M e Cse
M e Cse
UNIVERSITY DEPARTMENTS
M.E. COMPUTER SCIENCE AND ENGINEERING
REGULATIONS – 2023
VISION AND MISSION
1
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
M.E. COMPUTER SCIENCE AND ENGINEERING
REGULATIONS – 2023
A broad relation between the programme educational objective and the outcomes is given in the
following table
PROGRAMME
EDUCATIONAL PO1 PO2 PO3 PO4 PO5 PO6
OBJECTIVES
1. 1 1 3 2 1 3
2. 3 2 3 3 1 3
3. 3 2 3 3 1 3
4. 3 1 3 2 1 2
5. 1 1 1 1 1 3
6. 2 1 3 3 3 3
2
MAPPING OF COURSE OUTCOME AND PROGRAMME OUTCOME
Year Semester Course Name PO1 PO2 PO3 PO4 PO5 PO6
Advanced Mathematics for 3 3 3 3 2 2
Scientific Computing
Research Methodology and
IPR
Data Structures and
Sem 1
2.5 - 3 2.2 - -
Algorithms
Multi Core Architectures 3 3 3 2 1 2
Networking Technologies 2 1 3 2.2 - 2.2
Database Technologies 2 1 3 2.2 - 2.2
Year I
Techniques
Machine Learning 2.8 2.2 2.4 2.2 2.5 2
Professional Elective I
Professional Elective II
Professional Practices 2.8 2.2 2.6 3 2.4 2.4
Cyber Security 2.4 2.4 2 2.2 2 2
Professional Elective III
Sem 3
Professional Elective IV
Professional Elective V
Year 2
Project Work I
Project Work II
Sem 4
3
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
M.E. COMPUTER SCIENCE AND ENGINEERING
REGULATIONS – 2023
CHOICE BASED CREDIT SYSTEM
CURRICULA AND SYLLABI
SEMESTER I
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. Advanced Mathematics for
MA3154 FC 4 0 0 4 4
Scientific Computing
2. RM3151 Research Methodology and IPR RMC 2 1 0 3 3
3. CP3151 Data Structures and Algorithms PCC 3 0 0 3 3
4. CP3153 Multicore Architectures PCC 3 0 0 3 3
5. CP3154 Networking Technologies PCC 3 0 3 6 4.5
6. CP3152 Database Technologies PCC 3 0 0 3 3
PRACTICALS
7. Data Structures and Algorithms
CP3161 PCC 0 0 4 4 2
Laboratory
TOTAL 18 1 7 26 22.5
SEMESTER II
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. CP3251 Advanced Operating Systems PCC 3 0 0 3 3
2. CP3201 Compiler Optimization Techniques PCC 3 0 2 5 4
3. CP3252 Machine Learning PCC 3 0 3 6 4.5
4. Professional Elective I PEC 3 0 0 3 3
5. Professional Elective II
PEC 3 0 0 3 3
PRACTICALS
6. CP3261 Professional Practices EEC 0 0 4 4 2
TOTAL 15 0 9 24 19.5
4
SEMESTER III
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. CP3351 Cyber Security PCC 3 0 0 3 3
2. Professional Elective III PEC 3 0 2 5 4
3. Professional Elective IV PEC 3 0 0 3 3
4. Professional Elective V PEC 3 0 0 3 3
PRACTICALS
5. CP3311 Project Work I EEC 0 0 12 12 6
TOTAL 12 0 14 26 19
SEMESTER IV
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
PRACTICALS
1. CP3411 Project Work II EEC 0 0 24 24 12
TOTAL 0 0 24 24 12
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. RM3151 Research Methodology and IPR RMC 2 1 0 3 3
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. Advanced Mathematics for
MA3154 FC 4 0 0 4 4
Scientific Computing
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. Data Structures and
CP3151 PCC 3 0 0 3 3
Algorithms
2. CP3153 Multicore Architectures PCC 3 0 0 3 3
3. CP3154 Networking Technologies PCC 3 0 3 6 4.5
4. CP3152 Database Technologies PCC 3 0 0 3 3
5
5. Data Structures and
CP3161 PCC 0 0 4 4 2
Algorithms Laboratory
7. Advanced Operating
CP3251 PCC 3 0 0 3 3
Systems
8. Compiler Optimization
CP3201 PCC 3 0 2 5 4
Techniques
9. CP3252 Machine Learning PCC 3 0 3 6 4.5
11. CP3351 Cyber Security PCC 3 0 0 3 3
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
1. CP3261 Professional Practices EEC 0 0 4 4 2
2. CP3311 Project Work I EEC 0 0 12 12 6
3. CP3411 Project Work II EEC 0 0 24 24 12
TOTAL CREDITS 18
6
19. SE3053 Software Security PEC 3 0 0 3 3
20. CP3080 Virtualization Techniques PEC 3 0 0 3 3
21. Database Administration and
CP3059 PEC 3 0 0 3 3
Tuning
22. Data Warehousing and Data
CP3058 PEC 3 0 0 3 3
Mining Techniques
23. CP3076 Social Network Analysis PEC 3 0 0 3 3
24. Software Testing and Quality
SE3054 PEC 3 0 0 3 3
Assurance
25. CP3079 User Interface Design PEC 3 0 0 3 3
26. Software Reliability Metrics and
SE3052 PEC 3 0 0 3 3
Models
27. CP3081 Visualization Techniques PEC 3 0 0 3 3
28. BD3051 Foundations of Data Science PEC 3 0 0 3 3
29. CP3071 Wireless Communications PEC 3 0 0 3 3
30. CP3053 Agile Methodologies PEC 3 0 0 3 3
31. Statistical Natural Language
CP3078 PEC 3 0 0 3 3
Processing
32. CP3074 Quantum Computing PEC 3 0 0 3 3
33. Formal Methods in Software
SE3051 PEC 3 0 0 3 3
Systems
34. CP3066 GPU Computing PEC 3 0 0 3 3
35. CP3061 Devops and Microservices PEC 3 0 0 3 3
36. Full Stack Web Application
CP3064 PEC 3 0 2 5 4
Development
37. CP3054 Bioinformatics PEC 3 0 0 3 3
38. CP3069 Mixed Reality PEC 3 0 0 3 3
39. CP3057 Cyber Physical Systems PEC 3 0 0 3 3
SUMMARY
Name of the Programme: M.E. COMPUTER SCIENCE AND ENGINEERING
CREDITS
SUBJECT AREA CREDITS PER SEMESTER % Distribution
TOTAL
I II III IV
1. FC 4 4 5.48
2. PCC 15.5 11.5 3 30 41.10
3. PEC 6 10 16 21.92
4. RMC 3 3 4.11
5. EEC 2 6 12 20 27.40
6. TOTAL CREDIT 22.5 19.5 19 12 73 100
7
MA3154 ADVANCED MATHEMATICS FOR SCIENTIFIC COMPUTING LTPC
4 004
UNIT II SIMULATION 12
Discrete Event Simulation – Monte – Carlo Simulation – Stochastic Simulation – Applications to real
time problems.
REFERENCES:
1. Jay L. Devore, “Probability and Statistics for Engineering and the Sciences”, Cengage
Learning, 9th Edition, Boston, 2016.
2. Johnson, R.A, Irwin Miller and John Freund., “Miller and Freund’s Probability and Statistics
for Engineers”, Pearson Education, 9th Edition, New York, 2016.
3. Johnson, R.A., and Wichern, D.W., “Applied Multivariate Statistical Analysis”, Pearson
Education, Sixth Edition, New Delhi, 2013.
4. Ross. S.M., “Probability Models for Computer Science”, Academic Press, SanDiego, 2002.
5. Taha H.A.,, “Operations Research: An Introduction”, Prentice Hall of India Pvt. Ltd. 10th
Edition, New Delhi, 2017.
6. Winston, W.L., “Operations Research”, Thomson – Brooks/Cole, Fourth Edition, Belmont,
2003.
8
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 3 3 3 2 2
CO2 3 3 3 3 2 2
CO3 3 3 3 3 2 2
CO4 3 3 3 3 2 2
CO5 3 3 3 3 2 2
UNIT V PATENTS 9
Patents – objectives and benefits of patent, concept, features of patent, inventive steps,
specifications, types of patent application; patenting process - patent filling, examination of patent,
grant of patent, revocation; equitable assignments; Licenses, licensing of patents; patent agents,
registration of patent agents.
TOTAL: 45 PERIODS
COURSE OUTCOMES
Upon completion of the course, the student can
CO1: Describe different types of research; identify, review and define the research problem
CO2: Select suitable design of experiment s; describe types of data and the tools for collection of
data
CO3: Explain the process of data analysis; interpret and present the result in suitable form
CO4: Explain about Intellectual property rights, types and procedures
CO5: Execute patent filing and licensing
9
REFERENCES:
1. Cooper Donald R, Schindler Pamela S and Sharma JK, “Business Research Methods”, Tata
McGraw Hill Education, 11e (2012).
2. Soumitro Banerjee, “Research methodology for natural sciences”, IISc Press, Kolkata, 2022,
3. Catherine J. Holland, “Intellectual property: Patents, Trademarks, Copyrights, Trade Secrets”,
Entrepreneur Press, 2007.
4. David Hunt, Long Nguyen, Matthew Rodgers, “Patent searching: tools & techniques”, Wiley,
2007.
5. The Institute of Company Secretaries of India, Statutory body under an Act of parliament,
“Professional Programme Intellectual Property Rights, Law and practice”, September 2013.
