Ty Sy..
Ty Sy..
of
(Autonomous)
(As per Choice Based Semester and Grading System with effect from
Academic Year 2019 - 2020)
Preamble
This is the third year curriculum in the subject of Computer Science. The revised structure is designed to
transform students into technically competent, socially responsible and ethical Computer Science
professionals. In these Semesters we have made the advancements in the subject based on the previous
Semesters Knowledge.
In the first year basic foundation of important skills required for software development is laid. Second
year of this course is about studying core computer science subjects. The third year is the further
advancement which covers developing capabilities to design formulations of computing models and its
applications in diverse areas.
The proposed curriculum contains two semesters, each Semester contains two Electives: Elective-I and II.
Every Elective contains three papers based on specific areas of Computer Science. It also includes one Skill
Enhancement paper per semester, helps the student to evaluate his/her computer science domain
specific skills and also to meet industry expectations. This revised curriculum has not only taken the
specific areas of computer science into consideration but will also give the opportunity to the student to
prove his/her ability in the subject practically through the Project Implementation. In Semester V and
Semester VI student has to undertake a Project. It can boost his/her confidence and also can encourage
the student to perform innovations in the subject as the choice of the Project topic is kept open covering
most of the areas of Computer Science subject as per the students interest and the subject they have
learned during the Course.
Proposed Curriculum contains challenging and varied subjects aligned with the current trend with the
introduction of Machine Intelligence specific subject such as Artificial Intelligence, Information Retrieval.
Data Management related subjects such as Cloud Computing and Data Science. Image processing topics
such as Game Programming, Digital Image Processing. Introduction of physical world through Architecting
of IoT and Wireless Sensor Networks and Mobile Communication. Security domain is also evolved by the
introduction of Ethical Hacking, Cyber Forensic and Information and Network Security. To get the hands
on experience Linux Server Administration and Web Services topics are included.
In essence, the objective of this syllabus is to create a pool of technologically savvy, theoretically strong,
innovatively skilled and ethically responsible generation of computer science professionals. Hope that the
teacher and student community of University of Mumbai will accept and appreciate the efforts.
Course Artificial Intelligence
(Credits: 03 Lectures/Week:3)
GNKUSCS501
Learning Objectives:
• Artificial Intelligence (AI) and accompanying tools and techniques bring transformational
changes in the world.
• Machines capability to match, and sometimes even surpass human capability, make AI a
hot topic in Computer Science. This course aims to introduce the learner to this
interesting area.
Learning Outcome:
• After completion of this course, learner should get a clear understanding of AI and
different search algorithms used for solving problems.
• The learner should also get acquainted with different learning algorithms and models
used in machine learning
Unit Title No. of
lectures
Unit 1
1.1 What Is AI: Foundations, History and State of the Art of AI. 07
Intelligent Agents: Agents and Environments, Nature of
Environments, Structure of Agents.
Unit 2
Unit 3
3.1 Learning probabilistic models: Statistical Learning, Learning with 07
Complete Data, Learning with Hidden Variables: The EM Algorithm
References:
1. Artificial Intelligence: A Modern Approach, Stuart Russell and Peter Norvig,3rd
Edition, Pearson, 2010
Additional Reference(s):
Learning Objectives:
• Demonstrate proficiency with the Linux command line interface, directory & file
management techniques, file system organization, and tools commonly found on
most Linux distributions.
• Effectively operate a Linux system inside of a network environment to integrate with
existing service solutions.
• Demonstrate the ability to troubleshoot challenging technical problems typically
encountered when operating and administering Linux systems.
Learning Outcome:
• learner should get a clear understanding of AI and different search algorithms used
for solving problems.
• The learner should also get acquainted with different learning algorithms and
models used in machine learning.
