12crsfile CourseStructuresyllabusB - techCSE (2021 22) Final
12crsfile CourseStructuresyllabusB - techCSE (2021 22) Final
Session 2021-22)
B. Tech. Computer Science & Engineering
COURSE STRUCTURE
B.TECH.
COMPUTER SCIENCE & ENGINEERING
Under
Choice Based Credit System (CBCS)
Credits Distributions
First Semester
TEACHING
S. CONTACTS
CODE SUBJECT SCHEME CREDITS
NO. HRS/WK
L T P
1. BMAS0101 Engineering Mathematics I 3 1 0 4 4
BCHS0101/ Engineering Chemistry/
2. 3 1 0 4 4
BPHS0001 Engineering Physics
English Language Skills for
3. BELH0001 2 0 0 2 2
Communication I
BEEG0001/ Basic Electrical Engineering /
4. 3 1 0 4 4
BECG0001 Electronics Engineering
5. BCSG0002 Computer Programming 3 0 0 3 3
PRACTICALS
BCHS0801/ Engineering Chemistry Lab /
1. 0 0 2 1 2
BPHS0801 Engineering Physics Lab
2. BELH0801 English Language Lab I 0 0 2 1 2
BEEG0800/ Electrical Engineering Lab/
3. 0 0 2 1 2
BECG0800 Electronics Lab I
4. BMEG0801 Engineering Drawing Lab 0 0 2 1 2
5. BCSG0801 Computer Programming Lab 0 0 2 1 2
TOTAL 14 3 10 22 27
Second Semester
TEACHING
S. CONTACTS
CODE SUBJECT SCHEME CREDITS
NO. HRS/WK
L T P
1. BMAS0102 Engineering Mathematics II 3 1 0 4 4
BPHS0001/ Engineering Physics/
2. BCHS0101/ 3 1 0 4 4
Engineering Chemistry
English Language Skills for
3. BELH0002 2 0 0 2 2
Communication II
BECG0001/ Electronics Engineering/
4. 3 1 0 4 4
BEEG0001 Electrical Engineering
5. BMEG0001 Basic Mechanical Engineering 3 1 0 4 4
6. BCSG1001 Python Programming 3 0 0 3 3
PRACTICALS
BPHS0801/ Engineering Physics Lab/
1. 0 0 2 1 2
BCHS0801 Engineering Chemistry Lab
2. BELH0802 English Language Lab II 0 0 2 1 2
BECG0800/ Electronics Lab I/
3. 0 0 2 1 2
BEEG0800 Electrical Engineering Lab
Engineering Workshop Practice
4. BMEG0800 0 0 2 1 2
Lab
5. BCSG1800 Python Programming Lab 0 0 2 1 2
TOTAL 17 4 10 26 31
Program Core
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME PRE-
CODE SUBJECT
NO. REQUISITES
L T P J
THEORY
1. BCSC0002 Object Oriented Programming 3 0 0 0 3 3 Programming
Program Elective
CONTACTS
TEACHING SCHEME
CREDITS
HR/WK
S.
CODE SUBJECT PRE- REQUISITES
NO.
L T P J
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME PRE-
CODE SUBJECT
NO. REQUISITES
L T P J
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME
CODE SUBJECT PRE- REQUISITES
NO.
L T P J
PROJECTS
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME PRE-
CODE SUBJECT
NO. REQUISITES
L T P J
PRACTICALS
Data Mining and Warehousing
1. BCSE0181 0 0 2 0 1 2
Lab
2. BCSE0182 Business Intelligence Lab 0 0 2 0 1 2
PROJECTS
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME
NO.
CODE SUBJECT PRE- REQUISITES
L T P J
PROJECTS
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME
NO.
CODE SUBJECT PRE- REQUISITES
L T P J
PROJECTS
Full Stack Using Scripting
1. BCSE0291 0 0 0 0 2 -
Technologies Project
2. BCSE0292 Full Stack Using Node JS Project 0 0 0 0 2 -
Projects
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME
NO.
CODE SUBJECT PRE- REQUISITES
L T P J
TOTAL 0 0 0 0 17 0
CONTACTS
TEACHING SCHEME
CREDITS
HR/WK
S.
CODE SUBJECT PRE- REQUISITES
NO.
L T P J
THEORY
CONTACTS
TEACHING SCHEME
CREDITS
HR/WK
S.
CODE SUBJECT PRE- REQUISITES
NO.
L T P J
THEORY
English Language Skills for
1. BELH0001 2 0 0 0 2 2
Communication – I
English Language Skills for
2. BELH0002 2 0 0 0 2 2
Communication – II
3. BELH0003 English for Professional Purposes – I 2 0 0 0 2 2
PRACTICALS
TOTAL 13 0 24 0 25 37
Basic Sciences
CONTACT
S HR/WK
CREDITS
TEACHING SCHEME
S.
CODE SUBJECT PRE- REQUISITES
NO.
L T P J
THEORY
PRACTICALS
TOTAL 17 5 4 0 24 26
Engineering Sciences
CONTACTS
TEACHING SCHEME
CREDITS
HR/WK
S.
CODE SUBJECT PRE- REQUISITES
NO.
L T P J
THEORY
PRACTICALS
Total 15 3 12 0 24 25
CONTACTS
CREDITS
HR/WK
S. SCHEME
CODE SUBJECT PRE- REQUISITES
NO.
L T P J
THEORY
Data Structures and
1. BCSO0001 3 0 0 0 3 3 Programming
Applications
Introduction To Object Oriented
2. BCSO0002 3 0 0 0 3 3 Programming
Programming
Essentials of Information Object Oriented
3. BCSO0003 3 0 0 0 3 3
Technology Programming
4. BCSO0004 Elements of Soft Computing 3 0 0 0 3 3
PRACTICALS
Data Structures and Applications
1. BCSO0070 0 0 2 0 1 2 Programming
Lab
Introduction To Object Oriented
2. BCSO0071 0 0 2 0 1 2 Programming
Programming Lab
Essentials of Information Object Oriented
3. BCSO0072 0 0 2 0 1 2
Technology Lab Programming
4. BCSO0073 Elements of Soft Computing Lab 0 0 2 0 1 2
Credits:05 L-T-P-J:4-1-0-0
Module Teaching
No. Content Hours
Input-Output: Printing on screen, reading data from keyboard, Opening and closing
file, Reading and writing files, Functions.
Exception Handling: Exception, Exception Handling, except clause, try? finally
clause, User Defined Exceptions.
Basics of Python for Data Analysis, Introduction to series and data frames& Python
using Pandas.
Text Books:
Paul Barry: “Head First Python “O’Reilly Media, Inc.", 2010.
Reference Books:
Bret Slatkin: “Effective Python: 59 Specific ways to write better Python”, Addison Wesley, 2015.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO2/PSO4
CO2 PO4/PSO1
CO3 PO5/PSO4
CO4 PO5,PO7/PSO1
CO5 PO2,PO8/PSO4
CO6 PO3,PO10/PSO2
CO7 PO5,PO9/PSO1
Credits:05 L-T-P-J:4-1-0-0
Module Teaching
No. Content Hours
Generation of Programming Languages: Low, Assembly, High and 4GL.
Language Processors: Compiler, Interpreter, Assembler, Linker and Loader.
Algorithm: Introduction, Features, Different Ways of stating Algorithms.
Flow Chart: Introduction, Standard, Guidelines, Advantages and Limitations of using
Flowcharts.
Basics of C: Overview, Structure of a C program, Identifier, Keywords, Variables, Data
types, Formatted Input and output.
Operators and Expression: Assignment, Unary, Arithmetic, Relational, Logical, Bitwise,
Conditional, Special operators and their precedence & Associativity.
IEEE representation of data types like float & double, Lvalue and Rvalue
Type Conversion: Type Promotion in expression, Conversion by Assignment, Truncation
I and Casting Arithmetic expression. 25
Decision and Case Control Structure: if, if-else, nested if-else, Decisions using switch,
switch versus if-else ladder, goto.
Loop Control Structure: For loop, while loop, do-while loop, nesting of loops, break, and
continue.
Arrays: Introduction, one-dimensional and two-dimensional Array-Declaration,
Initialization, Address Calculation.
Operations on Arrays: Insertion, Deletion, Linear Search & Bubble Sort.
String: Introduction, One dimensional and two dimensional Array-Declarations,
Initialization
Operations on String: Length, Copy, Reverse, Concatenate, Compare with & without
built-in functions.
Functions: Declaration and Definition, Category of Functions, Parameter Passing
Techniques – Call by Value, Passing Arrays to Functions.
Introduction to Storage Classes: Auto, Static, Extern and Register.
Recursion: Mechanics of Recursive Call, Implementation of Recursion, Recursion vs.
Iteration.
The C Preprocessor: Introduction, Macro Expansion and File Inclusion, Conditional
Compilation and Miscellaneous Directives.
Pointers: Declaration and Initialization of Pointer Variables, Accessing a Variable
II through its Pointer, Arrays and Pointers, Pointer and Strings, Pointer Arithmetic, Pointers 25
to Pointers, Array of Pointers, Pointer to an Array, Two Dimensional Array and Pointers,
Pointers to Functions, Dynamic Memory Allocation, void Pointer and Null Pointer.
User Defined Types: enum, typedef, Union and Structure - Declaration, Initialization,
Nested Structures, Arrays of Structures, Structure and Pointer, Passing Structure
Through Function. Difference between Structures and Union.
File Handling: Data and Information, File Concepts, File Organization, File Operations:
Open, Read, and Close, Trouble in Opening a File. File Opening Modes, Working with Text
Files. Random Access to Files of Records.
Introduction to Command Line Arguments.
Text Books:
Behrouz A. Forouzan and Richard F. Gilberg, “Computer Science – A Structured Programming
Approach Using C”, C Language Learning, 2007
Reference Books:
Herbert Schildt, “C: The Complete Reference”, 5th Edition, McGraw Hill Education
K. N. King, “C Programming a Modern Approach”, W. W. Norton, 2nd Edition, 2008.
Kernighan and Ritche, “The C Programming Language”, PHI, 2ndEdition, 2011.
P. Dey and M. Ghosh, “Programming in C”, Oxford University Press 2nd Edition, 2013.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO4,PO12/PSO1,PSO3
CO2 PO1,PO2,PO3,PO10/PSO1,PSO3
CO3 PO1,PO2,PO3,PO4/PSO1,PSO3
CO4 PO1,PO3, PO12/PSO1,PSO2
CO5 PO1,PO2,PO4 /PSO1,PSO3
CO6 PO1,PO2,PO3,PO4/PSO1,PSO2
CO7 PO1,PO3,PO6 /PSO1
CO8 PO1,PO2,PO4,PO10,PO12/PSO1,PSO3
CREDITS: 3 L-T-P-J:3-0-0-0
Module Teaching
Content
No. Hours
Object-Oriented Programming: Features of Object-Oriented Programming,
Introduction to Object-Oriented Java Programming.
g Java Technology & Environment: Understanding the compilation process of
the JVM, JVM vs JDK vs JRE, Key Features of Java, Structure of a simple Java
program.
Working with Java Primitive Data Types: Strongly Typed nature of Java,
Primitive Data Types in Java, The new ‘var’ keyword, Scope of a variable.
Accepting User Input in Java Programs: using the Scanner class, using
command line arguments.
Programming Constructs: Sequence, Selection, Iteration & Transfer
Statements, For-Each Loop.
Working with Java Arrays: Declaring and Initializing One-Dimensional and
Two-Dimensional Arrays in Java, Introduction to java. util. Arrays class.
The String API: String Data Type, commonly used methods from the String API,
String Tokenizer, String Builder & String Buffer.
I 20
Creating and Using Methods: Signature of a method, Types of Methods,
Overloading methods in a class, Static and Non-Static Methods.
Describing and Using Objects & Classes: Declare the structure of a Java class,
declaring members of a class (fields and methods), declaring and using Java
Objects, lifecycle of an Object (creation, assignment, dereferencing and garbage
collection), Constructors of a class, Overloading Constructors, Constructor
chaining using ‘this’ and ‘super’ keyword.
Using Java Packages: create and import Java packages and static imports,
abstracting program logic to packages, creating executable main class, running
the executable class inside a package.
Applying Encapsulation: Using access modifiers with/in a class, principles of
encapsulation.
Programming Abstractly Through Interfaces: create and implement
Interfaces for programs, private and default methods in Interfaces, declaring
Abstract Classes, Constructors in Abstract Classes. Marker Interface, Functional
Interfaces, Lambda Expressions in Java.
Reusing Implementations using Inheritance: Declaring Subclasses and Super
classes, extend Abstract Classes, implementing Interfaces, exploring
polymorphic behavior by overriding methods, Object Types vs Reference Types,
differentiate overloading, overriding and hiding.
Exception Handling: Exception Hierarchy, Need of Exception Handling,
Checked Exceptions, Unchecked Exceptions and Errors, Try-Catch Blocks,
Finally, Throw & Throws Keywords, creating and handling Custom Exceptions.
Threads in Java: Life Cycle of a Thread, creating threads using Runnable and
Thread, ‘sleep ()’, Thread Priorities.
II Using Wrapper Classes: Wrapper Classes in Java, Boxing-Unboxing-Auto 18
Boxing-Auto Unboxing.
Generics & Collections: Creating Generic classes, Generic Methods, Diamond
Notation, Wildcards, Type Erasure, Collection Hierarchy, Base Interfaces, Lists,
Sets and Maps.
The Stream API: Introduction to the Stream API, using lambda expressions in
Streams.
Regular Expressions: Pattern and Matcher Class.
JDBC: JDBC Drivers, Connecting to a MySQL Database, Driver Manager,
Connection Interface, Statement Interface, Result Set Interface, Prepared
Statements.
Text Book:
Herbert Schildt, “The Complete Reference, Java Eleventh Edition”, Oracle Press.2019.
Reference Book:
Cay S Hosrtmann, “Core Java Volume I—Fundamentals, Eleventh Edition”, Pearson,2018.
Rogers Cadenhead, “Sams Teach Yourself Java in 21 Days (Covers Java 11/12), 8th Edition”,
Pearson,2020.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3/PSO1,PSO2
CO2 PO1,PO3/PSO1,PSO2
CO3 PO1,PO2/PSO1,PSO2
CO4 PO1/PSO2,PSO4
CO5 PO1,PO2,PO4/PSO4
CO6 PO1,PO2, PO3/PSO2
CO7 PO1,PO2,PO11/PSO2
CO8 PO1,PO2,PO3/PSO1,PSO2
Module Teaching
Content
No. Hours
Introduction: An Overview of Database Management System, Database System
Vs File System, Database System Concept and Architecture, Data Model Schema
and Instances, Data Independence, Database Language and Interfaces (DDL,
DML, DCL), Database Development Life Cycle (DDLC) with Case Studies.
Data Modeling Using the Entity-Relationship Model: ER Model Concepts,
Notation for ER Diagram, Mapping Constraints, Keys, Specialization,
I Generalization, Aggregation, Reduction of an ER Diagram to Tables, Extended 20
ER Model.
Relational Data Model and Language: Relational Data Model Concepts, Integrity
Constraints, Entity Integrity, Referential Integrity, Keys Constraints, Domain
Constraints, Relational Algebra
Database Design & Normalization I: Functional Dependencies, Primary Key,
Foreign Key, Candidate Key, Super Key, Normal Forms, First, Second, Third
Normal Forms, BCNF, Non-Redundant Cover, Canonical Cover
Database Design & Normalization II: 4th Normal Form, 5th Normal Form,
Lossless Join Decompositions, MVD and JDs, Inclusion Dependence.
File Organization: Indexing, Structure of Index files and Types, Dense and
Sparse Indexing
Transaction Processing Concept: Transaction System, Testing of
Serializability, Serializability of Schedules, Conflict & View Serializable
II Schedule, Recoverability, Recovery from Transaction Failures, Log Based 20
Recovery, Deadlock Handling.
Concurrency Control Techniques: Concurrency Control, Locking Techniques
for Concurrency Control, 2PL, Time Stamping Protocols for Concurrency
Control, Validation Based Protocol.
Distributed Database: Introduction of Distributed Database, Data
Fragmentation and Replication.
Text Books:
Elmasri and Navathe, “Fundamentals of Database Systems”, 6th Edition, Addison Wesley,2010.
Sadalage, P. &Fowler, “NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot
Persistence”, Pearson Education,2012.
References Books:
Date C J,” An Introduction to Database Systems”, 8th Edition, Addison Wesley.
Korth, Silbertz and Sudarshan, “Database Concepts”, 5th Edition, TMH,1998.
Redmond, E. & Wilson, “Seven Databases in Seven Weeks: A Guide to Modern Databases and the
NoSQL Movement”, 1st Edition.
Outcome: After the completion of the course, the student will:
CO1: Understand the concept of database management systems and Relational database.
CO2: Identify the various data model used in database design.
CO3: Design conceptual models of a database using ER modeling for real life applications and
construct queries in Relational Algebra.
CO4: Create and populate a RDBMS for a real life application, with constraints and keys using SQL.
CO5: Select the information from a database by formulating complex queries in SQL.
CO6: Analyze the existing design of a database schema and apply concepts of normalization to design
an optimal database.
CO7: Discuss indexing mechanisms for efficient retrieval of information from a database.
CO8: Discuss recovery system and be familiar with introduction to web database, distributed
databases.
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1 /PSO1
CO2 PO2, PO3/ PSO2
CO3 PO2,PO3,PO6,PO11/PSO1,PSO2,PSO4
CO4 PO1,PO3/PSO1
CO5 PO1,PO5/PSO1
CO6 PO2,PO3,PO9/ PSO2
CO7 PO1,PO11 /PSO1
CO8 PO1,PO3,PO12/ PSO2
Credits:03 L-T-P-J:3-0-0-0
Module Teaching
No. Content Hours
Text Books:
Silberschatz, Galvin and Gagne, “Operating Systems Concepts”,9th Edition, Wiley, 2012.