UNIT IV NP COMPLETENESS 9
NP Classes- Polynomial Time Verification – Theory of Reducibility - NP Completeness Proof for
Vertex Cover & Hamiltonian Cycle
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand, design and implement balanced search structures
CO2:Analyse algorithms for time complexity
CO3:Understand and implement different meldable priority queues
CO4:Appreciate Approximation and randomized algorithm design
CO5:Apply various data structures for solving problems
10
CO-PO Mapping
11
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Discuss and evaluate the performance of computer systems
CO2:Discuss and point out the various ways of exploiting ILP
CO3:Point out the various optimizations that can be performed to improve the memory hierarchy
design
CO4:Discuss the issues related to multiprocessing and suggest solutions
CO5:Point out the salient features of different multicore architectures and how they exploit different
types of parallelism
CO6:Point out the salient features of different example domain specific architectures
CO-PO Mapping
UNIT IV 4G NETWORKS 9
LTE – Network Architecture and Interfaces – FDD Air Interface and Radio Networks –Scheduling –
Mobility Management and Power Optimization – LTE Security Architecture – Interconnection with
UMTS and GSM – LTE Advanced (3GPPP Release 10) – 4G Networks and Composite Radio
12
Environment – Protocol Boosters – Hybrid 4G Wireless Networks Protocols – Green Wireless
Networks – Physical Layer and Multiple Access – Channel Modelling for 4G.
UNIT V 5G NETWORKS 9
Introduction – Pillars – IoT and Context Awareness – Networking Reconfiguration and Virtualization
Support – Mobility – QoS Control – Approach for resource over-provisioning – Smart Cells –
Capacity limits and achievable gains with densification – Mobile data demand – Next Generation
Wireless Networks – Mobile clouds – Technologies and Services for Future Communication
Platforms – Cognitive Radio for 5G Wireless Networks.
REFERENCES
1. William Stallings, “High Speed Networks and Internets: Performance and Quality of Service”,
Prentice Hall, Second Edition, 2002.
2. Martin Sauter, “From GSM to LTE, An Introduction to Mobile Networks and Mobile Broadband”,
Wiley, 2014.
3. Savo G Glisic, “Advanced Wireless Networks – 4G Technologies”, John Wiley & Sons, 2007.
4. Jonathan Rodriguez, “Fundamentals of 5G Mobile Networks”, Wiley, 2015.
5. Naveen Chilamkurti, SheraliZeadally, HakimaChaouchi, “Next-Generation Wireless
Technologies”, Springer, 2013.
6. Martin Sauter, “Beyond 3G – Bringing Networks, Terminals and the Web Together: LTE, WiMAX,
IMS, 4G Devices and the Mobile Web 2.0”, Wiley, 2009.
7. Erik Dahlman, Stefan Parkvall, Johan Skold, “4G: LTE/LTE-Advanced for Mobile Broadband”,
Academic Press, 2013.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify the different features of integrated and differentiated services.
13
CO2:Demonstrate various protocols of wireless networks.
CO3:Analyze the use of next generation networks.
CO4:Design protocols for cellular networks.
CO5:Explore 5G networks and applications.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 2 1 3 1 - 2
CO2 1 1 3 1 - 2
CO3 3 1 3 3 - 2
CO4 2 1 3 3 - 3
CO5 2 1 3 3 - 2
14
REFERENCES
1. Ramez Elmasri, Shamkant B. Navathe, Fundamentals of Database Systems, Seventh Edition,
Pearson Education, 2016.
2. Abraham Silberschatz, Henry F. Korth, S. Sudarshan, Database System Concepts, Seventh
Edition, McGraw Hill Education 2020.
3. Brad Dayley, “Teach Yourself NoSQL with MongoDB in 24 Hours”, Sams Publishing, 2014.
4. Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical Approach to Design,
Implementation and Management”, Third Edition, Pearson Education, 2007.
5. V.S.Subramanian, “Principles of Multimedia Database Systems”, Harcourt India Pvt. Ltd.,2001.
6. C.J.Date, A.KannanandS.Swamynathan, “An Introduction to Database Systems”, Eighth
Edition, Pearson Education, 2006.
7. ShashankTiwari, ”Professional NoSQL”, Wiley, 2011.
8. David Lane, Hugh.E.Williums, Web Database Applications with PHP and MySQL, O’Reilly
Media; 2nd edition, 2004
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Design a Relational Database for an Enterprise.
CO2:Design a Distributed Database, Active Database and Temporal Database for an Enterprise.
CO3:Gain the knowledge in advanced databases.
CO4:Comprehend the use of XML Database, Web Database, Spatial Database, Multimedia
Database and Deductive Database.
CO5:Use MongoDB NoSQL Database to Maintain Data of an Enterprise.
CO-PO Mapping
LIST OF EXPERIMENTS:
1. Linked list implementation of Stack and Queue ADTs
2. Binary Search tree
3. Min/Max Heap
4. AVL tree
5. Red- Black tree
6. Splay Tree
7. Leftist Heap
8. Binomial Heap
TOTAL: 60 PERIODS
15
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Apply suitable data structures in problem solving.
CO2:Select suitable search structures for an application
CO3:Understand priority queue implementations
CO4:Differentiate between approximation and Randomized algorithms
CO5:Understand NP complete problem solutions
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 - 3 - - -
CO2 3 - - -
CO3 - 2 2 - -
CO4 - 2 2 - -
CO5 2 2 3 - -
UNIT I INTRODUCTION 9
Distributed Operating Systems – Issues – Communication Primitives – Limitations of a Distributed
System – Lamport’s Logical Clocks – Vector Clocks – Causal Ordering of Messages
16
TOTAL: 45 PERIODS
REFERENCES
1. Mukesh Singhal and Niranjan G. Shivaratri, “Advanced Concepts in Operating Systems –
Distributed, Database and Multiprocessor Operating Systems”, Tata MC Graw-Hill, 2001.
2. Rajib Mall, “Real-Time Systems: Theory and Practice”, Pearson Education India, 2006.
3. Karim Yaghmour, “Embedded Android”, O’Reilly, First Edition, 2013.
4. Nikolay Elenkov, “Android Security Internals: An In-Depth Guide to Android’s Security
Architecture”, No Starch Press, 2014.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify the features of distributed operating systems.
CO2:Demonstrate the various protocols of distributed operating systems.
CO3:Identify the different features of real time operating systems.
CO4:Discuss the features of mobile operating systems.
CO5:Discuss the features of cloud operating systems.
CO-PO Mapping
17
Optimizations: Unreachable-Code Elimination – Straightening – If Simplifications – Loop
Simplifications –Loop Inversion Un-switching – Branch Optimizations – Tail Merging or Cross
Jumping – Conditional Moves – Dead-Code Elimination – Branch Prediction – Machine Idioms and
Instruction Combining. LLVM and procedure level optimization.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand modern programming language features and constructs.
CO2:Identify the different optimization techniques that are possible for any specific block of code.
CO3:Design program specific and generic optimization techniques.
CO4:Manage procedures to reduce execution and resource overheads.
CO5:Learn to work and apply performance enhancement on any larger software project.
CO-PO Mapping
UNIT I INTRODUCTION 9
Machine Learning–Types of Machine Learning : Supervised Learning, Unsupervised Learning –
Machine Learning process- Testing machine learning algorithms - Parametric Vs non-parametric
models - Mathematical Basics for Machine Learning : Probability and Statistics for Machine Learning
– Probability Distributions – Decision Theory – Information theory – Bias Variance tradeoff.
TOTAL: 90 PERIODS
REFERENCES
1. Stephen Marsland, “Machine Learning – An Algorithmic Perspective”, Chapman and Hall,
CRC Press, Second Edition, 2014.
2. Christopher Bishop, “Pattern Recognition and Machine Learning” Springer, 2007.
3. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012.
4. EthemAlpaydin, “Introduction to Machine Learning”, MIT Press, Third Edition, 2014.
5. Tom Mitchell, “Machine Learning”, McGraw-Hill, 1997.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain the basic concepts of machine learning
CO2:Analyze linear and non-linear techniques for classification problems
CO3:Apply unsupervised and reinforcement algorithms, probabilistic and evolutionary approaches
for the given problems
CO4:Analyze importance of neural networks in machine learning and deep learning.
CO5:Identify applications suitable for different types of Machine Learning and to Implement
appropriate learning algorithm for an application and to analyze the results.
CO-PO Mapping
20
roles and functions of supporting organizations (R&D, Innovation, Infrastructure, L&D,
Knowledge Management, Asset Creation).
UNIT I INTRODUCTION 9
Need for Cyber security - History of Cyber security - Defining Cyberspace and Cyber security-
Standards - CIA Triad – Cyber security Framework
21
UNIT II ATTACKS AND COUNTERMEASURES 9
Malicious Attacks, Threats, and Vulnerabilities – Scope of cyber-attacks – Tools used to attack
computer systems – security breach – Risks, vulnerabilities and threats. Malware – malicious
software attack – social engineering attack – wireless network attack – web application attack
Access control - Audit – Authentication - Biometrics - Denial of Service Filters - Ethical Hacking –
Firewalls - Scanning, Security policy, Threat Management - Applying software update and patches
- Intrusion Detection Systems -Virtual Private Networks –Cryptographic Techniques
UNIT V TOOLS 9
Zenmap – Hydra –Kismet – John the Ripper – Airgeddon – Deauther Board – Aircrack-ng – EvilOSX
TOTAL: 45 PERIODS
REFERENCES
1. William Stallings, Effective Cybersecurity: A Guide to Using Best Practices and Standards, 1st
edition, 2019.
