courses
Computer Science and
Course Offering Department Data Book / Codes/Standards Nil
Engineering
Learning Assessment
Continuous Learning Assessment (50%
Bloom Final Examination (50%
weightage)
’s Level of weightage)
CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)#
Thinking
Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember 2 2 1 1 1 1 1 1 1 1
Level 1 0 0 5 5 5 5 5 5 5 5
Understand
% % % % % % % % % %
Apply 2 2 2 2 2 2 2 2 2 2
Level 2 0 0 0 0 0 0 0 0 0 0
Analyze
% % % % % % % % % %
Evaluate 1 1 1 1 1 1 1 1 1 1
Level 3 0 0 5 5 5 5 5 5 5 5
Create
% % % % % % % % % %
Total 100 % 100 % 100 % 100 % -
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Noor Mahammad, IIITDM, Kancheepuram,
1. . Dr. Sricharan, Wipro Technologies, Chennai 1. Mr. K. Venkatesh, SRMIST
noor@iiitdm.ac.in
2. 2. 2. Ms.D. Anitha, SRMIST
3. 3. Ms. Ferni Ukrit, SRMIST
Cour L T P C
Course 18CSE00 Course se
DATABASE MANAGEMENT SYSTEMS E Professional Elective
Code 6J Name Categ 2 0 2 3
ory
Co-
Pre- requis Progressiv
requisite Nil ite Nil e Nil
Courses Cours Courses
es
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil
Duration
12 12 12 12 12
(hour)
Relational Algebra –
SL What is Database Basics of SQL-DDL,DML,DCL,TCL , Fundamental Operators and Transaction concepts,
Database Design
O-1 Management System Structure Creation, alternation syntax, relational algebra properties of transactions,
S-1 queries
Defining Constraints-Primary Key,
SL Advantage of DBMS over File
Design process Foreign Key, Unique, not null, Tuple relational calculus Serial izability of transactions,
O-2 Processing System
check, IN operator
SL Introduction and applications Pitfalls in Relational database, testing for serial inability, System
Entity Relation Model Functions-aggregation functions
O-1 of DBMS Decomposing bad schema recovery,
S-2 Built-in Functions-numeric, date, Functional Dependency –
SL Purpose of database system,
ER diagram string functions, string functions, definition, trivial and non-trivial Concurrency Control
O-2 Views of data
Set operations, FD
Lab 1: SQL Data Definition L Lab 7 : Join Queries on sample
SL Language Commands on a Inbuilt functions in SQL on exercise. Lab10: PL/SQL Procedures on Lab 13: PL/SQL Exception Handling*
S O-1 sample exercise* The b sample * Frame and execute the sample exercise.* Frame and Frame and execute the appropriate
3-4 abstract of the project to 4 appropriate execute the appropriate Join PL/SQL Procedures and Functions
SL construct database must DDL,DML,DCL,TCL for the Queries for the project for the project
Exercise.
O-2 be framed project
SL closure of FD set , closure of
O-1 Keys , Attributes and Constraints , Sub Queries, correlated sub attributes Two- Phase Commit protocol,
S-5 Database system Architecture
SL Mapping Cardinality queries ,Nested Queries Recovery and Atomicity
irreducible set of FD
O-2
SL Views and its Types, Transaction
Data Independence Extended ER - Generalization Normalization – 1Nf, 2NF, 3NF, Log-based recovery
O-1 Control Commands
S-6
SL Decomposition using FD- concurrent executions of
The evolution of Data Models Specialization and Aggregation Commit, Rollback, Save point
O-2 dependency transactions
SL Lab 2: SQL Data Manipulation Lab 8: Set Operators & Views.* Lab 14: PL/SQL Trigger* Frame and
Lab 5: Construct a ER Model for Lab 11: PL/SQL Functions* Frame
S O-1 Language Commands * Frame and execute the execute the appropriate PL/SQL
theapplication to be constructed to and execute the appropriate Set
7-8 SL Identification of project appropriate In- Built functions for Cursors and Exceptional Handling
a Database Operators & Views for the project
O-2 Modules and functionality the project for the project
SL
Degrees of Data Abstraction ER Diagram Issues PL/SQL Concepts- Cursors
O-1 Locking mechanism, solution to
S-9 BCNF, examples
SL concurrency related problems
Database Users and DBA Weak Entity Stored Procedure
