0% found this document useful (0 votes)
112 views43 pages

Ty Sy..

Uploaded by

ASHOK SEERVI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
112 views43 pages

Ty Sy..

Uploaded by

ASHOK SEERVI
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

Shiromani Gurdwara Parbandhak Committee’s

Guru Nanak Khalsa College

of

Arts, Science and Commerce

(Autonomous)

Matunga, Mumbai – 400 019, Maharashtra

Syllabus for T.Y.B.Sc Semester V and VI

Program: Bachelor of Science

Course: Computer Science

(As per Choice Based Semester and Grading System with effect from
Academic Year 2019 - 2020)
Preamble

This is the third year curriculum in the subject of Computer Science. The revised structure is designed to
transform students into technically competent, socially responsible and ethical Computer Science
professionals. In these Semesters we have made the advancements in the subject based on the previous
Semesters Knowledge.

In the first year basic foundation of important skills required for software development is laid. Second
year of this course is about studying core computer science subjects. The third year is the further
advancement which covers developing capabilities to design formulations of computing models and its
applications in diverse areas.

The proposed curriculum contains two semesters, each Semester contains two Electives: Elective-I and II.
Every Elective contains three papers based on specific areas of Computer Science. It also includes one Skill
Enhancement paper per semester, helps the student to evaluate his/her computer science domain
specific skills and also to meet industry expectations. This revised curriculum has not only taken the
specific areas of computer science into consideration but will also give the opportunity to the student to
prove his/her ability in the subject practically through the Project Implementation. In Semester V and
Semester VI student has to undertake a Project. It can boost his/her confidence and also can encourage
the student to perform innovations in the subject as the choice of the Project topic is kept open covering
most of the areas of Computer Science subject as per the students interest and the subject they have
learned during the Course.

Proposed Curriculum contains challenging and varied subjects aligned with the current trend with the
introduction of Machine Intelligence specific subject such as Artificial Intelligence, Information Retrieval.
Data Management related subjects such as Cloud Computing and Data Science. Image processing topics
such as Game Programming, Digital Image Processing. Introduction of physical world through Architecting
of IoT and Wireless Sensor Networks and Mobile Communication. Security domain is also evolved by the
introduction of Ethical Hacking, Cyber Forensic and Information and Network Security. To get the hands
on experience Linux Server Administration and Web Services topics are included.

In essence, the objective of this syllabus is to create a pool of technologically savvy, theoretically strong,
innovatively skilled and ethically responsible generation of computer science professionals. Hope that the
teacher and student community of University of Mumbai will accept and appreciate the efforts.
Course Artificial Intelligence
(Credits: 03 Lectures/Week:3)
GNKUSCS501

Learning Objectives:

• Artificial Intelligence (AI) and accompanying tools and techniques bring transformational
changes in the world.
• Machines capability to match, and sometimes even surpass human capability, make AI a
hot topic in Computer Science. This course aims to introduce the learner to this
interesting area.
Learning Outcome:

• After completion of this course, learner should get a clear understanding of AI and
different search algorithms used for solving problems.
• The learner should also get acquainted with different learning algorithms and models
used in machine learning
Unit Title No. of
lectures

Unit 1

1.1 What Is AI: Foundations, History and State of the Art of AI. 07
Intelligent Agents: Agents and Environments, Nature of
Environments, Structure of Agents.

1.2 Problem Solving by searching: Problem-Solving Agents, Example 08


Problems, Searching for Solutions, Uninformed Search Strategies,
Informed (Heuristic) Search Strategies, Heuristic Functions

Unit 2

2.1 Learning from Examples: Forms of Learning, Supervised Learning, 07


Learning Decision Trees, Evaluating and Choosing the Best
Hypothesis, Theory of Learning, Regression and Classification with
Linear Models

2.2 Artificial Neural Networks, Nonparametric Models, Support Vector 08


Machines, Ensemble Learning, Practical Machine Learning

Unit 3
3.1 Learning probabilistic models: Statistical Learning, Learning with 07
Complete Data, Learning with Hidden Variables: The EM Algorithm

3.2 Reinforcement learning: Passive Reinforcement Learning, Active 08


Reinforcement Learning, Generalization in Reinforcement
Learning, Policy Search, Applications of Reinforcement Learning.

References:
1. Artificial Intelligence: A Modern Approach, Stuart Russell and Peter Norvig,3rd
Edition, Pearson, 2010
Additional Reference(s):

1. Artificial Intelligence: Foundations of Computational Agents, David L Poole,Alan K.


Mackworth, 2nd Edition, Cambridge University Press ,2017
2. Artificial Intelligence, Kevin Knight and Elaine Rich, 3rd Edition, 2017
Course: Linux Server Administration

GNKUSCS502 (Credits: 03 Lectures/Week:3)

Learning Objectives:

• Demonstrate proficiency with the Linux command line interface, directory & file
management techniques, file system organization, and tools commonly found on
most Linux distributions.
• Effectively operate a Linux system inside of a network environment to integrate with
existing service solutions.
• Demonstrate the ability to troubleshoot challenging technical problems typically
encountered when operating and administering Linux systems.