2. Charles J. Brooks, Christopher Grow, Philip A. Craig, Donald Short, Cybersecurity Essentials,
Wiley Publisher, 2018.
3. Yuri Diogenes, ErdalOzkaya, Cyber security - Attack and Defense Strategies, Packt Publishers,
2018.
4. Carol C. Woody, Nancy R. Mead, Cyber Security Engineering: A Practical Approach for Systems
and Software Assurance, Addison-Wesley, 2016.
5. Thomas A. Johnson Cyber Security- Protecting Critical Infrastructures from Cyber Attack and
Cyber Warfare, CRC Press, 2015.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Analyze and evaluate the cyber security needs of an organization.
CO2:Analyze the security issues in networks and computer systems to secure an infrastructure.
CO3:Design operational cyber security strategies and policies.
CO4:Apply critical thinking and problem-solving skills to detect current and future attacks on an
organization’s computer systems and networks.
CO5:Understand the functionality of cyber security tools.
22
CO-PO Mapping
UNIT II VIRTUALIZATION 9
Implementation Levels of Virtualization - Virtualization Structures, Tools and Mechanisms -
Virtualization of CPU, Memory, and I/O Devices - Virtual Clusters and Resource Management -
Virtualization for Data-Center Automation.
PRACTICAL EXERCISES 30
1. Experiment with public SaaS
2. Create a software using public PaaS
3. Experiment storage services in cloud
4. Create VMs in public cloud platforms
5. Experiment with load balancing
6. Experiment with elasticity in the cloud
7. Interlink storage services with VMs
8. Set up a virtual private cloud using public cloud platforms
9. Set up an open source private cloud
10. Experiment with CLI in the open source private cloud
TOTAL: 75 PERIODS
23
REFERENCES
1. Kai Hwang, Geoffrey C Fox, Jack J Dongarra, “Distributed and Cloud Computing From Parallel
Processing to the Internet of Things”, Morgan Kauffman imprint of Elsevier, 2012.
2. Arshdeep Bahga, Vijay Madisetti, “Cloud Computing: A Hands-On Approach”, Universities
Press (India) Private Limited, 2014.
3. James E Smith and Ravi Nair, “Virtual Machines”, Elsevier, 2005.
4. Thomas Erl, Zaigham Mahood, Ricardo Puttini, “Cloud Computing, Concept, Technology &
Architecture”, Prentice Hall, 2013.
5. Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi, “Mastering Cloud Computing”, Tata
McGraw-Hill, 2013.
6. Toby Velte, Anthony Velte, Robert C. Elsenpeter, “Cloud Computing, A Practical
Approach”,Tata McGraw-Hill Edition, 2010.
7. Tom White, “Hadoop: The Definitive Guide”, O’Reilly Media, 4th Edition, 2015.
8. John Rittinghouse and James Ransome, “Cloud Computing Implementation, Management and
Security”, CRC Press, 2010.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Articulate the main concepts, key technologies, strengths and limitations of cloud computing.
CO2:Identify the architecture, infrastructure and delivery models of cloud computing.
CO3:Explain the core issues of cloud computing such as security, privacy and interoperability.
CO4:Choose the appropriate technologies, algorithms and approaches for the related issues.
CO5:Set up and use cloud platforms and services.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 1 3 1 1 2
CO2 3 1 3 2 1 2
CO3 3 1 3 2 1 2
CO4 3 1 3 3 1 3
CO5 1 1 3 2 1 3
24
UNIT III INFORMATION GATHERING AND SCANNING 9
Information Gathering Techniques – Active Information Gathering – Passive Information Gathering
– Sources of Information Gathering – Tracing the Location – Traceroute – ICMP Traceroute – TCP
Traceroute – Usage – UDP Traceroute – Enumerating and Fingerprinting the Webservers – Google
Hacking – DNS Enumeration – Enumerating SNMP – SMTP Enumeration – Target Enumeration
and Port Scanning Techniques – Advanced Firewall/IDS Evading Techniques.
UNIT IV EXPLOITATION 9
Introduction to Metasploit – Reconnaissance with Metasploit – Port Scanning with Metasploit –
Compromising a Windows Host with Metasploit – Client Side Exploitation Methods – E–Mails with
Malicious Attachments – Creating a Custom Executable – Creating a Backdoor with SET – PDF
Hacking – Social Engineering Toolkit – Browser Exploitation – Post–Exploitation – Acquiring
Situation Awareness – Hashing Algorithms – Windows Hashing Methods – Cracking the Hashes –
Brute force Dictionary Attacks – Password Salts –Rainbow Tables – John the Ripper – Gathering
OS Information – Harvesting Stored Credentials.
TOTAL: 45 PERIODS
REFERENCES
1. Rafay Baloch, “Ethical Hacking and Penetration Testing Guide”, CRC Press, 2014.
2. Certified Ethical Hacker Study Guide v9, Sean-Philip Oriyano, Sybex; Study Guide Edition,2016
3. CEH official Certified Ethical Hacking Review Guide, Wiley India Edition, 2007
4. Patrick Engebretson, “The Basics of Hacking and Penetration Testing – Ethical Hacking and
Penetration Testing Made Easy”, Syngress Media, Second Revised Edition, 2013
5. Michael T. Simpson, Kent Backman, James E. Corley, “Hands-On Ethical Hacking and Network
Defense”, Cengage Learning, 2012
6. Kevin Beaver, “Ethical Hacking for Dummies”, Sixth Edition, Wiley, 2018.
7. Jon Erickson , “Hacking: The Art of Exploitation”, Second Edition, Rogunix, 2007
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Use the various security tools to assess the computing system.
CO2:Predict the vulnerabilities across any computing system using penetration testing.
CO3:Identify prediction mechanism to prevent any kind of attacks.
CO4:Protect the system from malicious software and worms.
CO5:Analyze the risk and support the organization for effective security measures.
25
CO-PO Mapping
LIST OF EXPERIMENTS 30
1. Intensity Transformations
2. Filtering in the Spatial domain
3. Filtering in the Frequency Domain
4. Image Restoration
5. Detection of Discontinuities
6. Region Based Segmentation
7. Morphological operations
8. Feature Extraction
26
9. Feature Selection
10. Motion Detection and Estimation
11. Video Enhancement and Restoration
12. Video Segmentation
13. Motion Tracking in Video
14. Steganography
15. Watermarking
TOTAL: 75 PERIODS
REFERENCES
1. Rafael C.Gonzalez and Richard E.Woods, “Digital Image Processing”, Third Edition, Pearson
Education, New Delhi, 2008
2. Al Bovik (Alan C Bovik, “The Essential Guide to Video Processing”, Academic Press, Second
Edition, 2009.
3. S.Sridhar, “Digital Image Processing”, Oxford University Press, New Delhi, 2011.
4. Murat Tekalp, “Digital Video Processing”, Prentice Hall, 2015.
5. Oges Marques, “Practical Image and Video Processing Using MATLAB”, Wiley-IEEE Press,
2011.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Have a clear impression of the breadth and practical scope of digital image processing and have
arrived at a level of understanding that it is the foundation for most of the work currently
underway in this field.
CO2:Critically analyze the role of video in modern technologies.
CO3:Implement basic image and video processing algorithms.
CO4:Design and develop various applications that incorporate different techniques of Image and
Video processing.
CO5:Apply and explore new techniques in the areas of Image and Video Processing.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 3 3 2 2 2
CO2 3 3 3 3 2 2
CO3 3 3 3 3 2 2
CO4 3 3 3 3 2 2
CO5 3 3 3 3 2 2
27
UNIT II CRYPTOGRAPHY AND ATTACKS 9
Classical Cryptography, substitution cipher, different type of attack: CMA,CPA,CCA etc, Shannon
perfect secrecy, OTP, Pseudo random bit generators, stream ciphers and RC4
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Present the exploitation present in the security and learn the basic protocols
CO2:Apply the different cryptographic operations and key exchange protocols
CO3:Apply zero knowledge proofs and Exchange of Secrets
CO4:Analyze various cryptography techniques and its applications
CO5:Apply cryptographic Hash function to the real world application to achieve secured system.
CO-PO Mapping
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain the underlying architectures and models in IoT.
CO2:Analyze different connectivity technologies for IoT.
CO3:Develop simple applications using Arduino / Raspberry Pi.
29
CO4:Apply data analytics techniques to IoT.
CO5:Study the needs and suggest appropriate solutions for Industrial applications
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 1 2 3 4 5 6
CO2 3 - 3 2 - -
CO3 3 - 3 2 - -
CO4 3 3 2 3 -
CO5 3 2 2 2 - 3
UNIT V DEVOPS 9
DevOps: Motivation-Cloud as a platform-Operations- Deployment Pipeline: Overall Architecture -
Building and Testing-Deployment- Case study: Migrating to Microservices.
TOTAL: 45 PERIODS
REFERENCES
1. Roger S. Pressman, “Software Engineering – A Practioner’s Approach”, MC Graw Hill, 8th
edition.
2. Ian Sommerville, “Software Engineering”, Addison-Wesley, 9th Edition, 2010
3. Len Bass, Ingo Weber and Liming Zhu, “DevOps: A Software Architect‘s Perspective”, Pearson
Education, 2016.
30
4. Bernd Bruegge, Allen H. Dutoit, “Object-Oriented Software Engineering”, Prentice Hall,Third
Edition, 2009.
5. Robert E. Filman, Tzilla Elrad, Siobhán Clarke, Mehmet Aksit, “Aspect-Oriented Software
Development”, Addison-Wesley Professional, 2004.