Unit Title No. of
lectures
Unit 1
Unit 2
Unit 3
References:
1. Linux Administration: A Beginner’s Guide, Wale Soyinka, Seventh Edition, McGraw-Hill
Education, 2016
2. Ubuntu Server Guide, Ubuntu Documentation Team, 2016
Additional Reference(s):
Learning Objectives:
Learning Outcome:
Unit 1
Unit 2
References:
1. Software Engineering for Students, A Programming Approach, Douglas Bell, 4th Edition,,
Pearson Education, 2005
2. Software Engineering – A Practitioners Approach, Roger S. Pressman, 5th Edition, Tata
McGraw Hill, 2001
3. Quality Management, Donna C. S. Summers, 5th Edition, Prentice-Hall, 2010.
4. Total Quality Management, Dale H. Besterfield, 3rd Edition, Prentice Hall, 2003.
Additional Reference(s):
Learning Objectives:
Unit 1
Unit 2
References:
1. Cryptography and Network Security: Principles and Practice 5th Edition, William
Stallings, Pearson,2010
Additional Reference(s):
Learning Objectives:
• Discovering the interconnection and integration of the physical world. Learner should get
knowledge of the architecture of IoT.
Learning Outcome:
• Learners are able to design & develop IoT Devices. They should also be aware of the
evolving world of M2M Communications and IoT analytics
Unit 1
Unit 3
References:
1. From Machine-to-Machine to the Internet of Things: Introduction to a New Age of
Intelligence, Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis
Karnouskos, David Boyle,1st Edition, Academic Press, 2014.
2. Learning Internet of Things, Peter Waher, PACKT publishing, BIRMINGHAM –
MUMBAI,2015
Additional Reference(s):
1. Building the Internet of Things with IPv6 and MIPv6: The Evolving World of M2M
Communications, Daniel Minoli, Wiley Publications,2013
2. Internet of Things (A Hands-onApproach), Vijay Madisetti and ArshdeepBahga,1st Edition,
VPT, 2014.
3. http://www.cse.wustl.edu/~jain/cse570-15/ftp/iot_prot/index.html
Course: Web Services
Learning Objectives:
• To understand the details of web services technologies like SOAP, WSDL, and UDDI. To
learn how to implement and deploy web service client and server.
• To understand the design principles and application of SOAP and REST based web services
(JAX-Ws and JAX-RS).
• To understand WCF service.
• To design secure web services and QoS of Web Services
Learning Outcome:
• Emphasis on SOAP based web services and associated standards such as WSDL.
• Design SOAP based / RESTful / WCF services Deal with Security and QoS issues of Web
Services
Unit Title No. of
lectures
2.2 Build RESTful web services with JAX-RS APIs, The Description and 08
Discovery of RESTful Web Services, Design guidelines for building
RESTful web services, Secure RESTful web services
References:
1. Web Services: Principles and Technology, Michael P. Papazoglou, Pearson Education
Limited, 2008
2. RESTful Java Web Services, Jobinesh Purushothaman, PACKT Publishing,2nd Edition, 2015
3. Developing Service-Oriented Applications with WCF, Microsoft, 2017
https://docs.microsoft.com/en-us/dotnet/framework/wcf/index
Additional Reference(s):
1. Leonard Richardson and Sam Ruby, RESTful Web Services, O’Reilly, 2007
2. The Java EE 6Tutorial, Oracle, 2013
Course: Game Programming
Learning Objectives:
• Learner should get the understanding computer Graphics programming using Directx or
Opengl.
• Along with the VR and AR they should also aware of GPU, newer technologies and
programming using most important API for windows.
Learning Outcome:
• Learner should study Graphics and gamming concepts with present working style of
developers where everything remains on internet and they need to review it,
understand it, be a part of community and learn.
References:
1. Mathematics for Computer Graphics, John Vince, Springer-Verlag London, 5th
Edition,2017
2. Mathematics for 3D Game Programming and Computer Graphic, Eric Lengyel, Delmar
Cengage Learning, Delmar Cengage Learning,2011
3. Introduction To 3D Game Programming With Directx® 11,Frank D Luna, Mercury Learning
And Information,2012.
4. https://docs.unity3d.com/Manual/index.html - Free
Additional Reference(s):
1. Computer Graphics, C Version, Donald Hern and Pauline Baker, Pearson Education, 2 nd
Edition, 1997
2. HLSL Development Cookbook, Doron Feinstein, PACKT Publishing,2013
Artificial Intelligence
1. Implement Breadth first search algorithm for Romanian map problem.
2. Implement Iterative deep depth first search for Romanian map problem.
3. Implement A* search algorithm for Romanian map problem.
4. Implement recursive best-first search algorithm for Romanian map problem.
5. Implement decision tree learning algorithm for the restaurant waiting problem.
6. Implement feed forward back propagation neural network learning algorithm for the
restaurant waiting problem.