Learning Outcome:

• learner should get a clear understanding of AI and different search algorithms used
for solving problems.
• The learner should also get acquainted with different learning algorithms and
models used in machine learning.
Unit Title No. of
lectures

Unit 1

1.1 Introduction: Technical Summary of Linux Distributions, 07


Managing Software Single-Host Administration: Managing
Users and Groups, Booting and shutting down processes, File
Systems, Core System Services, Process of configuring,
compiling, Linux Kernel

1.2 Networking and Security: TCP/IP for System Administrators, 08


basic network Configuration, Linux Firewall (Netfilter), System
and network security

Unit 2

2.1 Internet Services: Domain Name System (DNS), File Transfer 07


Protocol (FTP), Apache web server, Simple Mail Transfer
Protocol (SMTP), Post Office Protocol and Internet Mail Access
Protocol (POP and IMAP)
2.2 Secure Shell (SSH), Network Authentication, OpenLDAP Server, 08
Samba and LDAP, Network authentication system (Kerberos),
Domain Name Service (DNS), Security

Unit 3

3.1 Intranet Services: Network File System (NFS), Samba, 07


Distributed File Systems (DFS), Network Information Service
(NIS), Lightweight Directory Access Protocol (LDAP)

3.2 Dynamic Host Configuration Protocol (DHCP), MySQL, LAMP 08


Applications File Servers, Email Services, Chat Applications,
Virtual Private Networking.

References:
1. Linux Administration: A Beginner’s Guide, Wale Soyinka, Seventh Edition, McGraw-Hill
Education, 2016
2. Ubuntu Server Guide, Ubuntu Documentation Team, 2016

Additional Reference(s):

3. Mastering Ubuntu Server, Jay LaCroix, PACKT Publisher, 2016


Course: Software Testing and Quality Assurance

GNKUSCS503 (Credits: 03 Lectures/Week:3)

Learning Objectives:

• To provide learner with knowledge in Software Testing techniques.


• To understand how testing methods can be used as an effective tools in providing quality
assurance concerning for software.
• To provide skills to design test case plan for testing software.

Learning Outcome:

• Understand various software testing methods and strategies.


• Understand a variety of software metrics, and identify defects and managing those
defects for improvement in quality for given software.
• Design SQA activities, SQA strategy, formal technical review report for software quality
control and assurance.
Unit Title No. of
lectures

Unit 1

1.1 Software Testing and Introduction to quality : Introduction, Nature 07


of errors, an example for Testing, Definition of Quality , QA, QC, QM
and SQA , Software Development Life Cycle, Software Quality Factors
1.2 Verification and Validation : Definition of V &V , Different types of V 08
& V Mechanisms, Concepts of Software Reviews, Inspection and
Walkthrough
Software Testing Techniques : Testing Fundamentals, Test Case
Design, White Box Testing and its types, Black Box Testing and its
types

Unit 2

2.1 Software Testing Strategies : Strategic Approach to Software 07


Testing, Unit Testing, Integration Testing, Validation Testing, System
Testing
Software Metrics : Concept and Developing Metrics, Different types
of Metrics, Complexity metrics

2.2 Defect Management: Definition of Defects, Defect Management 08


Process, Defect Reporting, Metrics Related to Defects, Using Defects
for Process Improvement.
Unit 3

3.1 Software Quality Assurance : Quality Concepts, Quality Movement, 07


Background Issues, SQA activities, Software Reviews, Formal
Technical Reviews, Formal approaches to SQA, Statistical Quality
Assurance, Software Reliability, The ISO 9000 Quality Standards, ,
SQA Plan , Six sigma, Informal Reviews
3.2 Quality Improvement : Introduction, Pareto Diagrams, Cause-effect 08
Diagrams, Scatter Diagrams, Run charts
Quality Costs : Defining Quality Costs, Types of Quality Costs, Quality
Cost Measurement, Utilizing Quality Costs for Decision-Making.