6. Renu Rajni, Pradeep Oak, “Software Testing: Effective Methods, Tools and Techniques”,Tata
McGraw Hill, 2004.
7. Jonathan Bowen, “Formal Specification and Documentation using Z – A Case Study Approach”,
Intl Thomson Computer Press, 1996.
8. Antoni Diller, “Z: An Introduction to Formal Methods”, Wiley, 1994.
9. James Shore, Shane Warden “The Art of Agile Development – Pragmatic guide to agile software
development”, O’Reilly Media, October 2007.
10. Ken Schwaber, “Agile Project Management with SCRUM”, Microsoft Press, 2004.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Select Appropriate Process Model for Software Development.
CO2:Analyze user requirements and design S/W using object-oriented methodology in UML
CO3:Apply the various design patterns in software development
CO4:Incorporate appropriate quality factors and standards during Software Development
CO5:Apply software testing techniques in various software development stages
CO-PO Mapping
31
UNIT III CONVOLUTIONAL NEURAL NETWORKS 9
CNN Architectures – Convolution – Pooling – Training a Convnet: weights initialization - batch
normalization - hyper parameter optimization and batch normalization - Transfer Learning –
Pretraining, fine-tuning – Pretrained CNN networks – Visualizing CNN Learning – Case Study :
Image Classification using CNNs .
PRACTICAL EXERCISES 30
Environment : TensorFlow/Keras
Processor : GPU or Cloud GPUs
1 Implement a perceptron to evaluate logical operations including XOR
2 Implement a Multi-Layer Perceptron and train the model using feed forward algorithm.
3 Build a MLP and train it using backpropagation algorithm with gradient decent optimization
4 Demonstrate the contexts of under fitting, Overfitting and good fit with MLP and generalize
the model you built.
5 Build and evaluate a convolutional Neural Network model for image classification
6 Implement Transfer Learning concept for Sentence classification in Convolutional Neural
Networks.
7 Build and evaluate variational autoencoder for image generation
8 Build and evaluate RNN structure (LSTM/GRU) to do PoS tagging, Sentence
Classification, and Text Generation.
9 Build a GAN to generate image from text and evaluate the performance.
10 Implement Sentiment Analysis using Recursive Neural Networks
11 Build a Deep learning model for speech recognition
12 Implement Object Detection using Yolo V6
13 Build a Deep learning model to summarize a video with Attention Models
14 Build a Deep Learning model to evaluate energy efficiency in IoT devices.
TOTAL: 75 PERIODS
REFERENCES
1. Ian Good Fellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2017.
2. Francois Chollet, “Deep Learning with Python”, Manning Publications, 2018.
3. Josh Patterson, Adam Gibson, "Deep Learning: A Practitioner’s Approach”, O’Reilly Media,
2017.
4. Ragav Venkatesan, Baoxin Li, “Convolutional Neural Networks in Visual Computing”, CRC
Press, 2018.
5. Joshua F. Wiley, “R Deep Learning Essentials”, Packt Publications, 2016.
32
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the role of Applied Mathematics and the need of Deep learning.
CO2:To optimize and generalize deep neural networks for better performance.
CO3:To design and implement Convolutional and recurrent Neural Networks and Critically Analyse
in Image and text Related Projects
CO4:To design and implement Deep Learning Applications.
CO5:To learn deep generative networks implications in unsupervised learning.
CO-PO Mapping
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Design web pages that follow standards and are usable.
CO2:Design web sites that are appealing.
CO3:Appreciate the usage of Content management System for designing webContent.
CO4:Take advantage of Content Management System tools for managing content for large web
sites.
CO5:Use analytics tools for better management.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 3 2 2 - -
CO2 3 3 3 3 - 3
CO3 3 - 3 3 - 2
CO4 3 - 3 3 - 2
CO5 2 - 3 2 - 1
34
UNIT IV ONTOLOGY MANAGEMENT AND TOOL 9
Overview – Need for management – Development process – Target Ontology – Ontology mapping
– Skills management system – Ontological class – Constraints – Issues – Evolution –Development
of Tools and Tool Suites – Ontology Merge Tools – Ontology based Annotation Tools.
UNIT V APPLICATIONS 9
Web Services – Semantic Web Services – Case Study for specific domain – Security issues – Web
Data Exchange and Syndication – Semantic Wikis – Semantic Portals – Semantic Metadata in
Data Formats – Semantic Web in Life Sciences – Ontologies for Standardizations – Rule
Interchange Format.
TOTAL: 45 PERIODS
REFERENCES
1. Pascal Hitzler, Markus Krötzsch, Sebastian Rudolph, “Foundations of Semantic Web
Technologies”, Chapman & Hall/CRC, 2009.
2. Asuncion Gomez-Perez, Oscar Corcho, Mariano Fernandez-Lopez, “Ontological Engineering:
with Examples from the Areas of Knowledge Management, e-Commerce and the Semantic
Web”, Springer, 2004.
3. Grigoris Antoniou, Frank van Harmelen, “A Semantic Web Primer (Cooperative Information
Systems)”, MIT Press, 2004.
4. Alexander Maedche, “Ontology Learning for the Semantic Web”, First Edition, Springer. 2002.
5. John Davies, Dieter Fensel, Frank Van Harmelen, “Towards the Semantic Web: Ontology
Driven Knowledge Management”, John Wiley, 2003.
6. John Davies, Rudi Studer, Paul Warren, (Editor), “Semantic Web Technologies: Trends and
Research in Ontology-Based Systems”, Wiley, 2006.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Create ontology for a given domain.
CO2:Develop an application using ontology languages and tools.
CO3:Understand the concepts of semantic Web.
CO4:Use ontology related tools and technologies for application creation.
CO5:Design and develop applications using semantic web.
CO6:Understand the standards related to semantic web.
CO-PO Mapping
35
CP3070 MOBILE APPLICATION DEVELOPMENT LTPC
3 003
UNIT I INTRODUCTION 9
Mobile applications – Characteristics and Benefits – Application Model – Frameworks and Tools –
Mobile OS: Android, iOS – versions with its features – Android architecture –ART(Android Runtime)
– ADB(Android Debug Bridge) – Application framework basics
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Acquire the knowledge on Android OS and its features.
CO2:Acquire knowledge on GUI design required for Android App development.
CO3:Apply the knowledge of persistence Data storage mechanism in Android Apps.
CO4:Develop web based mobile application that accesses internet and location data.
CO5:Apply the knowledge in App development using telephony and Google Map services
CO6:Design and apply the knowledge to publish Android applications into Market
36
CO-PO Mapping
UNIT I INTRODUCTION 9
Blockchain Overview-History and Origin of Blockchain - Technical Concepts of Blockchain Systems:
- Physical Ledger Technology and Security - Digital Ledger Technology, Digital Security Technology:
- Cryptographic Hash Functions - Digital Signatures
UNIT II FOUNDATIONS 9
Centralization vs. Decentralization of Blockchain - Distributed Ledger Technology (DLT) Technical
Concepts: Mining - Distributed Consensus- Incentives - Proof of Work - Cryptosystems in practice-
Distributed Networks – Attacks - Consensus Protocols
PRACTICAL EXERCISES 30
1. Implement cryptographic hash functions
2. Implement Decentralized Applications
3. Implement a simple program using Web3 Javascript API
4. Set up Go-Ethereum client
5. Set up Python Ethereum Client
TOTAL: 75 PERIODS
REFERENCES
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization, and
Smart Contracts Explained”, Second Edition, Packt Publishing, 2018.
2. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and Cryptocurrency
Technologies: A Comprehensive Introduction” Princeton University Press, 2016.
3. Alex Leverington, “Ethereum Programming” Packt Publishing Limited, 2017.
37
4. Andreas Antonopoulos, Satoshi Nakamoto, “Mastering Bitcoin”, O’Reilly Publishing, 2014.
5. Roger Wattenhofer, “The Science of the Blockchain” Create Space Independent Publishing
Platform, 2016.
6. Arshdeep Bahga and Vijay Madisetti, “Blockchain Applications : A Hands-On Approach”,
2017.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain cryptocurrencies and their relationship with the blockchain technology.
CO2:Explain the different steps in the use of Bitcoins.
CO3:Relate Web 3 and Hyperledger to concepts in blockchain technologies.
CO4:Apply blockchains to different real-life problems
CO5:Implement a simple application using Ethereum.
CO-PO Mapping
38
Hypermedia.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Handle the multimedia elements effectively
CO2:Use Multimedia Hardware and Software for Editing and Authoringmultimedia applications
CO3:Implement Compression algorithms for various multimedia applications
CO4:Develop effective strategies to deliver Quality-of-Experience in networked Multimedia
applications
CO5:Design and develop multimedia applications in various domains
CO-PO Mapping
UNIT I INTRODUCTION 9
Basic Concepts – Practical Issues – Retrieval Process – Architecture – Boolean Retrieval
– Retrieval Evaluation – Open Source IR Systems–History of Web Search – Web
Characteristics– The impact of the web on IR –IR Versus Web Search–Components of a Search
engine
39
UNIT II RETRIEVAL MODELING 9
Taxonomy and Characterization of IR Models – Boolean Model – Vector Model – Term
Weighting-Scoring and Ranking –Language Models – Set Theoretic Models – Probabilistic
Models – Algebraic Models – Structured Text Retrieval Models – Models for Browsing
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Build an Information Retrieval system using the available tools.
CO2:Identify and design the various components of an Information Retrieval system.
CO3:Measure effectiveness and efficiency of information retrieval techniques.
CO4:Use parallel Information Retrieval approaches in real world problems.
