Acm - M.E - Cse - Uit r2024 A
Acm - M.E - Cse - Uit r2024 A
REGULATIONS 2024
I. Develop proficiency as a computer science engineer with an ability to solve a wide range of
computational problems and have sustainable development in industry or any other work
environment.
II. Analyze and adapt quickly to new environments and technologies, gather new
Information and work on emerging technologies to solve multidisciplinary engineering problems.
III. Possess the ability to think analytically and logically to understand technical problems
with computational systems for a lifelong learning which leads to pursuing research.
Adopt ethical practices to collaborate with team members and team leaders to build technology
IV.
with cutting-edge technical solutions for computing systems
Strongly focus on design thinking and critical analysis to create innovative products and become
V.
entrepreneurs.
1. An ability to independently carry out research / investigation and development work to solve practical
problems.
2. An ability to write and present a substantial technical report/document.
3. Students should be able to demonstrate a degree of mastery over the area of Computer
Science and Engineering.
4. Efficiently design, build and develop system application software for distributed and centralized
computing environments in varying domains and platforms.
5. Understand the working of current Industry trends, the new hardware architectures, the
software components and design solutions for real world problems by Communicating and effectively
working with professionals in various engineering fields and pursue research orientation for a lifelong
professional development in computer and automation arenas.
6. Model a computer-based automation system and design algorithms that explore the
understanding of the tradeoffs involved in digital transformation.
PEO/PO Mapping:
POs
PEO
PO1 PO2 PO3 PO4 PO5 PO6
I. 1 2 3 4 5 6
II. 3 2 3 3 3 3
III. 3 3 3 3 2 3
IV. 3 3 2 3 3 2
V. 1 2 3 2 2 2
24CSPPC108
Advanced Data Structures and 1.00 1.50 1.75 1.40 2.00 1.00
Algorithms Laboratory
I
I
SEMESTER III
SEMESTER IV
PERIODS TOTAL
S. COURSE CATE- PER WEEK
COURSE TITLE CONTACT CREDITS
NO. CODE GORY
PERIODS
L T P
PRACTICALS
1. 24CSPEE401 Project Work II EEC 0 0 24 24 12
TOTAL 0 0 24 24 12
PROFESSIONAL ELECTIVES
SEMESTER II, ELECTIVE I
PERIODS PER TOTAL
S. COURSE CATEG CONTACT
COURSE TITLE WEEK CREDIT
NO. CODE ORY PERIODS S
L T P
5
SEMESTER II, ELECTIVE II
PERIODS PER TOTAL
S. COURSE CODE CATE- WEEK
COURSE TITLE CONTACT CREDITS
NO. GORY PERIODS
L T P
High Performance Computing
1. 24CSPPE209 PEC 3 0 0 3 3
for Big Data
6
7 24CSPPE315 Bioinformatics PEC 3 0 2 5 4
.
8 24CSPPE316 Cyber Physical Systems PEC 3 0 2 5 4
.
9 24CSPPE317 Mixed Reality PEC 3 0 2 5 4
.
AUDIT COURSES
(AC)
PERIODS PER
SL. COURSE
COURSE TITLE WEEK
NO. CODE CREDITS
L T P
1. 24CSPACX01 English for Research Paper Writing 2 0 0 0
2. 24CSPACX02 Disaster Management 2 0 0 0
3. 24CSPACX03 Constitution of India 2 0 0 0
4. 24CSPACX04 நற் றமிழ் இலக்கியம் 2 0 0 0
PERIODS PER
SL. COURSE
COURSE TITLE WEEK
NO. CODE CREDITS
L T P
1 24CSPOE301 Sustainable Management 3 0 0 3
2 24CSPOE302 Embedded Automation 3 0 0 3
3 24CSPOE303 Ethical Management 3 0 0 3
4 24CSPOE304 Industrial Safety 3 0 0 3
5 24CSPOE305 Ethical Hacking 3 0 0 3
11
PROFESSIONAL CORE COURSES (PCC)
12
SUMMARY
13
24MAPFC102 APPLIED PROBABILITY AND STATISTICS FOR COMPUTER
SCIENCE ENGINEERS
L T P C
3 1 0 4
COURSE OBJECTIVES:
14
CO5:develop critical thinking based on empirical evidence and the scientific approach
to knowledge development.
REFERENCES:
1. Dallas E Johnson, “Applied multivariate methods for data Analysis”, Thomson and Duxbury
press, Singapore, 1998.
2. Richard A. Johnson and Dean W. Wichern, “Applied multivariate statistical Analysis”,
Pearson Education, Fifth Edition, 6th Edition, New Delhi, 2013.
3. Bronson, R.,”Matrix Operation” Schaum’s outline series, Tata McGraw Hill,
New York, 2011.
4. Oliver C. Ibe, “Fundamentals of Applied probability and Random Processes”, Academic
Press, Boston, 2014.
5. Johnson R. A. and Gupta C.B., “Miller and Freund’s Probability and Statistics for
Engineers”, Pearson India Education, Asia, 9th Edition, New Delhi, 2017.
CO – PO Mapping
CO POs
1 1 2 3 - - 1
2 3 - 2 2 - 3
3 - - 1 - 3 2
4 2 1 3 2 2 2
5 2 2 1 - 1 2
Avg 2 1.67 2 2 2 2
15
UNIT I RESEARCH DESIGN 6
Overview of research process and design, Use of Secondary and exploratory data to answer the
research question, Qualitative research, Observation studies, Experiments and Surveys.
UNIT V PATENTS 6
Patents – objectives and benefits of patent, Concept, features of patent, Inventive step,
Specification, Types of patent application, process E-filing, Examination of patent, Grant of patent,
Revocation, Equitable Assignments, Licenses, Licensing of related patents, patent agents,
Registration of patent agents.
COURSE OUTCOMES:
At the end of the course, students will be able to
CO1: to design a comprehensive research plan using appropriate methodologies
CO2: to construct and evaluate data collection instruments, apply appropriate sampling methods
CO3: to perform multivariate analysis, test hypotheses, measure associations, and effectively
present their insights and findings through written reports and oral presentations
CO4: to analyze the evolution, development, and impact of intellectual property rights (IPR)
CO5: to evaluate the objectives, benefits, and features of patents, understand the patent
application process. TOTAL : 30 PERIODS
REFERENCES
16
CO-PO Mapping
CO POs
1 3 2 2 3 2 3
2 3 - - - 1 3
3 3 - - 1 1 2
4 3 - - - 1 1
5 3 - - 1 1 1
17
UNIT IV ALGORITHM DESIGN TECHNIQUES 9
Dynamic Programming: Matrix-Chain Multiplication – Elements of Dynamic Programming – Longest
Common Subsequence- Greedy Algorithms: – Elements of the Greedy Strategy- An Activity-Selection
Problem - Huffman Coding.
SUGGESTED ACTIVITIES:
1. Write an algorithm for Towers of Hanoi problem using recursion and analyze the
complexity (No of disc-4)
2. Write any one real time application of hierarchical data structure
3. Write a program to implement Make_Set, Find_Set and Union functions for Disjoint Set Data
Structure for a given undirected graph G(V,E) using the linked list representation with simple
implementation of Union operation
4. Find the minimum cost to reach last cell of the matrix from its first cell
5. Discuss about any NP completeness problem
COURSE OUTCOMES:
CO1: Design data structures and algorithms to solve computing problems.
CO2: Choose and implement efficient data structures and apply them to solve problems. CO3:
Design algorithms using graph structure and various string-matching algorithms to solve real-
life problems.
CO4: Design one’s own algorithm for an unknown problem.
CO5: Apply suitable design strategy for problem solving.
REFERENCES
1. S.Sridhar,” Design and Analysis of Algorithms”, Oxford University Press, 1st Edition,
2014.
2. Adam Drozdex, “Data Structures and algorithms in C++”, Cengage Learning, 4th
Edition, 2013.
3. T.H. Cormen, C.E.Leiserson, R.L. Rivest and C.Stein, "Introduction to Algorithms",
Prentice Hall of India, 3rd Edition, 2012.
4. Mark Allen Weiss, “Data Structures and Algorithms in C++”, Pearson Education,
3rd Edition, 2009.
5. E. Horowitz, S. Sahni and S. Rajasekaran, “Fundamentals of Computer Algorithms”,
University Press, 2nd Edition, 2008.
6. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”,
Pearson Education, Reprint 2006.
18
CO-PO Mapping
CO POs
2 3 1 - - 2 3
3 3 - 1 1 - 2
4 3 2 1 - 2 1
5 3 3 1 1 - 1
Suggested Activities:
Data Definition Language
• Create, Alter and Drop
• Enforce Primary Key, Foreign Key, Check, Unique and Not Null Constraints
• Creating Views
Data Manipulation Language
• Insert, Delete, Update
• Cartesian Product, Equi Join, Left Outer Join, Right Outer Join and Full Outer Join
• Aggregate Functions
• Set Operations
• Nested Queries
Transaction Control Language
• Commit, Rollback and Save Points
Suggested Activities:
• Distributed Database Design and Implementation
• Row Level and Statement Level Triggers
• Accessing a Relational Database using PHP, Python and R
Suggested Activities:
• Creating XML Documents, Document Type Definition and XML Schema
• Using a Relational Database to store the XML documents as text
• Using a Relational Database to store the XML documents as data elements
• Creating or publishing customized XML documents from pre-existing relational databases
• Extracting XML Documents from Relational Databases
• XML Querying
Suggested Activities:
• Creating Databases using MongoDB, DynamoDB, Voldemort Key-Value Distributed Data
Store Hbase and Neo4j.
• Writing simple queries to access databases created using MongoDB, DynamoDB,
Voldemort Key-Value Distributed Data Store Hbase and Neo4j.
UNIT V DATABASE SECURITY 15
Database Security Issues – Discretionary Access Control Based on Granting and Revoking
Privileges – Mandatory Access Control and Role-Based Access Control for Multilevel Security –
SQL Injection – Statistical Database Security – Flow Control – Encryption and Public Key
Infrastructures – Preserving Data Privacy – Challenges to Maintaining Database Security –
Database Survivability – Oracle Label-Based Security.
Suggested Activities:
• Implementing Access Control in Relational Databases
TOTAL : 75 PERIODS
COURSE OUTCOMES
At the end of the course, the students will be able to
CO1:Convert the ER-model to relational tables, populate relational databases and formulate SQL
queries on data.
CO2:Understand and write well-formed XML documents
CO3:Be able to apply methods and techniques for distributed query processing.
CO4:Design and Implement secure database systems.
CO5:Use the data control, definition, and manipulation languages of the NoSQL databases
20
REFERENCES:
1. R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Seventh Edition, Pearson
Education 2016.
2. Henry F. Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”,
Seventh Edition, McGraw Hill, 2019.
3. C.J.Date, A.Kannan, S.Swamynathan, “An Introduction to Database Systems, Eighth
Edition, Pearson Education, 2006
4. Raghu Ramakrishnan , Johannes Gehrke “Database Management Systems”, Fourth
Edition, McGraw Hill Education, 2015.
5. Harrison, Guy, “Next Generation Databases, NoSQL and Big Data” , First Edition, Apress
publishers, 2015
6. Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical Approach to Design,
Implementation and Management”, Sixth Edition, Pearson Education, 2015
CO-PO Mapping
CO POs
2 2 2 - 2 1 1
3 3 1 2 1 - 1
4 3 2 2 1 1 1
5 2 3 1 1 - 1
21
24CSPPC105 NETWORK TECHNOLOGIES L T P C
3 0 0 3
COURSE OBJECTIVES:
• To understand the basic concepts of networks
• To explore various technologies in the wireless domain
• To study about 4G and 5G cellular networks
• To learn about Network Function Virtualization
• To understand the paradigm of Software defined networks
22
SUGGESTED ACTIVITIES:
1. Execute various network utilities such as tracert, pathping, ipconfig
2. Implement the Software Defined Networking using Mininet
3. Implement routing in Mininet
4. Install a virtual machine and study network virtualization
5. Simulate various network topologies in Network Simulator
REFERENCES
1. James Bernstein, “Networking made Easy”, 2018. ( UNIT I )
2. HoudaLabiod, Costantino de Santis, HossamAfifi “Wi-Fi, Bluetooth, Zigbee and WiMax”,
Springer 2007 ( UNIT 2 )
3. Erik Dahlman, Stefan Parkvall, Johan Skold, 4G: LTE/LTE-Advanced for Mobile
Broadband, Academic Press, 2013 ( UNIT 3)
4. Saad Z. Asif “5G Mobile Communications Concepts and Technologies” CRC press –
2019 (UNIT 3)
5. William Stallings “Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud”
1st Edition, Pearson Education, 2016.( Unit 4 and 5 )
6. Thomas D.Nadeau and Ken Gray, SDN – Software Defined Networks, O‟Reilly
Publishers, 2013.