Reference Books:
SibsankarHalder and Alex a Aravind,” Operating Systems”, 6th Edition, Pearson Education, 2009.
Harvey M Dietel, “An Introduction to Operating System”, 2nd Edition, Pearson Education, 2002.
D M Dhamdhere, “Operating Systems: A Concept Based Approach”, 2nd Edition, 2006.
M. J. Bach, “Design of the Unix Operating System”, PHI, 1986.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO7/PSO1
CO2 PO1,PO2 /PSO1
CO3 PO1,PO4/PSO1,POS3
CO4 PO3,PO4,PO6/PSO3,PSO4
CO5 PO1,PO4/PSO1,PSO3
CO6 PO1,PO2/PSO1,PSO3
CO7 PO1,PO2,PO7/PSO1,PSO3
Module Teaching
Content
No. Hours
Basic Organization: Basic organization of the computer and Block level
description of the functional units, Number representation; 1’s and 2’s
Complement, Integer Representation, Arithmetic Addition & Subtraction
with overflow. fixed and floating-point number representation, IEEE
standard floating point representation. Introduction to Combinational
Circuit- half adder, full adder, binary adder/subtractor, carry look ahead
I adders. Multiplexer and Demultiplexer, Register, bus and memory 20
transfer.
Central Processing Unit: Addition and subtraction of signed numbers,
Multiplication: Signed operand multiplication, Booths algorithm.
Processor organization, general registers organization, stack organization,
Three, Two, One & Zero address instruction. Addressing modes, Micro-
operations (Arithmetic, Logical & Shift) and its applications.
Text Books:
M. Mano, “Computer System Architecture”, 3rd Edition, PHI,1996
Reference Books:
D.W. Patterson, “Computer Organization and Design”, 4thEdition, Elsevier Publication, 2008.
William Stalling, “Computer Organization”,8th Edition, PHI, 2011.
V. CarlHamacher, Zaky, “Computer Organization”,4th International Edition, TMH, 1996.
John P Hays, “Computer Organization”, 2nd Edition, TMH.
Tannenbaum , “Structured Computer Organization”, 5thEdition, PHI, 2005.
P Pal Chaudhry, “Computer Organization & Design”, 2ndEdition, PHI, 2002.
Outcome: After completion of the course, the student will be able to:
CO1: Understand the basics of digital computer system.
CO2: Demonstrate the principle of arithmetic operations on unsigned, signed integers and
floating point numbers.
CO3: Understand the concepts of Combinational and Sequential circuits and their applications.
CO4: Understand the CPU architecture and organization.
CO5: Explain the basic concepts of pipelining.
CO6: Design the steps for the execution of the complete instruction for hardwired and micro-
programmed control unit.
CO7: Explain the function of memory hierarchy.
CO8: Determine the interface of CPU with input/output devices and their modes of transfer.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3/PSO1
CO2 PO1,PO3/PSO1
CO3 PO2,PO3,PO5/PSO2
CO4 PO2,PO3,PO4/PSO1,PSO3
CO5 PO2,PO3,PO4/PSO2
CO6 PO1,PO2,PO3/PSO1,PSO3
CO7 PO2,PO3,PO5/PSO2,PSO3
CO8 PO3,PO4/PSO1
Objective: The objective of this course is that students will construct and application of various data
structures and abstract data types including lists, stacks, queues, trees and graphs.
Text Book:
Aaron M. Tanenbaum, YedidyahLangsam and Moshe J. Augenstein, “Data Structures Using C and
C++”, 2nd Edition, PHI, 2009.
Reference Books:
Horowitz and Sahani, “Fundamentals of Data Structures”, 3rd Edition, W H Freeman & Co, 2004-
05.
Jean Paul Trembley and Paul G. Sorenson, “An Introduction to Data Structures with Applications”,
2nd Edition, TMH, 2007.
R. Kruse, “Data Structures and Program Design in C”, 2nd Edition, Pearson Education, 2004.
Lipschutz Schaum’s Outline Series, “Data Structures”, 12th Reprint, TMH, 2010.
G A V Pai, “Data Structures and Algorithms”, TMH, 2009.
COs POs/PSOs
CO1 PO1/PSO1,PSO2
CO2 PO1, PO2/PSO1,PSO2
CO3 PO1/PSO1
CO4 PO1,PO4/PSO1
CO5 PO1,PO4/PSO3
CO6 PO2/PSO4
CO7 PO2/PSO4
Module Teaching
Content
No. Hours
Introduction: Microprocessors Evolution and Types, Basics of Pentium
Microprocessor, Microprocessor Application,
8-Bit Microprocessor:8085 Microprocessor and its Architecture, Addressing
Modes, The 8085 Programming Model, Instruction Classification, Instruction
Format, Overview of Instruction Set - Data Transfer Operation, Arithmetic
I 20
Operation, Logic Operations and Branch Operations; Introduction to
Assembly Language Program.
Programming Technique with Additional Instruction: Looping, Counting,
Indexing, Additional Data Transfer and 16-Bit Arithmetic Instruction,
Counters and Time Delays, Stack and Subroutine.
16 Bit Microprocessor: Architecture of 8086 – Register Organization,
Execution Unit, Bus Interface Unit, Signal Description, Physical Memory
Organization, Mode of Operation, I/O Addressing Capabilities.
Peripheral Interfacing: I/O Programming, Programmed I/O, Interrupt
II 18
Driven I/O, DMA I/O, Memory-Mapped I/Os.
Peripheral Devices: 8237 DMA Controller, 8255 Programmable Peripheral
Interface, 8253/8254 Programmable Timer/Counter, 8259 Programmable
Interrupt Controller.
Text Books:
N Senthil Kumar, MSaravanan, and S Jeevananthan, “Microprocessors and Microcontrollers”,
Oxford University Press India, 2010.
Reference Books:
Ramesh S. Gaonkar , “Microprocessor Architecture Programming and Applications with 8085”, 4th
Edition, Penram International Publishing, 2000.
Ray A.K. Bhurchandi.K.M, “Advanced Microprocessor and Peripherals”, TMH, 2002.
D. V. Hall, “Microprocessors and Interfacing: Programming and Hardware”, 2nd Edition, TMH,
1992.
Y.C. Liu and G.A. Gibson, “Microcomputer Systems: The 8086/8088 Family Architecture
Programming and Design”, 2nd Edition, PHI, 2003.
Outcome: After the completion of the course, the student will be able to:
• CO1: Demonstrate the Microprocessor internal architecture and its operations.
• CO2: Develop programs based on 8085 microprocessor instruction set and addressing mode.
• CO3: Develop program using looping, counting, indexing, counter and time delays.
• CO4: Understand the concept of stack and subroutine for modular approach.
• CO5: Compare accepted standards and guidelines to select microprocessor (8085 & 8086) to
meet performance requirements.
• CO6: Analyze the concept of interfacing the processor to external device with I/O programming
& Interrupt Driven I/O.
• CO7: Understand the working of interfacing chips (8237, 8253/54, 8255 & 8259).
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2/PSO1
CO2 PO2,PO3/PSO1,PSO2
CO3 PO2,PO3/PSO1,PSO2
CO4 PO1,PO2,PO3/PSO1,PSO3
CO5 PO2,PO3,PO5/PSO1,PSO3
CO6 PO1,PO2/PSO3
CO7 PO1,PO2,PO4/PSO3
Module Teaching
Content
No. Hours
Introduction Concepts: Goals and Applications of Networks, Network
structure and architecture, The OSI reference model, services, Network
Topology Design, Physical Layer Transmission Media, Line coding scheme,
switching methods (circuit switching, Packet switching), TDM.
I Medium Access sub layer: Medium Access sub layer - Channel Allocations, 20
LAN protocols - ALOHA protocols, CSMA, CSMA/CD, Overview of IEEE
standards.
Data Link Layer: Error detection and correction, Flow control (sliding
window protocol)
Network Layer: Network Layer –IP addressing, subnet, CIDR, VLSM,
Internetworking, Address mapping, routing. Connecting devices.
Transport Layer: Transport Layer - Design issues, connection
management, Flow control, TCP window management, congestion control-
II slow start algorithm. 20
Application Layer: Data compression, Data Encryption, File Transfer, DNS,
HTTP, SMTP, TELNET
Introduction to IPv6, transition from IPv4 to IPv6.
Text Books:
• Forouzan B. A. , “Data Communication and Networking”, 4th Edition, McGrawHill ,2004.
References:
• Kurose, J.F. and Ross K.W., “Computer Networking: A Top-Down Approach Featuring the Internet”,
3rd Edition, Addison-Wesley,2005.
• A.S. Tanenbaum, “Computer Networks”, 2nd Edition, Prentice Hall India,2006.
Outcome: After the completion of the course, the student will be able to:
• CO1: Understand the concept of OSI and TCP/IP reference model.
• CO2: Understand the basics of data transmission at physical layer.
• CO3: Understand the channel allocation using ALOHA, CSMA and CSMA/CD.
• CO4: Apply error detection and correction technique to eliminate transmission error.
• CO5: Analyze the fixed and variable length address (IPv4) subneting for the given scenarios.
• CO6: Understand the design issues of the transport layer.
• CO7: Understand the mechanism of protocols at application layer such as FTP, HTTP, Telnet,
DNS.
• CO8: Understand IPv6 addressing and differentiate it from IPv4.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3,PO12/PSO1
CO2 PO1/PSO2
CO3 PO1,PO4/PSO1,PSO4
CO4 PO1,PO3/PSO1
CO5 PO1,PO3,PO4,PO6/PSO3
CO6 PO2,PO4/PSO1
CO7 PO5,PO12/PSO2
CO8 PO4,PO7/PSO4
L–T–P-J: 3–0–0-0
Credits: 03
Module Teaching
Content
No. Hours
Introductory Concepts: The evolving role of software – characteristics,
components and applications.
Process Models: Waterfall Model, Prototyping, Incremental, Spiral.
Agile software Development: Introduction to Agile, Agile software
development framework.
Software Requirement Specification: Requirement Process, SRS
Components, Requirement Specifications with Use Cases Diagram.
I 20
Software Project Planning: Project Planning Objectives.
Software Metrics: Size, Function Point, Staffing, Project Estimation Methods–
COCOMO Model.
Function-Oriented Design: Problem Partitioning, Abstraction, Top Down
and Bottom Up Design.
Module-Level Concepts: Coupling, Cohesion, Design Notation and
Specification - Structure Charts; Structured Design Methodology - Data Flow
Diagram, Sequence Diagram.
OO Analysis and OO Design: OO Concepts, Introduction to UML Design
Patterns: Class Diagram, Activity Diagram, State Chart Diagram.
Coding: Coding Process, Verification – Code Inspections, Software Metrics.
Testing Fundamentals: Test Case Design, Black Box Testing Strategies,
White Box Testing, Unit Testing, Integration Testing, System Testing.
II Introduction to Automation Testing and Testing Tools: Automated 18
Testing Process, Framework for Automation Testing, Introduction to
Automation Testing Tool.
Software Quality: Models, ISO 9000 Certification for Software Industry, SEI
Capability Maturity Model.
Software Maintenance: Models Cost of Maintenance, Re-engineering,
Reverse Engineering.
Text Books:
R. S. Pressman , “Software Engineering: A Practitioners Approach”, 7thEdition, McGraw Hill,2010.
Reference Books:
K. K. Aggarwal and Yogesh Singh , “Software Engineering”, 3rd Edition, New Age International
Publishers,2008.
Rajib Mall , “Fundamentals of Software Engineering”, 3rd Edition, PHI Publication,2009.
R.E Fairley , “Software Engineering”, McGraw Hill,2004.
Sommerville, “Software Engineering”, 9th Edition, Pearson Education,2010.
Outcome: After the completion of the course, the student will be able to:
• CO1: Understand the basic concepts of software engineering.
• CO2: Apply software processes to solve real world problems.
• CO3: Estimate the cost, effort and schedule of software using COCOMO Model.
• CO4: Analyze the software design techniques (structure chart, SDM, sequence diagram).
• CO5: Understand the basic concepts of OO analysis and design.
• CO6: Develop the test cases to validate the software.
• CO7: Understand the basic models of software Quality and maintenance.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO7/PSO1
CO2 PO2,PO3/PSO4
CO3 PO2,PO11/PSO3
CO4 PO3,PO10/PSO4
CO5 PO3,PO7/PSO1
CO6 PO5,PO12/PSO2
CO7 PO4,PO9,PO12/PSO1
Text Book:
Kenneth H Rosen , “Discrete Mathematics and Its Applications”, 7th edition, TMH,2012.
Reference Books:
J.P. Tremblay , “Discrete Mathematical Structures with Applications to Computer Science”, TMH,
New Delhi,1997.
V. Krishnamurthy , “Combinatorics: Theory and Applications”, East-West Press, New Delhi,1986.
Ralph P. Grimaldi, “Discrete and Combinatorial Mathematics- An Applied Introduction”, 5th
Edition, Pearson Education,2004.
C.L. Liu, “Elements of Discrete Mathematics”, 2nd Edition, TMH,2000.
Outcome: After the completion of the course, the student will be able to:
• CO1: Understand the notion of mathematical thinking and proofs to solve the problem.
• CO2: Apply the basics of discrete probability and number theory to solve the real world problem.
CO3: Analyze basic discrete structures and algorithms using effectively algebraic techniques.
• CO4: Analyze mathematical concepts like sets, reasoning, relational algebra and graph theory to
solve optimization problems.
• CO5. Analyze the validity of an argument using logical notation.
• CO6. Demonstrate the basic structures of proof techniques to write and evaluate the validity of
arguments.
• CO7. Understand the basic principles of sets, set equalities and operations in sets.
• CO8. Apply counting principles to determine probabilities.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2/PSO1,PSO3
CO2 PO1,PO3/PSO4
CO3 PO2,PO3/PSO3
CO4 PO2,PO3/PSO3
CO5 PO1,PO2/ PSO3
CO6 PO1,PO3/PSO2,PSO3
CO7 PO1,PO2/PSO1
CO8 PO1,PO3/PSO1,PSO4
Module Teaching
No. Content Hours
Introduction: Alphabets, Strings and Languages; Automata and Grammars,
Deterministic Finite Automata (DFA), Nondeterministic Finite Automata (NFA),
Equivalence of NFA and DFA, Minimization of Finite Automata, Myhill-Nerode
Theorem; FA with Output - Moore and Mealy machine, Applications and
Limitations of FA.
I 20
Regular expression (RE): Regular Expression to FA, DFA to Regular Expression,
Arden Theorem, Non Regular Languages, Pumping Lemma for Regular
Languages, Applications of Pumping Lemma, Closure Properties of Regular
Languages.
Push Down Automata (PDA): Introduction, Language of PDA, Acceptance by
Final State, Acceptance by Empty Stack, Deterministic PDA.
Context Free Grammar (CFG) and Context Free Languages (CFL):
Introduction, Derivation Trees, Ambiguity in Grammar, Ambiguous to
Unambiguous CFG, Simplification of CFGs, Normal Forms for CFGs - CNF and
GNF; Pumping lemma for CFLs, Equivalence of PDA and CFG.
II 20
Turing machines (TM): Basic Model, Definition and Representation, Variants of
Turing Machine and their equivalence, TM for Computing Integer Functions,
Universal TM, Church’s Thesis,
Recursive and Recursively Enumerable Languages, Halting Problem,
Introduction to Computational Complexity.
Text Books:
K.L.P. Mishra and N. Chandrasekaran, “Theory of Computer Science: Automata, Languages and
Computation”, 3rd Edition, PHI,2006
Reference Books:
Hopcroft, Ullman , “Introduction to Automata Theory, Languages and Computation”, 3rd Edition,
Pearson Education,2013.
Martin J. C ,” Introduction to Languages and Theory of Computations”, 4th Edition, TMH,2011.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1,PSO4
CO2 PO2,PO3/PSO3
CO3 PO2,PO3,PO9,PO12/PSO1,PSO3,PSO4
CO4 PO1,PO3,PO5,PO9/PSO3,PSO4
CO5 PO1,PO2,PO4/PSO3
CO6 PO2,PO3/PSO3
CO7 PO1,PO2/PSO1,PSO3
CO8 PO3,PO12/PSO1,PSO2,PSO3
Credits:03 L-T-P-J:3-0-0-0
Text Books:
Thomas H. Coremen, Charles E. Leiserson and Ronald L. Rivest, Introduction to Algorithms,
Third edition, Prentice Hall of India,2008.
Reference Books:
Gilles Brassard Paul Bratley,” Fundamentals of Algorithms”, Prentice Hall,1996.
Ellis Horowitz, SartajSahni, SanguthevarRajasekaran, “Fundamentals of Computer Algorithms”,
Orient Longman Pvt. Ltd,2008.
Levitin , “An Introduction to Design and Analysis of Algorithms”, Pearson,2008.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3,PO4,PO12/PSO1,PSO3
CO2 PO1,PO3,PO4,PO5/PSO1,PSO3
CO3 PO1,PO3,PO6/PSO1,PSO3
CO4 PO1,PO2,PO3,/PSO1,PSO3
CO5 PO1,PO2/PSO1,PSO3
CO6 PO1,PO2,PO3, PO6/PSO1,PSO3
CO7 PO1,,PO4,PO12/PSO1,PSO3
CO8 PO1,PO2,PO3,PO4,PO12/PSO1,PSO2
Objective: The objective is to introduce students the Fundamentals of digital Image processing.
Students should study the basic of image operations and understand image analysis algorithm.
Students can have exposure to current applications in the field of digital image processing
Credits: 03 L–T–P-J:
L–T–P:
3–0–0-0
3–0–0
Module Teaching
Content
No. Hours
Introduction and Fundamentals: Motivation and Perspective,
Applications, Components of Image Processing System, Element of Visual
Perception, A Simple Image Model, Sampling and Quantization, Some Basic
Relationships between Pixels.