References:

1. Software Engineering for Students, A Programming Approach, Douglas Bell, 4th Edition,,
Pearson Education, 2005
2. Software Engineering – A Practitioners Approach, Roger S. Pressman, 5th Edition, Tata
McGraw Hill, 2001
3. Quality Management, Donna C. S. Summers, 5th Edition, Prentice-Hall, 2010.
4. Total Quality Management, Dale H. Besterfield, 3rd Edition, Prentice Hall, 2003.
Additional Reference(s):

1. Software engineering: An Engineering approach, J.F. Peters, W. Pedrycz , John Wiley,2004


2. Software Testing and Quality Assurance Theory and Practice, Kshirsagar Naik, Priyadarshi
Tripathy , John Wiley & Sons, Inc. , Publication, 2008
3. Software Engineering and Testing, B. B. Agarwal, S. P. Tayal, M. Gupta, Jones and Bartlett
Publishers, 2010
Course: Information and Network Security
(Credits: 03 Lectures/Week:3)
GNKUSCS504

Learning Objectives:

• To provide students with knowledge of basic concepts of computer security including


network security and cryptography.
Learning Outcome:

• Understand the principles and practices of cryptographic techniques.


• Understand a variety of generic security threats and vulnerabilities, and identify &
analyze particular security problems for a given application.
• Understand various protocols for network security to protect against the threats in a
network
Unit Title No. of
lectures

Unit 1

1.1 Introduction: Security Trends, The OSI Security Architecture, 07


Security Attacks, Security Services, Security Mechanisms
Classical Encryption Techniques: Symmetric Cipher Model,
Substitution Techniques, Transposition Techniques,
Steganography, Block Cipher Principles
1.2 The Data Encryption Standard, The Strength of DES, AES (round 08
details not expected), Multiple Encryption and Triple DES, Block
Cipher Modes of Operation, Stream Ciphers
Public-Key Cryptography and RSA: Principles of Public-Key
Cryptosystems, The RSA Algorithm.

Unit 2

2.1 Key Management: Public-Key Cryptosystems, Key Management, 07


Diffie-Hellman Key Exchange
Message Authentication and Hash Functions: Authentication
Requirements, Authentication Functions, Message
Authentication Codes, Hash Functions, Security of Hash
Functions and Macs, Secure Hash Algorithm, HMAC

2.2 Digital Signatures and Authentication: Digital Signatures, 08


Authentication Protocols, Digital Signature Standard
Authentication Applications: Kerberos, X.509 Authentication,
Public-Key Infrastructure
Unit 3

3.1 Electronic Mail Security: Pretty Good Privacy, S/MIME 07


IP Security: Overview, Architecture, Authentication Header,
Encapsulating Security Payload, Combining Security Associations,
Key Management
Web Security: Web Security Considerations, Secure Socket Layer
and Transport Layer Security, Secure Electronic Transaction
3.2 Intrusion: Intruders, Intrusion Techniques, Intrusion Detection 08
Malicious Software: Viruses and Related Threats, Virus
Countermeasures, DDOS
Firewalls: Firewall Design Principles, Types of Firewalls

References:

1. Cryptography and Network Security: Principles and Practice 5th Edition, William
Stallings, Pearson,2010

Additional Reference(s):

1. Cryptography and Network Security, Atul Kahate, Tata McGraw-Hill, 2013


2. Cryptography and Network, Behrouz A Fourouzan, Debdeep Mukhopadhyay, 2nd
Edition,TMH,2011
Course: Architecting of IoT

GNKUSCS505 (Credits: 03 Lectures/Week:3)

Learning Objectives:

• Discovering the interconnection and integration of the physical world. Learner should get
knowledge of the architecture of IoT.
Learning Outcome:

• Learners are able to design & develop IoT Devices. They should also be aware of the
evolving world of M2M Communications and IoT analytics

Unit Title No. of


lectures

Unit 1

1.1 IoT-An Architectural Overview: Building architecture, Main design 07


principles and needed capabilities, An IoT architecture outline,
standards considerations.
1.2 IoT Architecture-State of the Art : Introduction, State of the art, 08
Reference Model and architecture, IoT reference Model - IoT
Reference Architecture Introduction, Functional View, Information
View, Deployment and Operational View, Other Relevant
architectural views
Unit 2

2.1 IoT Data Link Layer and Network Layer Protocols: 07


PHY/MAC Layer(3GPP MTC, IEEE 802.11, IEEE 802.15), Wireless
HART,Z-Wave, Bluetooth Low Energy, Zigbee Smart Energy DASH7

2.2 Network Layer:IPv4, IPv6, 6LoWPAN, 6TiSCH,ND, DHCP, ICMP, RPL, 08


CORPL, CARP

Unit 3

3.1 Transport layer protocols : 07


Transport Layer (TCP, MPTCP, UDP, DCCP, SCTP)-(TLS, DTLS)
3.2 Session layer: 08
Session Layer-HTTP, CoAP, XMPP, AMQP, MQTT
Service layer protocols:
Service Layer -oneM2M, ETSI M2M, OMA, BBF

References:
1. From Machine-to-Machine to the Internet of Things: Introduction to a New Age of
Intelligence, Jan Holler, Vlasios Tsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis
Karnouskos, David Boyle,1st Edition, Academic Press, 2014.
2. Learning Internet of Things, Peter Waher, PACKT publishing, BIRMINGHAM –
MUMBAI,2015