7. Guy Pujolle, “Software Networks”, Second Edition, Wiley-ISTE, 2020
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
1 1 3 2 - 1 -
2 1 3 3 3 - 1
3 1 3 3 2 2 2
4 1 2 2 1 2 1
5 1 3 1 1 1 2
Data science process – roles, stages in data science project – working with data from files – working
with relational databases – exploring data – managing data – cleaning and sampling for modeling
and validation – introduction to NoSQL.
Choosing and evaluating models – mapping problems to machine learning, evaluating clustering
models, validating models – cluster analysis – K-means algorithm, Naïve Bayes – Memorization
Methods – Linear and logistic regression – unsupervised methods.
Reading and getting data into R – ordered and unordered factors – arrays and matrices – lists and
data frames – reading data from files – probability distributions – statistical models in R manipulating
objects – data distribution.
Introduction – distributed file system – algorithms using map reduce, Matrix-Vector Multiplication by
Map Reduce – Hadoop - Understanding the Map Reduce architecture - Writing Hadoop MapReduce
Programs - Loading data into HDFS - Executing the Map phase - Shuffling and sorting - Reducing
phase execution.
COURSE OUTCOMES:
REFERENCES
1. Nina Zumel, John Mount, “Practical Data Science with R”, Manning Publications, 2014.
2. Mark Gardener, “Beginning R - The Statistical Programming Language”, John Wiley &
Sons, Inc., 2012.
24
3. W. N. Venables, D. M. Smith and the R Core Team, “An Introduction to R”, 2013.
4. Tony Ojeda, Sean Patrick Murphy, Benjamin Bengfort, Abhijit Dasgupta, “Practical Data
Science Cookbook”, Packt Publishing Ltd., 2014.
5. Nathan Yau, “Visualize This: The FlowingData Guide to Design, Visualization, and
Statistics”, Wiley, 2011.
6. Boris Lublinsky, Kevin T. Smith, Alexey Yakubovich, “Professional Hadoop Solutions”,John
Wiley & Sons Inc., 2013.
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
2 2 - 2 1 2
1
2 2 - 1 - -
2
2 2 - 2 3 2
3
2 2 1 2 3 2
4
2 2 1 2 - 2
5
2 2 1 1.8 2.3 2
Avg
In this course, students will develop their scientific and technical reading and writing skills that they need to
understand and construct research articles. A term paper requires a student to obtain information from a
variety of sources (i.e., Journals, dictionaries, reference books) and then place it in logically developed ideas.
The work involves the following steps:
Please keep a file where the work carried out by you is maintained. Activities
to be carried out
25
Activity Instructions Submission Evaluation
week
Selection of area of You are requested to select an area of 2nd week 3%
interest and Topic interest, topic and state an objective Based on clarity of
Stating an thought, current
Objective relevance and clarity in
writing
Collecting 1. List 1 Special Interest Groups or 3rd week 3%
Information about professional society ( the selected
your area & topic 2. List 2 journals information must be
3. List 2 conferences, symposia or area specific and of
workshops international and
4. List 1 thesis title national standard)
5. List 3 web presences (mailing
lists, forums, news sites)
6. List 3 authors who publish
regularly in your area
7. Attach a call for papers (CFP)
from your area.
Collection of You have to provide a complete 4th week 6%
Journal papers in list of references you will be using- Based ( the list of standard
the topic in the on your objective -Search various digital papers and reason for
context of the libraries and Google Scholar selection)
objective – collect When picking papers to read - try
20 & then filter to:
Pick papers that are related to
each other in some ways and/or that are
in the same field so that you can write a
meaningful survey out of them,
Favour papers from well-known
journals and conferences,
Favour “first” or “foundational”
papers in the field (as indicated in other
people’s survey paper),
Favour more recent papers,
Pick a recent survey of the field
so you can quickly gain an overview,
Find relationships with respect to
each other and to your topic area
(classification scheme/categorization)
Mark in the hard copy of papers
whether complete work or
section/sections of the paper are being
considered
Reading and notes Reading Paper Process 5th week 8%
for first 5 papers For each paper form a Table ( the table given should
answering the following questions: indicate your
What is the main topic of the understanding of the
article? paper and the evaluation
What was/were the main issue(s) is based on your
the author said they want to discuss? conclusions about each
Why did the author claim it was paper)
important?
How does the work build on
other’s work, in the author’s opinion?
What simplifying assumptions
does the author claim to be making?
What did the author do?
How did the author claim they
were going to evaluate their work and
compare it to others?
What did the author say were the
limitations of their research?
What did the author say were the
important directions for future research?
Conclude with limitations/issues not
addressed by the paper ( from the
perspective of your survey)
Reading and notes Repeat Reading Paper Process 6th week 8%
for next5 papers ( the table given should
indicate your
understanding of the
paper and the
evaluation is based on
your conclusions about
each paper)
Reading and notes Repeat Reading Paper Process 7th week 8%
for final 5 papers ( the table given should
indicate your
understanding of the
paper and the
evaluation is based on
your conclusions about
each paper)
Draft outline 1 and Prepare a draft Outline, your survey 8th week 8%
Linking papers goals, along with a classification / ( this component will be
categorization diagram evaluated based on the
linking and classification
among the papers)
Abstract Prepare a draft abstract and give a 9th week 6%
presentation (Clarity, purpose and
conclusion)
6% Presentation & Viva
Voce
Introduction Write an introduction and background 10th week 5%( clarity)
Background sections
Sections of the Write the sections of your paper based 11thweek 10%
paper on the classification / categorization (this component will be
diagram in keeping with the goals of evaluated based on the
your survey linking and classification
among the papers)
Your conclusions Write your conclusions and future work 12th week 5% ( conclusions –
clarity and your ideas)
Final Draft Complete the final draft of your paper 13th week 10% (formatting,
English, Clarity and
linking)
4% Plagiarism Check
Report
Seminar A brief 15 slides on your paper 14th & 15th 10%
week (based on presentation
and Viva-voce)
TOTAL: 30 PERIODS
LIST OF EXPERIMENTS:
1: Implementation of recursive function for tree traversal and Fibonacci
2: Implementation of iteration function for tree traversal and Fibonacci
3: Implementation of Merge Sort and Quick Sort
4: Implementation of a Binary Search Tree
5: Red-Black Tree Implementation
6: Heap Implementation
7: Fibonacci Heap Implementation
8: Graph Traversals
9: Spanning Tree Implementation
10: Shortest Path Algorithms (Dijkstra's algorithm, Bellman Ford Algorithm)
11: Implementation of Matrix Chain Multiplication
12: Activity Selection and Huffman Coding Implementation
HARDWARE/SOFTWARE REQUIREMENTS
1. 64-bit Open source Linux or its derivative
2. Open Source C++ Programming tool like G++/GCC TOTAL PERIODS: 60
COURSE OUTCOMES:
CO1: Design and implement basic and advanced data structures extensively
CO2: Design algorithms using graph structures
CO3: Design and develop efficient algorithms with minimum complexity using design
techniques
CO4: Develop programs using various algorithms.
CO5: Choose appropriate data structures and algorithms, understand the ADT/libraries,
and use it to design algorithms for a specific problem.
REFERENCES:
1. Lipschutz Seymour, “Data Structures Schaum's Outlines Series”, Tata McGraw Hill, 3rd
Edition, 2014.
2. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and Algorithms”,
Pearson Education, Reprint 2006.
3. http://www.coursera.org/specializations/data-structures-algorithms
4. http://www.tutorialspoint.com/data_structures_algorithms
5. http://www.geeksforgeeks.org/data-structures/
CO-PO Mapping
CO POs
1 1 1 - 1 1 -
2 1 - 1 2 2 1
3 1 1 1 1 2 1
4 1 2 2 2 2 1
5 1 2 3 1 3 1
29
UNIT I INTRODUCTION 9+6
Internet of Things- Domain Specific IoTs - IoT and M2M-Sensors for IoT Applications–Structure of
IoT– IoT Map Device- IoT System Management with NETCONF-YANG
SUGGESTED ACTIVITIES:
1. Develop an application for LED Blink and Pattern using Arduino or Raspberry Pi
2. Develop an application for LED Pattern with Push Button Control using Arduino
or Raspberry Pi
3. Develop an application for LM35 Temperature Sensor to display temperature values using
arduino or Raspberry Pi
4. Develop an application for Forest fire detection end node using Raspberry Pi device and
sensor
5. Develop an application for home intrusion detection web application
6. Develop an application for Smart parking application using python and Django for web
application
COURSE OUTCOMES:
CO1: Understand the various concept of the IoT and their technologies
CO2: Develop the IoT application using different hardware platforms
CO3: Implement the various IoT Protocols
CO4: Understand the basic principles of cloud computing
CO5: Develop and deploy the IoT application into cloud environment TOTAL: 75 PERIODS
REFERENCES:
1 1 1 2 1 1 3
2 3 2 1 2 3 2
3 1 1 2 1 3 3
4 2 3 2 1 2 2
5 1 2 1 2 1 1
PRACTICALS:
1. Write a simple Program to demonstrate an OpenMP Fork-Join Parallelism.
2. Create a program that computes a simple matrix-vector multiplication b=Ax, either in
C/C++. Use OpenMP directives to make it run in parallel.
3. Create a program that computes the sum of all the elements in an array A (C/C++) or a
program that finds the largest number in an array A. Use OpenMP directives to make it run in
parallel.
4. Write a simple Program demonstrating Message-Passing logic using OpenMP.
5. Implement the All-Pairs Shortest-Path Problem (Floyd's Algorithm) Using OpenMP.
6. Implement a program Parallel Random Number Generators using Monte Carlo Methods in
OpenMP.
7. Write a Program to demonstrate MPI-broadcast-and-collective-communication in C.
8. Write a Program to demonstrate MPI-scatter-gather-and-all gather in C.
9. Write a Program to demonstrate MPI-send-and-receive in C.
10. Write a Program to demonstrate by performing-parallel-rank-with-MPI in C.
TOTAL: 30 PERIODS
TOTAL:45+30=75 PERIODS
COURSE OUTCOMES:
At the end of the course, the students should be able to:
CO1: Describe multicore architectures and identify their characteristics and challenges.
CO2: Identify the issues in programming Parallel Processors.
CO3: Write programs using OpenMP and MPI.
CO4: Design parallel programming solutions to common problems.
CO5: Compare and contrast programming for serial processors and programming for parallel
processors.
REFERENCES:
1. Peter S. Pacheco, “An Introduction to Parallel Programming, Morgan-Kauffman/Elsevier,
2021.
2. Darryl Gove, “Multicore Application Programming for Windows, Linux, and Oracle Solaris,
Pearson, 2011 (unit 2)
3. Michael J Quinn, “Parallel programming in C with MPI and OpenMP, Tata McGraw
Hill,2003.
4. Victor Alessandrini, Shared Memory Application Programming, 1st Edition, Concepts and
Strategies in Multicore Application Programming, Morgan Kaufmann, 2015.
5. Yan Solihin, Fundamentals of Parallel Multicore Architecture, CRC Press, 2015.
32
CO-PO Mapping
CO POs
1 1 1 1 2 1 2
2 2 1 _ _ 2 2
3 1 _ 2 1 1 2
4 2 1 1 1 2 2
5 3 1 2 1 3 3
33
Introduction -Naïve Bayes Algorithm -Maximum Likelihood -Maximum Apriori -Bayesian Belief
Networks -Probabilistic Modelling of Problems -Inference in Bayesian Belief Networks – Probability
Density Estimation - Sequence Models – Markov Models – Hidden Markov Models
45 PERIODS
SUGGESTED ACTIVITIES:
1. Give an example from our daily life for each type of machine learning problem .
2. Study at least 3 Tools available for Machine Learning and discuss pros & cons of each
3. 3. Take an example of a classification problem. Draw different decision trees for the
example and explain the pros and cons of each decision variable at each level of the tree
4. Outline 10 machine learning applications in healthcare
5. Give 5 examples where sequential models are suitable.
6. Give at least 5 recent applications of CNN
PRACTICAL EXERCISES: 30 PERIODS
1. Implement a Linear Regression with a Real Dataset
(https://www.kaggle.com/harrywang/housing). Experiment with different features in building a
model. Tune the model's hyperparameters.