CO5:Design an efficient search engine and analyze the Web content structure
CO-PO Mapping
40
BD3151 BIG DATA MINING AND ANALYTICS LTPC
3 003
UNIT V CLUSTERING 9
Introduction to Clustering Techniques – Hierarchical Clustering –Algorithms – K-Means – CURE –
Clustering in Non–Euclidean Spaces – Streams and Parallelism – Case Study: Advertising on the
Web – Recommendation Systems
TOTAL: 45 PERIODS
REFERENCES
1. Jure Leskovec, AnandRajaraman, Jeffrey David Ullman, “Mining of Massive Datasets”,
Cambridge University Press, Second Edition, 2014.
2. Jiawei Han, MichelineKamber, Jian Pei, “Data Mining Concepts and Techniques”, Morgan
Kaufman Publications, Third Edition, 2011.
3. Ian H.Witten, Eibe Frank “Data Mining – Practical Machine Learning Tools and Techniques”,
Morgan Kaufman Publications, Third Edition, 2011.
4. David Hand, HeikkiMannila and Padhraic Smyth, “Principles of Data Mining”, MIT Press,2001.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Design algorithms by employing Map Reduce technique for solving Big Data problems.
CO2:Identify similarities using appropriate measures.
CO3:Point out problems associated with streaming data and handle them.
CO4:Discuss algorithms for link analysis and frequent itemset mining.
CO5:Design solutions for problems in Big Data by suggesting appropriate clustering techniques.
CO-PO Mapping
41
CO3 3 3 3 3 3 3
CO4 3 3 3 2 2 2
CO5 3 3 3 3 3 3
UNIT I INTRODUCTION 10
Introduction to Parallel Algorithms – Principles of Parallel Algorithm Design- Parallel Algorithm
Models - Analyzing Parallel Algorithms- PRAM Algorithms: PRAM Model of Computation – Parallel
Reduction – Prefix Sum-List ranking- Merging Sorted lists
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the difference between sequential and parallel algorithms.
CO2:Design parallel algorithms in various models of parallel computation.
CO3:Understand various parallel processor organizations
CO4:Design parallel searching and sorting algorithms
CO5:Design parallel graph algorithms
42
CO-PO Mapping
UNIT V APPLICATIONS 9
Control systems; Speech systems; Image processing; Natural language processing and decision
making, Handwritten Script Recognition; Automotive Systems and Manufacturing; Decision Support
System; Bioinformatics; Investment and trading.
TOTAL: 45 PERIODS
REFERENCES
1. S. Rajasekaran, G.A. Vijayalakshmi Pai, “Neural Networks, Fuzzy Logic and Genetic Algorithm:
Synthesis and Applications”, Prentice Hall of India, 2010.
43
2. J.S.R. Jang, C.T. Sun, E. Mizutani, “Neuro-Fuzzy and Soft Computing”, Pearson Education,
2004.
3. An Introduction to Genetic Algorithm Melanic Mitchell (MIT Press)
4. Evolutionary Algorithm for Solving Multi-objective, Optimization Problems (2ndEdition), Collelo,
Lament, Veldhnizer (Springer)
5. S.N. Sivanandam, S.N. Deepa, “Principles of Soft Computing”, Second Edition, Wiley-India,
2007
6. Siman Haykin, “Neural Networks”, Prentice Hall of India, 1999.
7. Timothy Ross, “Fuzzy Logic with Engineering Applications”, Wiley Publications, 2016.
8. David E. Goldberg, “Genetic Algorithms in Search, Optimization and Machine Learning”,
Pearson Education, 2008.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Describe human intelligence and AI Explain how intelligent system works.
CO2:Recognize the feasibility of applying a soft computing methodology for a particular problem.
CO3:Apply fuzzy logic and reasoning to handle uncertainty and solve engineering problems.
CO4:Apply genetic algorithms to optimization problems.
CO5:Design neural networks for pattern classification and regression problems
CO6:Develop some familiarity with current research problems and research methods in Soft
Computing Techniques
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 2 2 2 2 - 2
CO2 2 3 2 3 2 2
CO3 2 2 2 2 - 2
CO4 3 3 2 2 2 2
CO5 3 2 2 2 2 2
CO6 2 3 2 3 3 1
UNIT I INTRODUCTION 8
Introduction – Making rational choices: basics of Games – strategy – preferences – payoffs –
Mathematical basics –Game theory –Rational Choice – Basic solution concepts-non-cooperative
versus cooperative games – Basic computational issues – finding equilibria and learning in games-
Typical application areas for game theory (e.g. Google’s sponsored search, eBay auctions,
electricity trading markets).
44
UNIT III GAMES WITH IMPERFECT INFORMATION 9
Games with Imperfect Information – Bayesian Games – Motivational Examples – General Definitions
–Information aspects – Illustrations – Extensive Games with Imperfect –Information – Strategies-
Nash Equilibrium – Beliefs and sequential equilibrium – Illustrations – Repeated Games – The
Prisoner’s Dilemma – Bargaining
TOTAL: 45 PERIODS
REFERENCES
1. Thomas S. Ferguson, Game Theory, Web notes available at
(https://www.cs.cmu.edu/afs/cs/academic/class/15859s05/www/ferguson/comb.pdf)
2. M. J. Osborne,” An Introduction to Game Theory”, Oxford University Press, 2012.
3. M. Machler, E. Solan, S. Zamir, “Game Theory”, Cambridge University Press, 2013.
4. N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani (Editors), “Algorithmic Game Theory”
Cambridge University Press, 2007.
5. A.Dixit and S. Skeath, “Games of Strategy”, Second Edition, W W Norton & Co Inc, 2004.
6. Yoav Shoham, Kevin Leyton-Brown, “Multiagent Systems: Algorithmic, Game-Theoretic, and
Logical Foundations”, Cambridge University Press, 2008.
7. Zhu Han, Dusit Niyato, Walid Saad, Tamer Basar and Hjorungnes, “Game Theory in Wireless
and Communication Networks”, Cambridge University Press, 2012.
8. Y.Narahari, “Game Theory and Mechanism Design”, IISC Press, World Scientific, 2015.
9. Anna R. Karlin and Yuval Peres, Game Theory, Alive, AMS, 2016 (E-book available online
from the author at (https://homes.cs.washington.edu/~karlin/GameTheoryBook.pdf)
10. Ivan Pastine, Tuvana Pastine, Tom Humberstone, Introducing Game Theory: A Graphic
Guide, Icon Books, 2017.
11. Steven Tadelis, Game Theory: An Introduction, Princeton University Press, 2013.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Discuss the notion of a strategic game and equilibria and identify the characteristics of main
applications of these concepts.
CO2:Discuss the use of Nash Equilibrium for other problems.
CO3:Identify key strategic aspects and based on these be able to connect them to appropriate
game theoretic concepts given a real world situation.
CO4:Identify some applications that need aspects of Bayesian Games.
CO5:Implement a typical Virtual Business scenario using Game theory.
45
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 - 3 3 - -
CO2 3 - 3 3 - 3
CO3 3 - 3 3 3 3
CO4 3 - 3 3 - 3
CO5 3 - - 3 - 3
46
3. Holger Karl, Andreas Willig, “Protocols and Architectures for Wireless Sensor Networks”,
Wiley India Private Limited, 2011.
4. Erdal Çayirci, Chunming Rong, “Security in Wireless Ad Hoc and Sensor Networks”, John
Wiley and Sons, 2009.
5. Carlos De Morais Cordeiro, Dharma Prakash Agrawal, “Ad Hoc and Sensor Networks:
Theory and Applications”, World Scientific Publishing, Second Edition, 2011.
6. Waltenegus Dargie, Christian Poellabauer, “Fundamentals of Wireless Sensor Networks
Theory and Practice”, Wiley India Private Limited, 2014
7. Adrian Perrig, J.D. Tygar, “Secure Broadcast Communication: In Wired and Wireless
Networks”, Kluwer Academic Publishers, Springer, 2002.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identifying suitable routing protocols for various scenarios of ad hoc networks.
CO2:To explore various mobility models for MANETs.
CO3:Identify different issues in wireless sensor networks.
CO4:Analyze various algorithms used in WSN
CO5:Identify and critique security issues in ad hoc and sensor networks
CO-PO Mapping
47
UNIT IV SECURITY TESTING 9
Traditional Software Testing – Comparison - Secure Software Development Life Cycle - Risk Based
Security Testing – Prioritizing Security Testing with Threat Modeling – Shades of Analysis: White,
Grey, and Black Box Testing..
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify various vulnerabilities related to memory attacks.
CO2:Apply security principles in software development.
CO3:Evaluate the extent of security risks
CO4:Involve selection of testing techniques related to software security in the testing phase of
software development.
CO5:Use tools for securing software.
CO-PO Mapping
48
CP3080 VIRTUALIZATION TECHNIQUES L T PC
3 0 03
49
2. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and Microsoft
Platform in the Virtual Data Center”, Auerbach Publications, 2006
3. Kumar Reddy, Victor Moreno, “Network virtualization”, Cisco Press, July, 2006.
4. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, A Press 2005
5. Kenneth Hess , Amy Newman, “Practical Virtualization Solutions: Virtualization from the
Trenches”, Prentice Hall, 2010
6. Lee Badger , Tim Grance , Robert Patt -Corner , Jeff Voas Cloud Computing Synopsis and
Recommendations NIST, May 2011
7. Tom White -Hadoop: The Definitive Guide Storage and Analysis at Internet Scale O'Reilly Media
Press May 2012
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the virtualization technologies.
CO2:Explore virtual clusters and resource management in virtualized environments.