O-2
SL Functions Triggers and
Relational Model Multi- valued dependency, 4NF Deadlock
O-1 Exceptional Handling
S-10 Database Languages
SL two-phase locking protocol,
Conversion of ER to Relational Table Query Processing Join dependency and 5NF
O-2 Isolation, Intent locking
SL Lab 3: SQL Data Control
O-1 Language Commands Lab 15 : * Frame and execute
Lab9: PL/SQL Conditional and Lab 12: PL/SQL Cursors* Frame
and Transaction control Lab 6: Nested Queries on sample the appropriate PL/SQL
S 11- Iterative Statements* Frame and execute the appropriate
commands to the exercise* Construction of Relational Cursors and Exceptional
12 SL and execute the appropriate PL/SQL Conditional and Iterative
sample exercises* Table from the ER Diagram Handling for the project*
O-2 Nested Queries for the project Statements for the project
Identify the issues that Demo of the project
can arise in a business
perspective for the
application
Learning Assessment
Continuous Learning Assessment
Bloom Final Examination (50%
(50%weightage)
’s Level of weightage)
CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)#
Thinking
Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember 2 2 1 1 1 1 1 1 1 1
Level 1 0 0 5 5 5 5 5 5 5 5
Understand
% % % % % % % % % %
Apply 2 2 2 2 2 2 2 2 2 2
Level 2 0 0 0 0 0 0 0 0 0 0
Analyze
% % % % % % % % % %
Evaluate 1 1 1 1 1 1 1 1 1 1
Level 3 0 0 5 5 5 5 5 5 5 5
Create
% % % % % % % % % %
100
Total 100 % 100 % 100 % -
%
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Mariappan Vaithilingam, Engineering Leader Amazon, dr.v.m@ieee.org 1. Ms. Sasi Rekha Sankar SRMIST
2. Mr.Elizer, SRMIST
2. Mr. Badinath, SDET, Amzon, sbadhrinath@gmail.com
3. Mrs. Hemavathy, SRMIST
Co L T P C
Co
ur Cours
ur
se e
se 18CSE007J COMPILER DESIGN E Professional Elective
Na Catego 2 0 2 3
Co
m ry
de
e
Co-
Pre- Progressiv
requisit
requisite Nil Nil e
e
Courses Courses
Courses
Data Book /
Course Offering Department Computer Science and Engineering Nil
Codes/Standards
Duration (hour) 12 12 12 12 12
Compilers – Analysis of Syntax Analysis Definition - Role of Code optimization -Principal
SLO-1 Bottom Up Parsing , Reductions Intermediate Code Generation
the source program parser Sources of Optimization
S-1 Intermediate Languages - prefix -
Phases of a compiler – Function Preserving
SLO-2 Lexical versus Syntactic Analysis Handle Pruning postfix -Quadruple - triple -
Cousins of the Compiler Transformation
indirect triples Representation
Grouping of Phases – Syntax tree- Evaluation of
Shift Reduce Parsing, problems and
SLO-1 Compiler construction Representative Grammars, expression - three-address Loop Optimization
conflicts
tools code
S-2
Lexical Analysis – Role of Synthesized attributes –
Elimination of Ambiguity, Left Optimization of basic Blocks-
SLO-2 Lexical Analyzer, Input Inherited attributes,
Recursion ,Left Factoring Building Expression of DAG
Buffering Declarations
S SLO-1 Lab 4Elimation of Ambiguity,
Lab 1 - Implementation of Lab 10-Intermediate code
3- Left Recursion and Left Lab 7 - Shift Reduce Parsing Lab 13 Implementation of DAG
SLO-2 Lexical Analyzer generation – Postfix, Prefix
4 Factoring
Finite automation -
Assignment Statements , Case Peephole Optimization , Basic
SLO-1 deterministic ,non Top down parsing LR Parsers- Why LR Parsers
Statements Blocks,
deterministic
S-5
Items and LR(0) Automaton,
Recursive Descent Parsing, back Boolean Expressions, Back Flow Graphs , Next -Use
SLO-2 Transition Tables Closure of Item Sets, LR Parsing
tracking patching – Procedure calls Information
Algorithm
Acceptance of Input Strings
by Automata - State Code Generation- Issues in the Introduction to Global Data Flow
SLO-1 Computation of FIRST, FOLLOW Operator Precedence Parser
Diagrams and Regular design of code generator Analysis
S-6 Expressions
Conversion of regular The target machine – Runtime
Problems related to FIRST, Computation of LEADING Computation of gen and kill, in