2. Implement a binary classification model. That is, answers a binary question such as "Are
houses in this neighborhood above a certain price?"(use data from exercise 1). Modify the
classification threshold and determine how that modification influences the model. Experiment
with different classification metrics to determine your model's effectiveness.
3. Classification with Nearest Neighbors. In this question, you will use the scikit-learn’s KNN
classifier to classify real vs. fake news headlines. The aim of this question is for you to read
the scikit-learn API and get comfortable with training/validation splits. Use California Housing
Dataset
4. In this exercise, you'll experiment with validation sets and test sets using the dataset. Split
a training set into a smaller training set and a validation set. Analyze deltas between training
set and validation set results. Test the trained model with a test set to determine whether your
trained model is overfitting. Detect and fix a common training problem.
5. Implement the k-means algorithm using https://archive.ics.uci.edu/ml/datasets/Codon+usage
dataset
6. Implement the Naïve Bayes Classifier using
https://archive.ics.uci.edu/ml/datasets/Gait+Classification dataset
7. Project - (in Pairs) Your project must implement one or more machine learning algorithms and
apply them to some data.
34
d. You must properly provide references to any work that is not your own in the write-up.
e. Project proposal You must turn in a brief project proposal. Your project proposal
should describe the idea behind your project. You should also briefly describe software
you will need to write, and papers (2-3) you plan to read.
COURSE OUTCOMES:
Upon the completion of course, students will be able to
CO1: Understand and outline problems for each type of machine learning
CO2: Design a Decision tree and Random forest for an application
CO3: Implement Probabilistic Discriminative and Generative algorithms for an application and
analyze the results.
CO4: Use a tool to implement typical Clustering algorithms for different types of applications.
CO5: Design and implement an HMM for a Sequence Model type of application and identify
applications suitable for different types of Machine Learning with suitable justification.
TOTAL:75 PERIODS
REFERENCES
1. Stephen Marsland, “Machine Learning: An Algorithmic Perspective”, Chapman & Hall/CRC,
2nd Edition, 2014.
2. Kevin Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012
3. Ethem Alpaydin, “Introduction to Machine Learning”, Third Edition, Adaptive Computation and
Machine Learning Series, MIT Press, 2014
4. Tom M Mitchell, “Machine Learning”, McGraw Hill Education, 2013.
5. Peter Flach, “Machine Learning: The Art and Science of Algorithms that Make Sense of Data”,
First Edition, Cambridge University Press, 2012.
6. Shai Shalev-Shwartz and Shai Ben-David, “Understanding Machine Learning: From Theory to
Algorithms”, Cambridge University Press, 2015
7. Christopher Bishop, “Pattern Recognition and Machine Learning”, Springer, 2007.
8. Hal Daumé III, “A Course in Machine Learning”, 2017 (freely available online)
9. Trevor Hastie, Robert Tibshirani, Jerome Friedman, “The Elements of Statistical Learning”,
Springer, 2009 (freely available online)
10. Aurélien Géron , Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts,
Tools, and Techniques to Build Intelligent Systems 2nd Edition, o'reilly, (2017)
35
CO-PO Mapping
CO POs
1 1 2 1 3 1 1
2 2 3 1 2 1 2
3 1 1 2 1 - 2
4 2 2 - - - 3
5 3 3 1 1 1 3
Avg 1.80 2.20 1.25 1.75 1.00 2.20
36
UNIT III SYSTEM DEPENDABILITY AND SECURITY 9
Dependable Systems – Dependability Properties – Sociotechnical Systems – Redundancy and
Diversity – Dependable Processes – Formal Methods and Dependability – Reliability Engineering –
Availability and Reliability – Reliability Requirements – Fault-tolerant Architectures – Programming for
Reliability – Reliability Measurement – Safety Engineering – Safety-critical Systems – Safety
Requirements – Safety Engineering Processes – Safety Cases – Security Engineering – Security and
Dependability – Safety and Organizations – Security Requirements – Secure System Design –
Security Testing and Assurance – Resilience Engineering – Cybersecurity – Sociotechnical Resilience
– Resilient Systems Design.
SUGGESTED ACTIVITIES
1. Comparatively analysing different Agile methodologies2. Describing the scenarios where
‘Scrum’ and ‘Kanban’ are used.
3. Mapping the data flow into suitable software architecture.
4. Developing behavioural representations for a class or component.
5. Implementing simple applications as RESTful service.
COURSE OUTCOMES:
The Students will be able to
CO1:Identify appropriate process models based on the Project requirements
CO2:Understand the importance of having a good Software Architecture
REFERENCES:
1. Software Engineering: A Practitioner's Approach, 9th Edition. Roger Pressman and Bruce
Maxim, McGraw-Hill 2019.
2. Software Engineering, 10th Edition, Ian Somerville, Pearson Education Asia 2016.
3. Software Architecture In Practice, 3rd Edition, Len Bass, Paul Clements and Rick Kazman,
Pearson India 2018
4. An integrated approach to Software Engineering, 3rd Edition, Pankaj Jalote, Narosa
Publishing House, 2018
5. Fundamentals of Software Engineering, 5th Edition, Rajib Mall, PHI Learning Private Ltd,
37
2018
CO POs
1 3 3 3 3 3 3
2 3 3 3 3 2 2
3 3 1 2 2 1 2
3
4 3 3 1 2 - -
5 3
3 1 2 - 3
Avg 3 2.67 2.00 2.5 2 2.34
77
GUIDELINES
Students have to work individually under the supervision of a faculty member, with standard
programming languages, computational tools and software packages for analyzing, designing and
implementing a solution. A detailed report on the work done shall be submitted by individual
student in the form of a report and presentation.
TOTAL:30 PERIODS
OUTCOMES
At the end of the course the students will have a clear idea of his/her area of work,
methodology for solution implementation and finally prepare the complete report.
38
Mapping of Cos-Pos & PSOs
1 3 3 2 2 1 1
LAB OBJECTIVE:
The Software Engineering Lab has been developed by keeping in mind the following objectives:
• To impart state-of-the-art knowledge on Software Engineering and UML in an
interactive manner through the Web.
• Present case studies to demonstrate practical applications of different concepts.
• Provide a scope to students where they can solve small, real-life problems.
LIST OF EXPERIMENTS:
1. Write a Problem Statement to define a title of the project with bounded scope of project
2. Select relevant process model to define activities and related task set for assigned project
3. Prepare broad SRS (Software Requirement Specification) for the above selected projects
4. Prepare USE Cases and Draw Use Case Diagram using modelling Tool
5. Develop the activity diagram to represent flow from one activity to another for
software development
6. Develop data Designs using DFD Decision Table & ER Diagram.
7. Draw class diagram, sequence diagram, Collaboration Diagram, State Transition
Diagram for the assigned project
8. Write Test Cases to Validate requirements of assigned project from SRS Document
9. Evaluate Size of the project using function point metric for the assigned project
10. Estimate cost of the project using COCOMO and COCOCMOII for the assigned project
11. Use CPM/PERT for scheduling the assigned project
12. Use timeline Charts or Gantt Charts to track progress of the assigned project
TOTAL:30
PERIODS
LAB OUTCOME:
CO1: Can produce the requirements and use cases the client wants for the software being
Produced.CO2: Participate in drawing up the project plan. The plan will include at least extent and
work assessments of the project, the schedule, available resources, and risk management can
model and specify the requirements of mid-range software and their architecture.
CO3: create and specify such a software design based on the requirement specification that the
software can be implemented based on the design.
CO4: Can assess the extent and costs of a project with the help of several different assessment
methods.
39
CO-PO Mapping
CO POs
1 3 3 3 3 3 3
2 2 3 3 3 2 2
3 3 1 2 2 1 2
4 2 3 1 2 - -
40
Cloud infrastructure management – Establishing trust in IaaS, PaaS, and SaaS Cloud types. Case
study: DVWA
CO-PO Mapping
CO POs
1 1 2 1 1 2 1
2 2 1 3 1 1 2
3 - - 2 3 3 3
4 2 2 1 2 1 3
5 1 - 1 1 2 3
41
24CSPEE301 PROJECT WORK (PHASE–I) LT PC
0 0 12 6
OBJECTIVES
• To identify a specific problem for the current need of the society and collecting information
related to the same through detailed review of literature.
• To train the students in preparing project reports and to face reviews and viva– voce
examination.
GUIDELINES
The student individually works on a specific topic approved by faculty member who is
familiar in this area of interest. The student can select any topic which is relevant to his/her
specialization of the programme. The topic may be experimental or analytical or case studies. At
the end of the semester, a detailed report on the work done should be submitted which contains
clear definition of the identified problem, detailed literature review related to the area of work and
methodology for carrying out the work. The students will be evaluated through a viva–voce
examination by a panel of examiners including one external examiner.
At the end of the course project the students will have a clear idea of his/her area of work and
they are in a position to carry out the remaining phase II work in a systematic way.
24CSPEE401 PROJECT WORK (PHASE – II) LT P C
0 0 24 12
OBJECTIVES
To solve the identified problem based on the formulated methodology.
To develop skills to analyze and discuss the test results, and make conclusions.
To train the students in preparing project reports and to face reviews and viva– voce
examination.
GUIDELINES
The student should continue the phase–I work on the selected topic as per the
formulated methodology. At the end of the semester, after completing the work to the satisfaction
of the supervisor and review committee, a detailed report should be prepared and submitted to the
head of the department. The students will be evaluated through based on the report and the viva-
voce examination by a panel of examiners including one external examiner.
OUTCOMES
On completion of the project work students will be in a position to take up any challenging
practical problem and find better solutions.
24CSPPE201 HUMAN COMPUTER INTERACTION L T P C
3 0 0 3
COURSE OBJECTIVES:
• To learn the foundations of Human Computer Interaction
• Understanding Interaction Styles and to become familiar with the design technologies for
individuals and persons with disabilities.
• To understand the process of Evaluation of Interaction Design.
• To clarify the significance of task analysis for ubiquitous computing
• To get insight on web and mobile interaction.
COURSE OUTCOMES:
CO1: Understand the basics of human computer interactions via usability engineering and
cognitive modeling.
CO2: Understand the basic design paradigms, complex interaction styles.
CO3. Understand the models and theories for user interaction
CO4: Examine the evaluation of interaction designs and implementations.
CO5: Elaborate the above issues for web and mobile applications.
TOTAL: 45 PERIODS
REFERENCES
1. Ben Shneiderman, Catherine Plaisant, Maxine Cohen, Steven Jacobs, NiklasElmqvist,
“Designing the User Interface: Strategies for Effective Human-Computer Interaction”, Sixth
Edition, Pearson Education, 2016.
2. Alan Dix, Janet Finlay, G D Abowd and Russel Beale, "Human Computer Interaction",
Pearson Education, Third Edition, 2004.
3. Helen Sharp Jennifer Preece Yvonne Rogers, “Interaction Design: Beyond Human-
Computer Interaction”, Wiley, 5th Edition, 2019.
4. Alan Cooper,RobertReimann, David Cronin, Christopher Noessel,“About Face: The
Essentials of Interaction Design”, 4th Edition, Wiley, 2014.
5. Donald A. Norman, “Design of Everyday Things”, MIT Press, 2013.
6. Wilbert O Galitz, "The Essential Guide to User Interface Design", Third Edition, Wiley India
Pvt., Ltd., 2007.
CO-PO Mapping
CO POs
1 3 3 3 3 3 3
2 1 - 1 2 2 1
3 2 3 2 2 - 1
4 2 3 1 2 - 2
5 2 2 3 3 3 3
Avg 2 2.75 2 2.4 2.67 2
COURSE OUTCOMES:
CO1: Employ the concepts of virtualization in the cloud computing
CO2: Identify the architecture, infrastructure and delivery models of cloud computing
CO3: Develop the Cloud Application in AWS platform
CO4: Apply the concepts of Windows Azure to design Cloud Application
CO5: Develop services using various Cloud computing programming models.
TOTAL: 45 PERIODS
REFERENCES
1. Bernard Golden, Amazon Web Service for Dummies, John Wiley & Sons, 2013.
2. Raoul Alongi, AWS: The Most Complete Guide to Amazon Web Service from Beginner to
Advanced Level, Amazon Asia- Pacific Holdings Private Limited, 2019.
3. Sriram Krishnan, Programming: Windows Azure, O’Reilly,2010.
4. Rajkumar Buyya, Christian Vacchiola, S.Thamarai Selvi, Mastering Cloud Computing ,
MCGraw Hill Education (India) Pvt. Ltd., 2013.
5. Danielle Ruest, Nelson Ruest, ―Virtualization: A Beginner‟s Guide‖, McGraw-Hill Osborne
Media, 2009.