Additional Reference(s):

1. Building the Internet of Things with IPv6 and MIPv6: The Evolving World of M2M
Communications, Daniel Minoli, Wiley Publications,2013
2. Internet of Things (A Hands-onApproach), Vijay Madisetti and ArshdeepBahga,1st Edition,
VPT, 2014.
3. http://www.cse.wustl.edu/~jain/cse570-15/ftp/iot_prot/index.html
Course: Web Services

GNKUSCS506 (Credits: 03 Lectures/Week:3)

Learning Objectives:

• To understand the details of web services technologies like SOAP, WSDL, and UDDI. To
learn how to implement and deploy web service client and server.
• To understand the design principles and application of SOAP and REST based web services
(JAX-Ws and JAX-RS).
• To understand WCF service.
• To design secure web services and QoS of Web Services
Learning Outcome:

• Emphasis on SOAP based web services and associated standards such as WSDL.
• Design SOAP based / RESTful / WCF services Deal with Security and QoS issues of Web
Services
Unit Title No. of
lectures

Unit 1 Web services basics

1.1 What Are Web Services? Types of Web Services Distributed 07


computing infrastructure, overview of XML, SOAP, Building Web
Services with JAX-WS, Registering and Discovering Web Services
1.2 Service Oriented Architecture, Web Services Development Life 08
Cycle, Developing and consuming simple Web Services across
platform

Unit 2 The REST Architectural style

2.1 Introducing HTTP, The core architectural elements of a RESTful 07


system, Description and discovery of RESTful web services, Java
tools and frameworks for building RESTful web services, JSON
message format and tools and frameworks around JSON

2.2 Build RESTful web services with JAX-RS APIs, The Description and 08
Discovery of RESTful Web Services, Design guidelines for building
RESTful web services, Secure RESTful web services

Unit 3 Developing Service-Oriented Applications with WCF


3.1 What Is Windows Communication Foundation, Fundamental 07
Windows Communication Foundation Concepts, Windows
Communication Foundation Architecture,
3.2 WCF and .NET Framework Client Profile, Basic WCF 08
Programming, WCF Feature Details. Web Service QoS

References:
1. Web Services: Principles and Technology, Michael P. Papazoglou, Pearson Education
Limited, 2008
2. RESTful Java Web Services, Jobinesh Purushothaman, PACKT Publishing,2nd Edition, 2015
3. Developing Service-Oriented Applications with WCF, Microsoft, 2017
https://docs.microsoft.com/en-us/dotnet/framework/wcf/index

Additional Reference(s):
1. Leonard Richardson and Sam Ruby, RESTful Web Services, O’Reilly, 2007
2. The Java EE 6Tutorial, Oracle, 2013
Course: Game Programming

GNKUSCS507 (Credits: 03 Lectures/Week:3)

Learning Objectives:

• Learner should get the understanding computer Graphics programming using Directx or
Opengl.
• Along with the VR and AR they should also aware of GPU, newer technologies and
programming using most important API for windows.
Learning Outcome:

• Learner should study Graphics and gamming concepts with present working style of
developers where everything remains on internet and they need to review it,
understand it, be a part of community and learn.

Unit Title No. of


lectures

Unit 1 Mathematics for Computer Graphics, DirectX Kickstart

1.1 Cartesian Coordinate system: The Cartesian XY-plane, Function 05


Graphs, Geometric Shapes, Polygonal Shapes, Areas of Shapes,
Theorem of Pythagoras in 2D, Coordinates, Theorem of
Pythagoras in 3D, 3D Polygons, Euler’s Rule
1.2 Vectors: Vector Manipulation, multiplying a Vector by a Scalar, 05
Vector Addition and Subtraction, Position Vectors, Unit Vectors,
Cartesian Vectors, Vector Multiplication, Scalar Product, Example
of the Dot Product, The Dot Product in Lighting Calculations, The
Dot Product in Back-Face Detection, The Vector Product, The
Right-Hand Rule, deriving a Unit Normal Vector for a Triangle
Areas, Calculating 2D Areas

1.3 Transformations: 2D Transformations, Matrices, Homogeneous 05


Coordinates, 3D Transformations, Change of Axes, Direction
Cosines, rotating a Point about an Arbitrary Axis, Transforming
Vectors, Determinants, Perspective Projection, Interpolation
DirectX: Understanding GPU and GPU architectures. How they
are different from CPU Architectures? Understanding how to
solve by GPU?
Unit 2
2.1 DirectX Pipeline and Programming: 07
Introduction To DirectX 11: COM, Textures and Resources
Formats, The swap chain and Page flipping, Depth Buffering,
Texture Resource Views,
Multisampling Theory and MS in Direct3D, Feature Levels
Direct3D 11 Rendering Pipeline: Overview, Input Assembler
Stage (IA), Vertex Shader Stage (VS), The Tessellation Stage (TS),
Geometry Shader Stage (GS), Pixel Shader Stage (PS), Output
merger Stage (OM)
Understanding Meshes or Objects, Texturing, Lighting, Blending.