Intensity Transformations and Spatial Filtering: Introduction, Some
Basic Intensity Transformation Functions, Histogram Processing, Histogram
I 20
Equalization, Histogram Specification, Local Enhancement, Enhancement
using Arithmetic/Logic Operations – Image Subtraction, Image Averaging,
Basics of Spatial Filtering, Smoothing - Mean Filter, Order Statistics Filters,
Sharpening – The Laplacian.
Filtering in the Frequency Domain: Fourier Transform and the Frequency
Domain, Basis of Filtering in Frequency Domain
Morphological Image Processing: Introduction, Logical Operations
involving Binary Images, Dilation and Erosion, Opening and Closing, The Hit-
or-Miss Transformation, Morphological Algorithms – Boundary Extraction,
Region Filling, Extraction of Connected Components, Convex Hull, Thinning,
Thickening.
II Image Segmentation: Point, Line & Edge detection, Thresholding, Region- 20
based Segmentation, Region Extraction - Pixel Based Approach & Region
Based Approach, Edge and Line Detection - Basic Edge Detection, Canny
Edge Detection, Edge Linking - Hough Transform.
Representation & Description: Representation - Boundary Following,
Chain Codes; Boundary Descriptors – Shape Numbers.
Text Books:
R.C.Gonzalez and R.E.Woods, “Digital Image Processing”, Prentice Hall, 3rd Edition,2011.
Reference Books:
BhabatoshChanda and D. DuttaMajumder, “Digital Image Processing and Analysis”, PHI,2011.
S. Sridhar , “Digital Image Processing”, Oxford University Press,2011
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO3/PSO1,PSO3
CO2 PO3,PO5,PO11,PO12/PSO3,PSO4
CO3 PO1,PO2,PO3,PO7/PSO2,PSO3
CO4 PO1,PO2,PO4/PSO1,PSO2,PSO4
CO5 PO4,PO5,PO3/PSO1,PSO2,PSO3
CO6 PO9,PO10,PO11,PO12/PSO1,PSO2,PSO4
Credits:04 L-T-P-J:4-0-0-0
Module Teaching
Content
No. Hours
Introduction: An Overview of Database Management System, Database System
vs File System, Database System Concept and Architecture, Data Model Schema
and Instances, Data Independence, Database Language and Interfaces (DDL,
DML, DCL), Database Development Life Cycle (DDLC) with case studies.
Data Modeling Using the Entity-Relationship Model: ER Model Concepts,
Notation for ER Diagram, Mapping Constraints, Keys, Specialization,
Generalization, Aggregation, Reduction of an ER Diagram to Tables, Extended ER
I Model. 26
Relational Data Model and Language: Relational Data Model Concepts,
Integrity Constraints, Entity Integrity, Referential Integrity, Keys Constraints,
Domain Constraints, Relational Algebra
Database Design & Normalization: Functional Dependencies, Primary Key,
Foreign Key, Candidate Key, Super Key, Normal Forms, First, Second, Third
Normal Forms, BCNF, 4th Normal Form, 5th Normal Form, Lossless Join
Decompositions, Non Redundant Cover, Canonical Cover, MVD and JDs, Inclusion
Dependence.
Text Books:
Elmasri and Navathe, “Fundamentals of Database Systems”, 6th Edition, Addison Wesley, 2010.
Sadalage, P. & Fowler , “NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot
Persistence”, Pearson Education, 2012.
References Books:
Date C J,” An Introduction to Database Systems”, 8th Edition, Addison Wesley.
Korth, Silbertz and Sudarshan, “Database Concepts”, 5th Edition, TMH, 1998.
Redmond, E. &Wilson, “Seven Databases in Seven Weeks: A Guide to Modern Databases and
the NoSQL Movement”, 1st Edition.
Course Outcome: After completion of course, student will be able to:
CO1: Understand the concept of database management systems and Relational database.
CO2: Identify the various data model used in database design.
CO3: Design conceptual models of a database using ER modeling for real life applications and
construct queries in Relational Algebra.
CO4: Create and populate a RDBMS for a real life application, with constraints and keys, using
SQL.
CO5: Select the information from a database by formulating complex queries in SQL.
CO6: Analyze the existing design of a database schema and apply concepts of normalization to
design an optimal database.
CO7: Discuss recovery system and be familiar with introduction to web database, distributed
databases.
CO8: Explain the differences between RDBMS and No-SQL,BASE properties and No-SQL
databases.
CO9:Design and implement the database system with the fundamental concepts of DBMS using
Python.
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO2,PO3/PSO2
CO3 PO2,PO3,PO6,PO11/PSO1,PSO1,PSO2,PSO4
CO4 PO1,PO3/PSO1
CO5 PO1,PO5/PSO1
CO6 PO2,PO3/PSO2
CO7 PO1,PO3/PSO2
CO8 PO1,PO2,PO3/PSO1,PSO4
CO9 PO1,PO2,PO3,PO5/PSO1,PSO2,PSO4
Module Teaching
Content
No. Hours
Introduction: Basic Terminologies, Elementary Data Organization with Arrays.
Algorithm: Definition, Characteristics of an Algorithm, Time and Space
Complexity.
Introduction to Asymptotic Notations: Big-Oh, Big-Omega, Big-Theta
Operations on Data Structures: Insertion, Deletion, Searching, Sorting,
Traversing and Merging.
Abstract Data Types (ADT).
Linked Lists: Implementation of Singly Linked Lists, Doubly Linked List,
Circular Linked List, Operations on a Linked List - Insertion, Deletion, Traversal;
Polynomial Representation and Addition.
Stacks: Primitive Stack Operations - Push & Pop, Array and Linked List
Implementation of Stack, Applications of Stack: Prefix and Postfix Expressions,
Evaluation of Postfix Expression, conversion of Infix to Postfix expression.
I
Recursion: Principles of Recursion, Head & Tail Recursion, Removal of
20
Recursion, Use of stack in Recursion, Tower of Hanoi Problem, Nth Term of a
Fibonacci Series.
Queues: Operations on Queue – Enqueue & Dequeue operations,
Implementation of Queue using Array and Linked List, Circular Queues,
DEQueue.
Trees: Basic Terminology, Array Representation and Linked Representation;
Complete Binary Tree, Algebraic Expressions, Extended Binary Trees, Tree
Traversal Algorithms - Inorder, Preorder and Postorder;
Search Trees: Binary search trees, search efficiency, insertion and deletion
operations, importance of balancing, AVL trees, searching, insertion and
deletions in AVL trees, Tries, Red-Black Trees.
Text Books:
● Robert Lafore, “Data Structures And Algorithms in Java”, 2nd Edition, Pearson SAMS,2003.
References Books:
Elliot B. Koffman, Paul A. T. Wolfgang , “Data Structures: Abstraction and Design Using Java”, 3rd
Edition, Wiley,2016.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO4/PSO3
CO2 PO1,PO2,PO4/PSO3
CO3 PO1,PO2,PO3/PSO1,PSO4
CO4 PO1,PO2,PO3/PSO1,PSO2,PSO4
CO5 PO1,PO2,PO3,PO4,PO5/PSO1,PSO4
CO6 PO2,PO3/PSO1,PSO2
CO7 PO3,PO6,PO12/PSO1,PSO2
CO8 PO2,PO4/PSO3,PSO4
Credits:01 L-T-P-J:0-0-2-0
Module Lab
No. Content Hours
Programs based on the concepts of:
Building Python Modules
Obtaining user Data
Printing desired output
Programs based on the concepts of:
Conditional if statements
Nested if statements
Using else if and elif
Programs based on the concepts of Iteration using different kinds of loops
Usage of Data Structures
I & II Strings 26
Lists
Tuples
Sets
Dictionary
Program based on the concepts of User-defined modules and Standard Library
(random, numpy, scipy, sys, Math Module, String Module, List Module).
Program based on Input Output.
Program based on exception Handling.
Program based on Simple Data analysis.
Program based on Pandas.
Text Books:
Paul Barry: “Head First Python “O’Reilly Media, Inc.", 2010.
Reference Books:
Bret Slatkin: “Effective Python: 59 Specific ways to write better Python”, Addison Wesley, 2015.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO2/PSO1
CO2 PO3/PSO4
CO3 PO5/PSO2
Credits:01 L-T-P-J:0-0-2-0
Module Lab
No. Content Hours
Mapping of flow chart, Algorithm, Language
Simple C-program execution
Programs based on various operators
Programs based on Decision and case Control Structure
Programs based on Loop Control Structure
Program based on special control statement
break
continue
Programs based on Array Insertion, Deletion, Linear Search & Bubble Sort
Programs based on String
Length, Copy, Reverse, Concatenate, Compare with & without built-in
functions
Programs based on Functions.
Programs based on Storage Class.
I & II
Programs based on Recursion.
52
Programs based on Preprocessor.
Programs based on Pointers
Programs based on array
Programs based on string
Programs based on call by value and call by reference
Programs based on Dynamic Memory Allocation
Programs based on User Defined Data types
Structure and Union
Enum and Typedef
Programs based on File handling
Opening a file
Reading, writing and appending a file
Closing file
Random Access to Files of Records
Programs based on Command Line Argument.
Reference Books:
Herbert Schildt, “C: The Complete Reference”, 5th Edition, McGraw Hill Education
K. N. King, “C Programming a Modern Approach”, W. W. Norton, 2nd Edition, 2008.
Kernighan and Ritche, “The C Programming Language”, PHI, 2ndEdition, 2011.
P. Dey and M. Ghosh, “Programming in C”, Oxford University Press 2nd Edition, 2013.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3/PSO1,PSO2
CO2 PO3,PO4/PSO1
CO3 PO3/PSO2,PSO4
Credits:01 L-T-P-J:0-0-2-0
Module Teaching
No. Content Hours
Reference Books:
Naughton, Schildt, “The Complete Reference JAVA2”, 9 th Edition, Oracle Press.
Bhave&Patekar, “Programming with Java”, Pearson Education
Bret Slatkin: “Effective Python: 59 Specific ways to write better Python”, Addison Wesley, 2015.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2/PSO1
CO2 PO3,PO5/PSO2
CO3 PO3,PO5/PSO4
Credits:01 L-T-P-J:0-0-2-0
Module Teaching
No. Content Hours
Write the SQL queries for data definition and data manipulation language.
To implement various operations on a table.
To implement various functions in SQL.
To implement restrictions on the table.
I & II To implement the concept of the grouping of Data. 24
To implement the concept of Joins in SQL.
To implement the concept of sub-queries.
To implement the concept of views, sequence.
To implement the concept of PL/SQL using a cursor.
To implement the concept of Procedure function and Triggers.
References Books:
Date C J,” An Introduction to Database Systems”, 8th Edition, Addison Wesley.
Korth, Silbertz and Sudarshan, “Database Concepts”, 5th Edition, TMH, 1998.
Majumdar& Bhattacharya, “Database Management System”, TMH
Outcome:After the completion of the course, the student will be able to:
• CO1: Apply SQL queries for DML and DDL.
• CO2: Develop the SQL queries for real life scenarios.
• CO3: Implement the procedural language (PL/SQL) and Triggers.
.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2/PSO1,PSO4
CO2 PO1,PO2/PSO1,PSO4
CO3 PO2,PO3,PO5/PSO2,PSO3
Credits:01 L-T-P-J:0-0-2-0
Module Teaching
No. Content Hours
Reference Books:
SibsankarHalder and Alex a Aravind,” Operating Systems”, 6th Edition, Pearson Education, 2009.
Harvey M Dietel, “An Introduction to Operating System”, 2nd Edition, Pearson Education, 2002.
D M Dhamdhere, “Operating Systems: A Concept Based Approach”, 2nd Edition, 2006.
M. J. Bach. , “Design of the Unix Operating System”, PHI, 1986.
Outcome: After completion of course, the student will be able to:
• CO1: Implement the basic operations on UNIX operating systems.
• CO2: Demonstrate the working of systems calls.
• CO3: Demonstrate message passing in Unix operating system.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3,PO4/PSO1
CO2 PO1,PO2/PSO1
CO3 PO1,PO4,PO5/PSO1,PSO2
Reference Books:
D.W. Patterson , “Computer Organization and Design”, 4thEdition, Elsevier Publication, 2008.
William Stalling , “Computer Organization”,8th Edition, PHI, 2011.
M. Mano , “Computer System Architecture”, 3rd Edition, PHI.
Outcome: After the completion of the course, the student will be able to:
• CO1: Implement the Combinational and Sequential Circuit.
• CO2: Demonstrate the working of counter and shift register.
• CO3: Demonstrate the working of ALU and seven segment displays.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO2,PO3,PO5/PSO2
CO2 PO3,PO4/PSO2
CO3 PO3,PO5/PSO1,PSO2
Credits:01 L-T-P-J:0-0-2-0
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO4/PSO1,PSO3
CO3 PO2/PSO3,PSO4
Objective: The objective is to introduce the Architecture and programming of the microprocessor and
learning about interfacing and various applications of microprocessor.
Reference Books:
Ramesh S. Gaonkar, “Microprocessor Architecture Programming and Applications with 8085”,
4th Edition, Penram International Publishing, 2000.
D. V. Hall , “Microprocessors and Interfacing: Programming and Hardware”, 2nd Edition, TMH,
1992.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3/PSO1,PSO2
CO2 PO1,PO2/PSO1,PSO2
CO3 PO1,PO3,PO5/ PSO2
Credits:01 L-T-P-J:0-0-2-0
Module Content Teaching
No. Hours
Implementation of sorting algorithms:
o Insertion Sort
o Bubble Sort
o Selection Sort
o Divide and conquer approach:
Quick Sort
Merge Sort
o Heap Sort
o Counting Sort
Implementation of Searching Techniques:
o Linear Search
o Binary Search
Implementation of Matrix Multiplication
Implementation of Convex Hull
I& II Implementation of Breadth First Search 32
Implementation of Depth First Search
Implementation of Greedy approaches:
o Optimal Reliability Allocation.
o Knapsack. Minimum
o Minimum Spanning trees:
Prim’s and Kruskal’s algorithms.
o Single source shortest paths –
Dijkstra’s and Bellman Ford algorithms.
Implementation of Dynamic Programming:
o Longest Increasing Subsequence.
o Finding best path in maze.
o Matrix Chain Multiplication
o 0/1 Knapsack Problem
o Resource Allocation Problem
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO4/PSO1,PSO2,PSO4
CO2 PO1,PO3,PO4/PSO1,PSO2,PSO3
CO3 PO2,PO3,PO5/PSO1,PSO2,PSO4
Reference Books:
R.C. Gonzalez and R.E. Woods, “Digital Image Processing Using MATLAB”, PHI, 2ndEdition,2010.
Hands-On Image Processing with Python by SandipanDey, November 2018, Packt
https://www.pyimagesearch.com/
Outcome: After studying the subject, the students will be able to:
CO1: Implement digital image processing operations for image manipulation and Enhancement.
CO2: Test the source code for Morphological and Segmentation algorithms.
CO3: Apply image processing algorithms in real-life problems as Minor Application Assignment.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO6,PO9/PSO1,PSO2
CO2 PO5,PO7,PO8,PO10/PSO1,PSO4
CO3 PO1,PO3,PO11,PO12/PSO3,PSO4
Credits:01 L-T-P-J:0-0-2-0
Module Teaching
Content
No. Hours
Write the SQL queries for data definition and data manipulation language.
To implement various operations on a table.
To implement various functions in SQL.
To implement restrictions on the table.
To implement the concept of the grouping of Data.
To implement the concept of Joins in SQL.
I & II
To implement the concept of sub-queries.
24
To implement the concept of views, sequence.
To implement the concept of PL/SQL using a cursor.
To implement the concept of Procedure function and Triggers.
Introduction to MongoDB and its Installation on Windows or Linux,
Description of mongo Shell, create database and show database,
Commands for MongoDB and To study operations in MongoDB – Insert,
Query, Update, Delete and Projection
To implement Database connectivity using Python
References Books:
Date C J,” An Introduction to Database Systems”, 8th Edition, Addison Wesley.
Korth, Silbertz and Sudarshan, “Database Concepts”, 5th Edition, TMH, 1998.
Majumdar& Bhattacharya, “Database Management System”, TMH
Sadalage, P. & Fowler , “NoSQL Distilled: A Brief Guide to the Emerging World of Polyglot
Persistence”, Pearson Education, 2012.
Outcome:After the completion of the course, the student will be able to:
• CO1: Apply SQL queries for DML and DDL.
• CO2: Implement the procedural language (PL/SQL) and Triggers.
• CO3: Apply NoSQL queries in MongoDB.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2/PSO1,PSO4
CO2 PO2,PO3,PO5/PSO2,PSO3
CO3 PO5/PSO2
Credits:01 L-T-P-J:0-0-2-0
Teaching
Module No. Content
Hours
Program to implement various operations in a singly linked list.
Program to implement insertion, deletion and traversal in a doubly
linked List.
Program to demonstrate the various operations on stack.
Program to implement Tower of Hanoi problem using Recursion.
Program to demonstrate the implementation of various operations on
linear and a
circular queue.
Program to implement Dijkstra’s Algorithm to find the shortest path
between source and
destination.
I&II Program to search a given element as entered by the user using binary
search (divide and 24
conquer approach) to search a given element as entered by the user.
Implementation of various sorting algorithms like Selection Sort, Bubble
Sort, Insertion Sort, Merge Sort, Quick Sort, Heap Sort, Radix Sort, Bucket
Sort.
Program to implement AVL Trees.
Program to implement Red-Black Trees.
Program to implement Binary Heaps.
Program to implement Priority Queues.
Program to implement Huffman Character Length Encoding.