6. Jim Smith, Ravi Nair , "Virtual Machines: Versatile Platforms for Systems and Processes",
Elsevier/Morgan Kaufmann, 2005.
7. John W.Rittinghouse and James F.Ransome, "Cloud Computing: Implementation,
Management, and Security", CRC Press, 2010
8. Toby Velte, Anthony Velte, Robert Elsenpeter, "Cloud Computing, A Practical Approach",
McGraw-Hill Osborne Media, 2009.
9. Tom White, "Hadoop: The Definitive Guide", Yahoo Press, 2012.
CO-PO Mapping
CO POs
2 2 3 1 - - 1
3 3 - 3 - 1 3
4 - - - 2 - 3
5 3 2 - - - -
UNIT I INTRODUCTION 9
Language Processors - The Structure of a Compiler – The Evolution of Programming Languages-
The Science of Building a Compiler – Applications of Compiler Technology Programming
Language Basics - The Lexical Analyzer Generator -Parser Generator - Overview of Basic Blocks
and Flow Graphs - Optimization of Basic Blocks - Principle Sources of Optimization.
COURSE OUTCOMES:
CO1: Design and implement techniques used for optimization by a compiler.
CO2: Modify the existing architecture that supports parallelism.
CO3: Modify the existing data structures of an open source optimising compiler.
CO4: Design and implement new data structures and algorithms for code
optimization.
CO5: Critically analyse different data structures and algorithms used in the building of
an optimising compiler.
TOTAL : 45 PERIODS
REFERENCES
1. Alfred V. Aho, Monica S.Lam, Ravi Sethi, Jeffrey D.Ullman, “Compilers:Principles,
Techniques and Tools”, Second Edition, Pearson Education,2008.
2. Randy Allen, Ken Kennedy, “Optimizing Compilers for Modern Architectures: A
Dependence-based Approach”, Morgan Kaufmann Publishers, 2002.
3. Steven S. Muchnick, “Advanced Compiler Design and Implementation”,Morgan Kaufmann
Publishers - Elsevier Science, India, 2007
4. John Hopcroft, Rajeev Motwani, Jeffrey Ullman, “Introduction To Automata Theory
Languages, and Computation”, Third Edition, Pearson Education, 2007.
5. Torbengidius Mogensen, “Basics of Compiler Design”, Springer, 2011.
6. Charles N, Ron K Cytron, Richard J LeBlanc Jr., “Crafting a Compiler”, Pearson Education,
2010.
CO-PO Mapping
CO POs
1 2 2 2 3 2 2
2 - - 3 3 - 3
3 3 - 3 3 - 3
4 3 3 3 3 - -
5 - 3 3 3 3 -
SUGGESTED ACTIVITIES:
1: Survey on various features of cellular networks
2: Study the nature of cellular networks
3: A comparative study on the performance of different digital modulation techniques
4: Perform a review of various diversity techniques in wireless communication
5: Presentation on design of multicarrier systems for 5G
COURSE OUTCOMES:
CO1: Design solutions for cellular communication
CO2: Determine the capacity of wireless channels
CO3: Analyze the performance of the digital modulation techniques in fading channels
CO4: Apply various diversity techniques in wireless communication
CO5: Design multicarrier systems in wireless communication TOTAL: 45 PERIODS
REFERENCES:
1. Theodore.S. Rappaport, “Wireless Communications: Principles and Practice", 2nd
Edition, Pearson Education, India, 2010.
2. Andrea Goldsmith, “Wireless Communications”, Cambridge University Press, 2005.3. David
Tse and Pramod Viswanath, “Fundamentals of Wireless Communication”, Wiley
Series in Telecommunications, Cambridge University Press, 2005.
4. Saad Z. Asif, “5G Mobile Communications Concepts and Technologies” CRC press –
2019.
5. Keith Q. T. Zhang, “Wireless Communications: Principles, Theory and Methodology” 1st
edition, John Wiley & Sons, 2016.
6. Ramjee Prasad, "OFDM for Wireless Communication Systems", Artech House, 2004.
6. Boris Lublinsky, Kevin T. Smith, Alexey Yakubovich, “Professional Hadoop Solutions”,John
Wiley & Sons Inc., 2013.
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
1 - - 2 2 3 2
2 3 2 3 - - -
3 2 - - 2 3 3
4 3 3 - 2 3 3
5 2 3 3 2 3 3
COURSE OUTCOMES:
CO1: Analyze existing problems with the team, development process and wider organization
CO2: Apply a thorough understanding of Agile principles and specific practices
CO3: Select the most appropriate way to improve results for a specific circumstance or need
CO4: Judge and craft appropriate adaptations to existing practices or processes depending upon
analysis of typical problems
CO5: Evaluate likely successes and formulate plans to manage likely risks or problems
TOTAL: 45 PERIODS
REFERENCES
1. Robert C. Martin ,Agile Software Development, Principles, Patterns, and Practices Alan Apt
Series (2011)
2. Succeeding with Agile : Software Development Using Scrum, Pearson (2010)
3. David J. Anderson and Eli Schragenheim, “Agile Management for Software Engineering:
Applying the Theory of Constraints for Business Results, Prentice Hall, 2003.
4. Hazza and Dubinsky, “Agile Software Engineering, Series: Undergraduate Topics in
Computer Science, Springer, 2009.
5. Craig Larman, “Agile and Iterative Development: A Managers Guide, Addison-Wesley,
2004.
6. Kevin C. Desouza, “Agile Information Systems: Conceptualization, Construction, and
Management, Butterworth-Heinemann, 2007.
CO-PO Mapping
CO POs
1 3 1 3 - 2 3
2 2 - 3 3 1 3
3 3 - - - 3 3
4 2 - 1 2 3 3
5 1 3 - - 2 3
TOTAL : 45 PERIODS
COURSE OUTCOMES:
Upon completion of this course, the students should be able to
CO1: Identify the need for performance evaluation and the metrics used for it
CO2: Distinguish between open and closed queuing networks
CO3: Apply Little‘e law and other operational laws to open and closed systems
CO4: Use discrete-time and continuous-time Markov chains to model real world systems
CO5: Develop analytical techniques for evaluating scheduling policies
REFERENCES:
1. K. S. Trivedi, “Probability and Statistics with Reliability, Queueing and Computer Science
Applications‖, John Wiley and Sons, 2001.
2. Krishna Kant, “Introduction to Computer System Performance Evaluation‖, McGraw-Hill,
1992.
3. Lieven Eeckhout, “Computer Architecture Performance Evaluation Methods‖, Morgan and
Claypool Publishers, 2010.
4. Mor Harchol - Balter, “Performance Modeling and Design of Computer Systems –
Queueing Theory in Action‖, Cambridge University Press, 2013.
5. Paul J. Fortier and Howard E. Michel, “Computer Systems Performance Evaluation and
Prediction‖, Elsevier, 2003.
6. Raj Jain, “The Art of Computer Systems Performance Analysis: Techniques for
Experimental Design, Measurement, Simulation and Modeling‖, Wiley-Interscience, 1991.
7. Raj Jain, Art of Computer Systems Performance Analysis: Techniques For Experimental
Design Measurements Simulation and Modeling,2nd edition, wiley, 2015
CO-PO Mapping
CO POs
2 2 2 3 2 2 1
3 2 2 2 2
4 1 3 3 1
5 2 2 2 1 2
UNIT I INTRODUCTION 9
Architectures of Distributed Systems - System Architecture types - issues in distributed operating
systems - communication networks – communication primitives. Theoretical Foundations - inherent
limitations of a distributed system – lamport's logical clocks – vector clocks – causal ordering of
messages – global state – cuts of a distributed computation – termination detection. Distributed
Mutual Exclusion – introduction – the classification of mutual exclusion and
associated algorithms – a comparative performance analysis.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1:Understand and explore the working of Theoretical Foundations of OS.
CO2:Analyze the working principles of Distributed Deadlock Detection and resource management
CO3:Understand the concepts of distributed shared memory and scheduling mechanisms
CO4:Understand and analyze the working of Data security
CO5:Apply the learning into multiprocessor system architectures.
REFERENCES:
1. Mukesh Singhal, Niranjan G.Shivaratri, "Advanced concepts in operating
systems: Distributed, Database and multiprocessor operating systems", TMH, 2001
2. Andrew S.Tanenbaum, "Modern operating system", PHI, 2003
3. Pradeep K.Sinha, "Distributed operating system-Concepts and design", PHI, 2003.
4. Andrew S.Tanenbaum, "Distributed operating system", Pearson education, 2003.
CO-PO Mapping
CO POs
1 1 3 2 2 1 3
2 2 2 3 2 1 -
3 1 1 - 3 2 1
4 1 1 2 1 2 2
5 - - - - - -
Image enhancement in the spatial domain: Basic gray-level transformation, histogram processing,
enhancement using arithmetic and logic operators, basic spatial filtering, smoothing, and
sharpening spatial filters, combining the spatial enhancement methods.
Suggested Activities:
Discussion of Mathematical Transforms.
Numerical problem solving using Fourier Transform.
Numerical problem solving in Image Enhancement.
External learning – Image Noise and its types.
Suggested Activities:
Discussion on Image Artifacts and Blur.
Discussion of Role of Wavelet Transforms in Filter and Analysis.
Numerical problem solving in Wavelet Transforms.
External learning – Image restoration algorithms.
Suggested Activities:
External learning – Feature selection and reduction.
External learning – Image salient features.
Assignment on numerical problems in texture computation.
Suggested Activities:
Flipped classroom on different image coding techniques.
Practical – Demonstration of EXIF format for given camera.
Practical – Implementing effects quantization, color change.
Case study of Google’s WebP image format.
Suggested Activities:
Flipped classroom on importance of segmentation.
Suggested Evaluation Methods:
Tutorial – Image segmentation and edge detection.
COURSE OUTCOMES:
CO1: Apply knowledge of Mathematics for image processing operations
CO2: Apply techniques for image restoration.
CO3: Identify and extract salient features of images.
CO4: Apply the appropriate tools (Contemporary) for image compression and analysis.
CO5: Apply segmentation techniques and do object recognition.
1. Digital Image Processing, Rafeal C.Gonzalez, Richard E.Woods, Second Edition, Pearson
Education/PHI., 2002
2. Digital Image Processing, Sridhar S, Second Edition, Oxford University Press, 2016
3. Introduction to Digital Image Processing with Matlab, Alasdair McAndrew, Thomson Course
Technology, .Brooks/Cole 2004
4. Milan Sonka, Vaclav Hlavac, Roger Boyle, “Image Processing, Analysis and Machine
Vision”, Second Edition, Thompson Learning, 2007.
5. Digital Image Processing using Matlab, Rafeal C.Gonzalez, Richard E.Woods, Steven L.
Eddins, Pearson Education.Second Edition, 2017CO-PO Mapping
CO POs
1 2 2 - 3 - -
2 2 - 3 3 2 3
3 3 3 - 2 - -
4 3 - - 2 3 3
5 2 2 2 2 2 3
UNIT I INTRODUCTION 9
The Emerging IT Trends- IOT/IOE-Apache Hadoop for big data analytics-Big data into big insights
and actions – Emergence of BDA discipline – strategic implications of big data – BDA Challenges –
HPC paradigms – Cluster computing – Grid Computing – Cloud computing – Heterogeneous
computing – Mainframes for HPC - Supercomputing for BDA – Appliances for BDA.
REFERENCES:
1. Pethuru Raj, Anupama Raman, Dhivya Nagaraj and Siddhartha Duggirala, "High-
Performance Big-Data Analytics: Computing Systems and Approaches", Springer, 1st
Edition, 2015.
2. "Big Data Management and Processing", Kuan-Ching Li , Hai Jiang, Albert Y. Zomaya,
CRC Press,1st Edition,2017.
3. "High Performance Computing for Big Data: Methodologies and Applications", Chao
wang ,CRC Press,1st Edition,2018
4. "High-Performance Data Mining And Big Data Analytics" , Khosrow Hassibi, Create
Space Independent Publishing Platform,!st Edition,2014
5. "High performance computing: Modern systems and practices", Thomas Sterling,
Matthew Anderson, Morgan Kaufmann publishers,1st Edition,2017
WEB REFERENCES:
1. https://www.hpcwire.com/
ONLINE RESOURCES:
1. http://hpc.fs.uni-lj.si/sites/default/files/HPC_for_dummies.pdf
2. https://www.nics.tennessee.edu/computing-resources/what-is-hpc
CO-PO Mapping
CO POs
1 2 2 3 1 - -
2 - - 2 3 2 3
3 1 - 1 - 1 3
4 3 1 - - 3 -
5 1 - - 2 3 -
COURSE OBJECTIVES:
▪ To understand the basics of information retrieval with
pertinence to modeling, query operations and indexing
▪ To get an understanding of machine learning techniques for text
classification and clustering.