7. Implement Adaboost ensemble learning algorithm for the restaurant waiting
problem.
8. Implement Naive Bayes’ learning algorithm for the restaurant waiting problem.
9. Implement passive reinforcement learning algorithm based on adaptive dynamic
programming (ADP) for the 3 by 4 world problem
10. Implement passive reinforcement learning algorithm based on temporal differences
(TD) for 3 by 4 world problem.
Linux Server Administration
Practical shall be performed using any Linux Server (with 8GB RAM).
- Internet connection will be required so that Linux server (command line mode) can be
connected to Internet.
1. Install DHCP Server in Ubuntu 16.04
2. Initial settings: Add a User, Network Settings, Change to static IP address, Disable IPv6 if
not needed, Configure Services, display the list of services which are running, Stop and
turn OFF auto-start setting for a service if you don’t need it, Sudo Settings
3. Configure NTP Server (NTPd), Install and Configure NTPd, Configure NTP Client (Ubuntu
and Windows)
4. SSH Server : Password Authentication
Configure SSH Server to manage a server from the remote computer, SSH Client : (Ubuntu
and Windows)
5. Install DNS Server BIND, Configure DNS server which resolves domain name or IP address,
Install BIND 9, Configure BIND, Limit ranges you allow to access if needed.
6. Configure DHCP Server, Configure DHCP (Dynamic Host Configuration Protocol) Server,
Configure NFS Server to share directories on your Network, Configure NFS Client. (Ubuntu
and Windows Client OS)
7. Configure LDAP Server, Configure LDAP Server in order to share users' accounts in your
local networks, Add LDAP User Accounts in the OpenLDAP Server, Configure LDAP Client
in order to share users' accounts in your local networks. Install phpLDAPadmin to operate
LDAP server via Web browser.
8. Configure NIS Server in order to share users' accounts in your local networks, Configure
NIS Client to bind NIS Server.
9. Install MySQL to configure database server, Install phpMyAdmin to operate MySQL on
web browser from Clients.
10. Install Samba to share folders or files between Windows and Linux.
1. Install Selenium IDE; Write a test suite containing minimum 4 test cases for different
formats.
2. Conduct a test suite for any two web sites.
3. Install Selenium server (Selenium RC) and demonstrate it using a script in Java/PHP.
4. Write and test a program to login a specific web page.
5. Write and test a program to update 10 student records into table into Excel file
6. Write and test a program to select the number of students who have scored more than
60 in any one subject (or all subjects).
7. Write and test a program to provide total number of objects present / available on the
page.
8. Write and test a program to get the number of items in a list / combo box.
9. Write and test a program to count the number of check boxes on the page checked and
unchecked count.
10. Load Testing using JMeter, Android Application testing using Appium Tools, Bugzilla Bug
tracking tools.
1. a) Edit text files with nano and cat editor, Learn sudo privileges and Unix shell commands
such as cd , ls , cat, etc
b) Learn to set dynamic and static IP. Connect to and Ethernet and WiFi network.
Learn to vnc and ssh into a raspberry pi using vnc and putty from a different computer on
the network.
c) Write a basic bash script to open programs in kiosk mode. Learn how to autostart
programs on boot.
2. Run the node red editor and run simple programs and trigger gpios. Use basic nodes
1. Write a program to implement to create a simple web service that converts the
temperature from Fahrenheit to Celsius and vice a versa.
2. Write a program to implement the operation can receive request and will return a
response in two ways. a) One - Way operation b) Request –Response
3. Write a program to implement business UDDI Registry entry.
4. Develop client which consumes web services developed in different platform.
5. Write a JAX-WS web service to perform the following operations. Define a Servlet / JSP
that consumes the web service.
6. Define a web service method that returns the contents of a database in a JSON string. The
contents should be displayed in a tabular format.
7. Define a RESTful web service that accepts the details to be stored in a database and
performs
CRUD operation.