2.2 Interpolation and Character Animation: 08


Trigonometry: The Trigonometric Ratios, Inverse Trigonometric
Ratios, Trigonometric Relationships, The Sine Rule, The Cosine
Rule, Compound Angles, Perimeter Relationships
Interpolation: Linear Interpolant, Non-Linear Interpolation,
Trigonometric Interpolation, Cubic Interpolation, Interpolating
Vectors, Interpolating Quaternions
Curves: Circle, Bezier, B-Splines
Analytic Geometry: Review of Geometry, 2D Analytic Geometry,
Intersection Points, Point in Triangle, and Intersection of circle
with straight line.
Unit 3

3.1 Introduction to Rendering Engines: Understanding the current 07


market Rendering Engines. Understanding AR, VR and MR.Depth
Mappers, Mobile Phones, Smart Glasses, HMD’s
3.2 Unity Engine: Multi-platform publishing, VR + AR: Introduction 08
and working in Unity, 2D, Graphics, Physics, Scripting, Animation,
Timeline, Multiplayer and Networking, UI, Navigation and
Pathfinding, XR, Publishing.
Scripting: Scripting Overview, Scripting Tools and Event Overview
XR: VR, AR, MR, Conceptual Differences. SDK, Devices

References:
1. Mathematics for Computer Graphics, John Vince, Springer-Verlag London, 5th
Edition,2017
2. Mathematics for 3D Game Programming and Computer Graphic, Eric Lengyel, Delmar
Cengage Learning, Delmar Cengage Learning,2011
3. Introduction To 3D Game Programming With Directx® 11,Frank D Luna, Mercury Learning
And Information,2012.
4. https://docs.unity3d.com/Manual/index.html - Free
Additional Reference(s):
1. Computer Graphics, C Version, Donald Hern and Pauline Baker, Pearson Education, 2 nd
Edition, 1997
2. HLSL Development Cookbook, Doron Feinstein, PACKT Publishing,2013

Course (Credits: 02 Lectures/Week:06)


Practical of Elective-I
GNKUSCSP501

Artificial Intelligence
1. Implement Breadth first search algorithm for Romanian map problem.
2. Implement Iterative deep depth first search for Romanian map problem.
3. Implement A* search algorithm for Romanian map problem.
4. Implement recursive best-first search algorithm for Romanian map problem.
5. Implement decision tree learning algorithm for the restaurant waiting problem.
6. Implement feed forward back propagation neural network learning algorithm for the
restaurant waiting problem.
7. Implement Adaboost ensemble learning algorithm for the restaurant waiting
problem.
8. Implement Naive Bayes’ learning algorithm for the restaurant waiting problem.
9. Implement passive reinforcement learning algorithm based on adaptive dynamic
programming (ADP) for the 3 by 4 world problem
10. Implement passive reinforcement learning algorithm based on temporal differences
(TD) for 3 by 4 world problem.
Linux Server Administration

Practical shall be performed using any Linux Server (with 8GB RAM).

- Internet connection will be required so that Linux server (command line mode) can be
connected to Internet.
1. Install DHCP Server in Ubuntu 16.04
2. Initial settings: Add a User, Network Settings, Change to static IP address, Disable IPv6 if
not needed, Configure Services, display the list of services which are running, Stop and
turn OFF auto-start setting for a service if you don’t need it, Sudo Settings
3. Configure NTP Server (NTPd), Install and Configure NTPd, Configure NTP Client (Ubuntu
and Windows)
4. SSH Server : Password Authentication
Configure SSH Server to manage a server from the remote computer, SSH Client : (Ubuntu
and Windows)
5. Install DNS Server BIND, Configure DNS server which resolves domain name or IP address,
Install BIND 9, Configure BIND, Limit ranges you allow to access if needed.
6. Configure DHCP Server, Configure DHCP (Dynamic Host Configuration Protocol) Server,
Configure NFS Server to share directories on your Network, Configure NFS Client. (Ubuntu
and Windows Client OS)
7. Configure LDAP Server, Configure LDAP Server in order to share users' accounts in your
local networks, Add LDAP User Accounts in the OpenLDAP Server, Configure LDAP Client
in order to share users' accounts in your local networks. Install phpLDAPadmin to operate
LDAP server via Web browser.
8. Configure NIS Server in order to share users' accounts in your local networks, Configure
NIS Client to bind NIS Server.
9. Install MySQL to configure database server, Install phpMyAdmin to operate MySQL on
web browser from Clients.
10. Install Samba to share folders or files between Windows and Linux.