▪ To understand the various applications of information retrieval giving
emphasis
▪ to multimedia IR, web search
▪ To get an understanding of machine learning techniques for text
classification and clustering and to understand the concepts of digital libraries
UNIT II MODELING 9
Taxonomy and Characterization of IR Models – Boolean Model – Vector Model - Term Weighting –
Scoring and Ranking –Language Models – Set Theoretic Models - Probabilistic Models –
Algebraic Models – Structured Text Retrieval Models – Models for Browsing
COURSE OUTCOMES:
CO1: Build an Information Retrieval system using the available tools.
CO2: Identify and design the various components of an Information Retrieval system.
CO3: Categorize the different types of IR Models.
CO4: Apply machine learning techniques to text classification and clustering which is used
for efficient Information Retrieval.
CO5: Design an efficient search engine and analyze the Web content structure.
TOTAL: 45 PERIODS
REFERENCES
1. Christopher D. Manning, Prabhakar Raghavan, Hinrich Schutze, “Introduction to
Information Retrieval, Cambridge University Press, First South Asian Edition,2008.
2. Stefan Buttcher, Implementing and Evaluating Search Engines, The MIT Press,
Cambridge, Massachusetts London, England, 2016.
3. Ricardo Baeza – Yates, Berthier Ribeiro – Neto, “Modern Information Retrieval: The
concepts and Technology behind Search (ACM Press Books), Second Edition, 2011
4. Stefan Buttcher, Charles L. A. Clarke, Gordon V. Cormack, “Information Retrieval
CO-PO Mapping
CO POs
1 2 2 1 3 3 2
2 1 1 1 3 2 1
3 2 1 2 3 3 3
4 1 2 2 1 2 3
5 2 2 3 3 1 3
COURSE OBJECTIVES:
COURSE OUTCOMES:
After completion of the course, the student will be able to:
CO1: Apply various soft computing concepts for practical applications
CO2: Choose and design suitable neural network for real time problems
CO3: Use fuzzy logic rules and reasoning to handle uncertainty and develop decision making and
expert system
CO4: Describe the importance of genetic algorithms for solving combinatorial optimization problems
CO5: Analysis the various hybrid soft computing techniques and apply in real time problems.
TOTAL: 45 PERIODS
REFERENCES:
1. S.N. Sivanandam, S.N. Deepa, “Principles of Soft Computing”, Wiley, Second Edition, 2011.
2. S. Rajasekaran, G.A.V Vijayalakshmi Pai, “Neural Networks, Fuzzy Systems and Evolutionary
Algorithms: Synthesis and Applications” Prentice Hall, Second Edition, 2017.
3. Timothy J. Ross, “Fuzzy Logic with Engineering Applications, 4th Edition, Wiley, 2016.
4. David E. Goldberg, Genetic Algorithm in Search Optimization and Machine Learning Pearson
Education India, 2013.
5. Simon Haykin, Neural Networks Comprehensive Foundation Third Edition, Pearson
Education, .2016.
6. James A. Freeman, David M. Skapura, Neural Networks Algorithms, Applications, and
Programming Techniques, Pearson Education India, 2011.
7. J. -S. R. Jang, C.-T. Sun, E. Mizutani, “Neuro Fuzzy and Soft Computing: A Computational
Approach to Learning and Machine Intelligence, Pearson, 2015.
CO-PO Mapping
CO POs
1 3 3 1 1 2 2
2 3 3 2 2 2 2
3 3 3 2 2 2 2
4 3 2 1 2 1 1
3
5 3 3 3 2 2 3
SUGGESTED ACTIVITIES:
1. Solve puzzles with uninformed and informed searches.
2: Reasoning methods through puzzles and real life scenarios
3: Ontology creation using Protégé
4: Give example scenarios where probabilistic reasoning and case
based reasoning can be applied
5: Discuss some case studies and their ethical issues
COURSE OUTCOMES:
CO1: Implement any three problem solving methods for a puzzle of your choice
CO2: Understand Game playing and implement a two player game using AI techniques
CO3: Design and Implement an example using predicate Logic
CO4: Implement a case based reasoning system
CO5:Discuss some methodologies to design ethical and explainable AI systems
REFERENCES:
1. Stuart Russell, Peter Norvig, “Artificial Intelligence: A Modern Approach”, Pearson, 4th
Edition, 2020.
2. Zhongzhi Shi “Advanced Artificial Intelligence”, World Scientific; 2019.
3. Kevin Knight, Elaine Rich, Shivashankar B. Nair, “Artificial Intelligence”, McGraw Hill
Education; 3rd edition, 2017
4. Richard E. Neapolitan, Xia Jiang, “Artificial Intelligence with an Introduction to Machine
Learning”, Chapman and Hall/CRC; 2nd edition, 2018
5. Dheepak Khemani, “A first course in Artificial Intelligence”, McGraw Hill Education Pvt
Ltd., NewDelhi, 2013.
6. Nils J. Nilsson, “Artificial Intelligence: A New Synthesis”, Morgan Kaufmann Publishers
Inc; Second Edition, 2003.
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
3 1 1 2 3 2
1
2 1 2 3 2 3
2
1 3 2 3 3 2
3
1 3 3 3 3 1
4
2 2 3 3 2 3
5
2.2 2 2.4 2.8 2.6 2.2
Avg
UNIT I INTRODUCTION 9
Definition, Process, Key terms: Site references, Keywords and Key phrases; building block terms:
Visit characterization terms, Content characterization terms, Conversion metrics; Categories:
Offsite web, on site web; Web analytics platform, Web analytics evolution, Need for web analytics,
Advantages, Limitations.
TOTAL: 45 PERIODS
COURSE OUTCOMES
Upon completion of this course, the students should be able to:
CO1:Understand the Web analytics platform, and their evolution.
CO2:Use the various Data Streams Data.
CO3:Know how the survey of capturing of data will benefit.
CO4:Understand Common metrics of web as well as KPI related concepts.
CO5:Apply various Web analytics versions in existence.
REFERENCES:
1. Clifton B., Advanced Web Metrics with Google Analytics, Wiley Publishing, Inc.2nd ed, 2012.
2. Kaushik A., Web Analytics 2.0, The Art of Online Accountability and Science of
Customer Centricity, Wiley Publishing, Inc. 1st ed, 2010.
3. Sterne J., Web Metrics: Proven methods for measuring web site success, John Wiley and
Sons, 2002
CO-PO Mapping
CO POs
1 3 - 3 2 3 2
2 2 2 3 1 1 1
3 3 - 3 2 2 2
4 1 2 3 1 1 1
5 2 - 3 2 2 1
COURSE OBJECTIVES:
• To familiarize Use the Innovation Canvas to justify potentially successful products.
• To learn various ways in which to develop a product idea.
• To understand about how Big Data can play vital role in Cognitive Computing
• To know about the business applications of Cognitive Computing
• To get into all applications of Cognitive Computing
COURSE OUTCOMES:
CO1: Explain applications in Cognitive Computing.
CO2: Describe Natural language processor role in Cognitive computing.
CO3: Explain future directions of Cognitive Computing
CO4: Evaluate the process of taking a product to market
CO5: Comprehend the applications involved in this domain.
REFERENCES
1. Judith H Hurwitz, Marcia Kaufman, Adrian Bowles, “Cognitive computing and Big Data
Analytics”, Wiley, 2015
2. Robert A. Wilson, Frank C. Keil, “The MIT Encyclopedia of the Cognitive Sciences”, The MIT
Press, 1999.
3. Noah D. Goodman, Joshua B. Tenenbaum, The ProbMods Contributors, “Probabilistic
Models of Cognition”, Second Edition, 2016, https://probmods.org/.
CO-PO Mapping
CO POs
1 1 3 2 - 2 -
2 2 - 3 1 3 -
3 1 2 - - 3 -
4 - - 2 2 1 1
5 2 2 1 - 1 2
COURSE OUTCOMES:
At the end of the course, the student will be able to
CO1:Understand the basic principles of quantum computing.
CO2:Gain knowledge of the fundamental differences between conventional computing and
quantum computing.
CO3:Understand several basic quantum computing algorithms.
CO4:Understand the classes of problems that can be expected to be solved well by quantum
computers.
CO5: Simulate and analyze the characteristics of Quantum Computing Systems.
TOTAL: 45 PERIODS
REFERENCES:
1. John Gribbin, Computing with Quantum Cats: From Colossus to Qubits, 2021
2. William (Chuck) Easttom, Quantum Computing Fundamentals, 2021
3. Parag Lala, Quantum Computing, 2019
4. Eleanor Rieffel and Wolfgang Polak, QUANTUM COMPUTING A Gentle Introduction, 2011
5. Nielsen M. A., Quantum Computation and Quantum Information, Cambridge University
Press.2002
6. Benenti G., Casati G. and Strini G., Principles of Quantum Computation and Information,
Vol. I: Basic Concepts, Vol II: Basic Tools and Special Topics, World Scientific. 2004
7. Pittenger A. O., An Introduction to Quantum Computing Algorithms 2000
CO-PO Mapping
CO POs
1 1 2 3 - 1 -
2 1 2 3 - 2 -
3 - 1 3 2 3 2
4 2 - 2 2 1 3
5 3 - 1 2 3 3
COURSE OBJECTIVES:
• To understand the computational approaches to Modeling, Feature Extraction
• To understand the need and application of Map Reduce
• To understand the various search algorithms applicable to Big Data
• To analyze and interpret streaming data
• To learn how to handle large data sets in main memory and learn the various
clustering techniques applicable to Big Data
UNIT V CLUSTERING 9
Introduction to Clustering Techniques – Hierarchical Clustering –Algorithms – K-Means – CURE –
Clustering in Non -– Euclidean Spaces – Streams and Parallelism – Case Study: Advertising on
the Web – Recommendation Systems.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of this course, the students will be able to
CO1: Design algorithms by employing Map Reduce technique for solving Big Data problems.
CO2: Design algorithms for Big Data by deciding on the apt Features set .
CO3: Design algorithms for handling petabytes of datasets
CO4: Design algorithms and propose solutions for Big Data by optimizing main memory
consumption
CO5: Design solutions for problems in Big Data by suggesting appropriate clustering techniques.
REFERENCES:
1. Jure Leskovec, AnandRajaraman, Jeffrey David Ullman, “Mining of Massive Datasets”,
Cambridge University Press, 3rd Edition, 2020.
2. Jiawei Han, MichelineKamber, Jian Pei, “Data Mining Concepts and Techniques”, Morgan
Kaufman Publications, Third Edition, 2012.
3. Ian H.Witten, Eibe Frank “Data Mining – Practical Machine Learning Tools and
Techniques”, Morgan Kaufman Publications, Third Edition, 2011.
4. David Hand, HeikkiMannila and Padhraic Smyth, “Principles of Data Mining”, MIT PRESS,
2001
WEB REFERENCES:
1. https://swayam.gov.in/nd2_arp19_ap60/preview
2. https://nptel.ac.in/content/storage2/nptel_data3/html/mhrd/ict/text/106104189/lec1.pdf
ONLINE RESOURCES:
1. https://examupdates.in/big-data-analytics/
2. https://www.tutorialspoint.com/big_data_analytics/index.htm
3. https://www.tutorialspoint.com/data_mining/index.html
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
1 - - - 2 3 3
2 - - - - 2 2
3 - - - 2 3 3
4 1 - 2 2 3 3
5 2 3 2 2 3 3
COURSE OBJECTIVES:
• To understand the basics of Mobile Computing and Personal Computing
• To learn the role of cellular networks in Mobile and Pervasive Computing
• To expose to the concept of sensor and mesh networks
• To expose to the context aware and wearable computing
• To learn to develop applications in mobile and pervasive computing environment
UNIT I INTRODUCTION 9
Differences between Mobile Communication and Mobile Computing – Contexts and Names –
Functions – Applications and Services – New Applications – Making Legacy Applications Mobile
Enabled – Design Considerations – Integration of Wireless and Wired Networks – Standards
Bodies – Pervasive Computing – Basics and Vision – Principles of Pervasive Computing –
Categories of Pervasive Devices
COURSE OUTCOMES:
CO1: Design a basic architecture for a pervasive computing environment
CO2: Design and allocate the resources on the 3G-4G wireless networks
CO3: Analyze the role of sensors in Wireless networks
CO4: Work out the routing in mesh network
CO5: Deploy the location and context information for application development
CO6: Develop mobile computing applications based on the paradigm of context aware
computing and wearable computing
TOTAL:45 PERIODS
REFERENCES
1. Asoke K Talukder, Hasan Ahmed, Roopa R Yavagal, “Mobile Computing: Technology,
Applications and Service Creation”, 2nd ed, Tata McGraw Hill, 2017.