CO3:Apply various virtual machine programming languages.
CO4:Differentiate between network and storage virtualization.
CO5:Understand the concept of service creation environments for developing cloud-based
applications.
CO-PO Mapping
50
UNIT III PERFORMANCE MANAGEMENT 7
Designing the DBMS Environment for Recovery - Types of Recovery - DBA Tools- Monitoring Vs
Management- Service level management-Performance parameters- Performance Tuning Tools-
Techniques for Optimizing Databases-Database reorganization- Files and datasets- space
management- Loading and unloading data-bulk data movement- Client server computing
REFERENCES
1. Craig S. Mullins, "Database Administration: The Complete Guide to Practices and Procedures",
Addison-Wesley Professional, 2nd edition, 2013.
2. Dennis Shasha and Philippe Bonnet, "Database Tuning, Principles, Experiments and
Troubleshooting Techniques", Elsevier Reprint, 2005.
3. C.J.Date, A.Kannan, S.Swamynathan, ―An Introduction to Database Systems‖, Eighth Edition,
Pearson Education, 2006.
4. R. Elmasri, S.B. Navathe, ―Fundamentals of Database Systems‖, Sixth Edition, Pearson
Education/Addison Wesley, 2010.
5. Craig S. Mullins. “DB2 Developer's Guide A Solutions-Oriented Approach to Learning the
Foundation and Capabilities of DB2 for Z/OS”, IBM Press, 6th edition, 2012.
6. Henry F Korth, Abraham Silberschatz, S. Sudharshan, ―Database System Concepts, Seventh
Edition, McGraw Hill, 2019
7. Thomas Connoly and Carlolyn Begg, "Database Systems, A Practical Approach to Design,
Implementation and Management", Fourth Edition, Pearson Education, 2008
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:An ability to understand various DBA roles, tasks and tools
CO2:Apply various Database recovery, backup and security privileges and
CO3:Differentiate between monitoring and management in the context of database administration
and explain their respective roles in ensuring database performance and availability.
CO4:Effectively tune and optimize relational databases, including query optimization, concurrency
control, recovery subsystem tuning, index selection, and hardware considerations.
51
CO5:Possess the skills to effectively optimize and tune database systems by employing techniques
such as normalization, denormalization, clustering, query tuning, performance monitoring, and
troubleshooting various subsystems.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 1 1 2 1 0 1
CO2 1 1 2 3 2 1
CO3 2 1 3 3 1 1
CO4 3 2 3 3 1 1
CO5 2 3 3 2 1 1
52
UNIT V TRENDS IN DATA MINING 9
Big Data - Mining complex data objects – Spatial databases – Temporal databases – Visual and
Audio Data Mining – Time series and sequence data – Text mining – Web mining – Data mining
Applications.
TOTAL: 45 PERIODS
REFERENCES
1. Jiawei Han, Micheline Kamber and Jian Pei“Data Mining Concepts and Techniques”, Third
Edition, Elsevier, 2011.
2. Alex Berson, Stephen J. Smith, “Data Warehousing, Data Mining & OLAP”, Tata McGraw Hill,
Tenth Reprint, 2007.
3. G. K. Gupta, “Introduction to Data Mining with Case Studies”, Eastern Economy Edition,
Prentice Hall of India, Third Edition, 2014.
4. Ian.H.Witten, Eibe Frank and Mark.A.Hall, “Data Mining: Practical Machine Learning Tools and
Techniques”, Morgan Kaufmann, Third edition, 2011.
5. Bruce Ratner, “Statistical and Machine - Learning Data Mining: Techniques for Better
Predictive Modeling and Analysis of Big Data”, CRC Press, Second Edition, 2012.
6. Mehmed kantardzic, “Data mining: Concepts, Models, Methods, and Algorithms”,
WileyBlackwell, Second Edition, 2011.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Evolve multidimensional intelligent model from typical system.
CO2:Design and implement data warehouse and to do Business Analytics.
CO3:Acquire knowledge on data and to prepare data for mining
CO4:Design and deploy classification and clustering techniques.
CO5:Evaluate various mining techniques on complex data objects.
CO-PO Mapping
UNIT I INTRODUCTION 9
Introduction to Semantic Web: Limitations of current Web - Development of Semantic Web -
Emergence of the Social Web - Social Network analysis: Development of Social Network Analysis -
Key concepts and measures in network analysis - Applications of Social Network Analysis- Graph
Essentials –Graph Basics – Graph Representation- Types of Graphs – Connectivity in Graphs –
Special Graphs – Graph Algorithms.
53
UNIT II MODELLING, AGGREGATING AND KNOWLEDGE REPRESENTATION 9
Ontology and their role in the Semantic Web: Ontology-based knowledge Representation - Ontology
languages for the Semantic Web: Resource Description Framework - Web Ontology Language -
Modelling and aggregating social network data: State-of-the-art in network data representation -
Ontological representation of social individuals - Ontological representation of social relationships -
Aggregating and reasoning with social network data - Advanced representations.
UNIT V APPLICATIONS 9
Classical Recommendation Algorithms- Recommendation Using Social Context-Evaluating
Recommendations Behavior Analytics: Individual Behavior- Collective Behavior- Hacking on Twitter
Data-Twitter: Friends, Followers, and Set wise Operations-Analyzing Tweets-Visualizing tons of
tweets.
TOTAL: 45 PERIODS
REFERENCES
1. R. Zafarani, M. Abbasi, and H. Liu,“Social Media Mining: An Introduction”, Cambridge
University Press, 2014.
2. Peter Mika, “Social Networks and the Semantic Web”, First Edition, Springer 2007.
3. Borko Furht, “Handbook of Social Network Technologies and Applications”, 1st Edition,
Springer, 2010.
4. Guandong Xu ,Yanchun Zhang and Lin Li, “Web Mining and Social Networking – Techniques
and applications”, First Edition, Springer, 2011.
5. Dion Goh and Schubert Foo, “Social information Retrieval Systems: Emerging Technologies
and Applications for Searching the Web Effectively”, IGI Global Snippet, 2008.
6. Matthew A. Russell, “Mining the Social Web”, O‟Reilly Media,2nd edition, 2013.
7. Colleen McCue, “Data Mining and Predictive Analysis: Intelligence Gathering and Crime
Analysis”, Elsevier,2nd edition, 2015.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Develop semantic web related applications.
CO2:Represent knowledge using ontology.
CO3:Predict human behaviour in social web and related communities.
CO4:Visualize social networks
54
CO5:Apply social network analysis techniques in real-life applications
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 3 2 2 2 1
CO2 3 3 3 3 2 1
CO3 3 3 2 3 3 1
CO4 3 3 3 3 3 1
CO5 3 1 - - 3 1
UNIT I INTRODUCTION 9
Introduction to Software Quality - Challenges – Quality Factors – Testing Activities – Test Case
Selection – Power of Test – Components of SQA – SQA Components in Project Life Cycle – Test
Groups – Software Quality Assurance Group – Reviews
REFERENCES
1. Yogesh Singh, “Software Testing”, Cambridge University Press, 2012
2. Daniel Galin, “Software Quality Assurance – from Theory to Implementation” Pearson
Education, 2009
3. Aditya Mathur, “Foundations of Software Testing”, Pearson Education, 2008
4. Srinivasan Desikan, Gopalaswamy Ramesh, “Software Testing – Principles and Practices”,
Pearson Education, 2006
5. Ron Patton, ”Software Testing” , Second Edition, Pearson Education, 2007
55
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Develop Quality plans and use SQA components in project life cycle.
CO2:Analyze the product Quality.
CO3:Judge the use of infrastructure components and use configuration items for Quality control.
CO4:Use various testing methods and verify.
CO5:Assess Quality standards of various software products.
CO-PO Mapping
UNIT I INTRODUCTION 9
process of Design thinking, Human factors in Interaction Design, Understanding Users- cognition
and cognitive frameworks, User Centred approaches - modeling users personas and goals,
Usability, accessibility standards and Universal Usability. HCI and software Engineering, User
Centric Computing, Computational User models.
UNIT IV EVALUATION 9
Evaluation Techniques- Expert Reviews and Heuristics - Assessing User Experience- Usability
Testing – Acceptance tests, Heuristic Evaluation and Walkthroughs, Analytics Predictive Models.
56
REFERENCES
1. Ben Shneiderman, Catherine Plaisant, Maxine Cohen, Steven Jacobs, NiklasElmqvist,
“Designing the User Interface: Strategies for Effective Human-Computer Interaction”, Sixth
Edition, Pearson Education, 2018.
2. Jenny Preece, Helen Sharp, Yvonne Rogers, “Interaction Design: Beyond Human Computer
Interaction”, Wiley Student Edition, 5th Edition, Wiley, 2019.
3. Jenifer Tidwell, Charles Brewer & Aynne Valencia, “Designing Interfaces: Patterns for Effective
Interaction Design”, Third Edition,O'reilly, 2020.
4. Alan Cooper, Robert Reimann, David Cronin, Christopher Noessel, “About Face: The
Essentials of Interaction Design”, 4th Edition, Wiley, 2014.
5. Samit Bhattacharya, “Human-Computer Interaction: User-Centric Computing for Design”,
McGrawHill, 1st Edition, 2019.
6. Donald A. Norman, “Design of Everyday Things”, MIT Press, 2013.
7. Steve Krug, “Don't Make Me Think, Revisited: A Common Sense Approach to Web and Mobile
Usability”, Third Edition, New Riders, 2014.
8. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human Computer Interaction”, Third
Edition, Pearson Education, 2004.