Program to implement tree traversal using Backtracking.
Project to create a LogBook to generate a Calendar Display.
Project to create a Hangman game using String Lexical Analysis.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO4/PSO1,PSO3
CO3 PO2/PSO3,PSO4
SYLLABUS
OF
PROGRAM ELECTIVE
BOUQUET: COMPUTER NETWORK &
SECURITY
Under
Choice Based Credit System (CBCS)
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME
NO.
CODE SUBJECT PRE- REQUISITES
L T P J
PRACTICALS
Network Programming and
1. BCSE0070 0 0 2 0 1 2 Computer Networks
Management Lab
Cryptography & Network
2. BCSE0071 0 0 2 0 1 2 Computer Networks
Security Lab
Cyber security and Digital
3. BCSE0072 0 0 2 0 1 2
Forensics Lab
Information Coding Techniques
4. BCSE0073 0 0 2 0 1 2 Computer Networks
Lab
PROJECTS
Cyber security and Digital
1. BCSE0081 0 0 0 - 2 0
Forensics Project
Objective: To learn the basics of socket programming using TCP Sockets and UDP sockets. To develop
knowledge of threads for developing high performance scalable applications. To learn about raw sockets.
To understand simple network management protocols & practical issues.
Credits:03 L-T-P-J:3-0-0-0
Module Teaching
Content
No. Hours
Introduction to Socket Programming-Overview of TCP/IP Protocols, Introduction
to Sockets, Socket address Structures, Byte ordering functions, address conversion
functions, Elementary TCP Sockets, socket, connect, bind, listen, accept, read, write,
close functions, Iterative Server, Concurrent Server.
I 20
Application development: TCP Echo Server, TCP Echo Client, Posix Signal handling,
Server with multiple clients, boundary conditions: Server process Crashes, Server host
Crashes, Server Crashes and reboots, Server Shutdown, I/O multiplexing, I/O Models,
select function, shutdown function TCP echo Server (with multiplexing) - poll function
- TCP echo Client (with Multiplexing).
Socket options: Socket options, get socket and set socket functions - generic socket
options - IP socket options -ICMP socket options - TCP socket options.
Elementary UDP sockets:
Elementary UDP sockets - UDP echo Server - UDP echo Client - Multiplexing TCP and
II UDPsockets - Domain name system - gethostbyname function - Ipv6 support in DNS - 20
gethostbyadr function - getservbyname and getservbyport functions.
Advanced sockets: Ipv4 and Ipv6 interoperability - threaded servers - thread
creation andtermination - TCP echoserver using threads - Mutexes - condition
variables - raw sockets - raw socket creation - raw socket output - raw socket input -
ping program - trace route program.
Text Books:
Unix Network Programming Volume 1: The Sockets Networking API by W. Richard Stevens, Bill
Fenner and Andrew M. Rudoff, Pearson Education
Reference Books:
The Definitive Guide to Linux Network Programming by Keir Davis, John Turner and Nathan
Yocom,
TCP/IP Sockets in C: Practical Guide for Programmers by Michael J. Donahoo and Kenneth L.
Calvert, Morgan Kaufmann
Outcome: After completion of course, the student will be able to:
CO1: Understand the basic Concepts of socket programming.
CO2: Apply the socket constructs for application development.
CO3: Understand the basics of get socket set socket, generic socket options.
CO4: Understand the concepts of elementary UDP sockets.
CO5: Demonstrate the working of threaded servers.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO4/PSO1,PSO3
CO2 PO1,PO3/PSO2
CO3 PO1,PO3/PSO1
CO4 PO1,PO3/PSO1
CO5 PO1,PO4/ PSO3
Reference Books:
W. Richard Stevens, “Unix Network Programming”, Prentice Hall, Pearson Education, 2009.
Douglas E. Comer, “Hands-on Networking with Internet Technologies”, Pearson Education.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3,PO5,PO6/PSO1,PSO4
CO2 PO1,PO3,PO5,PO6/PSO1,PSO4
CO3 PO2,PO3 /PSO3,PSO4
Objective: To learn the cellular concepts and to know about the radio wave propagation along with
various wireless techniques.
Text Books:
Mobile Communications, 2nd Edition by Jochen Schiller, Pearson Education
Handbook of Wireless Networks and Mobile Computing Edited by Ivan Stojmenović, John Wiley
& Sons, Inc.
Reference Books:
Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML by
Reza B'Far, Cambridge University Press
Fundamentals of Mobile and Pervasive Computing by Frank Adelstein, Sandeep KS Gupta, Golden
Richard III and Loren Schwiebert, McGraw-Hill Professional
802.11 Wireless Networks: The Definitive Guide, 2nd Edition by Matthew Gast, O'Reilly Media
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO7,PO10/PSO1,PSO4
CO2 PO1,PO7,PO10/PSO1,PSO4
CO3 PO1,PO6,PO7/PSO1,PSO4
CO4 PO1,PO4,PO7/PSO1,PSO4
CO5 PO1,PO2,PO6/PSO1,PSO4
Objective: This course is offered for those who are interested in understanding and building systems support
mechanisms for mobile computing systems including client-server web/database/file systems, and mobile ad
hoc and sensor networks for achieving the goal of anytime, anywhere computing in wireless mobile
environments.
Credits:03 L-T-P-J:3-0-0-0
Text Books:
Ad Hoc and Sensor Networks: Theory and Applications, Carlos de MoraisCordeiro and Dharma
PrakashAgrawal, World Scientific Publications / Cambridge University Press,2006.
Wireless Sensor Networks: An Information Processing Approach, Feng Zhao, Leonidas Guibas,
Elsevier Science Imprint, Morgan Kauffman Publishers, 2005
Reference Books:
Ad Hoc Wireless Networks: Architectures and Protocols, C. Siva Ram Murthy and B. S. Manoj,
Pearson Education, 2004.
Guide to Wireless Sensor Networks, SudipMisra, Isaac Woungang, and Subhas Chandra Misra,
Springer International Edition, 2012.
Wireless Mesh Networking, Thomas Krag and SebastinBuettrich, O’Reilly Publishers,2007.
Wireless Sensor Networks – Principles and Practice, Fei Hu, Xiaojun Cao, An Auerbach book, CRC
Press, 2010.
Wireless Ad hoc Mobile Wireless Networks-Principles, Protocols and Applications, Subir Kumar
Sarkar, et al., Auerbach Publications, Taylor & Francis Group, 2008.
Wireless Ad hoc Networking, Shih-Lin Wu, Yu-Chee Tseng, Auerbach Publications, 2007
Wireless Ad hoc and Sensor Networks–Protocols, Performance and Control,
JagannathanSarangapani, CRC Press, 2007.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3/PSO1,PSO2
CO2 PO1,PO3/PSO1,PSO4
CO3 PO1,PO5,PO6/PSO1,PSO2
CO4 PO1,PO4/PSO2,PSO4
CO5 PO1,PO2/PSO1,PSO4
CO6 PO1,PO5/PSO2,PSO4
Objective: This Course focuses towards the introduction of network security using various cryptographic
algorithms and understanding network security applications and practical applications that have been
implemented and are in use to provide email and web security.
Credits:03 L-T-P-J:3-0-0-0
Module Teaching
No. Content Hours
Introduction: Introduction to Security Attacks, Services and Mechanism, Classical
Encryption Techniques-Substitution Ciphers and Transposition Ciphers,
Steganography, Stream and Block Ciphers, Cryptanalysis.
I Symmetric Key Cryptosystems: Block Cipher Principles, Shannon’s Theory of 20
Confusion and Diffusion, Data Encryption Standard(DES), Strength of DES, Triple DES,
Advance Encryption Standard (AES), Linear and Differential Cryptanalysis, Block
Ciphers Modes of Operation.
Introduction to Number Theory: Modular Arithmetic, Prime and Relative Prime
Numbers, Primitive Roots, Fermat’s and Euler’s Theorem, Extended Euclidean
Algorithm, Chinese Remainder Theorem.
Algebraic Structures: Introduction to Group, Ring & Field of the Form GF(P).
Asymmetric Key Cryptosystems: RSA Cryptosystem, Attacks on RSA, Security of RSA,
Discrete Logarithm Problem, Elgamal Encryption Algorithm.
Hash Functions and Macs: Authentication Functions, Message Authentication Code,
Hash Functions, Birthday Attacks, Security of Hash Functions, Secure Hash Algorithm
(SHA-512).
Digital Signature: Digital Signatures, RSA Digital Signature Scheme, Elgamal Digital
Signature Techniques, Digital Signature Standards(DSS).
Key Management: Symmetric Key Distribution, Diffie Hellman Key Exchange
II Algorithm. 22
Public Key Distribution: X.509 Certificates, Public Key Infrastructure.
Authentication Applications and E-Mail Security: Kerberos, Pretty Good Privacy
(PGP), S/MIME.
IP Security and Web Security: IP Sec Architecture, Authentication Header,
Encapsulating Security Payloads, Combining Security Associations, Key Management,
Introduction to Secure Socket Layer, Transport Layer Security, Secure Electronic
Transaction (SET).
System Security: Introductory Idea of Intrusion, Intrusion Detection, Malicious
Programs, Firewalls.
Text Books:
W. Stallings , "Cryptography and Network Security: Principles and Practices",5th Edition,
Pearson Education,2010.
Reference Books:
B. A. Forouzan, "Cryptography & Network Security", 3rd Edition, Tata McGraw Hill,2003.
Wenbo Mao , “Modern Cryptography: Theory and Practice”, Prentice Hall,2003.
Douglas Stinson, "Cryptography Theory and Practice", 2nd Edition, Chapman& Hall/CRC.
Outcome: After completion of course, the student will be able to:
• CO1: Understands the basic concepts of cryptography.
• CO2: Apply the symmetric key concepts of DES and AES for securing data.
• CO3: Apply the concepts of number theory of Asymmetric key cryptosystem.
• CO4: Understand the concepts of hash function, MAC and digital signature for data integrity.
• CO5: Explain the symmetric and asymmetric key distribution techniques.
• CO6: Understand the concepts of security mechanism at TCP/IP layer.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO5,PO12/PSO2,PSO3
CO2 PO1,PO2,PO3,PO12/PSO1,PSO2
CO3 PO1,PO2,PO4,PO5,PO6/PSO1,PSO4
CO4 PO1,PO2,PO3,PO5,PO6/PSO1,PSO3
CO5 PO1,PO2,PO6,PO12/PSO1,PSO4
CO6 PO1,PO2,PO6,PO12/PSO1,PSO4
Objective: The objective of this lab is that to understand the principles of encryption algorithms,
conventional and public key cryptography practically with real time applications.
Textbooks:
W. Stallings , "Cryptography and Network Security: Principles and Practices",5th Edition,
Pearson Education,2010.
Reference Books:
B. A. Forouzan, "Cryptography & Network Security", 3rd Edition, Tata McGraw Hill,2003.
Douglas Stinson, "Cryptography Theory and Practice", 2nd Edition, Chapman& Hall/CRC.
K. N. King, “C Programming a Modern Approach”, W. W. Norton, 2nd Edition, 2008.
Kernighan and Ritche, “The C Programming Language”, PHI, 2nd Edition, 2011.
P.DeyandM.Ghosh, “ProgramminginC”, OxfordUniversityPress1stEdition,2000.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO6,PO12/PSO1,PSO4
CO2 PO1,PO2,PO6,PO12/PSO1,PSO4
CO3 PO1,PO3,PO4,PO6,PO12/PSO1,PSO4
Objective: To give knowledge of constitutional and case law to search and capture digital evidence,
determine the most effective and appropriate forensic response strategies to digital evidence, and provide
effective proof in a case involving digital evidence.
Credits:03 L-T-P-J:3-0-0-0
Module Teaching
No. Content Hours
Introduction: Introduction and Overview of Cyber Crime, Nature and Scope of Cyber
Crime, Types of Cyber Crime: Social Engineering, Categories of Cyber Crime, Property
Cyber Crime.
Cyber Security issues:
Unauthorized Access to Computers, Computer Intrusions, White Collar Crimes, Viruses
and
I Malicious Code ,Security Engineering ,Network Security ,Information Security, Web 24
Security, Database Security, Malware Security, Biometric Security, Security in Cloud
Computing and Mobile Computing. Software Piracy, Intellectual Property, Digital laws
and legislation, Law Enforcement Roles and Responses.
Investigation:
Introduction to Cyber Crime Investigation - Investigation Tools Discovery - Digital
Evidence Collection, Evidence Preservation, E-Mail Investigation
Tracking - IP Tracking, E-Mail Recovery, Hands on Case Studies, Encryption and
Decryption Methods, Search and Seizure of Computers, Recovering Deleted Evidences,
Password Cracking.
Digital forensics:
Introduction to Digital Forensics, Forensic Software and Hardware, Analysis and
II Advanced Tools, Forensic Technology and Practices, Forensic Ballistics and Photography, 24
Face, Iris and Fingerprint Recognition, Audio Video Analysis, Windows System Forensics,
Linux System Forensics, Network Forensics.
Laws and acts:
Laws and Ethics, Digital Evidence Controls, Evidence Handling Procedures, Basics of
Indian Evidence ACT IPC and CrPC, Electronic Communication Privacy ACT, Legal
Policies.
Text Books:
Guide to Computer Forensics and Investigations 6th Edition by Bill Nelson, Amelia Phillips and
Christopher Steuart, Cengage Publication
Incident Response & Computer Forensics, Second edition by Chris Prosise and Kevin Mandia,
McGraw-Hill Education
Reference Books:
Computer Forensics and Digital Investigation with EnCase Forensic v7 1st Edition by Suzanne
Widup, McGraw-Hill Education
Forensic Computer Crime Investigation by Thomas A. Johnson, CRC Press
Software Forensics: Collecting Evidence from the Scene of a Digital Crime 1st Edition by Robert
Slade, McGraw-Hill Education
Outcome: After completion of course, the student will be able to:
CO1: Understand the basics of cyber security.
CO2: Explain the basic concepts of System security.
CO3: Understand the different investigation mechanism of cyber security.
CO4: Explain the digital forensics in system security.
CO5: Illustrate the laws and acts in cyber domain.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO3,PO6,PO12/PSO1,PSO3
CO2 PO1,PO2,PO3,PO4,PO5/PSO1,PSO4
CO3 PO1,PO3,PO4,PO6/PSO1,PSO3,PSO4
CO4 PO1,PO2,PO5/PSO1,PSO3
CO5 PO1,PO3,PO5/PSO1,PSO3
Textbooks:
“Gray Hat Hacking the Ethical Hackers Handbook, 3rd Edition” by Allen Harper and Shon Harris
Reference Books:
“The Unrevealed Secrets of Hacking and Cracking – Hack Before You Get Cracked” by Prateek
Shukla and NavneetMehra
“How to Unblock Everything on the Internet” by Ankit Fadia
“The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, 2ed” by
DafyddStuttard and Marcus Pinto
Outcome: After completion of this course students will be able to:
CO1: Implement the reconnaissance attacks of cyber security.
CO2: Implement the access attacks of cyber security.
CO3: Identify vulnerability of web applications and wireless networks.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO3,PO5/PSO1,PSO4
CO2 PO1,PO2,PO3,PO5/PSO1,PSO4
CO3 PO1,PO2,PO3,PO5/PSO1,PSO4
Credits:03 L-T-P-J:3-0-0-0
Module Teaching
No. Content Hours
Information entropy fundamentals
Uncertainty, Information and Entropy - Source Coding Theorem - Huffman coding –
Shannon Fano coding - Discrete Memory less channels - channel capacity - channel
coding Theorem - Channel Capacity Theorem.
Data and voice coding
I Differential Pulse Code Modulation - Adaptive Differential Pulse Code Modulation - 20
Adaptive sub band coding - Delta Modulation - Adaptive Delta Modulation - Coding of
speech signal at low bit rates (Vocoders, LPC).
Error control coding
Linear Block codes - Syndrome Decoding - Minimum distance consideration - cyclic codes
-Generator Polynomial - Parity check polynomial - Encoder for cyclic codes - calculation
of syndrome - Convolutional codes.
Compression techniques - text
Principles - Text compression - Static Huffman Coding - Dynamic Huffman coding -
Arithmetic coding.
Compression techniques - multimedia
Image Compression - Graphics Interchange format - Tagged Image File Format - Digitized 20
II documents - Introduction to JPEG standards.
Audio and video coding
Linear Predictive coding - code excited LPC - Perceptual coding, MPEG audio coders –
Dolby audio coders - Video compression - Principles - Introduction to H.261 & MPEG
Video standards.
Text Books:
Communication Systems, 5th Edition by Simon Haykin and Michael Moher, Willey
Multimedia Communications: Applications, Networks, Protocols and Standards by Fred Haskell,
Pearson Education India
Reference Books:
Multimedia Communications: Directions and Innovations, 1st Edition, by Jerry Gibson, Academic
Press
Information Theory and Network Coding by Raymond W. Yeung, Springer
Fundamentals of Information Theory and Coding Design by Roberto Togneri and Christopher J.S
deSilva, Chapman and Hall/CRC
Outcome: After completion of course, the student will be able to:
CO1: Understand the fundamentals of information coding techniques.
CO2: Apply the modulation technique for encoding data and voice.
CO3: Apply the error detection and correction techniques for error elimination.
CO4: Apply the compression techniques for multimedia data.
CO5: Understand the audio and video coding standards for data representations.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO5/PSO1,PSO4
CO2 PO1,PO2,PO3,PO4,PO5/PSO1,PSO4
CO3 PO1,PO3,PO12/PSO1,PSO4
CO4 PO1,PO2,PO3,PO4,PO5/PSO1,PSO4
CO5 PO1,PO5,PO6,PO12/PSO1,PSO3
Objective: To understand and implement the fundamental concepts of information theory: data
compaction, data compression, data transmission, error detection and correction .