2. Reto Meier, “Professional Android 2 Application Development”, Wrox Wiley,2010.
3. Pei Zheng and Lionel M Li, ‘Smart Phone & Next Generation Mobile Computing’, Morgan
Kaufmann Publishers, 2006.
4. Frank Adelstein, ‘Fundamentals of Mobile and Pervasive Computing’, TMH, 2005
5. Jochen Burthardt et al, ‘Pervasive Computing: Technology and Architecture of Mobile
Internet Applications’, Pearson Education, 2003
6. Feng Zhao and Leonidas Guibas, ‘Wireless Sensor Networks’, Morgan Kaufmann
Publishers, 2004
7. Uwe Hansmaan et al, ‘Principles of Mobile Computing’, Springer, 2nd edition,2006
8. Reto Meier, “Professional Android 2 Application Development”, Wrox Wiley,2010.
9. Mohammad s. Obaidat et al, “Pervasive Computing and Networking” ,John wiley, 2011
10. Stefan Poslad, “Ubiquitous Computing: Smart Devices, Environments and Interactions”,
Wiley, 2009
11. Frank Adelstein Sandeep K. S. Gupta Golden G. Richard III Loren Schwiebert
“Fundamentals of Mobile and Pervasive Computing, “, McGraw-Hill, 2005
CO-PO Mapping
CO POs
1 3 3 1 3 1 3
2 2 2 2 2 2 2
3 1 3 1 1 2 2
4 1 2 2 2 1 1
5 2 2 1 2 2
Av 1.8 2.50 1.60 1.80 1.60 2.00
g 0
24CSPPE302 WEB SERVICES AND API DESIGN L T PC
3 0 0 3
COURSE OBJECTIVES:
• To learn the basics of Web service.
• To become familiar with the Web Services building blocks
• To learn to work with RESTful web services.
• To implement the RESTful web services.
• To understand resource oriented Architecture.
COURSE OUTCOMES:
CO1: Explain how to write XML documents.
CO2: Apply the web service building blocks such as SOAP, WSDL and UDDI
CO3: Describe the RESTful web services.
CO4: Implement the RESTful web service with Spring Boot MVC
CO5: Discuss Resource-oriented Architecture.
TOTAL: 45 PERIODS
REFERENCES
1. Leonard Richardson and Sam Ruby, RESTful Web Services, O’Reilly Media, 2007
2. McGovern, et al., "Java Web Services Architecture", Morgan Kaufmann Publishers,2005.
3. Lindsay Bassett, Introduction to JavaScript Object Notation, O’Reilly Media, 2015
4. Craig Walls, “Spring in Action, Fifth Edition”, Manning Publications, 2018
5. Raja CSP Raman, Ludovic Dewailly, “Building A RESTful Web Service with Spring 5”,
Packt Publishing, 2018.
6. Bogunuva Mohanram Balachandar, “Restful Java Web Services, Third Edition: A pragmatic
guide to designing and building RESTful APIs using Java”, Ingram short title, 3rd Edition,
2017.
7. Mario-Leander Reimer, “Building RESTful Web Services with Java EE 8: Create modern
RESTful web services with the Java EE 8 API”, Packt publishing, 2018.
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
1 1 3 3 - - -
2 1 - 3 3 1 2
3 - 3 3 - - -
4 1 - 2 3 1 2
5 1 - 1 - 1 -
Avg 1 3 2.4 3 1 2
L T P C
24CSPPE303 DATA VISUALIZATION TECHNIQUES
3 0 0 3
COURSE OBJECTIVES:
• To develop skills to both design and critique visualizations.
• To introduce visual perception and core skills for visual analysis.
• To understand technological advancements of data visualization
• To understand various data visualization techniques
• To understand the methodologies used to visualize large data sets
COURSE OUTCOMES:
CO1: Visualize the objects in different dimensions.
CO2: Design and process the data for Visualization.
CO3:Apply the visualization techniques in physical sciences, computer science, applied
mathematics and medical sciences.
CO4: Apply the virtualization techniques for research projects.
CO5: Identify appropriate data visualization techniques given particular requirements imposed by
the data.
TOTAL: 45 PERIODS
REFERENCES
1. Matthew Ward, Georges Grinstein and Daniel Keim, “Interactive Data Visualization
Foundations, Techniques, Applications”, 2010.
2. Colin Ware, “Information Visualization Perception for Design”, 4th edition, Morgan
Kaufmann Publishers, 2021.
3. Robert Spence “Information visualization – Design for interaction”, Pearson Education, 2nd
Edition, 2007.
4. Alexandru C. Telea, “Data Visualization: Principles and Practice,” A. K. Peters Ltd, 2008.
CO-PO Mapping
CO POs
1 3 1 2 2 1 2
2 2 1 2 3 2 2
3 1 - 2 2 1 1
4 3 1 3 3 2 2
5 2 1 3 2 1 1
SUGGESTED ACTIVITIES:
1: Twitter Intelligence project performs tracking and analysis of the Twitter
2: Large-Scale Network Embedding as Sparse Matrix Factorization
3: Implement how Information Propagation on Twitter
4: Social Network Analysis and Visualization software application.
5: Implement the Structure of Links in Networks
COURSE OUTCOMES:
TOTAL : 45 PERIODS
REFERENCES
1. Practical Social Network Analysis with Python, Krishna Raj P. M. Ankith Mohan and K. G.
Srinivasa. Springer, 2018
2. SOCIAL NETWORK ANALYSIS: METHODS AND APPLICATIONS, STANLEY
WASSERMAN, and KATHERINE F' AUST. CAMBRIDGE UNIVERSITY PRESS, 2012
3. Social Network Analysis: History, Theory and Methodology by Christina Prell, SAGE
Publications, 1st edition, 2011
4. Sentiment Analysis in Social Networks, Federico Alberto Pozzi, Elisabetta Fersini, Enza
Messina, and Bing. LiuElsevier Inc, 1st edition, 2016
5. Social Network Analysis, John Scott. SAGE Publications, 2012
CO-PO Mapping
C POs
O
PO1 PO2 PO3 PO4 PO PO6
5
1 3 - - - 2 -
2 2 - - - - 3
3 - 1 2 3 - -
4 3 - - 2 - 2
5 - - - - 3 -
COURSE OBJECTIVES:
• To understand the goals, complexity of software systems, the role of Specification activities
and qualities to control complexity.
• To understand the fundamentals of abstraction and formal systems
• To learn fundamentals of logic reasoning- Propositional Logic, temporal logic and apply to
models systems
• To understand formal specification models based on set theory, calculus and algebra and
apply to a case study
• To learn Z, Object Z and B Specification languages with case studies.
COURSE OUTCOMES:
CO1: Understand the complexity of software systems, the need for formal specifications activities
and qualities to control complexity.
CO2: Gain knowledge on fundamentals of abstraction and formal systems
CO3: Learn the fundamentals of logic reasoning- Propositional Logic, temporal logic and apply to
models systems
CO4: Develop formal specification models based on set theory, calculus and algebra and apply to
a typical case study
CO5: Have working knowledge on Z, Object Z and B Specification languages with case studies.
TOTAL: 45 PERIODS
REFERENCES
1. Mathematical Logic for computer science ,second edition, M.Ben-Ari ,Springer,2012.
2. Logic in Computer Science- modeling and reasoning about systems, 2 nd Edition,
Cambridge University Press, 2004.
3. Specification of Software Systems, V.S. Alagar, K. Periyasamy, David Grises and Fred B
Schneider, Springer –Verlag London, 2011
4. The ways Z: Practical programming with formal methods, Jonathan Jacky, Cambridge
University Press,1996.
5. Using Z-Specification Refinement and Proof,Jim Woodcock and Jim Devies Prentice Hall,
1996
6. Markus Roggenbach ,Antonio Cerone, Bernd-Holger Schlingloff, Gerardo Schneider , Siraj
Ahmed Shaikh, Formal Methods for Software Engineering: Languages, Methods,
Application Domains (Texts in Theoretical Computer Science. An EATCS Series) 1st ed.
2022 Edition
CO-PO Mapping
CO POs
1 1 1 3 - 2 3
2 2 1 - 2 1 3
3 3 1 2 3 2 3
4 - 2 2 - 1 3
5 2 2 - 3 3 3
24CSPPE306 ROBOTICS LT P C
3 0 0 3
COURSE OBJECTIVES:
• To Introduce the concepts of Robotic systems
• To understand the concepts of Instrumentation and control related to Robotics
• To understand the kinematics and dynamics of robotics
• To explore robotics in Industrial applications
CO-PO Mapping
CO POs
1 1 3 3 - 2 -
2 1 2 3 2 1 1
3 1 2 - 3 3 2
4 2 - 3 - 2 -
5 1 - - 3 3 3
UNIT I INTRODUCTION 6
Natural Language Processing – Components - Basics of Linguistics and Probability and
Statistics – Words-Tokenization-Morphology-Finite State Automata
COURSE OUTCOMES:
CO1: Understand basics of linguistics, probability and statistics associated with NLP
CO2: Implement a Part-of-Speech Tagger
CO3: Design and implement a sequence labeling problem for a given domain
CO4: Implement semantic processing tasks and simple document indexing and searching
system using the concepts of NLP
CO5:: Implement a simple chatbot using dialogue system concepts TOTAL : 60 PERIODS
REFERENCES
1. Daniel Jurafsky and James H.Martin, “Speech and Language Processing: An Introduction
to Natural Language Processing, Computational Linguistics and Speech Recognition”
(Prentice Hall Series in Artificial Intelligence), 2020
2. Jacob Eisenstein. “Natural Language Processing “, MIT Press, 2019
3. Samuel Burns “Natural Language Processing: A Quick Introduction to NLP with Python
and NLTK, 2019
4. Christopher Manning, “Foundations of Statistical Natural Language Processing”, MIT
Press, 2009.
5. Nitin Indurkhya,Fred J. Damerau, “Handbook of Natural Language Processing”, Second
edition, Chapman & Hall/CRC: Machine Learning & Pattern Recognition, Hardcover,2010
6. Deepti Chopra, Nisheeth Joshi, “Mastering Natural Language Processing with Python”,
Packt Publishing Limited, 2016
7. Mohamed Zakaria Kurdi “Natural Language Processing and Computational Linguistics:
Speech, Morphology and Syntax (Cognitive Science)”, ISTE Ltd., 2016
8. Atefeh Farzindar,Diana Inkpen, “Natural Language Processing for Social Media
(Synthesis Lectures on Human Language Technologies)”, Morgan and Claypool Life
Sciences, 2015
CO-PO Mapping
CO POs
1 - 2 3 1 1 -
2 2 2 2 3 - 3
3 3 - 3 3 - 3
4 1 - 2 3 - 3
5 1 - 2 3 - 3
SUGGESTED ACTIVITIES:
1. Debugging Lab
2. Performance Lab
3. Launching Nsight
4. Running Performance Analysis
5. Understanding Metrics
6. NVIDIA Visual Profiler
7. Matrix Transpose Optimization
8. Reduction Optimization
COURSE OUTCOMES:
CO1: Describe GPU Architecture
CO2: Write programs using CUDA, identify issues and debug them
CO3: Implement efficient algorithms in GPUs for common application kernels, such as
matrix multiplication
CO4: Write simple programs using OpenCL
CO5: Identify efficient parallel programming patterns to solve problems
TOTAL: 45 PERIODS
REFERENCES
1. Shane Cook, CUDA Programming: “A Developer's Guide to Parallel Computing with GPUs
(Applications of GPU Computing), First Edition, Morgan Kaufmann, 2012.
2. David R. Kaeli, Perhaad Mistry, Dana Schaa, Dong Ping Zhang, “Heterogeneous
computing with OpenCL, 3rd Edition, Morgan Kauffman, 2015.
3. Nicholas Wilt, “CUDA Handbook: A Comprehensive Guide to GPU Programming, Addison -
Wesley, 2013.
4. Jason Sanders, Edward Kandrot, “CUDA by Example: An Introduction to General Purpose
GPU Programming, Addison - Wesley, 2010.
5. David B. Kirk, Wen-mei W. Hwu, Programming Massively Parallel Processors - A Hands-on
Approach, Third Edition, Morgan Kaufmann, 2016.