9. Alan Dix, Devina Ramduny-Ellis, Jo Hare, Steve Gil,l TouchIT: Understanding Design in a
Physical-Digital World, Oxford University Press, 1st Edition, 2022.
10. https://www.nngroup.com
11. https://www.interaction-design.org/
12. www.mural.co
13. https://m3.material.io/
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Apply usability principles and user/cognitive modeling for various design tasks.
CO2:Use the different design methods, interaction styles, metaphors, basic design paradigms
CO3:Create advanced interaction designs for a variety of use cases in complex environments.
CO4:Evaluate interaction designs and implementations.
CO5:Use formal models and notation to design interactions for new systems.
CO6:Explore use cases from real world examples and suggest usable designs.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 2 2 3 2 2 1
CO2 2 2 3 2 2 1
CO3 2 2 3 2 2 1
CO4 2 2 3 2 2 1
CO5 2 2 3 2 2 1
CO6 2 2 3 2 2 1
57
SE3052 SOFTWARE RELIABILITY METRICS AND MODELS LTPC
3 003
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify and apply various software metrics, which determine the quality level of software.
CO2:Identify and evaluate the reliability of any given software product.
CO3:Understand the fault handling and failure forecasting techniques in software systems.
58
CO4:Understand and Comprehend different time-dependent and time-independent software
reliability models.
CO5:Design reliability models for evaluating the quality level of software systems based on the
requirement.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 - 3 3 1 3
CO2 3 - 3 3 3 3
CO3 2 - 1 1 1 3
CO4 2 2 2 1 1 3
CO5 3 - 3 2 2 3
UNIT I INTRODUCTION 9
Introduction – Visualization Stages – Computational Support – Issues – Different Types of Tasks –
Data representation – Limitation: Display Space, Rendering Time, Navigation Link.
59
2. Colin Ware, “Information Visualization Perception for Design”, Third edition, Margon Kaufmann
Publishers, 2012.
3. Robert Spence, “Information Visualization Design for Interaction”, Second Edition, Pearson
Education, 2006.
4. Benjamin B. Bederson and Ben shneiderman, “The Craft of Information Visualization”, Morgan
Kaufmann Publishers, 2003.
5. Thomas strothotte, “Computational Visualization: Graphics, Abstraction and Interactivity”,
Springer, 1998.
6. Matthew O. Ward, George Grinstein, Daniel Keim, “Interactive Data Visualization: Foundation,
Techniques and Applications”, Second Edition, A. K. Peters/CRC Press, 2015.
7. Joerg Osarek, “Virtual Reality Analytics”, Gordon’s Arcade, 2016.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Apply mathematics and basic science knowledge for designing information visualizing System.
CO2:Collect data ethically and solve engineering problem in visualizing the information.
CO3:Implement algorithms and techniques for interactive information visualization.
CO4:Conduct experiments by applying various modern visualization tool and solve the space layout
problem.
CO5:Analyze and design system to visualize multidisciplinary multivariate Data individually or in
teams.
CO-PO Mapping
UNIT I INTRODUCTION 9
Data Science: Benefits and uses – facets of data – Data Science Process: Overview – Defining
research goals – Retrieving data – Data preparation – Exploratory Data analysis – build the model–
presenting findings and building applications – Data Mining – Data Warehousing – Basic Statistical
descriptions of Data
60
UNIT III DESCRIBING RELATIONSHIPS 9
Correlation –Scatter plots –correlation coefficient for quantitative data –computational formula for
correlation coefficient – Regression –regression line –least squares regression line – Standard error
of estimate – interpretation of r2 –multiple regression equations –regression towards the mean
REFERENCES
1. David Cielen, Arno D. B, Meysman and Mohamed Ali, “Introducing Data Science”, Manning
Publications, 2016.
2. Robert S. Witte and John S. Witte, “Statistics”, Eleventh Edition, Wiley Publications, 2017.
3. Jake Vander Plas, “Python Data Science Handbook”, O’Reilly, 2016.
4. Matthew O. Ward, George Grinstein, Daniel Keim, “Interactive Data Visualization: Foundation,
Techniques and Applications”, Second Edition, A. K. Peters/CRC Press, 2015.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Define the data science process
CO2:Understand different types of data description for data science process
CO3:Gain knowledge on relationships between data
CO4:Use the python libraries for data wrangling
CO5:Apply visualization libraries in python to interpret and explore data
CO-PO Mapping
61
CP3071 WIRELESS COMMUNICATIONS LTPC
3 003
62
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand concepts of wireless communication.
CO2:Analyse the different types of wireless channels and coding
CO3:Understand about transmitter and receiver diversity and equalisation.
CO4:Learn about performance of the digital modulation.
CO5:Explore 5G, 6G technology concepts.
CO-PO Mapping
63
REFERENCES
1. Craig Larman, “Agile and Iterative Development: A Manager’s Guide”, Addison-Wesley,
2004.
2. David J. Anderson and Eli Schragenheim, “Agile Management for Software Engineering:
Applying the Theory of Constraints for Business Results”, Prentice Hall, 2003.
3. Kevin C. Desouza, “Agile Information Systems: Conceptualization, Construction and
Management”, Butterworth-Heinemann, 2007
4. Hazza and Dubinsky, “Agile Software Engineering, Series: Undergraduate Topics in
Computer Science”, Springer, 2009.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Analyze existing problems with the team, development process and wider organization
CO2:Apply a thorough understanding of Agile principles and specific practices
CO3:Select the most appropriate way to improve results for a specific circumstance or need
CO4:Judge and craft appropriate adaptations to existing practices or processes depending upon
analysis of typical problems
CO5:Evaluate likely successes and formulate plans to manage likely risks or problems
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 1 3 - 2 3
CO2 2 - 3 3 1 3
CO3 3 - - - 3 3
CO4 2 - 1 2 3 3
CO5 1 3 - - 2 3
UNIT V APPLICATIONS 9
Information Extraction – Named Entity Recognition - Relation Detection and Classification –
Temporal and Event Processing - Template-Filling - Biomedical Information Extraction. Question
Answering and Summarization -Information Retrieval -Factoid Question Answering - Summarization
- Single and Multi-Document Summarization - Focused Summarization - Evaluation. Dialog and
Conversational Agents – Properties of Human Conversations – Basic Dialogue Systems - VoiceXML
- Information- State and Dialogue Acts - Markov Decision Process Architecture. Machine Translation
–Issues in Machine Translation - Classical MT and the Vauquois Triangle -Statistical MT - Phrase-
Based Translation Model - Alignment in MT –IBM Models – Evaluation.
TOTAL: 45 PERIODS
REFERENCES
1. Jurafsky and Martin, “Speech and Language Processing”, Pearson Prentice Hall, Second
Edition, 2008.
2. Christopher D. Manning and HinrichSchütze, “Foundations of Statistical Natural Language
Processing”, MIT Press, 1999.
3. Stevan Bird, “Natural Language Processing with Python”, Shroff, 2009
4. James Allen, “Natural Language Understanding”, Addison Wesley, Second Edition, 2007.
5. NitinIndurkhya, Fred J. Damerau, “Handbook of Natural Language Processing”, (Chapman&
Hall/CRC Machine Learning & Pattern Recognition), Second Edition, 2010.
6. Alexander Clark, Chris Fox, Shalom Lappin, “The Handbook of Computational Linguistics and
Natural Language Processing”, Wiley-Blackwell, 2012.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify the different linguistic components of given sentences.
CO2:Design a morphological analyser for a language of your choice using finite state automata
concepts.
CO3:Implement the Earley algorithm for a language of your choice by providing suitable grammar
and words.
CO4:Use a machine learning algorithm for word sense disambiguation.
CO5:Build a tagger to semantically tag words using WordNet.
CO6:Design a business application that uses different aspects of language processing.
65
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 2 - 1 - - -
CO2 2 - 3 2 - 3
CO3 2 - 3 3 - 2
CO4 2 - 2 2 - 2
CO5 2 - 2 2 - 3
CO6 2 - 2 2 - 3
REFERENCES
1. Michael A. Nielsen, Issac L. Chuang, Quantum Computation and Quantum Information,
Cambridge University Press, Tenth Edition 2010.
66
2. Parag K Lala, Quantum Computing, A Beginners Introduction, Mc Graw Hill Education, First
edition 2020.
3. Chris Bernhardt, Quantum Computing for Everyone, The MIT Press, Reprint edition 2020.
4. Jack D. Hidary’s Quantum Computing: An applied approach, Springer, 2019.
5. Eric Johnston, Nic Harrigan, and Mercedes Gimeno Segovia, Programming Quantum
Computers: Essential Algorithms and Code, O′reilly, 2019.
6. Pierpaolo Marturano, Quantum Computing, De Gruyter Oldenbourg Publishing, 2023.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the basics of quantum computing.
CO2:Understand the background of Quantum Mechanics.
CO3:Analyse the computation models.
CO4:Model the circuits using quantum computation. Environments and frameworks.
CO5:Understand the quantum operations such as noise and error-correction.
CO-PO Mapping
UNIT I INTRODUCTION 9
Need for Formal methods – Problems in Natural Language Specifications, Formal Versus Informal
Programming – Advantages of Formal Methods – Requirements of Formal System – Types –
Prepositional Logic – Predicate Logic – Relationships and Functions.
67
UNIT V FORMAL SEMANTICS AND TOOLS 9
Operational Semantics – Denotational Semantics – Axiomatic Semantics Proof Editors – Proof
Analyser – Symbolic Simulators –Translators – Test Generation Tools.