Reference Books:
Ranjan Bose, “Information Theory coding and Cryptography”, McGraw-Hill Publication,
2ndEdition
C Moreira, P G Farrell, “Essentials of Error-Control Coding”, Wiley Student Edition
BernadSklar, “Digital Communication Fundamentals & applications”, 2ndEd. Pearson Education.
Shu lin and Daniel j, Cistellojr., “Error control Coding” Pearson, 2nd Edition.
Todd Moon, “Error Correction Coding: Mathematical Methods and Algorithms”, Wiley Publication
Khalid Sayood, “Introduction to data compression”, Morgan Kaufmann Publishers
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3,PO5,PO6/PSO1,PSO4
CO2 PO1,PO3,PO5,PO6/PSO1,PSO4
CO3 PO1,PO3,PO5 /PSO1,PSO4
1. Data Forensics:
Objective: Find and analyze hiddendata from slack, swap and dead spaces on small devices (PDAs,
phones ,USB sticks, etc.)
2. Honeypots:
Objective: Configure a honeypot and analyze the collected target data with and from honeypots.
3. Malware analysis:
Objective:Analyze of malware using static and dynamic/behavioral methods and use it for
malware detection, mitigation, the development of countermeasures
4. Dynamic Binary Instrumentation:
Objective:Use of software testing measures such as code coverage, Function callhooking, control flow
analysis, dynamic binary instrumentation helps ensure that an adequate slice of the program’s set of
possible behaviors has been observed.
5. Steganalysis:
Objective: Perform Steganalysison a JPEG Image Using Variation Techniques. Find and analyze hidden
data from the image.
6. Mobile Forensics:
Objective: Investigate into a Factory Reset of Android Device. Find and analyze hidden data from the
device.
7. Network Forensics:
Objective: Find different logs on the network and analyze to close the defined problem.
8. Capturing volatile and non-volatile information:
Objective: Capture information from different files systems. Simple and extended attributes, erased
data, file reassembly.
SYLLABUS
OF
PROGRAM ELECTIVE
BOUQUET: SOFTWARE ENGINEERING
Under
Choice Based Credit System (CBCS)
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME
NO.
CODE SUBJECT PRE- REQUISITES
L T P J
Bouquet:Software Engineering
THEORY
Stephen H. Kan, “Metrics and Models in Software Quality Engineering”, 2nd Edition, Pearson
Education,2000.
Yogesh Singh , “Software Testing”, Cambridge University Press,2011.
Reference Books:
Outcome: After the completion of this syllabus, the student will be able to:
CO1: Evaluate alternative standards, models and techniques aimed for quality software to
achieve the satisfaction of the client as well as developer.
CO2: Propose the innovative solutions for the software quality assurance and measurement
problems in the context of various software development environments.
CO3: Evaluate software quality assurance issues in software development and propose the
quality framework for an organization.
CO4: Write the software test scenarios, test cases, test plans and various metrics of different
applications.
CO5: Perform the testing of web based projects in team.
CO6: Apply the suitable methodology to perform regression testing in projects.
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO4,PO6/PSO4
CO2 PO2,PO3/PSO1,PSO4
CO3 PO11,PO12/PSO4
CO4 PO1,PO5,PO6/PSO1
CO5 PO1,PO5/PSO2
CO6 PO1,PO6/PSO1,PSO4
Thomas Erl, “SOA Principles of Service Design” The Prentice Hall Service Oriented Computing
Series, Prentice Hall India, 2008.
Reference Books:
Newcomer, Lomow, “Understanding SOA with Web Services”, Pearson Education, 2005.
Sandeep Chatterjee, James Webber , “Developing Enterprise Web Services: An Architect’s Guide”,
Pearson Education, 2005.
Munindar P. Singh, Michael N. Huhns, “Service-Oriented Computing: Semantics, Processes Agents”,
Wiley, 2010.
Dan Woods and Thomas Mattern, “Enterprise SOA Designing IT for Business Innovation”, 1st Edition,
O’Reilly, 2006.
Outcome:After completion of the course, students will be able to:
CO1: Understand the concept of service oriented architecture.
Co2:Compare service oriented architecture with client server, and distributed internet architectures.
CO3: Understand the concept of service oriented analysis.
CO4: Understand the SOA Composition and Guidelines.
CO5: Demonstrate the use of java API for XML based services.
CO6: Understand the WS Integration concepts.
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO2/PSO3
CO3 PO2/PSO3
CO4 PO3/PSO1
CO5 PO3,PO5/PSO4
CO6 PO4,PO5/PSO4
Ken Schawber& Mike Beedle, Agile Software Development with Scrum, Pearson, 2008
Reference Books:
KenSchawber & MikeBeedle, AgileSoftware Development with Scrum,Pearson,2008
RobertC.Martin , Agile Software Development ,Principles, Patterns and Practices,
Prentice Hall,2002
Lisa Crispin & JanetGregory, AgileTesting: A Practical Guide for Testers and Agile
Teams, Addison Wesley,2008
Alistair Cockburn, Agile Software Development: The Cooperative Game ,Addison Wesley ,2006
Outcome:After completion of the course, students will be able to:
CO1: UnderstandthesignificanceofAgileMethodologiesinsoftwaredevelopment.
CO2: Compare and contrast the different agile methods.
CO3: Determine the suitability of agile methods for a particular Project.
CO4:Evaluate how well a project is following agile principles, and assist the project to
become moreagile (where appropriate).
CO5: Understand the relationship between the customer and the development team in agile
projects and the responsibilities of both communities.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO3,PO5,PO7,PO10/PSO1,PSO4
CO2 PO2,PO4,PO9/PSO2,PSO4
CO3 PO2,PO6,PO11/PSO1,PSO4
CO4 PO1,PO2,PO4/PSO1,PSO3
CO5 PO8,PO9,PO10,PO11/PSO2
Bob Hughes and Mike Cotterell, “Software Project Management”, Tata McGraw Hill ,2009.
Daniel Galin, “Software Quality Assurance: from Theory to Implementation”, Addison-Wesley,
2003.
Reference Books:
Roger Pressman, A practitioner’s Guide to Software Engineering, Tata McGraw Hill ,2014
Andrew Stellman; Jennifer Greene, Applied Software Project Management, O’Reilly Media, Inc.
2000.
Ramesh Gopalaswamy, “Managing and global Software Projects”, Tata McGraw Hill Tenth
Reprint, 2011.
Outcome: After completion of the course, students will be able to:
CO4: Analyze various project estimation techniques, especially size estimation (FP), effort
estimation (COCOMO models), schedule estimation (GANTT charts), and cost estimation.
CO5: Understand the concept of time and cost Management in a project life cycle
CO6: Understand Project Communication Management and Project Risk Management.
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO1/PSO1,PSO4
CO3 PO2/PSO3
CO4 PO1,PO2/PSO3
CO5 PO1,PO2/PSO1,PSO4
CO6 PO1/PSO1
Test Management
Basic Concepts – Testing, Debugging Goals, Policies – Test Planning – Test Plan
Components – Test Plan Attachments – Locating Test Items – Reporting Test
Results – The Role Of Three Groups In Test Planning And Policy Development –
Process And The Engineering Disciplines – Introducing The Test Specialist –
Skills Needed By A Test Specialist – Building A Testing Group.
System Testing
Integration Testing, System Testing, Interaction Testing, Performance Testing,
II Mutation Testing, Regression Testing, Error Seeding 19
Object Oriented Testing
Issues In Object Oriented Testing, Test Case Design By Object Oriented
Software, Fault Based Testing, Test Cases And Class Hierarchy, Scenario Based
Test Design, Testing Surface Structure And Deep Structure, Class Testing:
Random Testing For Object Oriented Classes, Partition Testing At The Class
Level; Inter Class Test Case Design: Multiple Class Testing, Tests Derived From
Behavior Models, Test Case Generation Using Uml Diagrams, Gui Testing,
Object Oriented System Testing.
Text Book:
R. Mall, Fundamentals of Software Engineering, Prentice Hall of India, 2nd Ed, 2003.
Outcome:After completion of the course, students will be able to:
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO11/PSO1
CO2 PO3,PO5/PSO1,PSO2
CO3 PO1,PO2/PSO1,PSO3
CO4 PO1,PO2/PSO1,PSO3
CO5 PO1,PO2/PSO2,PSO3
CO6 PO1,PO2,PO4/PSO1,PSO3
Objective: The course objective is to introduce the major concept areas of language translation and
compiler design and to enrich the knowledge in various phases of compiler ant its use, code optimization
techniques, machine code generation, and use of symbol table.
Text Book:
Aho, Sethi& Ullman , “Compilers: Principles, Techniques and Tools”, 2nd Edition, Pearson
Education, 2008.
Reference Books:
V Raghvan, “Principles of Compiler Design”, 2nd Edition, TMH, 2010.
Kenneth Louden , “Compiler Construction”, 1st Edition, Cengage Learning, 1997.
Charles Fischer and Ricard LeBlanc , “Crafting a Compiler with C”, Pearson Education, 2005
Outcome: After the completion of the course, the student will be able to:
CO1: Understand basics of Compilers and its phases.
CO2: Design top-down and bottom-up parsers and will be able to solve problems related to
predictive parser, Shift reduce parsing, compute FIRST and FOLLOW sets, LR(0), LR(1) and
LALR sets of items and parse table for a given grammar.
CO3: Demonstrate the ability to write syntax directed translations of simple statements and
understand the working of procedure calls.
CO4: Demonstrate the ability to write intermediate code for a given high level programming
language (preferably C or FORTRAN) and be able to represent the intermediate code as
Quadruples, Triples and Indirect Triples
CO5: Identify the basic blocks for three address code, draw flow graphs and represent directed
acyclic graphs for the identified basic blocks.
CO6: Write the target optimized code (assembly code) for the given three-address code.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO3,PO4/PSO1,PSO2,PSO3
CO2 PO1,PO2,PO3,PO4,PO5/PSO1,PSO2,PSO3
CO3 PO1,PO2,PO3,PO4/PSO1,PSO2,PSO3
CO4 PO1,PO2,PO3,PO5/PSO1,PSO2,PSO3
CO5 PO1,PO2,PO3,PO4,PO5/PSO1,PSO2,PSO3
CO6 PO1,PO2,PO3,PO4,PSO5/PSO1,PSO2,PSO3
SYLLABUS
OF
PROGRAM ELECTIVE
BOUQUET: IMAGE PROCESSING AND
INTELLIGENT SYSTEM
Under
Choice Based Credit System (CBCS)
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME
NO.
CODE SUBJECT PRE- REQUISITES
L T P J
PROJECTS
Reference Books:
W.K. Gilloi , Interactive Computer Graphics, PHI.
D.F. Rogers, Procedural Elements for Computer Graphics, TMH .
J.D. Foley and A.D. Van, Fundamentals of Interactive Computer Graphic
Rogers and Adam, Mathematical Elements for Computer Graphics, TMH
R.Steinmetz and K. Nahstedt, Multimedia: Computing, Communications and Applications
PHI,PTR,1995
Salomon, D., Motta, G. Handbook of Data Compression , Springer.2010.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO1,PO3/PSO1,PSO3
CO3 PO1,PO5/PSO1
CO4 PO1,PO5/PSO1,PSO2
CO5 PO1,PO3/PSO1,PSO3
CO6 PO1,PO6/PSO1,PSO2
CO7 PO1,PO10/PSO1,PSO4
Text Books:
S. Rajsekaran& G.A. VijayalakshmiPai, “Neural Networks, Fuzzy Logic and Genetic Algorithm:
Synthesis and Applications”, 4th Edition, Prentice Hall of India,2003.
Reference Books:
Timothy J Ross ,"Fuzzy Logic with Engineering Applications", 3rd Edition, John Wiley and
Sons,2016.
David E. Goldberg ,"Genetic Algorithm in Search Optimization and Machine Learning "Adission-
Wesley,2009.
Karray, “Soft Computing and Intelligent Systems Design: Theory, Tools and Applications”, 1 st
Edition, Pearson Education,2009.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO3/PSO3
CO2 PO2,PO3, PO4/PSO2
CO3 PO2,PO3, PO5/PSO4
CO4 PO1,PO12/PSO4
CO5 PO2,PO5,PO12/PSO4
Text Books:
N P Padhy, "Soft Computing: With MATLAB Programming”, Oxford Publication,2015.
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO5/PSO1
CO2 PO2,PO12/PSO2
CO3 PO3,PO4/PSO3
Module Teaching
Content
No. Hours
Introduction: Introduction to Artificial Intelligence, Foundations of Artificial
Intelligence, Applications of Artificial Intelligence, Turing Test.
Introduction to Intelligent Agents: Agents and Environment, Concept of
rationality. Nature of environments, Knowledge based Agents, Structure of
Intelligent Agents.
Problem solving: Searching for solutions, Uninformed search strategies,
I Informed search strategies, Heuristic versus Solution Guaranteed Algorithm, 22
Hill Climbing, Simulated Annealing, Best First Search (A*), Problem Reduction
(AO*).
Knowledge & Reasoning: Propositional logic, First order predicate logic, Horn
Clause, Inference in First order logic, Unification, Forward& Backward chaining,
Resolution, Probabilistic reasoning, Bayesian Networks.
Reference Books:
Elaine Rich and Kevin Knight, “Artificial Intelligence”, McGraw-Hill
Dan W. Patterson, “Artificial Intelligence and Expert Systems”, Prentice Hall of India,
E Charniak and D McDermott, “Introduction to Artificial Intelligence”, Pearson Education
COs POs/PSOs
CO1 PO1,PO2/PSO3,PSO4
CO2 PO2/PSO3
CO3 PO1,PO3/PSO2,PSO3
CO4 PO2/PSO2,PSO3
CO5 PO1 /PSO3
CO6 PO2/PSO3,PSO4
Module Teaching
Content
No. Hours
Introduction: Machine Learning basics, Hypothesis space and inductive bias,
training and test set, and cross-validation.
Introduction to Statistical Learning: Bayesian Method.
Machine Learning: Supervised (Regression, Classification) vs. Unsupervised
(Clustering) Learning.
I 20
Data Preprocessing: Imputation, Outlier management, One hot encoding,
Dimensionality Reduction- feature extraction, Principal Component Analysis
(PCA), Singular Value Decomposition
Supervised Learning: Regression- Linear regression, Polynomial regression,
Classification- Logistic regression, k-nearest neighbor classifier,
Text Book:
Tom M. Mitchell, Machine Learning. Tata McGraw-Hill Education, 2013.
Alpaydin, E. . Introduction to machine learning. MIT press, 2009.
Reference Books:
Harrington, P. , “ Machine learning in action”, Shelter Island, NY: Manning Publications Co, 2012.
Bishop, C. M. . Pattern recognition and machine learning (information science and statistics)
springer-verlag new york. Inc. Secaucus, NJ, USA. 2006
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2/PSO3,PSO4
CO2 PO1,PO2/PSO1,PSO3
CO3 PO1,PO3,PO5/PSO1,PSO3
CO4 PO1 /PSO1
CO5 PO2/PSO3
CO6 PO1,PO2,PO3/PSO1,PSO2,PSO4
Module Teaching
Content
No. Hours
Introduction: Machine Learning basics, Applications, Type of Learning
Algorithm
Hypothesis space and inductive bias: Concept-Learning, Hypotheses
Representation, Find-S Algorithm
Machine Learning: Training, Testing, Evaluation: Cross-validation,
Confusion Matrix, Precision, Recall, F1-score, ROC curve, Overfitting, Bias,
I Variance Trade off 20
Supervised Learning: Regression- Linear regression, Polynomial regression,
Gradient Descent Algorithm
Data Preprocessing: Imputation, Outlier management, One hot encoding,
Feature selection, Filter and Wrapper approach
Supervised Learning: Classification- Logistic regression, k-nearest neighbor
classifier, Decision tree classifier, Naïve Bayes classifier,
Text Book:
Tom M. Mitchell, “Machine Learning”. Tata McGraw-Hill Education, 2013.
Alpaydin, E. , “ Introduction to machine learning”. MIT press, 2009.
Reference Books:
Harrington, P., .” Machine learning in action”. Shelter Islan”, NY: Manning Publications Co, 2012.
Bishop, C. M. . Pattern recognition and machine learning (information science and statistics)
springer-verlag new york. Inc. Secaucus, NJ, USA, 2006.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2/PSO3,PSO4
CO2 PO1,PO2/PSO1,PSO3
CO3 PO1,PO3,PO5/PSO1,PSO3
CO4 PO1 /PSO1
CO5 PO2/PSO3
CO6 PO1,PO2,PO3/PSO1,PSO2,PSO4
S.No PROGRAM
1 Estimate parameters of a model based on Linear Regression method using a given set of
training data set.
3 Compute weights of ANN based on back propagation method using a given training
dataset.
5 Classify a person as male or female based on a given dataset using naïve Bayesian
Classifier, and calculate accuracy, precision, and recall for your data set.
6 Write a program to implement k-Nearest Neighbour method to classify the iris data set.
Print both correct and wrong predictions. Use Java/Python ML library classes
7 Predicts whether the bank should approve the loan of an applicant, based on his profile
using Ensemble learning method.
Apply Ensemble learning to cluster a set of data stored in a .CSV file. Use the same
8 dataset for clustering using k-Means method. Compare the results of these two
algorithms and comment on the quality of clustering. You can add Java/Python ML
library classes/API in the program.
9 The stock prediction data is used to predict, whether the stock will go up or down.
Perform the task of feature selection with the help of wrapper method.
10 Identify principal components of Big Mart sales data using Principal component analysis
(PCA). Also plot the result of PCA, and give inferences.
Outcome: After studying the subject, the students will be able to:
CO1: Applythe machine learning algorithms in the area of text, audio and image processing.
CO2: Apply classification algorithms to design complex problems.