Software Testing and Quality Assurance

1. Install Selenium IDE; Write a test suite containing minimum 4 test cases for different
formats.
2. Conduct a test suite for any two web sites.
3. Install Selenium server (Selenium RC) and demonstrate it using a script in Java/PHP.
4. Write and test a program to login a specific web page.
5. Write and test a program to update 10 student records into table into Excel file
6. Write and test a program to select the number of students who have scored more than
60 in any one subject (or all subjects).
7. Write and test a program to provide total number of objects present / available on the
page.
8. Write and test a program to get the number of items in a list / combo box.
9. Write and test a program to count the number of check boxes on the page checked and
unchecked count.
10. Load Testing using JMeter, Android Application testing using Appium Tools, Bugzilla Bug
tracking tools.

Course (Credits: 02 Lectures/Week:06)


Practical of Elective-II
GNKUSCSP502

Information and Network Security


1. Write programs to implement the following Substitution Cipher Techniques:
- Caesar Cipher
- Monoalphabetic Cipher
2. Write programs to implement the following Substitution Cipher Techniques:
- Vernam Cipher
- Playfair Cipher
3. Write programs to implement the following Transposition Cipher Techniques:
- Rail Fence Cipher
- Simple Columnar Technique
4. Write program to encrypt and decrypt strings using
- DES Algorithm
- AES Algorithm
5. Write a program to implement RSA algorithm to perform encryption / decryption of a
given string.
6. Write a program to implement the Diffie-Hellman Key Agreement algorithm to generate
symmetric keys.
7. Write a program to implement the MD5 algorithm compute the message digest.
8. Write a program to calculate HMAC-SHA1 Signature
9. Write a program to implement SSL.
10. Configure Windows Firewall to block:
- A port
- An Program
- A website
Architecting of IoT

1. a) Edit text files with nano and cat editor, Learn sudo privileges and Unix shell commands
such as cd , ls , cat, etc
b) Learn to set dynamic and static IP. Connect to and Ethernet and WiFi network.
Learn to vnc and ssh into a raspberry pi using vnc and putty from a different computer on
the network.
c) Write a basic bash script to open programs in kiosk mode. Learn how to autostart
programs on boot.
2. Run the node red editor and run simple programs and trigger gpios. Use basic nodes

such as inject, debug, gpio


3. Open the python idle editor and run simple Python scripts such as to print Fibonacci
numbers, string functions. Learn how to install modules using Pip and write functions
4. Setup a physical button switch and trigger an led in node red and python w debounce
5. Write simple JavaScript functions in Node-Red simple HTTP server page using node red
6. Setup a TCP server and client on a raspberry pi using Python modules to send
messages and execute shell commands from within python such as starting another
application
7. Trigger a set of led Gpios on the pi via a Python Flask web server
8. Interface the raspberry pi with a 16x2 LCD display and print values.
9. Setup a Mosquitto MQTT server and client and write a Python script to communicate data
between Pi's.
10. Interface with an Accelerometer Gyro Mpu6050 on the i2c bus and send sensor values
over the internet via mqtt.
Web Services

1. Write a program to implement to create a simple web service that converts the
temperature from Fahrenheit to Celsius and vice a versa.
2. Write a program to implement the operation can receive request and will return a
response in two ways. a) One - Way operation b) Request –Response
3. Write a program to implement business UDDI Registry entry.
4. Develop client which consumes web services developed in different platform.
5. Write a JAX-WS web service to perform the following operations. Define a Servlet / JSP
that consumes the web service.
6. Define a web service method that returns the contents of a database in a JSON string. The
contents should be displayed in a tabular format.
7. Define a RESTful web service that accepts the details to be stored in a database and
performs
CRUD operation.
8. Implement a typical service and a typical client using WCF.
9. Use WCF to create a basic ASP.NET Asynchronous JavaScript and XML (AJAX) service.
10. Demonstrates using the binding attribute of an endpoint element in WCF

Course Project Implementation


(Credits: 01 Lectures/Week:03)
GNKUSCSP503

Please Refer to Project Implementation Guidelines

Course Game Programming


(Credits: 03 Lectures/Week:03)
GNKUSCSP504

1. Setup DirectX 11, Window Framework and Initialize Direct3D Device


2. Buffers, Shaders and HLSL (Draw a triangle using Direct3D 11)
3. Texturing (Texture the Triangle using Direct 3D 11)
4. Lightning (Programmable Diffuse Lightning using Direct3D 11)
5. Specular Lightning (Programmable Spot Lightning using Direct3D 11)
6. Loading models into DirectX 11 and rendering.