SLO-2 expression to NFA – Storage
FOLLOW ,TRAILING and out
Thompson’s management
S SLO-1 Lab 11 Intermediate code
Lab 2 conversion from Lab 5 -FIRST AND FOLLOW Lab 8- Computation of LEADING Lab 14 : Implementation of
7- generation – Quadruple, Triple,
SLO-2 Regular Expression to NFA computation AND TRAILING Global Data Flow Analysis
8 Indirect triple
Conversion of NFA to DFA - Construction of a predictive A simple Code generator - Code Parameter Passing - Runtime
SLO-1 SLR Grammars- SLR Parsing Tables
Simulation parsing table Generation Algorithm Environments
S-9
Converting Regular
SLO-2 Predictive Parsers LL(1) Grammars Problems related to SLR Register and Address Descriptors Source Language issues
expression directly to DFA
Construction of Canonical LR(1) Generating Code of Assignment Storage Organization - Activation
SLO-1 Minimization of DFA Predictive Parsing Algorithm
and LALR Statements Records
S-
Error Recovery in Predictive
10 Design of lexical analysis Problems related to Canonical Cross Compiler – T diagrams -
SLO-2 Parsing- Non Recursive Predictive Storage Allocation strategies
(LEX) LR(1) and LALR Parsing Table Issues in Cross compilers
Parser
S SLO-1 Lab 15: Implement any one
Lab 3 Conversion from
11- Lab 6 Predictive Parsing Table Lab9 Computation of LR(0) items Lab 12 : A simple code Generator storage allocation
SLO-2 NFA to DFA
12 strategies(heap, stack, static)
Learning Assessment
Continuous Learning Assessment
Bloom Final Examination (50%
(50%weightage)
’s Level of weightage)
CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)#
Thinking
Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember 2 2 1 1 1 1 1 1 1 1
Level 1 0 0 5 5 5 5 5 5 5 5
Understand
% % % % % % % % % %
Apply 2 2 2 2 2 2 2 2 2 2
Level 2 0 0 0 0 0 0 0 0 0 0
Analyze
% % % % % % % % % %
Evaluate 1 1 1 1 1 1 1 1 1 1
Level 3 0 0 5 5 5 5 5 5 5 5
Create
% % % % % % % % % %
100
Total 100 % 100 % 100 % -
%
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Ms.R.Jeya
2. Mrs.J. Jeyasudha
Cour L T P C
Cours
18CSE0 Course se Professional
e ARTIFICIAL INTELLIGENCE C
08J Name Cate Core 2 0 2 3
Code
gory
Progress
Pre-
Co-requisite ive
requisite Nil Nil Nil
Courses Cours
Courses
es
Course Offering Department Computer Science and Engineering Data Book / Codes/Standards Nil
Learning Assessment
Continuous Learning Assessment (50%
Final Examination (50%
weightage)
Bloom’s Level weightage)
CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)#
of Thinking
Theor Practic Practic
Theory Practice Theory Practice Practice Theory Theory
y e e
Remember 2 1 1 1 1 1 1 1
15
Level 1 20% 0 0 0 5 5 5 5 5
Understand %
% % % % % % % %
Apply 2 2 2 2 2 2 2 2
20
Level 2 20% 0 0 0 0 0 0 0 0
Analyze %
% % % % % % % %
Evaluate 1 2 2 1 1 1 1 1
15
Level 3 10% 0 0 0 5 5 5 5 5
Create %
% % % % % % % %
Total 100 % 100 % 100 % 100 % -
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Mr.Jagatheeswaran, Lead, Auxo labs jagatheeswarans.iot@auxolabs.in 1. Dr. Chitrakala, Anna University, au.chitras@gmail.com 1. Dr.M.Pushpalatha, SRMIST
2. 2. 2. Dr.G..Vadivu, SRMIST
3. 3. Dr.C.Lakshmi, SRMIST
Course Learning
The purpose of learning this course is to: Learning Program Learning Outcomes (PLO)
Rationale (CLR):
CLR-1 : Understand the basic concepts of networking devices 1 2 3 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
CLR-2 : Understand the concept of IP security E
CLR-3 : Understand the various methods and protocols to maintain E-mail security A n
CLR-4 : Understand the various methods and protocols to maintain web security L E n v
E
CLR-5 : Understand security measures for wireless and cell phone communications e x E a i
x I P
v p n D l r
p n r
e e g e y o L
e P M S d o
l c i s s n i
c r o o i C j
o t n i i m f
t o d c v o e
f e e g s e e
e b e i i m c
T d e n , n L
d l r e d m t
h P r & D t E o
A e n t u u M P P P
i r i D e & t n
t m T y a n g S S S
n o n e s S h g
t A o & l i t O O O