CO3: Design solution to societal issues using machine learning algorithms.
CO4: Analyze the view problem in the perspective of machine learning.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
CO PO/PSO
CO1 PO3,PO5/PSO4
CO2 PO1,PO5/PSO1,PSO3,PSO4
CO3 PO3 /PSO1,PSO2,PSO4
CO4 PO2,PO3/PSO1,PSO2,PSO4
1. Iris Flowers Classification ML Project: Learn about Supervised Machine Learning Algorithms
Objective: The goal of this machine learning project is to classify the flowers into among the three
species – virginica, setosa, or versicolor based on length and width of petals and sepals.
2. BigMart Sales Prediction ML Project: Learn about Unsupervised Machine Learning Algorithms
Objective: The goal of the BigMart sales prediction ML project is to build a regression model to predict
the sales of each of 1559 products for the following year in each of the 10 different BigMart outlets.
3. Social Media Sentiment Analysis using Twitter Dataset
Objective: Working with the twitter dataset will help you understand the challenges associated with
social media data mining and also learn about classifiers in depth.
4. Sales Forecasting using Walmart Dataset
Objective: The goal of this machine learning project is to forecast sales for each department in each
outlet to help them make better data driven decisions for channel optimization and inventory planning.
5. Learn to build Recommender Systems with MovieLens Dataset
Objective: The goal of this machine learning project is to start working with this dataset by building a
world-cloud visualization of movie titles to build a movie recommender system.
6. Stock Prices Predictor
Objective: Stock prices predictor is a system that learns about the performance of a company and
predicts future stock prices.
7. Boston Housing Price Prediction ML Project
Objective: The goal of this machine learning project is to predict the selling price of a new home by
applying basic machine learning concepts on the housing prices data.
8. MNIST Handwritten Digit Classification
Objective: The goal of this machine learning project is study, analyze and recognize elements in the
images.
9. Human Activity Recognition using Smartphone Dataset
Objective: The goal of this machine learning project is to build a classification model that can precisely
identify human fitness activities. Working on this machine learning project will help you understand how
to solve multi-classification problems.
10. Use classification and clustering techniques to deal with the Turkiye Student Evaluation Data
Set
Objective: This dataset is based on an evaluation form filled out by students for different courses. It has
different attributes including attendance, difficulty, score for each evaluation question, among others.
This is an unsupervised learning problem.
11. Predict height and weight from Heights and Weights dataset.
Objective: The goal of this project is to learn the concept of Regression.
12. Text Mining Data Set
Objective: The goal of this project is classify the documents according to their labels.
13. Predict the income class of any country population
Objective: The goal of this project is to work with imbalanced classification problem.
14. Classify the type of sound from the audio.
Objective: The goal of this project is to introduce the student to audio processing in the usual
classification scenario.
SYLLABUS
OF
PROGRAM ELECTIVE
Under
Choice Based Credit System (CBCS)
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME PRE-
CODE SUBJECT
NO. REQUISITES
L T P J
PRACTICALS
Data Mining and Warehousing
1. BCSE0181 0 0 2 0 1 2
Lab
2. BCSE0182 Business Intelligence Lab 0 0 2 0 1 2
PROJECTS
Objective: This course aims to give students in depth information about query processing and
optimization, advanced query processing techniques, and advanced databases.
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO3/PSO2
CO2 PO4/PSO4
CO3 PO1/PSO1
CO4 PO2,PO3/PSO4
CO5 PO5/PSO1
CO6 PO3/PSO4
Objective: The Objective of this course is to introduce the basic concepts of Data Warehouse and Data
Mining techniques.
Module Teaching
Content
No. Hours
Data Warehousing: Overview, Difference between Database System and Data
Warehouse, Multi-dimensional Data Model: Concept Hierarchy, Three-Tier
Architecture, Meta Repository, Data Warehouse & OLAP Technology, Types of
OLAP Servers. Data Cubes Computations & Data Generalization.
Data Pre Processing: Data Cleaning, Data Integration and Data
Transformation, Data Reduction
I 13
Mapping the Data Warehouse to a Multiprocessor Architecture, Multi-
Dimensional Data Model.
Introduction: Basics of Data Mining, Issues and Applications of Data Mining
Techniques. Mining frequent Patterns: Basic Concepts of Association Rules
Mining, Apriori Algorithm, FP-Growth. Multilevel Association Rules, Multi-
Dimensional Association Rules.
Text Books:
Jiawei Han, MichelineKamber,” Data Mining Concepts& Techniques”, 3rdEdition, Morgan
Kauffmann,2013.
Reference Books:
M. H. Dunham , “Data Mining: Introductory and Advanced Topics”, 1 st Edition, Pearson
Education,2003.
Sam Anahory, Dennis Murray , “Data Warehousing in the Real World: A Practical Guide for
Building Decision Support Systems”, 4th Edition, Pearson Education,2009.
Pang-Ning Tan, Michael Steinbach, Vipin Kumar , “Introduction to Data Mining”, 2ndEdition,
Addison-Wesley,2006.
Aggarwal, , “Data Mining: The Textbook”, Springer,2015.
Outcome: After the completion of this course, student will be able to:
CO1: Understand and apply the concept of data warehouse and mining in real-life applications.
CO2: Apply the principle algorithms used in modern machine learning.
CO3: Apply the information theory and probability theory to get the basic theoretical results in
Data Mining.
CO4: Apply Data mining algorithms to real datasets, evaluate their performance and appreciate
the practical issues involved.
CO5: Implement clustering using various clustering methods on data set.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2/PSO1
CO2 PO1,PO3,PO4/PSO1,PSO3
CO3 PO1 /PSO1
CO4 PO1 /PSO2
CO5 PO3/PSO2
Objective: The Objective of this course is to implement and run the programme based on the basic concepts of
Data Warehouse and Data Mining techniques
Module
Content Lab Hours
No.
Demonstration of pre-processing on different dataset
Demonstration of Association rule process on different dataset using
apriori algorithm
Demonstration of classification rule process on different dataset using FP
Tree algorithm
Demonstration of classification rule process on different dataset using
id3 algorithm
Demonstration of classification rule process on different dataset using
naïve bayes algorithm
Demonstration of clustering rule process on different dataset using
simple k-means
Demonstration of clustering rule process on different dataset using
simple k-mediods
24
Demonstration of clustering rule process on different dataset using
simple k-mode.
I/II Demonstration of clustering rule process on different dataset using
DBSCAN.
Demonstration of clustering rule process on different dataset using
simple Hieratical based algorithm.
Implementation of K-NN Algorithms on different data sets.
Implementation of Sequential pattern SPADE algorithm on sequence data
set.
Implementation of Sequential pattern GSP algorithm on sequence data
set.
Implementation of SVM on a two dimensional data set.
Demonstration of Decision Tree on Weka Tool.
Text Books:
Toby Segaran, Programming Collective Intelligence Building Smart Web 2.0 Applications, O'Reilly
Media,2015.
Reference Books:
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H.
Witten (2009). The WEKA Data Mining Software: An Update. SIGKDD Explorations, Volume 11,
Issue 1.
https://www.cs.waikato.ac.nz/ml/weka/Witten_et_al_2016_appendix.pdf
Outcome: After completion of this course students will be able to:
CO1: Implement the clustering technique like DBSCAN, K-NN, K Mean.
CO2: Implement SVM on two dimensional data set.
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO3/PSO3
CO2 PO1,PO3/PSO2
Module Teaching
Content
No. Hours
Introduction to Business Intelligence: BI Definitions & Concepts, BI
Framework, Data Warehousing Concepts and Its Role in BI; BI Infrastructure
Components – BI Process, BI Technology, BI Roles & Responsibilities, Business
Applications of BI, BI Best Practices. Effective and timely decisions – Data,
information and knowledge – Role of mathematical models – Business
I intelligence architectures: Cycle of a business intelligence analysis – Enabling
20
factors in business intelligence projects – Development of a business
intelligence system – Ethics and business intelligence.
Basics of Data Integration: Concepts of Data Integration, Needs and
Advantages of using Data Integration, Introduction to Common Data
Integration Approaches; Meta Data - Types and Sources, Introduction to Data
Quality
Data Profiling Concepts and Applications, Introduction to ETL using Kettle.
Marketing models – Logistic and Production models – Case studies. Efficiency
Measures and Metrics: Efficiency measures – The CCR model: Definition of
target objectives- Peer groups – Identification of good operating practices;
cross efficiency analysis – virtual inputs and outputs – Other models.
II Introduction to Business Metrics and KPIS, Creating Cubes using Microsoft 20
Excel.
Basics of Enterprise Reporting: A Typical Enterprise, Malcolm Bridge -
Quality Performance Framework, Balanced Scorecard, Enterprise Dashboard,
Balanced Scorecard vs. Enterprise Dashboard, Enterprise Reporting using MS
Access / MS Excel, Best Practices in the Design of Enterprise Dashboards.
Text Books:
RN Prasad and Seema Acharya , “Fundamentals of Business Analytics”, Wiley India, 2nd
Edition,2018.
Reference Books:
U Dinesh Kumar , “Business Analytics: The Science of Data - Driven Decision Making”, Wiley
India, 1st Edition,2017.
David Loshin, “Business Intelligence”, 2nd Edition, Elsevier Science & Technology,2012.
Mike Biere, “Business Intelligence for the Enterprise”, Pearson,2010.
IBM , “An Introduction to Building Data Warehouse”, Prentice Hall of India,2004.
Larissa Terpeluk Moss &ShakuAtre, “Business Intelligence Roadmap”, Pearson,2003
Outcome: At the end of this course, student will be able to
CO1: Identify the major frameworks of computerized decision support: decision support systems
(DSS), data analytics and business intelligence (BI).
CO2: Explain the foundations, definitions, and capabilities of DSS, data analytics and BI.
CO3: Design tested and effective advanced analytics models and simulations for decision
making.
CO4: Understand the methodology of engineering legacy databases for business intelligence to
derive business rules for decision support systems.
CO5: Articulate assumptions, analyses, and interpretations of data in an oral formatApply big
data technologies in business intelligence using geospatial data, location-based analytics, social
networking, Web 2.0, reality mining, and cloud computing.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO5/PSO1
CO2 PO1,PO2/PSO3
CO3 PO1/PSO1,PSO3
CO4 PO3,PO6/PSO1,PSO4
CO5 PO2,PO3/PSO2
Objective: This course introduces students to Business Intelligence, Students will learn to create multiple
reports and analyze data using various methods and generate Business reports. Student will also learn data
representation in dimensional Modeling
Filtering on Reports
Sorting and calculation on Reports
Adding Prompt in Reports
Creation of Miscellaneous Reports
Scenario/ Objective Based Reports
Reference Books:
Paul Teetor. R Cookbook: Proven recipes for data analysis, statistics, and
graphics. O'Reilly Media, Inc.,2011.
Norman Matloff. Theart of R programming: A tour of statistical software design.
No Starch Press, 2011.
Winston Chang. R graphics cookbook. O'Reilly Media, Inc., 2012.
Hadley Wickham and Garrett Grolemund. R for data science. 2016.
Phil Spector. Data manipulation with R. Springer Science& Business Media, 2008.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO4,PO5/PSO2
CO2 PO2,PO3/PSO4
CO3 PO1,PO2/PSO1
Module Teaching
Content
No. Hours
Introduction to IR: IR Concepts, Boolean Retrievals- An Example
Information Retrieval Problem, A First Take at Building an Inverted Index,
Processing Boolean Queries.
The Term Vocabulary and Postings Lists: Document Delineation and
Character Sequence Decoding, Determining the Vocabulary of Terms.
I Dictionaries and Tolerant Retrieval: Search Structures for Dictionaries, 22
Wildcard Queries, Spelling Correction, Phonetic Correction.
Index Construction: Hardware Basics Blocked Sort-Based Indexing.Scoring,
Term Weighting and the Vector Space Model: Parametric and Zone Indexes,
Term Frequency and Weighting, The Vector Space Model for Scoring.
Outcome: After successful completion of this course, students should be able to:
CO1: Apply different information retrieval techniques in real life application.
CO2: Analyze indexing and pre-processing of textual documents for IR system.
CO3: Apply IR principles into Spelling Correction, Phonetic Correction.
CO4: Analyze performance of retrieval systems.
CO5: Apply IR techniques to XML Retrieval.
CO6: Develop retrieval systems for web search tasks.
CO7: Demonstrate similarity computation for document.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO4/PSO3
CO2 PO2,PO4/PSO4
CO3 PO1,PO3,PO4/PSO4
CO4 PO3,PO4/PSO1,PSO4
CO5 PO1,PO2,PO5/PSO1
CO6 PO3,PO5 /PSO1,PSO4
CO7 PO2,PO3,PO5/PSO2
Module Teaching
Content
No. Hours
Introduction: Introduction to Databases, Overview of Relational DBMS,
Relational Database concepts, Normalization.
Distributed Database: Introduction, Comparison of Distributed and
I CentralizedDatabaseSystems,DistributedDatabaseArchitecture,Distributed 20
DataBaseDesign,TypesofDataFragmentations,FragmentationandAllocation of
Fragments, Distributed Catalog Management.
Transactions Management in Distributed Database: Properties and Goals of
Transaction Management, Distributed Transactions, Two Phase Commit
Protocol, Recovery Mechanism in case of Transaction Failures, Log Based
Recovery, Communication and Site Failures.
Text Books:
M. Tamer Oezsu, Patrick Valduriez. “Principles of Distributed DatabaseSystems”,2ndEdition,
Prentice Hall,2011.
Reference Books:
Elmasri, Navathe, “FundamentalsofDatabaseSystems”,5 Edition, Pearson,2011.
th
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO5/PSO1
CO2 PO5/PSO4
CO3 PO5/PSO4
CO4 PO2/PSO4
CO5 PO1/PSO1
CO6 PO3/PSO2, PSO1
Reference Books:
1. Akshar Bharti, Vineet Chaitanya and Rajeev Sangal, NLP: A Paninian Perspective, Prentice Hall,
New Delhi
2. D. Jurafsky, J. H. Martin, Speech and Language Processing, Pearson Education, 2002
3. L.M. Ivansca, S. C. Shapiro, Natural Language Processing and Language Representation
4. T. Winograd, Language as a Cognitive Process, Addison-Wesley
Outcomes: After the completion of the course, the student will be able to:
CO1: Understand the core tasks in NLP and its applications in real problems.
CO2: Understand the human languages, be familiar with the most mainstream descriptive and
theoretical frameworks for handling their properties.
CO3: Understand the basics of knowledge representation, inference, and relations to the artificial
intelligence.
CO4: Understand the algorithmic description of the main language levels: morphology, syntax,
semantics, and pragmatics.
CO5: Understand the various translation strategies and techniques of maintaining balance among
the three basic criteria of translation: accuracy, clarity and naturalness.
CO6: Apply the Markov Models and it’s variants to do the Part of Speech Tagging.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO2/PSO1
CO3 PO2,PO5/PSO5
CO4 PO3/PSO3
CO5 PO1/PSO1
CO6 PO5/PSO4
Module Teaching
Content
No. Hours
Big Data Technology Landscape: Types of Digital Data (Structured, Semi-
Structured, Unstructured), Concept, importance and characteristics of data,
Challenges with big data, Big data stack, Big Data 1.0, 2.0 and 3.0, Traditional BI vs.
Big Data Environment, NoSQL Databases, NoSQL Vs. RDBMS, New SQL,
Introduction to Data Science/Scientist
HADOOP 1.0: Introducing Hadoop 1.0, Limitations of RDBMS, Hadoop
Components, High Level Architecture of Hadoop, History of Hadoop, Special
Features of Hadoop, Introduction to HDFS 1.0, Architecture, Daemons, working
with HDFS Command, Introduction to Map-Reduce
I 20
1.0, Architecture, Daemons
HADOOP 2.0: Introducing Hadoop 2.0, Limitations of 1.0, Introduction to HDFS
2.0, Architecture, Daemons, Introduction to Map-Reduce 2.0, YARN, Architecture,
Daemons, Word Count Example using Java, Introduction to Hadoop 3.0, Difference
among Hadoop1.0, Hadoop2.0, Hadoop3.0
Introduction to Mongo DB: RDBMS vs. MongoDB, JSON, Unique Key, Dynamic
Queries, Sharding, Replication, MongoDB QL: Create, Drop Database and
Collections, CRUD: Create, Insert, Find, Update, Delete, Map Reduce Programming,
Aggregations
Introduction to Cassandra DB: Features of Cassandra, CQL Data Types, CQLSH:
CRUD, Counter, TTL, List, Set, Map, Tracing, Import Export csv files
HADOOP Ecosystem and Flume: Introduction to Hadoop Ecosystem, Sqoop,
Zookeeper, Plug-in Components: Impala, Hue, Flume: Introduction, Application,
Advantage, Features.
Introduction to HIVE: Hive Architecture, Hive Data types, Hive Collection Types,
II Hive File Formats, Hive Query Language, Hive Partitions, Bucketing, Views, RCFile
20
Implementation, Hive User Defined Function, SerDe, UDF
Introduction to Pig: History and Anatomy of Pig, Pig on Hadoop, Use Case for Pig,
Pig Primitive Data Types, Pig Latin Overview, Execution Modes of Pig, Field, Tuple,
Bag, User Defined Function, Parameters in Pig, Piggy Bank, Word count example
using Pig, Pig vs Hive, When to use Pig.
Text Book:
Seema Acharya and SubhashiniChellappan, “Big Data and Analytics”, 1st Edition, 2015, Wiley,
India.
Jure Leskovec, AnandRajaraman, Jeff Ullman, “Mining of Massive Datasets”, 2nd Edition, 2014,
Cambridge University Press.
Reference Books:
Chuck Lam, “Hadoop in Action”, 2nd Edition, 2014, Manning Publications.