8. Implement a typical service and a typical client using WCF.
9. Use WCF to create a basic ASP.NET Asynchronous JavaScript and XML (AJAX) service.
10. Demonstrates using the binding attribute of an endpoint element in WCF
Perform following Practical using online content from the Unity Tutorials Web--sites:
https://unity3d.com/learn/tutorials/s/interactive-tutorials
7. https://unity3d.com/learn/tutorials/s/2d-ufo-tutorial
8. https://unity3d.com/learn/tutorials/s/space-shooter-tutorial
9. https://unity3d.com/learn/tutorials/s/roll-ball-tutorial
10. https://unity3d.com/learn/tutorials/topics/vr/introduction?playlist=22946
SEMESTER VI
Learning Objectives:
• In this era of wireless and adhoc network, connecting different wireless devices and
understanding their compatibility is very important. Information is gathered in many
different ways from these devices.
• Learner should be able to conceptualize and understand the framework. On completion,
will be able to have a firm grip over this very important segment of wireless network
Learning Outcome:
• After completion of this course, learner should be able to list various applications of
wireless sensor networks, describe the concepts, protocols, design, implementation
and use of wireless sensor networks.
• Also implement and evaluate new ideas for solving wireless sensor network design
issues
Unit 1
Unit 2
References:
1. Protocols and Architectures for Wireless Sensor Network, Holger Kerl, Andreas Willig,
John Wiley and Sons, 2005
2. Wireless Sensor Networks Technology, Protocols, and Applications ,Kazem Sohraby,
Daniel Minoli and TaiebZnati, John Wiley & Sons, 2007
3. Mobile communications, Jochen Schiller,2nd Edition, Addison wisely , Pearson
Education,2012
Additional Reference(s):
Learning Objectives:
• To provide learners with the comprehensive and in-depth knowledge of Cloud Computing
concepts, technologies, architecture, implantations and applications.
• To expose the learners to frontier areas of Cloud Computing, while providing sufficient
foundations to enable further study and research.
Learning Outcome:
• After successfully completion of this course, learner should be able to articulate the
main concepts, key technologies, strengths, and limitations of cloud computing and the
possible applications for state-of-the-art cloud computing using open source
technology.
• Learner should be able to identify the architecture and infrastructure of cloud
computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.
• They should explain the core issues of cloud computing such as security, privacy, and
interoperability.
Unit 1
Unit 2
Additional Reference(s):
Learning Objectives:
• The student will be able to plan and prepare for all stages of an investigation - detection,
initial response and management interaction, investigate various media to collect
evidence, report them in a way that would be acceptable in the court of law.
Unit 1
Unit 2
1. Incident Response and computer forensics, Kevin Mandia, Chris Prosise, Tata
McGrawHill,2nd Edition,2003
Course: Information Retrieval
GNKUSCS604 (Credits: 03 Lectures/Week:3)
Learning Objectives:
• To provide an overview of the important issues in classical and web information retrieval.
• The focus is to give an up-to- date treatment of all aspects of the design and
implementation of systems for gathering, indexing, and searching documents and of
methods for evaluating systems.
Learning Outcome:
• After completion of this course, learner should get an understanding of the field of
information retrieval and its relationship to search engines. It will give the learner an
understanding to apply information retrieval models.
Unit Title No. of
lectures
2.1 Link Analysis, hubs and authorities, Page Rank and HITS 07
algorithms, Similarity, Hadoop & Map Reduce, Evaluation,
Personalized search
2.2 Collaborative filtering and content-based recommendation of 08
documents and products, handling “invisible” Web, Snippet
generation, Summarization, Question Answering, Cross- Lingual
Retrieval
Unit 3
3.1 Web Search Engine: Web search overview, web structure, the 07
user, paid placement, search engine optimization/spam, Web
size measurement, search engine optimization/spam, Web
Search Architectures
3.2 XML retrieval: Basic XML concepts, Challenges in XML retrieval, A 08
vector space model for XML retrieval, Evaluation of XML
retrieval, Text-centric versus data-centric XML retrieval.
References:
• Introduction to Information Retrieval, C. Manning, P. Raghavan, and H. Schütze,
Cambridge University Press, 2008
• Modern Information Retrieval: The Concepts and Technology behind Search, Ricardo
Baeza -Yates and Berthier Ribeiro – Neto, 2nd Edition, ACM Press Books 2011.