k f g v i u i L
a n o C & c . - - –
i i K e g s c e
Course Learning i a l u T a & 1 2 3
At the end of this course, learners will be able to: n c n l n t s a
Outcomes (CLO): n l U l e t F
g i o o , a r
m y s t a i i
( e w p R i n
e s a u m o n
B n l m e n i
n i g r W n a
l c e e s a n
t s e e o n
o y d n e b g
( r c
o ( g t a i
% k e
m % e r l
)
) ) c i
h t
y
CLO-1 : Acquire the knowledge of network devices used in data communication 2 80 85 H H
CLO-2 : Acquire the knowledge of IP security and ability to identify the IP security attack 2 75 80 H
CLO-3 : Acquire the knowledge of Email security and ability to detect the attacks in e-mail 2 85 80 H
CLO-4 : Acquire the knowledge of web security attack and prevention mechanism 2 80 75 H H
CLO-5 : Acquire the knowledge of wireless network security and prevention mechanism 2 75 85 H H
Duration (hour) 9 9 9 9 9
Overview of IPSEC- Security
Wireless Security:IEEE 802.11 Wireless
SLO-1 Networking Devices(Layer1,2) Associations, Security Association Security Services for E-mail SSL/TLS Basic Protocol
LAN
S-1 Database
Wireless Security:IEEE 802.11 Wireless
SLO-2 Networking Devices(Layer 3) Security Policy databases , AH and ESP Security Services for E-mail SSL/TLS Basic Protocol
LAN
Different types of network layer
SLO-1 Tunnel and Transport mode Establishing keys computing the keys Authentication
attacks
S-2
Different types of network layer
SLO-2 IP header Protection Establishing Public and secret keys computing the keys Authentication and confidentiality
attacks
SLO-1 Firewall- ACL IP and IPv6 Privacy client authentication Cellphone Security
S-3 End-to end Privacy, Privacy with
SLO-2 Packet Filtering IPV4 and IPV6 header client authentication GSM (2G) Security
distribution List Exploders
SLO-1 DMZ, Alerts Authentication Header Authentication of the source PKI as deployed by SSL Security in UMTS (3G)
S-4 Mutable, Immutable and Mutable but Based on public key technology and Security in UMTS (3G)
SLO-2 Audit Trials PKI as deployed by SSL
predictable secret keys and with distribution list
SLO-1 IDS Encapsulation Security Payload(ESP) Message Integrity SSLAttacks fixed in v3 Wireless LAN Vulnerabilities
S-5 Advantages and Disadvantages of
SLO-2 Internet Key Exchange Non-repudiation SSLAttacks fixed in v3 Phishing
IDS(Need of IPS)
SLO-1 Advantages of IPS ove IDS Phases of IKE Introduction and Overviw of PGP Exportability Buffer Overflow
S-6
SLO-2 IPS Phase I IKE- Modes and key types Efficient Encoding Exportability Buffer Overflow
SLO-1 IPS Types- Signature based Phase I IKE Protocols Certificate and key revocation Encoding Format String Attacks
S-7
SLO-2 Anomaly based, Policy based Phase I IKE Protocols Singature types, Private key, Fing types Encrypted Record Cross-site Scripting (XSS)
SLO-1 IPS Types - Honeypot based Phase II IKE Anomalies Handshake messages SQL Injection
S-8
SLO-2 Applications Phase II IKE Object Format Changecipherspec and Alerts SQL Injection
Case Studies: Secure Inter-branch
SLO-1 Malicious Software ISAKMP/IKE Encoding S/MIME SET
S-9 Payment Transactions
SLO-2 Malicious Software ISAKMP/IKE Encoding S/MIME SET Virtual Elections
1. Charlie Kaufman, Radia Perlman, Mike Speciner, Network Security, Prentice Hall of India, 3. William Stallings, Cryptography and Network Security - Principles and Practice, 7th edition, Pearson
Learning
2002. Publication, 2017
Resources
2. Bernard Menezes - Network Security and Cryptography- Cengage Learning. 2010. 4. Cryptography and network security , AtulkahateTata McGraw-Hill Education,2003
Learning Assessment
Bloom’s Continuous Learning Assessment (50% weightage)
Final Examination (50% weightage)
Level of CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)#
Thinking Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 40 % - 30 % - 30 % - 30 % - 30% -
Understand
Apply
Level 2 40 % - 40 % - 40 % - 40 % - 40% -
Analyze
Evaluate
Level 3 20 % - 30 % - 30 % - 30 % - 30% -