Outcome: At the end of the course, student will be able to
CO 1: Understand the concepts and challenges of big data.
CO 2: Apply existing technology to collect, manage, store, query, and analyze the big data.
CO 3: Apply job scheduling of various applications and resource management using Hadoop and
Yarn.
CO 4: Apply the data summarization, query, and analysis of big data using pig and hive.
CO 5: Design the regression model, cluster and decision tree of big data.
CO 6: Experiment with hands-on experience in large-scale analytics tools to solve big data
problems.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO5/PSO5
CO2 PO3/PSO4
CO3 PO3,PO5/PSO4
CO4 PO3,PO5/PSO4
CO5 PO3/PSO2
CO6 PO2/PSO4
Module Teaching
Content
No. Hours
Big Data technology Landscape: Types of Digital Data (Structured,
Semi-Structured, Unstructured),Concept, importance and
characteristics of data, Challenges with big data, Big data stack, Big
Data 1.0, 2.0 and 3.0, Traditional BI vs. Big Data Environment, NoSQL
Databases, NoSQL Vs. RDBMS, New SQL, Introduction to Data
Science/Scientist.
HADOOP 1.0: Introducing Hadoop 1.0, Limitations of RDBMS, Hadoop
Components, High Level Architecture of Hadoop, History of Hadoop,
Special Features of Hadoop, Introduction to HDFS 1.0, Architecture,
Daemons, Working with HDFS Command, Introduction to Map-Reduce
1.0, Architecture, Daemons
I HADOOP 2.0: Introducing Hadoop 2.0, Limitations of 1.0, Introduction 19
to HDFS 2.0, Architecture, Daemons, Introduction to Map-Reduce 2.0,
YARN, Architecture, Daemons, Word Count Example using Java,
Introduction to Hadoop 3.0, Difference among Hadoop1.0, Hadoop2.0,
Hadoop3.0
Apache Spark: Introduction, Introduction to Spark & functional
programming, Spark Concepts, RDD Fault Tolerance
Introduction to HBase: What is HBase? HBase Architecture, HBase
Components, Data model, HBase Storage Hierarchy, Cross-Datacenter
Replication, Auto Sharding
Introduction to Cassandra DB: Features of Cassandra, CQL Data
Types, CQLSH: CRUD, Counter, TTL, List, Set, Map, Tracing, Import
Export csv files
HADOOP Ecosystem and Flume: Introduction to Hadoop Ecosystem,
Sqoop, Zookeeper, Plug-in Components: Impala, Hue, Flume:
Introduction, Application, Advantage, Features.
Introduction to Mongo DB: RDBMS vs. MongoDB, JSON, Unique Key,
Dynamic Queries, Sharding, Replication, MongoDB QL: Create, Drop
Database and Collections, CRUD: Create, Insert, Find, Update, Delete,
Map Reduce Programming, Aggregations
Introduction to HIVE: Hive Architecture, Hive Data types, Hive
Collection Types, Hive File Formats, Hive Query Language, Hive
II Partitions, Bucketing, Views, RCFile Implementation, Hive User Defined 19
Function, SerDe, UDF
Introduction to Pig: History and Anatomy of Pig, Pig on Hadoop, Use
Case for Pig, Pig Primitive Data Types, Pig Latin Overview, Execution
Modes of Pig, Field, Tuple, Bag, User Defined Function, Parameters in
Pig, Piggy Bank, Word count example using Pig, Pig vs Hive, when to
use Pig.
Machine Learning: Linear Regression, Logistic Regression,
Association Rule
Text Book:
Seema Acharya and Subhashini Chellappan, “Big Data and Analytics”, 1st Edition, 2015,
Wiley, India.
Jure Leskovec, Anand Rajaraman, Jeff Ullman, “Mining of Massive Datasets”, 2nd Edition,
2014, Cambridge University Press.
Reference Books:
Chuck Lam, “Hadoop in Action”, 2nd Edition, 2014, Manning Publications.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO3/PSO4
CO3 PO3,PO5/PSO4
CO4 PO3,PO5/PSO4
CO5 PO3/PSO2
CO6 PO2/PSO4
Objective: This course introduces students to R, a widely used statistical programming language.
Students will learn to manipulate data objects, produce graphics, analyse data using common statistical
methods, and generate reproducible statistical reports. Student will also learn data mangling.
Module
Content Lab Hours
No.
Module 1: Introduction to R
Reference Books:
Paul Teetor. R Cookbook: Proven recipes for data analysis, statistics, and
graphics. O'Reilly Media, Inc.,2011.
Norman Matloff. Theart of R programming: A tour of statistical software design.
No Starch Press, 2011.
Winston Chang. R graphics cookbook. O'Reilly Media, Inc., 2012.
Hadley Wickham and Garrett Grolemund. R for data science. 2016.
Phil Spector. Data manipulation with R. Springer Science& Business Media, 2008.
Outcome: At the end of the course, student is able to:
CO1: Apply R-Studio, read R documentation, and write R scripts.
CO2: Analyse the data using data analytics latest tools based on HDFS like Pig, Hive.
CO3: Implement the aggregation projection on data set using Cassandra, MongoDB.
CO4: Implement the concept of PIG & HIVE Using QVERIESON real world data
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO2,PO5/PSO4
CO2 PO1,PO5/PSO3
CO3 PO2,PO5/PSO3
CO4 PO5/PSO4
Objective: Create multiple reports to visualize all kinds of placement activity such as
placed students with unplaced students, company wise placed students, visited
companies, upcoming companies etc. with filters and prompts
Objective: Create Dashboard for displaying multiple products and their sales analysis
using multiple report types such as gauge chart, crosstab, pie chart etc and also
represent it by colours such as high selling product in green, low selling product in red
in same way for different region as well.
Project No. 14. Country Crime Statistics Reporting Project in Business Intelligence
Objective: Display multiple crime reports with drill down feature like from country to
state and state to district and district to city...with filtering capability for various reasons
such as display of city or state which had highest number of crimes.
Objective: Display trends of various companies’ shares with drill down as well as drill
up feature on date basis
Objective: compares how different order methods are performing for each product line.
This report should display the revenue that individual order methods generate for each
product line and the average revenue all order methods generate for each product line.
Objective: The Vice President of Sales has requested a report that shows sales
performance in each country for 2012. He wants to see the performance for
representatives in Southern Europe so he can present an award to the top seller when
he visits next month
Project No.18.Create a Report Focused on Top Performing Product Types and Product Lines
Objective: create a report that displays revenue by product line and product type. The
report must show the product types that generated revenue greater than $100 million
and product lines that generated revenue greater than $400 million with various charts
and colouring scheme
Objective: create a dashboard report that contains a gauge chart that compares the
gross profit of each product line by region, a combination chart that shows revenue
earned by each product line by retailer type and region on separate axis, and finally a
crosstab report that shows the gross margin of each product line by year and region.
Objective: You have been asked for a report that displays the quantity of products sold
for each order year. You also need to display all product lines in uppercase. The
report should contain an optional prompt that lets users view data by sales region. Add a
report title that indicates which sales region users select in the prompt. It should also
indicate if they do not select a region as well. You will use a layout calculation to display
the report title
Objective: HR would like a report that outlines the courses each employee has
completed. They want to see the number of course days that each employee has
accumulated to date and the cost of those courses. They would also like to be able to
drill-through to specific information on each employee for each year.
Objective: prepare a report that shows the quantity of products sold in each month of
2012 for all product lines, to help estimate production requirements for next year.
The report must be broken into separate sections for each product line so that products
from each line can be analyzed separately. The report name and logo must appear at the
top and bottom of each page of the report.
Objective: This is to create Bollywood Movies reports with filter and prompts to let
user to find out list of movies based on different users’ taste (e.g. emotional, scary ..Etc)
and also show other report to show most/least user rated movie
Objective: create a list report where users can review the gross profit generated by
retailer types for each region gained by XYZ (product wise) providing multiple filter and
prompts and also name the report
Objective: Create a dashboard where a manager can visualize various Income class of
people based on region (country, state, district and so on...) providing multiple prompts
and filter to drill down in reporting levels
SYLLABUS
OF
PROGRAM ELECTIVE
BOUQUET: HIGH PERFORMANCE
COMPUTING
DEPARTMENT OF COMPUTER ENGINEERING &
APPLICATIONS
Under
Choice Based Credit System (CBCS)
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME
NO.
CODE SUBJECT PRE- REQUISITES
L T P J
PROJECTS
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO2,PO3/PSO2
CO2 PO1,PO5/PSO1
CO3 PO3,PO4/PSO3
CO4 PO5,PO7/PSO1
CO5 PO4 /PSO2
CO6 PO2,PO3/PSO1,PSO2
Text Books:
Reference Books:
Raj Kamal , “Embedded Systems–Architecture, Programming & Design”, Tata McGraw Hill,2011.
David A. Simon , “An Embedded Software Primer”, Pearson Education,1999.
DanielW.Lewis, “Fundamentals of Embedded Software Where C and Assembly Meet”, 2nd Edition,
Pearson College Division,2012.
James K. Peckol, “Embedded Systems: A Contemporary Design Tool”, Wiley India,2012.
Mapping of Course Outcomes (COs) withProgram Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO4,PO5/PSO2
CO2 PO3 /PSO1
CO3 PO5/PSO2
CO4 PO4,PO5/PSO1
CO5 PO2,PO3/PSO2
CO6 PO3,PO10/PSO2
interrupts
control
Text Books:
Raj Kamal , “Embedded Systems–Architecture, Programming & Design”, Tata McGraw Hill.2011.
CO1: Visualize and analyze the design and behavior of the hardware components.
CO2: Apply knowledge of embedded systems along with some specialization in any area of
computer engineering.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO5,PO7/PSO3
CO2 PO2,PO3/PSO2
Outcome:
CO1: Understand the concepts of Internet of Things.
CO2: Understand difference between Sensors and Actuators and their working principles.
CO3: Design IoT applications using different sensors and actuators.
CO4: Understand different protocols used in IoT over network.
CO5: Understand different communication protocols.
CO6: Explain the concept of cloud computing and fog computing.
CO7: Implement IoT application using Raspberry Pi.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3/PSO1
CO2 PO2 /PSO4
CO3 PO5/PSO2
CO4 PO11/PSO2
CO5 PO1,PO3/PSO4
CO6 PO2/PSO1
CO7 PO5/PSO3
Text Books:
Perry Lea , "Internet of Things for Architects: Architecting IoT solutions by implementing
sensors, communication infrastructure, edge computing, analytics, and security", Packt
Publishing,2018
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3/PSO1
CO2 PO2/PSO4
CO3 PO5/PSO2
CO4 PO10/PSO1
CO5 PO10/PSO4
CO6 PO10/PSO1
CO7 PO2,PO3/PSO2
CO8 PO5/PSO3
Objective: Coordinate and help to increase and optimize the utilization of results and value creation in the
area of IoT.
Text Books:
Upskill Learning , “ESP8266: Programming NodeMCU Using Arduino IDE - Get Started With
ESP8266 (Internet Of Things, IOT, Projects In Internet Of Things, Internet Of Things for
Beginners, NodeMCU Programming, ESP8266”,2018.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO3,PO5/PSO1
CO2 PO4/PSO1
CO3 PO1/PSO4
Objective: Brain-Computer Interface technology is innovated to the analysis of the brain to predict the
human thoughts or to control applications using the brain. As the next stage of analysis based on Machine
Learning to our Brain, we need data logs of our Brain parameters, so we need the logs of data, which
should contain Brain values. This can be done by using Raspberry Pi to take values from the Brain and to
uploading the Brain values in Raspberry Pi.
10. MQTT based Monitoring System for Coal Mine using Raspberry Pi:
Objective: Due to global warming and climate, changes there are challenging situations in coalmine. To
reduce the cost as well as to improve the productivity along with product quality the automation in the
field of coalmine is necessary, which will also reduce the mine worker’s efforts. This project proposes a
design of a IOT system with MQTT protocol, by the help of Raspberry pi controller which is able to
monitor the temperature, humidity, gas and status of smoke in an underground mine.
11. Industry Monitoring with data logger in Google sheet using Raspberry Pi:
Objective: This Raspberry Pi industry monitoring system which having some sensors, taking sensor
values and converting using Analog to Digital, then for data logging which will be helpful to review the
industry parameter, instead of data log manually, every data values will be uploaded to Google sheets
which already get authenticated and by generating JSON file for every individual.
12. IoT Based Transmission Line Monitoring System Using Raspberry Pi:
Objective: The aim of this project is to decrease power consumption for delay sensitive and delay
insensitive traffic. A fuzzy rule table is constructed with prediction of average inter arrival time of frame
based on outcome sleep time and power is evaluated. Proposed method offer effective power efficiency
than previous inter arrival time method using Raspberry Pi.
Reference Books:
A.S. Tanenbaum and M. Van Steen , “Distributed Systems”, Pearson Education,2004.
George Coulouris, Jean Dollimore and Tim Kindberg, “Distributed Systems Concepts and Design”,
5th Edition, Pearson Education Asia,2011.
CO4: Introduce the concepts of distributed file system with its architecture and components
along with case studies.
CO5: Distinguish the main failure types in a Distributed System and specify algorithms for
achieving fault tolerance and error recovery within such a system.
CO6: Understand how balancing of resources is done; issues, components and algorithms for
load balancing in distributed environment.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO1,PO2/PSO1
CO3 PO1,PO2,PO3/PSO1,PSO2
CO4 PO1,PO2/PSO1,PSO2
CO5 PO1,PO2/PSO1
CO6 PO1,PO2,PO4/PSO1
Objective: This course aims to introduce the concept of designing algorithms suitable for implementation
on parallel computers. The focus will be on the algorithmic side. In particular, the emphasis will be on
studying different parallel techniques and using them to design scalable parallel algorithms for a variety of
problems and architectures.
Text Books:
M.J. Quinn, “Designing Efficient Algorithms for Parallel Computer”, McGraw-Hill, Inc, ISBN:0-07-
051071-7,1987.
Reference Books:
S.G. Akl, “Design and Analysis of Parallel Algorithms”. Prentice-Hall, Inc., ISBN:0-13-200056-
3,1989.
S.G. Akl,” Parallel Sorting Algorithm” by Academic Press,1985.
AnanthGrama, Anshul Gupta, George Karypis, Vipin Kumar, "Introduction to Parallel Computing",
Second Edition, Addison Wesley, ISBN: 0-201-64865,2003.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO2,PO10/PSO2
CO2 PO5/PSO1
CO3 PO4/PSO2
CO4 PO1/PSO3
CO5 PO2 /PSO2
CO6 PO1,PO4/PSO3
Objective: The goal of the course is to study the mathematical models, methods and technologies of
parallel programming for multiprocessor systems.
Module Lab
Content
No. Hours
Parallel Programming with MPI
Parallel Programming with OpenMP
Lab for estimating the parallel method efficiency with the use of the
ParaLab system
I/II/III Lab for developing the parallel algorithms and programs 12*2=24
Lab works for parallel solving partial differential equations
Lab works for studying the parallel method libraries
Lab works for parallel solving the problem of multidimensional
multiextremal optimization
Text Books:
M.J. Quinn, “Designing Efficient Algorithms for Parallel Computer”, McGraw-Hill, Inc, ISBN:0-07-
051071-7,1987.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2/PSO3
CO2 PO5/PSO2
Objective: This course covers aims to explain various technologies related to Cloud Computing and their
practical implementations, discuss different architectural models of cloud computing, the concepts of
virtualization and cloud orchestration.
TextBooks:
Raj Kumar Buyya, James Broberg, Andrezei M. Goscinski, “Cloud Computing”: Principles and
paradigms,2011.
Reference Book:
Anthony T. Velte, Toby J. Velte, and Robert Elsenpeter Cloud Computing: A Practical
Approach,2010.
McGraw Hill. Rittinghouse, John, W, Cloud computing: Implementation, management and
security.
Barrie Sosinsky, Cloud Computing Bible, Wiley.2011.
Rhoton, John, Cloud Computing Architected: Solution Design Handbook.
Krutz, Ronald L.; Vines, Russell Dean, Cloud Security, A comprehensive Guide to Secure Cloud
Computing.
CO1: Describe importance of virtualization along with their technologies like system, network,
and storage virtualizations.
CO2: Identify the architecture and infrastructure of cloud computing, including SaaS, PaaS, IaaS,
XaaS, Public Cloud, Private Cloud, Hybrid Cloud and the core issues of cloud computing such as
security, privacy, and interoperability.
CO3: Justify the need of new technology of Virtualization & Cloud Computing and its ecological
impact.
CO4: Identify the known threats, risks, vulnerabilities and privacy issues associated with Cloud
based IT services
CO5: Apply fundamental concepts in cloud infrastructures to understand the tradeoffs in power,
efficiency and cost
CO6: Identify the Challenges in managing heterogeneous clouds.
CO7: Analyze various cloud programming models and apply them to solve problems on the
cloud.
CO8: Describe the key components of Amazon web Service
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3,PO5,PO7/PSO2
CO2 PO1,PO3,PO7/PSO1
CO3 PO1,PO7/PSO1
CO4 PO1,PO3,PO5/PSO4
CO5 PO1,PO3,PO5,PO7/PSO4
CO6 PO1,PO3,PO5 /PSO2
CO7 PO1,PO3,PO5/PSO1
CO8 PO1,PO3,PO5,PO7/PSO1,PSO2
Reference Books:
Anthony T. Velte, Toby J. Velte, and Robert Elsenpeter ,” Cloud Computing”: A Practical Approach,
McGraw Hill,2010.
Rittinghouse, John, W, “Cloud computing” : Implementation, management and security.
Barrie Sosinsky,” Cloud Computing Bible”, Wiley. 2011
Rhoton, John, “Cloud Computing Architected”: Solution Design Handbook.