• Search Engines: Information Retrieval in Practice, Bruce Croft, Donald Metzler and Trevor
Strohman, 1st Edition, Pearson, 2009.
•
Additional Reference(s):
Learning Outcome:
• Learner should review the fundamental concepts of a digital image processing system.
Analyze the images in the frequency domain using various transforms.
• Evaluate the techniques for image enhancement and image segmentation.
• Apply various compression techniques.
• They will be familiar with basic image processing techniques for solving real problems
Unit 1
Unit 2
1. Digital Image Processing 3rd Edition, Rafael C Gonzalez, Richard E Woods, Pearson, 2008
2. Scilab Textbook Companion for Digital Image Processing, S. Jayaraman, S. Esakkirajan And
T. Veerakumar, 2016 (https://scilab.in/textbook_companion/generate_book/125)
Course: Data Science
GNKUSCS606 (Credits: 03 Lectures/Week:3)
Learning Objectives:
• After completion of this course, the students should be able to understand &
comprehend the problem; and should be able to define suitable statistical method to be
adopted.
Unit Title No. of
lectures
Unit 1
Unit 2
References:
1. Doing Data Science, Rachel Schutt and Cathy O’Neil, O’Reilly,2013
2. Mastering Machine Learning with R, Cory Lesmeister, PACKT Publication,2015
Additional Reference(s):
Learning Objectives:
• Learner will know to identify security vulnerabilities and weaknesses in the target
applications. They will also know to test and exploit systems using various tools and
understand the impact of hacking in real time machines.
Unit Title No. of
lectures
2.1 Introduction: Black Hat vs. Gray Hat vs. White Hat 15L 07
(Ethical) hacking, Why is Ethical hacking needed?, How is
Ethical hacking different from security auditing and
digital forensics?, Signing NDA, Compliance and
Regulatory
2.2 Approach : Planning - Threat Modeling, set up security verification 08
standards, Set up security testing plan – When, which systems/apps,
understanding functionality, black/gray/white, authenticated vs.
unauthenticated, internal vs. external PT, Information gathering,
Perform Manual and automated (Tools: WebInspect/Qualys, Nessus,
Proxies, Metasploit) VA and PT, How WebInspect/Qualys tools work:
Crawling/Spidering, requests forging, pattern matching to known
vulnerability database and Analyzing results, Preparing report, Fixing
security gaps following the report
Enterprise strategy : Repeated PT, approval by security testing team,
Continuous Application Security Testing,
Phases: Reconnaissance/foot-printing/Enumeration, Phases: Scanning,
Sniffing
Unit 3 Ethical Hacking :Enterprise Security
Additional Reference(s):
Practical experiments require software tools like INET Framework for OMNeT++, NetSim , TOSSIM,
Cisco packet tracer 6.0 and higher version.
1. Understanding the Sensor Node Hardware. (For Eg. Sensors, Nodes(Sensor mote), Base
Station, Graphical User Interface.)
2. Exploring and understanding TinyOS computational concepts:- Events, Commands and Task.
a. nesC model
b. nesC Components
3. Understanding TOSSIM for
c. Mote-mote radio communication
d. Mote-PC serial communication
4. Create and simulate a simple adhoc network
5. Understanding, Reading and Analyzing Routing Table of a network.
6. Create a basic MANET implementation simulation for Packet animation and Packet Trace.
7. Implement a Wireless sensor network simulation.
8. Create MAC protocol simulation implementation for wireless sensor Network.
9. Simulate Mobile Adhoc Network with Directional Antenna
10. Create a mobile network using Cell Tower, Central Office Server, Web browser and Web
Server. Simulate connection between them.