Create
Total 100 % 100 % 100 % 100 % 100 %
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
Dr. A. Jeyasekar, Associate Professor
Dr. P. Yogesh, Associate Professor, Dept of Information Science and
Mr. M. Sudhakar, M.Tech, (Ph.D)-IIT, IT Infrastructure Service, Tata Consultancy Services. Dr. J. Femilda, Associate Professor
Technology, College of Engineering, Guindy,
Mrs. G. Sujatha, Assistant Professor
Course Course Course L T P C
18CSE010T DATA MINING AND ANALYTICS E Professional Elective
Code Name Category 3 0 0 3
Duration
9 9 9 9 9
(hour)
Why Data mining? What is Data Mining frequent patterns: Basic
SLO-1 Classification: Basic concepts Cluster Analysis: Introduction Outliers: Introduction
mining ? concepts
S-1
Requirements and overview of different
SLO-2 Kinds of data meant for mining Market Basket Analysis General approach to Classification Challenges of outlier detection
categories
SLO-1 Kinds of patterns that can be mined Frequent itemsets, Closed itemsets Decision tree induction Partitioning method: Introduction Outlier detection methods: Introduction
S-2 Applications suitable for data Supervized and Semi-supervized
SLO-2 Association rules-Introduction Algorithm for Decision tree induction k-means
mining methods
Numerical example for Decision tree
SLO-1 Issues in Data mining Apriori algorithm-theoritical approach k-medoids Unsupervized methods
S-3 induction
SLO-2 Data objects and Attribute types Apply Apriori algorithm on dataset-1 Attribute selection measure Hierarchical method: Introduction
SLO-1 Statistical descriptions of data Apply Apriori algorithm on dataset-2 Tree pruning Agglomerative vs. Divisive method Statistical and Proximity based methods
S-4 Generating Association rules from Distance measures in algorithmic
SLO-2 Scalability and Decision tree induction
frequent itemsets methods
Need for data preprocessing and
S-5 SLO-1 Improving efficiency of Apriori Bayes’ Theorem BIRCH technique Statistical approaches
data quality
SLO-2 Naïve Bayesian Classification
SLO-1 Data cleaning Pattern growth approach IF-THEN rules for classification DBSCAN technique Statistical data mining
S-6
SLO-2 Data integration Rule extraction from a decision tree
Mining frequest itemsets using Vertical Metrics for evaluating classifier
SLO-1 Data reduction STING technique Data mining and recommender systems
S-7 data format performance
SLO-2 Strong rules vs. weak rules Cross validation
Association analysis to Correlation Bootstrap
SLO-1 Data transformation CLIQUE technique Data mining for financial data analysis
S-8 analysis
SLO-2 Ensemble methods-Introduction
Comparison of pattern evaluation Bagging and Boosting
SLO-1 Data cube and its usage Evaluation of clustering techniques Data mining for Intrusion detection
S-9 measures
SLO-2 Random Forests: Introduction
Learning 1. Jiawei Han and Micheline Kamber, “ Data Mining: Concepts and Techniques”, 3rd
Resources Edition, Morgan Kauffman Publishers, 2011.
Learning Assessment
Bloom’s Continuous Learning Assessment (50% weightage) Final Examination (50%
Level of CLA – 1 (10%) CLA – 2 (15%) CLA – 3 (15%) CLA – 4 (10%)# weightage)
Thinking Theory Practice Theory Practice Theory Practice Theory Practice Theory Practice
Remember
Level 1 40 % - 30 % - 30 % - 30 % - 30% -
Understand
Apply
Level 2 40 % - 40 % - 40 % - 40 % - 40% -
Analyze
Evaluate
Level 3 20 % - 30 % - 30 % - 30 % - 30% -
Create
Total 100 % 100 % 100 % 100 % 100 %
# CLA – 4 can be from any combination of these: Assignments, Seminars, Tech Talks, Mini-Projects, Case-Studies, Self-Study, MOOCs, Certifications, Conf. Paper etc.,
Course Designers
Experts from Industry Experts from Higher Technical Institutions Internal Experts
1. Dr.Latha Parthiba, Pondicherry University,
1. Mr.V.Selvakumar, Hexaware Technologies, selvakumarv@hexaware.com 1. Mr.L.N.B.Srinivas, SRMIST
lathaparthiban@yahoo.com
2. Mr.S.Karthick, SRMIST
3. Dr.V.V.Ramalingam, SRMIST