Krutz, Ronald L.; Vines, Russell Dean, Cloud Security, A comprehensive Guide to Secure Cloud
Computing.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO3,PO5,PO7/PSO1
CO2 PO1,PO3,PO5,PO7/PSO2
CO3 PO1,PO5/PSO1
CO4 PO1,PO3/PSO1
CO5 PO1,PO3,PO5/PSO1,PSO4
CO6 PO1,PO3,PO5,PO7/PSO4
CO7 PO1,PO3,PO5/PSO2
CO8 PO1,PO3,PO5,PO7/PSO1,PSO2
Objective: This lab aims to understand the concept of cloud and virtualization by the help of VMware.
Reference Book:
Raj Kumar Buyya, James Broberg, Andrezei, M. Goscinski,” Cloud Computing”: Principles and
paradigms,2011.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO5/PSO1
CO2 PO1,PO3,PO5/PSO1
CO3 PO1,PO3,PO5,PO7/PSO2
5. Configure a devstack environment in personal computer and create a image with LAMP stack
and deploy web an application:
Objective:DevStack is an opinionated script to quickly create an OpenStack development environment. It
can also be used to demonstrate starting/running OpenStack services and provide examples of using
them from a command line. Your objective is to deploy private cloud using devstack and create a
necessary network components and projects. Than configure an image with (LAMP), Linux-Apache-
MySQL-PHP. Develop a web application using html, PHP and MySQL database and deploy it on devstack.
6. Develop a three-tier web application using Web 3.0 Technologies and deploy it on AWS EC2
service with auto scaling property:
Objective: Amazon web services is a Public cloud provider consists of many services like storage,
database, compute and container services. It also consists of advanced services like AI, Image voice
recognition and other allied services. The high end three tier applications are with huge complex
structure like e-commerce sites, social media sites and other variety of application where quality of user
experience is most important. These types of applications can leverage the clouds on the fly based on the
resource demands. Your objective is to create a web application using latest web technologies. Deploy the
application by provisioning the EC2 instances of type micro. Perform auto scaling by generating high http
network traffic using http-perf.
9. Minisat: Open source provisioning, managing and monitoring tool for virtual machines:
Objective: The web interface allows the user to interact with the underlying infrastructure to manage its
provisions. Technologies, which can be used to do so, are HTML, CSS, and Django. Application Server,
which is the master node, will be used to provision the requirements of a user by using libvirt API. It will
be able to monitor the status of VMs. Worker Node is the physical machines on which the VM will be
provisioned.
10. Develop a three-tier web application using Web 3.0 Technologies and deploy it on Google
compute service with auto scaling property:
Objective: Google compute services is a Public cloud provider consists of many services like storage,
database, compute and container services. It also consists of advanced services like AI, Image voice
recognition and other allied services. The high end three tier applications are with huge complex
structure like e-commerce sites, social media sites and other variety of application where quality of user
experience is most important. These type of applications can leverage the clouds on the fly based on the
resource demands. Your objective is to create a web application using latest web technologies. Deploy the
application by provisioning the EC2 instances of type micro. Perform auto scaling by generating high http
network traffic using http-perf.
12. Cloud Log Forensics: Foundations, State of the Art, and Future Directions:
DEPARTMENT OF COMPUTER ENGINEERING & APPLICATIONS, Institute of Engineering & Technology
Course Curriculum (w.e.f. Session 2021-22)
B. Tech. Computer Science & Engineering
Objective: Cloud log forensics (CLF) mitigates the investigation process by identifying the malicious
behavior of attackers through profound cloud log analysis. However, the accessibility attributes of cloud
logs obstruct accomplishment of the goal to investigate cloud logs for various susceptibilities.
Accessibility involves the issues of cloud log access, selection of proper cloud log file, cloud log data
integrity, and trustworthiness of cloud logs. Therefore, forensic investigators of cloud log files are
dependent on cloud service providers (CSPs) to get access of different cloud logs.
15. The Aneka Platform and Qos-driven Resource Provisioning for Elastic Applications on Hybrid
Cloud:
Objective: How Aneka, a platform for developing scalable applications on the Cloud, supports a vision of
QOS by provisioning resources from different sources and supporting different application models. We
highlight the key concepts and features of Aneka that support the integration between Desktop Grids and
Clouds and present an experiment showing the performance of this integration.
manager can rely on the rules and can make efficient decision for optimal provisioning of virtual machine
based on the aggregated route.
SYLLABUS
OF
PROGRAM ELECTIVE
BOUQUET: DEVELOPMENT TOOLS AND
TECHNOLOGIES
Under
Choice Based Credit System (CBCS)
Program Elective
TEACHING
CONTACTS
CREDITS
HR/WK
S. SCHEME
NO.
CODE SUBJECT PRE- REQUISITES
L T P J
PROJECTS
Full Stack Using Scripting
1. BCSE0291 0 0 0 - 2 -
Technologies Project
2. BCSE0292 Full Stack using Node JS Project 0 0 0 - 2 -
Objective: The objective is to provide a comprehensive study of the frontend. It stresses the strengths of
Web, which provide students with the means of writing efficient, maintainable, and portable code.
Credits: 03 L–T–P-J: 3–0–0-0
Module Teaching
No. Content Hours
Hyper Text Mark-up Language (HTML5): Introduction HTML, HTML Basics, HTML Elements,
HTML5 Semantic, HTML Attributes, HTML Headings, HTML Paragraph, HTML Styles, HTML
Formatting, HTML Quotations, HTML Computer Code, HTML Comments &Colours, HTML
CSS, Links and Images, HTML Lists, HTML Blocks, HTML Classes, HTML Layout, HTML
Responsive, HTML iframes, HTML JavaScript, HTML Head, HTML Entities and URI Code,
HTML Symbols and XHTML, HTML Charset and Forms
I Cascading Style Sheets (CSS3): Introduction CSS3, CSS3 Syntax, CSS3 How To, CSS3 Colours, 35
CSS3 Backgrounds, CSS3 Boarders, CSS Padding, CSS Height/Width, CSS3 Gradients, CSS3
Shadows, CSS3 Text, CSS3 Fonts, CSS3 2D Transforms, CSS3 3D Transforms, CSS Links, CSS
Lists, CSS Tables, CSS Box Model, CSS Outline, CSS Display, CSS Max-width, CSS Position, CSS
Float, CSS Inline-block, CSS Align, CSS Combinators, CSS Pseudo-class, CSS Pseudo-element,
CSS Navigation Bar, CSS Dropdowns, CSS Tooltips, CSS3 Images, CSS Attr Selectors, CSS
Forms, CSS Counters, CSS3 , CSS3 Button, CSS3 Pagination, CSS3 Multiple Columns, CSS3
User Interface, CSS3 Box Sizing, CSS3 Filters, CSS3 Media Queries, CSS3 Responsive
jQuery: Introduction to jQuery, jQuery Syntax, jQuery Selectors, jQuery Events, jQuery
Effects, jQuery HTML, jQuery Traversing, jQuery AJAX
Text Books:
HTML 5 Black Book (Covers CSS3, JavaScript, XML, XHTML, AJAX, PHP, jQuery) by DT Editorial
Services, 2016
Learning Web Development with Bootstrap and AngularJS by Stephen Radford,
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO3/PSO2
CO2 PO3/PSO2
CO3 PO5/PSO2
CO4 PO4/PSO1
CO5 PO5/PSO4
CO6 PO4/PSO3
Reference Books:
HTML 5 Black Book (Covers CSS3, JavaScript, XML, XHTML, AJAX, PHP, jQuery) by DT Editorial
Services, 2016
Learning Web Development with Bootstrap and AngularJS by Stephen Radford
Outcome: After studying the subject, the students will be able to:
CO1: Implement interactive web page(s) using HTML, CSS and JavaScript.
CO2: Design a responsive web site using HTML5 and CSS3.
CO3: Demonstrate Rich Web Applications.
CO4: Use newer HTML5 tags with associated CSS instructions to organize information and
content.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO3/PSO1
CO2 PO3/PSO2
CO3 PO1/PSO1
CO4 PO5/PSO4
Ecommerce Template.
E-Learning Template.
Uni. Template.
Photography shop Templates
Service provider Template.
I/II -
Event planner Template
Model Portfolio Template
Resume Based template
Property Site Template
Educational Site Template
Industry approved and relevant projects
Objective: The objective is to provide a comprehensive study of the Backend. It stresses the strengths of
Web (Full Stack), which provide students with the means of writing efficient, maintainable, and portable
Website.
Credits: 03 L–T–P:J: 3–0–0-0
Module Teaching
Content
No. Hours
MongoDB: Introduction to MongoDB, MongoDB Environment, MongoDB
Create Database, MongoDB Drop Database, MongoDB Create Collection,
MongoDB Drop Collection, MongoDB Read Operations, MongoDB Write
Operations, MongoDB Data Modelling, MongoDB Administration.
Angular JS: Introduction to AngularJS, AngularJS Expressions, AngularJS
I Modules, AngularJS Data Binding, AngularJS Scopes, AngularJS Directives & 20
Events, AngularJS Controllers, AngularJS Filters, AngularJS Services,
AngularJS HTTP, AngularJS Tables, AngularJS Select, Fetching Data from
MySQL, AngularJS Validation, AngularJS API.
Express Framework: Introduction to Express Framework, Introduction to
Nodejs, what is Nodejs, Getting Started with Express, Express Routing,
Express Framework: Implementing MVC in Express, Middleware, Using
Template Engines, Error Handling, API Handling, Debugging, Developing
Template Engines, Using Process Managers, Security & Deployment.
Node.js: Introduction to Node JS, Setup Dev Environment, Node Core, Node
II Modules, Creating Web server, File System, Debugging Node JS Application, 20
Automation and Deployment, Events & Database connectivity.
React.js: Welcome to Starting with React, React Components, React State
and Props, React Event Handling, Routing in React React flux, &. Styling
React
Text Books:
Node.js, MongoDB and Angular Web Development: The definitive guide to using the MEAN stack
to build web applications by Brad Dayley, Brendan Dayley, Caleb Dayley
Express.js: Guide Book on Web framework for Node.js by Rick L.
Introduction to React by Cory Gackenheimer,
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO1
CO2 PO3/PSO2
CO3 PO3/PSO3
CO4 PO2/PSO3
CO5 PO3/PSO2
CO6 PO2/PSO1
Reference Books:
Node.js, MongoDB and Angular Web Development: The definitive guide to using the MEAN stack
to build web applications by Brad Dayley, Brendan Dayley, Caleb Dayley
Express.js: Guide Book on Web framework for Node.js by Rick L.
Introduction to React by Cory Gackenheimer,
Outcome: After studying the subject, the students will be able to:
CO1: Implement web application using MongoDB and Angular.Js.
CO2: Develop web application using NodeJs.
CO3: Develop RESTful and MVC based web application.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO5/PSO2
CO2 PO3/PSO2
CO3 PO5/PSO4
Ecommerce Template.
E-Learning Template.
Uni. Template.
Photography shop Templates
Service provider Template.
I/II -
Event planner Template
Model Portfolio Template
Resume Based template
Property Site Template
Educational Site Template
Industry approved and relevant projects
Objective: The objective is to provide a comprehensive study of the Backend. It stresses the strengths of
Web (Full Stack), which provide students with the means of writing efficient, maintainable, and portable
Website.
Credits: 03 L–T–P-J: 3–0–0-0
Module Teaching
Content
No. Hours
.NET Framework & C#: Expressions & Primitive Types, Non-Primitive
Types, Control Flow, Arrays & Lists, Date & Time, Text, File System, Debug
Application, Classes, Association, between Classes, Inheritance - Second
Pillar of OOP, Polymorphism: Third Pillar of OOP, Interfaces, C# Advanced
Topics & ADO.net.
Collections and Generics: Introducing Collections, Benefits of Collection
Classes, Understanding and using commonly used collections, Generics,
Advantages of Generics, Generic Collections
I 20
ASP.NET Core: Introduction to ASP.NET Core, ASP.NET Core First Application,
- Controllers & Action Methods, Views, Helpers, Model Binding, - Validations &
Data Annotations, State management Techniques, Security, MVC and Entity
Framework Core, ASP.NET Core - Web Caching, Routing, Module Development
& Web API and JQuery Ajax, Creating a Layout Using Master Pages&, Data
bound Controls.
Text Books:
Learning Angular for .NET Developers by Rajesh Gunasundaram
ASP.NET Core Application Development - Building an Application in Four Sprints by James
Chambers, David Paquette, Simon Timms
Querying Microsoft SQL Server 2012 Exam 70-461 Training Kit by Gan B.I
Introduction to React by Cory Gackenheimer,
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO3
CO2 PO3/PSO4
CO3 PO5/PSO1
CO4 PO3/PSO4
CO5 PO3/PSO4
CO6 PO5/PSO4
Reference Books:
Learning Angular for .NET Developers by Rajesh Gunasundaram
ASP.NET Core Application Development - Building an Application in Four Sprints by James
Chambers, David Paquette, Simon Timms
Querying Microsoft SQL Server 2012 Exam 70-461 Training Kit by Gan B.I
Introduction to React by Cory Gackenheimer,
Outcome: After studying the subject, the students will be able to:
CO1: Implement the basic programming concepts of C#.
CO2: Develop web application using Asp.Net Core.
CO3: Develop web application using Angular.JS.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1/PSO3
CO2 PO3/PSO4
CO3 PO3/PSO4
Ecommerce Template.
E-Learning Template.
Uni. Template.
Photography shop Templates
Service provider Template.
I/II -
Event planner Template
Model Portfolio Template
Resume Based template
Property Site Template
Educational Site Template
Industry approved and relevant projects
Objective: The objective is to provide a comprehensive study of the Backend. It stresses the strengths of
Web, which provide students with the means of writing efficient, maintainable, and portable Website
Class and Object: Introduction, Object, Class, Defining Class in PHP, Object in
PHP, Usage of this variable, Constructor, Constructor with Parameters.
Exception Handling: Introduction to Exception, Exception Handling
mechanisms, Creating Custom Exceptions, Multiple Catch Blocks, Exception
Propagation, Error Handling in PHP.
Form Handling and Session Management in PHP: Accessing and displaying
Form data from different Form components, Differences among $_GET, $_POST
and $_REQUEST variables, Session management, Session operations, Session
II 20
tracking mechanism, Clearing/Modifying data from session, destroying a
session, Setting and Retrieving Cookies, uploading a file, displaying its details,
restricting various details of a file during upload, checking for errors and
reading Error code table.
Database Management: Introduction to DBMS, SQL Basics, Database
connectivity in PHP with MySQL, Executing Queries from frontend.
XML: Introduction to XML, Parsing XML document using DOM parser, Various
operations on XML document using PHP.
Text Books:
PHP Reference Beginner to Intermediate PHP 5 By Mario Lurig
PHP and MySQL by Mike McGrath,
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO2,PO7/PSO1
CO2 PO4,PO12/PSO1
CO3 PO1,PO3,PO8/PSO1
CO4 PO4,PO7,PO8/PSO3
CO5 PO2,PO3,PO7,PO9/PSO3
CO6 PO6,PO9,PO11,PO12/PSO3,PSO4
Reference Books:
PHP Reference Beginner to Intermediate PHP 5 By Mario Lurig
PHP and MySQL by Mike McGrath,
Outcome: After studying the subject, the students will be able to:
CO1: Implement the basic constructs using PHP.
CO2: Develop web application using PHP.
CO3: Develop RESTful and MVC based web applications.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO2,PO3,PO6/PSO1,PSO2
CO2 PO5,PO7,PO8/PSO3,PSO4
CO3 PO3,PO11,PO12/PSO4
Ecommerce Template.
E-Learning Template.
Uni. Template.
Photography shop Templates
Service provider Template.
I/II -
Event planner Template
Model Portfolio Template
Resume Based template
Property Site Template
Educational Site Template
Industry approved and relevant projects
Mobile Marketing
II Mobile landscapes for Marketing and Monetization, Conventional Advertising, 20
Millennial Mobile Advertising, Versatile Promotions, Alternative focusing and
promotions on Mobile, Push App and Game based promotions, Location evolution
with mobile
Marketing Analytics & ROI
Key marketing engagement & ROI metrics, Primer on data science and analytics
concepts, Web Traffic nuances, Multi-channel Analytics, Decoding CLV and RFM,
Deciphering conversion and goal metrics, implement conjoint analysis & decision
tree tactics, Avoiding common analytical pitfalls.
Text Book:
Puneet Singh Bhatia, Fundamentals of Digital Marketing First Edition, Publication Pearson.
Reference Books:
Ian Dodson, The Art of Digital Marketing: The Definitive Guide to Creating Strategic, Targeted
and Measurable Online Campaigns, Publication Wiley India Pvt Ltd.
Philip Kotler, Hermawan Kartajaya, Iwan Setiawan, Marketing 4.0: Moving from Traditional to
Digital, , Publication Wiley India Pvt Ltd.
Outcome: After learning the course the students should be able to:
CO1: Understanding the basics of digital marketing.
CO2: Explain the measurement techniques used in evaluating digital marketing efforts.
CO3: Understand the use of digital marketing for multiple goals within a larger marketing and
media strategy.
CO4: Understand the major digital marketing channels - online advertising: Digital display, video,
mobile, search engine, and social media.
CO5: Explore the latest digital ad technologies.
CO6: Learn to develop, evaluate, and execute a comprehensive digital marketing strategy and
plan.
Mapping of Course Outcomes (COs) with Program Outcomes (POs) and Program Specific Outcomes (PSOs):
COs POs/PSOs
CO1 PO1,PO4,PO7,PO8/PSO1
CO2 PO1,PO4,PO7,PO8/PSO1
CO3 PO1,PO7,PO8/PSO1
CO4 PO1,PO7,PO8/PSO1
CO5 PO1,PO7,PO8/PSO3
CO6 PO1,PO4,PO7,PO8/PSO4