6. http://www.nvidia.com/object/cuda_home_new.html
7. http://www.openCL.org
CO-PO Mapping
CO POs
1 3 - - - - -
2 - - 2 - - -
3 - - 3 - 3 3
4 - 2 - 3 2 -
5 - - - 2 - 3
SUGGESTED ACTIVITIES:
1. Creating a new Git repository, cloning existing repository, Checking changes into a Git
repository, Pushing changes to a Git remote, Creating a Git branch
2. Installing Docker container on windows/Linux, issuing docker commands
3. Building Docker Images for Python Application
4. Setting up Docker and Maven in Jenkins and First Pipeline Run
5. Running Unit Tests and Integration Tests in Jenkins Pipelines
COURSE OUTCOMES:
CO1: Implement modern software Engineering process
CO2: work with DevOps platform
CO3: build, test and deploy code
CO4: Explore DevOps tools
CO5: Correlate MLOps concepts with real time examples
TOTAL:75 PERIODS
REFERENCES
1. Len Bass, Ingo Weber and Liming Zhu, ―”DevOps: A Software Architect‘s Perspective”,
Pearson Education, 2016
2. Joakim Verona - “Practical DevOps” - Packet Publishing , 2016
3. Viktor Farcic -”The DevOps 2.1 Toolkit: Docker Swarm” - Packet Publishing, 2017
4. Mark Treveil, and the Dataiku Team-”Introducing MLOps” - O’Reilly Media- 2020
CO-PO Mapping
CO POs
1 3 2 1 2 3 -
2 3 2 - -- 3 -
3 3 2 2 3 2 3
4 3 2 1 2 3 -
5 3 2 2 1 2 3
COURSE OUTCOMES:
CO1: Identify various concepts of mobile programming that make it unique from programming for
other platforms
CO2: Create, test and debug Android application by setting up Android development
CO3: Demonstrate methods in storing, sharing and retrieving data in Android applications
CO4: Utilize rapid prototyping techniques to design and develop sophisticated mobile interfaces
CO5: Create interactive applications in android using databases with multiple activities including
audio, video and notifications and deploy them in marketplace
TOTAL: 75 PERIODS
REFERENCES
1. Lauren Darcey and Shane Conder, “Android Wireless Application Development”, Pearson
Education, 2nd ed. (2011)
2. Google Developer Training, "Android Developer Fundamentals Course – Concept
Reference”, Google Developer Training Team, 2017.
3. Prasanth Kumar Pattnaik,Rajib Mall,”Fundamentals of Mobile Computing”,PHI Learning
Pvt.Ltd,New Delhi-2012
4. Reto Meier, “Professional Android 2 Application Development”, Wiley India Pvt Ltd, 2010
5. Mark L Murphy, “Beginning Android”, Wiley India Pvt Ltd, 2009
6. Dawn Griffiths and David Griffiths, “Head First Android Development”, 1st Edition, O‟Reilly
SPD Publishers, 2015. ISBN-13: 978-9352131341
7. Erik Hellman, “Android Programming – Pushing the Limits”, 1st Edition, Wiley India Pvt Ltd,
2014. ISBN-13: 978-8126547197.
8. Bill Phillips, Chris Stewart and Kristin Marsicano, “Android Programming: The Big Nerd
Ranch Guide”, 4th Edition, Big Nerd Ranch Guides, 2019. ISBN-13: 978-0134706054
CO-PO Mapping
CO POs
1 3 2 - 3 3 -
2 3 1 1 3 - 2
3 3 2 3 3 3 1
4 3 1 1 2 - 3
5 3 2 2 3 3 3
LIST OF EXPERIMENTS: 30
1. Feature Selection from Video and Image Data
2. Image and video recognition
3. Image Colorization
4. Aspect Oriented Topic Detection & Sentiment Analysis
5. Object Detection using Autoencoder
COURSE OUTCOMES:
CO1: Feature Extraction from Image and Video Data
CO2: Implement Image Segmentation and Instance Segmentation in Images
CO3: Implement image recognition and image classification using a pretrained network (Transfer
Learning)
CO4: Traffic Information analysis using Twitter Data
CO5: Autoencoder for Classification & Feature Extraction
TOTAL : 45+30=75 PERIODS
REFERENCES
1. Deep Learning A Practitioner’s Approach Josh Patterson and Adam Gibson O’Reilly Media,
Inc.2017
2. Learn Keras for Deep Neural Networks, Jojo Moolayil, Apress,2018
3. Deep Learning Projects Using TensorFlow 2, Vinita Silaparasetty, Apress, 2020
4. Deep Learning with Python, FRANÇOIS CHOLLET, MANNING SHELTER ISLAND,2017
5. Pro Deep Learning with TensorFlow, Santanu Pattanayak, Apress,2017
CO-PO Mapping
CO POs
2 2 2 2 3 3 2
3 2 2 2 3 2 3
4 2 2 1 3 3 3
5 2 2 - 3 2 2
LIST OF EXPERIMENTS:
1. Create a Simple Blockchain in any suitable programming language.
2. Use Geth to Implement Private Ethereum Block Chain.
3. Build Hyperledger Fabric Client Application.
4. Build Hyperledger Fabric with Smart Contract.
5. Create Case study of Block Chain being used in illegal activities in real world.
6. Using Python Libraries to develop Block Chain Application.
TOTAL: 30 PERIODS
SUPPLEMENTARY RESOURCES:
NPTEL online course : https://nptel.ac.in/courses/106/104/106104220/#
Udemy: https://www.udemy.com/course/build-your-blockchain-az/
EDUXLABS Online training :https://eduxlabs.com/courses/blockchain-technology-
training/?tab=tab-curriculum
TOTAL: 75 PERIODS
COURSE OUTCOMES:
After the completion of this course, student will be able to
CO1: Understand and explore the working of Blockchain technology
CO2: Analyze the working of Smart Contracts
CO3: Understand and analyze the working of Hyperledger
CO4: Apply the learning of solidity to build de-centralized apps on Ethereum
CO5: Develop applications on Blockchain
REFERENCES:
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization, and
Smart Contracts Explained”, Second Edition, Packt Publishing, 2018.
2. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and Cryptocurrency
Technologies: A Comprehensive Introduction” Princeton University Press, 2016
3. Antonopoulos, Mastering Bitcoin, O’Reilly Publishing, 2014. .
4. Antonopoulos and G. Wood, “Mastering Ethereum: Building Smart Contracts and Dapps”,
O’Reilly Publishing, 2018.
5. D. Drescher, Blockchain Basics. Apress, 2017.
CO-PO Mapping
CO POs
1 2 1 3 2 2 3
2 2 1 2 3 2 2
3 2 1 3 1 2 1
4 2 1 2 3 2 2
5 - - - - - -
SUGGESTED ACTIVITIES:
1. Study of ARM evaluation system
2. Interfacing ADC and DAC.
3. Interfacing LED and PWM.
4. Interfacing real time clock and serial port.
5. Interfacing keyboard and LCD.
6. Interfacing EPROM and interrupt.
7. Principles of Mailbox.
8. Interrupt performance characteristics of ARM and FPGA.
9. Flashing of LEDS.
10. Interfacing stepper motor and temperature sensor.
COURSE OUTCOMES:
CO1: Understand different architectures of embedded processor, microcontroller and peripheral
devices. Interface memory and peripherals with embedded systems.
CO2: Interface memory and peripherals with embedded systems.
CO3: Work with embedded network environment.
CO4: Understand challenges in Real time operating systems.
CO5: Design and 85nalyse applications on embedded systems.
TOTAL:75 PERIODS
REFERENCES
1. Adrian McEwen, Hakim Cassimally, "Designing the Internet of Things" Wiley Publication,
First edition, 2013
2. Andrew N Sloss, D. Symes, C. Wright, Arm system developers guide, Morgan
Kauffman/Elsevier, 2006.
3. ArshdeepBahga, Vijay Madisetti, " Internet of Things: A Hands-on-Approach" VPT First
Edition, 2014
4. C. M. Krishna and K. G. Shin, “Real-Time Systems , McGraw-Hill, 1997
5. Frank Vahid and Tony Givargis, “Embedded System Design: A Unified Hardware/Software
Introduction, John Wiley & Sons.1999
6. Jane.W.S. Liu, “Real-Time systems, Pearson Education Asia,2000
7. Michael J. Pont, “Embedded C, Pearson Education, 2007.
8. Muhammad Ali Mazidi , SarmadNaimi , SepehrNaimi, "The AVR Microcontroller and
Embedded Systems: Using Assembly and C" Pearson Education, First edition, 2014
9. Steve Heath, “Embedded System Design, Elsevier, 2005
10. Wayne Wolf, “Computers as Components:Principles of Embedded Computer System
Design, Elsevier, 2006.
CO-PO Mapping
CO POs
1 2 - 3 2 - -
2 - - - 3 3 2
3 - 1 2 1 2 2
4 2 2 - - 3 -
5 3 3 1 - 1 -
UNIT II ANGULAR 10
About Angular. Angular CLI. Creating an Angular Project. Components. Components Interaction.
Dynamic Components. Angular Elements. Angular Forms. Template Driven Forms. Property, Style,
Class and Event Binding. Two way Bindings. Reactive Forms. Form Group. Form Controls. About
Angular Router. Router Configuration. Router State. Navigation Pages. Router Link. Query
Parameters. URL matching. Matching Strategies. Services. Dependency Injection. HttpClient.
Read Data from the Server. CRUD Operations. Http Header Operations. Intercepting requests and
responses.
UNIT V MONGODB 8
Introduction to MongoDB. Documents. Collections. Subcollections. Database. Data Types. Dates.
Arrays. Embedded Documents. CRUD Operations. Batch Insert. Insert Validation. Querying The
Documents. Cursors. Indexing. Unique Indexes. Sparse Indexes. Special Index and Collection
Types. Full-Text Indexes. Geospatial Indexing. Aggregation framework.
LIST OF EXPERIMENTS 30
1. Accessing the Weather API from Angular
2. Accessing the Stock Market API from Angular
3. Call the Web Services of Express.js From Angular
4. Read the data in Node.js from MongoDB
5. CRUD operation in MongoDB using Angular
COURSE OUTCOMES:
CO1: Develop basic programming skills using Javascript
CO2: Implement a front-end web application using Angular.
CO3: Will be able to create modules to organise the server
CO4: Build RESTful APIs with Node, Express and MongoDB with confidence.
CO5: Will learn to Store complex, relational data in MongoDB using Mongoose
TOTAL : 45 + 30=75 PERIODS
REFERENCES
1. Adam Freeman, Essential TypeScript, Apress, 2019
2. Mark Clow, Angular Projects, Apress, 2018
3. Alex R. Young, Marc Harter,Node.js in Practice, Manning Publication, 2014
4. Pro Express.js, Azat Mardan, Apress, 2015
5. MongoDB in Action, Kyle Banker, Peter Bakkum, Shaun Verch, Douglas Garrett, Tim
Hawkins, Manning Publication, Second edition, 2016
CO-PO Mapping
CO POs
1 - - 2 3 3 3
2 - - 2 3 3 3
3 2 - 1 - 3 3
4 2 - 2 - 3 3
5 3 3 - - 3 3
LTPC
24CSPPE315 BIO INFORMATICS
3 024
COURSE OBJECTIVES:
• Exposed to the need for Bioinformatics technologies
• Be familiar with the modeling techniques
• Learn microarray analysis
• Exposed to Pattern Matching and Visualization
• To know about Microarray Analysis
UNIT I INTRODUCTION 9
Need for Bioinformatics technologies – Overview of Bioinformatics technologies
Structural bioinformatics – Data format and processing – Secondary resources and applications –
Role of Structural bioinformatics – Biological Data Integration System.
REFERENCES
1. Yi-Ping Phoebe Chen (Ed), “BioInformatics Technologies”, First Indian Reprint, Springer
Verlag, 2007.
2. Bryan Bergeron, “Bio Informatics Computing”, Second Edition, Pearson Education, 2015.
3. Arthur M Lesk, “Introduction to Bioinformatics”, Second Edition, Oxford University Press,
2019
CO-PO Mapping
CO POs
PO1 PO2 PO3 PO4 PO5 PO6
1 1 1 - - - 3
2 1 1 2 2 1 2
3 1 2 1 1 3 3
4 1 2 2 2 2 2
5 1 2 1 - 2 3
COURSE OUTCOMES:
CO1: Explain the core principles behind CPS
CO2: Discuss the requirements of CPS. CO3:
Explain the various models of CPS. CO4:
Describe the foundations of CPS.