TOTAL: 45 PERIODS
REFERENCES
1. Alexander Kossiakoff, William N. Sweet, Samuel J. Seymour, Steven M. Biemer, “Systems
Engineering Principles and Practice”, John Wiley & Sons, Inc., 2011.
2. Andrew Harry, “ Formal Methods: Fact File VDM and Z”, John Wiley and Sons, 1996.
3. Severance, Frank L. An Introduction to System Modeling and Simulation. New York: Wiley,
2001
4. Jim Woodcock, Jim Davies, “Using Z Specification, Refinement and Proof”, Prentice Hall
International, 1996.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:To model various classes of software systems within appropriate formalisms
CO2:To model various classes of software systems within appropriate formalisms;
CO3:To interpret and apply the formal languages of the formalisms for modeling software systems
CO4:To apply specific techniques for the analysis and verification of software systems;
CO5:To formulate and prove properties of software systems within studied formalisms
CO-PO Mapping
68
UNIT IV OPENCL BASICS 9
OpenCL Standard – Kernels – Host Device Interaction – Execution Environment – Memory Model
– Basic OpenCL Examples.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Describe GPU Architecture.
CO2:Write programs using CUDA, identify issues and debug them.
CO3:Implement efficient algorithms in GPUs for common application kernels, such as matrix
multiplication.
CO4:Write simple programs using OpenCL.
CO5:Given a problem, identify efficient parallel programming patterns to solve it.
CO-PO Mapping
69
UNIT II SECURITY IN DEVOPS 9
Virtualization – Container Orchestration – Secure Development – Disaster Recovery.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain basic DevOps practices
CO2:Be familiar with a Deployment Pipeline and associated tools
CO3:Understand Microservice Architecture
CO4:Be familiar with incident response and disaster recovery
CO5:Develop services using different technologies
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 1 1 3 3 - 1
CO2 1 1 3 3 - 1
CO3 1 1 3 3 - 1
CO4 1 1 3 3 - 1
CO5 1 1 3 3 - 1
70
CP3064 FULL STACK WEB APPLICATION DEVELOPMENT LTPC
3 024
Lab Exercises:
Implement JavaScript functions, arrays, objects, strings
Lab Exercises:
installing Node.js, Using createRoot() and render() methods,
Using React Class and function components, properties, events, conditionals, forms
Implementing simple UI like menus
Lab Exercises:
Implement simple Client-server communication using TOMCAT from REACT client
installing any IDE like STS (Spring Tool Suite) and configuring for spring application
Creating Spring Boot project with Spring Initializr
implementing a simple hello world web application
Lab Exercises:
Install MongoDB Atlas Cluster, use Dependencies, Spring Web and Spring Data
MongoDB, Docker, Container
Create a CRUD application with MongoDB and Spring Boot.
Lab Exercises:
Building RESTful web services with annotations: Rest controller, Request mapping, Request
Body, Path Variable.
71
Building Microservice: using the dependencies on the Spring Initializr - Spring Web, Spring
Boot DevTools, Spring Boot Actuator, Config Client.
TOTAL: 75 PERIODS
REFERENCES
1. John Carnell, Illary Huaylupo Sánchez, “Spring Microservices in Action”, 2nd Edition,
Manning Publications, 2021.
2. Greg L. Turnquist, Learning Spring Boot 3.0, 3rd Edition, Packt Publishing, 2022.
3. David Herron, Node.js Web Development, Packt Publishing Limited, 5th edition, 2020.
4. David Flanagan, Javascript The Definitive Guide, Oreilly, 7th Edition, 2020.
5. K. Siva Prasad Reddy, Sai Upadhyayula, Beginning Spring Boot 3: Build Dynamic Cloud-
Native Java Applications and Microservices, A Press, 2022.
6. Craig Walls, Spring Boot in Action, Manning Publications, 2016.
7. https://spring.io
8. https://react.dev
9. https://www.mongodb.com/compatibility/spring-boot
10. https://nodejs.org/en
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Use Javascript and its libraries for building front-end applications
CO2:Use React.js to build client-side applications
CO3:Develop Spring Boot based web applications
CO4:Integrate web applications with MongoDB
CO5:Develop Web applications, RESTful web services and MicroServices using full stack
CO-PO Mapping
UNIT I INTRODUCTION 9
Bioinformatics- Need for Bioinformatics technologies – Overview of Bioinformatics
technologies - Structural bioinformatics – Data format and processing – Secondary resources and
applications – Role of Structural bioinformatics – Biological Data Integration System.
72
UNIT III GRAPHS 9
Hidden Markov modeling for biological data analysis and protein, gene families Sequence
identification –Sequence classification – multiple alignment generation – Comparative modeling –
Protein modeling – genomic modeling – Probabilistic modeling – Bayesian networks – Boolean
networks – Molecular modeling – Computer programs for molecular modeling.
REFERENCES
1. David W. Mount Bioinformatics: Sequence and Genome Analysis, Cold Spring Harbor
Laboratory Press, 2nd ed., 2004
2. Arthur M .Lesk, Introduction to Bioinformatics, Oxford University Press, 2014
3. Big Data Analysis for Bioinformatics and Biomedical Discoveries Edited by Shui Qing Ye, CRC
Press, Taylor and Francis Group, 2015
4. Bolón-Canedo, V., & Alonso-Betanzos, A. (Eds.). Microarray Bioinformatics. Methods in
Molecular Biology, 2019
5. Andrew R.Leach, Molecular Modeling Principles And Applications, Prentice Hall,2009.
6. Baldi,P.,Brunak, S.Bioinformatics: The Machine Learning Approach, East West Press, 2nd 2001
7. Orpita Bosu, Bioinformatics – Databases, Tools and Algorithms, Oxford University Press, 2007.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Gather knowledge of basic bioinformatics and computational biology concepts
CO2:Perform analysis of biological data including proteomic, genomic and transcriptomic data and
provide meaningful interpretation of the results
CO3:Understand machine learning techniques, microarray data analysis and interpretation of results
CO4:Understand the concepts of modelling for bioinformatics
CO5:Perform analysis of various methods of phylogenetic tree construction and its evolutions
73
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 1 1 - - - 3
CO2 1 1 2 2 1 2
CO3 1 2 1 1 3 3
CO4 1 2 2 2 2 2
CO5 1 2 1 - 2 3
UNIT I INTRODUCTION 9
Introduction to Virtual Reality – Definition – Three I’s of Virtual Reality – Virtual Reality Vs 3D
Computer Graphics – Benefits of Virtual Reality – Components of VR System – Introduction to AR
– System Structure of Augmented Reality – Key Technology in AR – 3D Vision – Approaches to
Augmented Reality – Alternative Interface Paradigms – Spatial AR – Input Devices – 3D Position
Trackers – Performance Parameters – Types Of Trackers – Interaction-Modelling and annotation-
Navigation and Manipulation Interfaces – Gesture Interfaces – Types of Gesture InputDevices –
Output Devices – Graphics Display – Human Visual System – Personal Graphics Displays – Large
Volume Displays – Sound Displays – Human Auditory System.
UNIT IV MR PROGRAMMING 9
VR Programming – Toolkits and Scene Graphs – World Toolkit – Java 3D – Comparison of World
Toolkit and Java 3D – GHOST – People Shop – Human Factors in VR – Methodology And
Terminology – VR Health and Safety Issues – VR and Society –Mixed Reality Coding – Trajectories
through Mixed Reality Performance – Mobile Interface Design – Quantitative Evaluation – Qualitative
Evaluation
UNIT V APPLICATIONS 9
Emerging MR Applications in Medical, Military & Manufacturing– Education, Arts and Entertainment–
Applications of MR in Robotics-Application of AI in AR & VR: virtual assistant, Digital avatars and
characters, user engagement, Interactive training, digital art creation – Information Visualization –
Wearable Computing – Games
TOTAL: 45 PERIODS
74
REFERENCES
1. Grigore C. Burdea, Philip Coiffet, “Virtual Reality Technology”, Second Edition, WileyIndia,
2006.
2. Benford, S., Giannachi G., “Performing Mixed Reality”, MIT Press, 2011
3. Dieter Schmalstieg, Tobias Hollerer, “Augmented Reality: Principles & Practice”, Addison
Wesley, 2016.
4. Charles Palmer, John Williamson, “Virtual Reality Blueprints: Create Compelling VR
Experiences for Mobile”, Packt Publisher, 2018.
5. John Vince, “Introduction to Virtual Reality”, Springer-Verlag, 2004.
6. William R. Sherman, Alan B.Craig: Understanding Virtual Reality – Interface,Application,
Design”, Morgan Kaufmann, 2003.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Discuss the basic concepts of Mixed Reality.
CO2:Design and develop the Mixed Reality applications in different domains.
CO3:Design various models using modelling techniques.
CO4:Perform Mixed Reality Programming with toolkits.
CO5:Understand the working principles of input output devices used in mixed reality
applications.
CO6:Evaluate mixed reality-based applications.
CO-PO Mapping
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain and analyze the major concepts, philosophical and theoretical perspectives, empirical
findings, and historical trends in Cyber-Physical Systems.
CO2:Use Computational knowledge base to create their own methods for answering novel questions
of either a theoretical or applied nature, and to critically evaluate the work of others in the same
domain.
CO3:Articulate the main concepts, key technologies, strengths and limitations of Human Centered
Cyber Physical Systems.
CO4:Point out the challenges in HiTL and able to explain the future of HiTL CPS.
CO5:Be proficient with basic feedback and control research methods, including both theory-driven
and applied research design.
76
CO-PO Mapping
77