Perform following Practical using online content from the Unity Tutorials Web--sites:
https://unity3d.com/learn/tutorials/s/interactive-tutorials

7. https://unity3d.com/learn/tutorials/s/2d-ufo-tutorial
8. https://unity3d.com/learn/tutorials/s/space-shooter-tutorial
9. https://unity3d.com/learn/tutorials/s/roll-ball-tutorial
10. https://unity3d.com/learn/tutorials/topics/vr/introduction?playlist=22946
SEMESTER VI

Course: Wireless Sensor Networks and Mobile Communication

GNKUSCS601 (Credits: 03 Lectures/Week:3)

Learning Objectives:

• In this era of wireless and adhoc network, connecting different wireless devices and
understanding their compatibility is very important. Information is gathered in many
different ways from these devices.
• Learner should be able to conceptualize and understand the framework. On completion,
will be able to have a firm grip over this very important segment of wireless network
Learning Outcome:

• After completion of this course, learner should be able to list various applications of
wireless sensor networks, describe the concepts, protocols, design, implementation
and use of wireless sensor networks.
• Also implement and evaluate new ideas for solving wireless sensor network design
issues

Unit Title No. of


lectures

Unit 1

1.1 Introduction: Introduction to Sensor Networks, unique 07


constraints and challenges.
Advantage of Sensor Networks, Applications of Sensor Networks,
Mobile Adhoc NETworks (MANETs) and Wireless Sensor
Networks, Enabling technologies for Wireless Sensor Networks

1.2 Sensor Node Hardware and Network Architecture: Single-node 08


architecture, Hardware components & design constraints,
Operating systems and execution environments, introduction to
TinyOS and nesC.
Network architecture, Optimization goals and figures of merit,
Design principles for WSNs, Service interfaces of WSNs, Gateway
concepts

Unit 2

2.1 Medium Access Control Protocols: Fundamentals of MAC 07


Protocols, MAC Protocols for WSNs, Sensor-MAC Case Study.
Routing Protocols : Data Dissemination and Gathering, Routing
Challenges and Design Issues in Wireless
Sensor Networks, Routing Strategies in Wireless Sensor
Networks.

2.2 Transport Control Protocols : Traditional Transport 15L 08


Control Protocols,
Transport Protocol Design Issues, Examples of Existing
Transport Control Protocols, Performance of Transport
Control Protocols.
Unit 3

3.1 Introduction, Wireless Transmission and Medium Access 07


Control: Applications, A short history of wireless communication.
Wireless Transmission: Frequency for radio transmission,
Signals, Antennas, Signal propagation, Multiplexing, Modulation,
Spread spectrum, Cellular systems.

3.2 Telecommunication, Satellite and Broadcast Systems: GSM: 08


Mobile services, System architecture, Radio interface, Protocols,
Localization And Calling, Handover, security, New data services;
DECT: System architecture, Protocol architecture; ETRA, UMTS
and IMT- 2000.
Satellite Systems: History, Applications, Basics: GEO, LEO, MEO;
Routing, Localization, Handover

References:

1. Protocols and Architectures for Wireless Sensor Network, Holger Kerl, Andreas Willig,
John Wiley and Sons, 2005
2. Wireless Sensor Networks Technology, Protocols, and Applications ,Kazem Sohraby,
Daniel Minoli and TaiebZnati, John Wiley & Sons, 2007
3. Mobile communications, Jochen Schiller,2nd Edition, Addison wisely , Pearson
Education,2012

Additional Reference(s):

1. Fundamentals of Wireless Sensor Networks, Theory and Practice, Waltenegus Dargie,


Christian Poellabauer , Wiley Series on wireless Communication and Mobile Computing,
2011
2. Networking Wireless Sensors, Bhaskar Krishnamachari , Cambridge University Press, 2005
Course: Cloud Computing
GNKUSCS602
(Credits: 03 Lectures/Week:3)

Learning Objectives:

• To provide learners with the comprehensive and in-depth knowledge of Cloud Computing
concepts, technologies, architecture, implantations and applications.
• To expose the learners to frontier areas of Cloud Computing, while providing sufficient
foundations to enable further study and research.
Learning Outcome:

• After successfully completion of this course, learner should be able to articulate the
main concepts, key technologies, strengths, and limitations of cloud computing and the
possible applications for state-of-the-art cloud computing using open source
technology.
• Learner should be able to identify the architecture and infrastructure of cloud
computing, including SaaS, PaaS, IaaS, public cloud, private cloud, hybrid cloud, etc.
• They should explain the core issues of cloud computing such as security, privacy, and
interoperability.

Unit Title No. of


lectures

Unit 1

1.1 Introduction to Cloud Computing, Characteristics and benefits of 07


Cloud Computing, Basic concepts of Distributed Systems, Web
2.0, Service-Oriented Computing, Utility-Oriented Computing.
Elements of Parallel Computing
1.2 Elements of Distributed Computing. Technologies for Distributed 08
Computing. Cloud Computing Architecture. The cloud reference
model. Infrastructure as a service. Platform as a service. Software
as a service. Types of clouds.