CO5: Use the various platforms to implement the CPS.
1. Raj Rajkumar, Dionisio De Niz , and Mark Klein, Cyber-Physical Systems, Addison-
Wesley Professional, 2016
2. Rajeev Alur, Principles of Cyber-Physical Systems, MIT Press, 2015.
3. Lee, Edward Ashford, and Sanjit Arunkumar Seshia. Introduction to embedded systems: A
cyber physical systems approach. 2nd Edition, 2017
4. André Platzer, Logical Analysis of Hybrid Systems: Proving Theorems for
ComplexDynamics., Springer, 2010. 426 pages,ISBN 978-3-642-14508-7.
5. Jean J. Labrosse, Embedded Systems Building Blocks: Complete and Ready-To-Use
Modules in C, The publisher, Paul Temme, 2011.
6. Jensen, Jeff, Lee, Edward, A Seshia, Sanjit, An Introductory Lab in Embedded and Cyber-
Physical Systems, http://leeseshia.org/lab, 2014.
7. documentation | KOBUKI (yujinrobot.com)
CO-PO Mapping
CO POs
2 2 2 2 - 1 --
3 - - 3 1 - 1
4 - - 3 1 - 1
5 2 - 2 3 3 3
Suggested Activities:
Flipped classroom on modeling three dimensional objects.
External learning – Collision detection algorithms.
Practical – Creating three dimensional models.
Suggested Evaluation Methods:
Tutorial – Three dimensional modeling techniques.
Brainstorming session on collision detection algorithms.
Demonstration of three dimensional scene creation.
Suggested Activities:
External learning – Different types of programming toolkits and Learn different types of
available VR applications.
Practical – Create VR scenes using any toolkit and develop applications.
Suggested Evaluation Methods:
Tutorial – VR tool comparison.
Brainstorming session on tools and technologies used in VR.
Demonstration of the created VR applications.
Suggested Activities:
External learning - AR Systems
Suggested Evaluation Methods:
Brainstorming session different AR systems and environments.
TOTAL: 45 PERIODS
PRACTICALS:
1. Study of tools like Unity, Maya, 3DS MAX, AR toolkit, Vuforia and Blender.
2. Use the primitive objects and apply various projection methods by handling the camera.
3. Download objects from asset stores and apply various lighting and shading effects.
4. Model three dimensional objects using various modeling techniques and apply textures
over them.
5. Create three dimensional realistic scenes and develop simple virtual reality enabled mobile
applications which have limited interactivity.
6. Add audio and text special effects to the developed application.
7. Develop VR enabled applications using motion trackers and sensors incorporating full
haptic interactivity.
8. Develop AR enabled applications with interactivity like E learning environment, Virtual
walkthroughs and visualization of historic places.
9. Develop MR enabled simple applications like human anatomy visualization, DNA/RNA
structure visualization and surgery simulation.
10. Develop simple MR enabled gaming applications. TOTAL: 30 PERIODS
COURSE OUTCOMES:
REFERENCES
1. Burdea, G. C. and P. Coffet. Virtual Reality Technology, Second Edition. Wiley-IEEE Press,
2003/2006.
2. Alan B. Craig, Understanding Augmented Reality, Concepts and Applications, Morgan
Kaufmann,First Edition 2013.
3. Alan Craig, William Sherman and Jeffrey Will, Developing Virtual Reality Applications,
Foundations of Effective Design, Morgan Kaufmann, 2009.
4. John Vince, “Virtual Reality Systems “, Pearson Education Asia, 2007.
5. Adams, “Visualizations of Virtual Reality”, Tata McGraw Hill, 2000.
6. Grigore C. Burdea, Philippe Coiffet , “Virtual Reality Technology”, Wiley Inter Science, 2nd
Edition, 2006.
7. William R. Sherman, Alan B. Craig, “Understanding Virtual Reality: Interface, Application
and Design”, Morgan Kaufmann, 2008
CO-PO Mapping
CO POs
1 3 1 3 1 - -
2 3 - 3 - 1 -
3 3 1 - - 1 -
4 - - - - 1 -
5 - 1 3 - - 2
Avg 3 1 3 1 1 2
AUDIT COURSES
COURSE OUTCOMES:
CO1 –Understand that how to improve your writing skills and level of readability
CO2 – Learn about what to write in each section
CO3 – Understand the skills needed when writing a Title
CO4 – Understand the skills needed when writing the Conclusion
CO5 – Ensure the good quality of paper at very first-time submission
REFERENCES:
1. Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht
Heidelberg London, 2011
2. Day R How to Write and Publish a Scientific Paper, Cambridge University Press 2006
3. Goldbort R Writing for Science, Yale University Press (available on Google Books) 2006
4. Highman N, Handbook of Writing for the Mathematical Sciences, SIAM. Highman’s
5. book 1998.
24CSPACX02 DISASTER MANAGEMENT LT PC
2 00 0
COURSE OBJECTIVES:
• Summarize basics of disaster
• Explain a critical understanding of key concepts in disaster risk reduction and humanitarian
response.
• Illustrate disaster risk reduction and humanitarian response policy and practice from
multiple perspectives.
• Describe an understanding of standards of humanitarian response and practical relevance
in specific types of disasters and conflict situations.
• Develop the strengths and weaknesses of disaster management approaches
UNIT I INTRODUCTION 6
Disaster: Definition, Factors and Significance; Difference between Hazard And Disaster; Natural
and Manmade Disasters: Difference, Nature, Types and Magnitude.
REFERENCES:
1. Goel S. L., Disaster Administration And Management Text And Case Studies”, Deep &
Deep Publication Pvt. Ltd., New Delhi,2009.
2. NishithaRai, Singh AK, “Disaster Management in India: Perspectives, issues and strategies
“’New Royal book Company,2007.
3. Sahni, Pradeep Et.Al. ,” Disaster Mitigation Experiences And Reflections”, Prentice Hall
OfIndia, New Delhi,2001.
SUGGESTED READING
1. The Constitution of India,1950(Bare Act),Government Publication.
2. Dr.S.N.Busi, Dr.B. R.Ambedkar framing of Indian Constitution,1st Edition, 2015.
3. M.P. Jain, Indian Constitution Law, 7th Edn., LexisNexis,2014.
4. D.D. Basu, Introduction to the Constitution of India, LexisNexis, 015.
5. புறநொனூறு
சிறுவபன வள் ளலொனொன்
6. அகநொனூறு(4) - வண்டு
நற் றிகண(11) - நண்டு
கலித்ததொகக - யொகன, புறொ
ஐந்திகண ஐம் பது - மொன்
ஆகியகவ பற் றிய தைய் திகள்
UNIT: V நவீன தமிழ் இலக்கியம் 6
1. உகரநகடத் தமிழ்
• தமிழின் முதல் புதினம்
• தமிழின் முதல் சிறுககத
• கட்டுகர இலக்கியம்
• பயண இலக்கியம்
• நொடகம்
COURSEOBJECTIVES:
• To provide students with fundamental knowledge of the notion of corporate sustainability.
• To determine how organizations impacts on the environment and socio-technical systems,
the relationship between social and environmental performance and competitiveness, the
approaches and methods.
• To Understand the importance of integrating sustainability into corporate strategies.
• To Learn how to identify and exploit opportunities for sustainable business ventures
• To Explore various renewable energy sources and their potential for sustainable
development.
COURSE OUTCOMES:
CO1: An understanding of sustainability management as an approach to aid in evaluating and
minimizing environmental impacts while achieving the expected social impact.
CO2: An understanding of corporate sustainability and responsible Business Practices
CO3: Knowledge and skills to understand, to measure and interpret sustainabilityperformances.
CO4: Knowledge of innovative practices in sustainable business and community
management
CO5: Deep understanding of sustainable management of resources and commodities
REFERENCES:
1. Daddi, T., Iraldo, F., Testa, Environmental Certification for Organizations and Products:
Management, 2015
2. Christian N. Madu, Handbook of Sustainability Management 2012
3. Petra Molthan-Hill, The Business Student's Guide to Sustainable Management: Principles
and Practice, 2014
4. Margaret Robertson, Sustainability Principles and Practice, 2014
5. Peter Rogers, An Introduction to Sustainable Development, 2006
COURSE OBJECTIVES:
• To learn about the process involved in the design and development of real-time embedded
system
• To develop the embedded C programming skills on 8-bit microcontroller
• To study about the interfacing mechanism of peripheral devices with 8-bit microcontrollers
• To learn about the tools, firmware related to microcontroller programming
• To build a home automation system
REFERENCES:
1. Dhananjay V. Gadre, "Programming and Customizing the AVR Microcontroller", McGrawHill,
2001.
2. Joe Pardue, "C Programming for Microcontrollers ", Smiley Micros, 2005.
3. Steven F. Barrett, Daniel J. Pack, "ATMEL AVR Microcontroller Primer : Programming and
Interfacing", Morgan & Claypool Publishers, 2012
4. Mike Riley, "Programming Your Home - Automate With Arduino, Android and Your
Computer", the Pragmatic Programmers, Llc, 2012.
6. Richard Szeliski, "Computer Vision: Algorithms and Applications", Springer, 2011.
7. Kevin P. Murphy, "Machine Learning - a Probabilistic Perspective", the MIT Press
Cambridge, Massachusetts, London, 2012.
ETHICAL MANAGEMENT LT P C
3003
COURSE OBJECTIVE
• To equip students with the knowledge and skills to integrate ethical principles and social
responsibility into managerial and organizational practices.
• To help students develop knowledge and competence in ethical management and decision
making in organizational contexts.
• To identify and manage relationships with various internal and external stakeholders, ensuring
fairness, justice, and sustainability.
• To analyze the effect of individual variables on ethics.
• Develop practical techniques and skills to navigate ethical challenges
REFERENCES
1. Brad Agle, Aaron Miller, Bill O’ Rourke, The Business Ethics Field Guide: the essential
companion to leading your career and your company, 2016.
2. Steiner & Steiner, Business, Government & Society: A managerial Perspective, 2011.
3. Lawrence & Weber, Business and Society: Stakeholders, Ethics, Public Policy, 2020.
COURSE OBJECTIVES:
• Summarize basics of industrial safety
• Describe fundamentals of maintenance engineering
• Explain wear and corrosion
• Illustrate fault tracing
• Identify preventive and periodic maintenance
UNIT I INTRODUCTION 9
Accident, causes, types, results and control, mechanical and electrical hazards, types, causes
and preventive steps/procedure, describe salient points of factories act 1948 for health and
safety, wash rooms, drinking water layouts, light, cleanliness, fire, guarding, pressure vessels,
etc, Safety color codes. Fire prevention and firefighting, equipment and methods
TOTAL : 45 PERIODS
COURSE OUTCOME:
On successful completion of the course student will be able to:
CO1: Ability to summarize basics of industrial safety
CO2 : Ability to describe fundamentals of maintenance engineering
CO3: Ability to explain wear and corrosion
CO4: Ability to illustrate fault tracing
CO5: Ability to identify preventive and periodic maintenance
REFERENCES
1. Audels, Pump-hydraulic Compressors, Mcgrew Hill Publication, 1978.
2. Garg H P,Maintenance Engineering, S. Chand and Company,1987.
3. Hans F. Winterkorn, Foundation Engineering Handbook, Chapman & Hall London, 2013.
4. Higgins & Morrow, Maintenance Engineering Handbook, Eighth Edition,2008
24CSPOE305
ETHICAL HACKING LT P C
3003
COURSE OBJECTIVES:
• To examine the different phases involved in ethical hacking.
• To learn technologies for scanning and the steps involved in performing enumeration.
• To get exposure on the password cracking techniques and wireless network hacking.
• To study about the Trojans and Backdoors, Sniffers and Denial-Of-Service attack.
• To understand about and other applications.
COURSE OUTCOME:
On successful completion of the course student will be able to:
CO1: Identify appropriate hacking tools for different phases of hacking.
CO2: Work with scanning tools and enumeration techniques.
CO3: Apply various hacking tools for system hacking & wireless network hacking and recovery.
CO4: Design and transmit Trojans, Backdoors in different modes, construct Denial-Of-Service
attack and work with sniffing tools.
CO5: Construct and Sql Injection Attack.
REFERENCES:
1. Kimberly Graves, Certified Ethical Hacker STUDY GUIDE, Wiley publication, 2010.
2. Michael Gregg, Certified Ethical Hacker, Pearson publication, 2014.
3. Matt Walker, All-in-one Certified Ethical Hacker Exam Guide, McGraw Hill Edition, 2012.