Cloud Computing
Cyber Forensics
1. Creating a Forensic Image using FTK Imager/Encase Imager :
a. Creating Forensic Image
b. Check Integrity of Data
c. Analyze Forensic Image
2. Data Acquisition:
a. Perform data acquisition using:
b. USB Write Blocker + Encase Imager
c. SATA Write Blocker + Encase Imager
d. Falcon Imaging Device
3. Forensics Case Study:
a. Solve the Case study (image file) provide in lab using Encase Investigator or Autopsy
Information Retrieval
Data Science
1. Practical of Data collection, Data curation and management for Unstructured data (NoSQL)
2. Practical of Data collection, Data curation and management for Large-scale Data system
(such as MongoDB)
3. Practical of Principal Component Analysis
4. Practical of Clustering
5. Practical of Time-series forecasting
6. Practical of Simple/Multiple Linear Regression
7. Practical of Logistics Regression
8. Practical of Hypothesis testing
9. Practical of Analysis of Variance
10. Practical of Decision Tree
Course Project Implementation
(Credits: 01 Lectures/Week:03)
GNKUSCSP603
b) Use Cain and Abel for cracking Windows account password using Dictionary attack and
to decode wireless network passwords
3. a) Run and analyze the output of following commands in Linux – ifconfig, ping, netstat,
traceroute
b) Perform ARP Poisoning in Windows
4. Use NMap scanner to perform port scanning of various forms – ACK, SYN, FIN, NULL,
XMAS
5. a) Use Wireshark (Sniffer) to capture network traffic and analyze
1. A learner is expected to carry out two different projects: one in Semester V and another in
Semester VI.
2. A learner can choose any topic which is covered in Semester I- semester VI or any other topic
with the prior approval from head of the department/ project in charge.
3. The Project has to be performed individually.
4. A learner is expected to devote around three months of efforts in the project.
5. The project can be application oriented/web-based/database/research based.
6. It has to be an implemented work; just theoretical study will not be acceptable.
7. A learner can choose any programming language, computational techniques and tools which
have been covered during BSc course or any other with the prior permission of head of the
department/ project guide. 8. A project guide should be assigned to a learner. He/she will
assign a schedule for the project and hand it over to a learner. The guide should oversee the
project progress on a weekly basis by considering the workload of 3 lectures as assigned.
9. The quality of the project will be evaluated based on the novelty of the topic, scope of the
work, relevance to the computer science, adoption of emerging techniques/technologies and
its real-world application.
10. A learner has to maintain a project report with the following subsections
a) Title Page
b) Certificate
A certificate should contain the following information –
- The fact that the student has successfully completed the project as per the
syllabus and that it forms a part of the requirements for completing the BSc
degree in computer science of University of Mumbai.
- The name of the student and the project guide
- The academic year in which the project is done
- Date of submission,
- Signature of the project guide and the head of the department with date along
with the department stamp,
- Space for signature of the university examiner and date on which the project is
evaluated.
1. Theory:
I. Internal 25 Marks :
a) Test – 20 Marks
20 marks Test – Duration 40 mins It will be conducted either using any open
source learning management system like Moodle (Modular object-oriented
dynamic learning environment)
OR
A test based on an equivalent online course on the contents of the concerned
course (subject) offered by or build using MOOC (Massive Open Online Course)
platform.
b) 5 Marks
- Active participation in routine class instructional deliveries Overall conduct as a
responsible student, manners, skill in articulation, leadership qualities demonstrated
through organizing co-curricular activities, etc.
In the Practical Examination of Elective-I and II, the student has to perform practical on each of
the subjects chosen. The Marking Scheme for each of the Elective is given below:
Subject Code Experiment-I Experiment-II Total Marks
(Certified Project Document is compulsory for appearing at the time of Project Presentation)
Content beyond Syllabus
value addition courses, activities, trainings, certification courses, Industrial Visits, minor/ major project
development.
Additional Laboratory Topics which are important and not the part of lab experiments such
Experiments additional experiments are conducted to enhance the knowledge.
Case Studies Group of students are given an advanced topic. They discuss on the
topic and prepare a document.
Project Societal, environmental, need based and real-time application based
Development/certification projects are carried out by the students under the guidance by faculty.
courses (Paid) Students must do certification courses at departmental level.
Workshops/Seminars/ Various workshops, seminars, Expert talks by
Guest Lectures academicians/industrialists on different technologies are organized to
gain the knowledge
Industrial Visits/Tours Visit to the large or small-scale industries are organized for the
students to bridge the gap.
Internships Software development cell provides in-house internship for the
students to work on real time projects, need based projects.
Pre-placement Trainings Seminars are organized to groom students for aptitude tests,
interviews and overall development of students
Online Certification Students should participate in NPTEL online courses
courses (free of cost)