Unit 2

2.1 Characteristics of Virtualized Environments. Taxonomy of 07


Virtualization Techniques. Virtualization and Cloud Computing.
Pros and Cons of Virtualization. Virtualization using KVM
2.2 Creating virtual machines, oVirt - management tool for 08
virtualization environment. Open challenges of Cloud Computing
Unit 3
3.1 Introduction to OpenStack, OpenStack test-drive, Basic 07
OpenStack operations, OpenStack CLI and APIs, Tenant model
operations, Quotas, Private cloud building blocks, Controller
deployment, Networking deployment
3.2 Block Storage deployment, Compute deployment, deploying and 08
utilizing OpenStack in production environments, Building a
production environment, Application orchestration using
OpenStack Heat
References:
1. Mastering Cloud Computing, Rajkumar Buyya, Christian Vecchiola, S Thamarai Selvi, Tata
McGraw Hill Education Private Limited, 2013
2. OpenStack in Action, V. K. CODY BUMGARDNER, Manning Publications Co, 2016

Additional Reference(s):

1. OpenStack Essentials, Dan Radez, PACKT Publishing, 2015


2. OpenStack Operations Guide, Tom Fifield, Diane Fleming, Anne Gentle, Lorin Hochstein,
Jonathan Proulx, Everett Toews, and Joe Topjian, O'Reilly Media, Inc., 2014
3. https://www.openstack.org
Course: Cyber Forensics
GNKUSCS603 (Credits: 03 Lectures/Week:3)

Learning Objectives:

• To understand the procedures for identification, preservation, and extraction of


electronic evidence, auditing and investigation of network and host system intrusions,
analysis and documentation of information gathered
Learning Outcome:

• The student will be able to plan and prepare for all stages of an investigation - detection,
initial response and management interaction, investigate various media to collect
evidence, report them in a way that would be acceptable in the court of law.

Unit Title No. of


lectures

Unit 1

1.1 Computer Forensics : 07


Introduction to Computer Forensics and standard procedure,
Incident Verification and System Identification ,Recovery of Erased
and damaged data, Disk Imaging and Preservation, Data Encryption
and Compression, Automated Search Techniques, Forensics Software
1.2 Network Forensic : 08
Introduction to Network Forensics and tracking network traffic,
Reviewing Network Logs, Network Forensics Tools, Performing Live
Acquisitions, Order of Volatility, Standard Procedure
Cell Phone and Mobile Device Forensics: Overview, Acquisition
Procedures for Cell Phones and Mobile Devices

Unit 2

2.1 Internet Forensic : 07


Introduction to Internet Forensics, World Wide Web Threats,
Hacking and Illegal access, Obscene and Incident transmission,
Domain Name Ownership Investigation, Reconstructing past internet
activities and events
E-mail Forensics : e-mail analysis, e-mail headers and spoofing, Laws
against e-mail Crime, Messenger Forensics: Yahoo Messenger

2.2 Social Media Forensics: Social Media Investigations 08


Browser Forensics: Cookie Storage and Analysis, Analyzing Cache
and temporary internet files, Web browsing activity reconstruction
Unit 3

3.1 Investigation, Evidence presentation and Legal aspects of Digital 07


Forensics:
Authorization to collect the evidence , Acquisition of Evidence,
Authentication of the evidence, Analysis of the evidence, Reporting
on the findings, Testimony
3.2 Introduction to Legal aspects of Digital Forensics: Laws & 08
regulations, Information Technology Act, Giving Evidence in court,
Case Study – Cyber Crime cases, Case Study – Cyber Crime cases
References:
1. Guide to computer forensics and investigations, Bill Nelson, Amelia Philips and
Christopher Steuart, course technology,5th Edition,2015
2.
Additional Reference(s):

1. Incident Response and computer forensics, Kevin Mandia, Chris Prosise, Tata
McGrawHill,2nd Edition,2003
Course: Information Retrieval
GNKUSCS604 (Credits: 03 Lectures/Week:3)
Learning Objectives:

• To provide an overview of the important issues in classical and web information retrieval.
• The focus is to give an up-to- date treatment of all aspects of the design and
implementation of systems for gathering, indexing, and searching documents and of
methods for evaluating systems.
Learning Outcome:

• After completion of this course, learner should get an understanding of the field of
information retrieval and its relationship to search engines. It will give the learner an
understanding to apply information retrieval models.
Unit Title No. of
lectures

Unit 1 Introduction to Information Retrieval

1.1 Introduction, History of IR, Components of IR, and Issues related 15


to IR, Boolean retrieval, Dictionaries and tolerant retrieval.

Unit 2 Link Analysis and Specialized Search

2.1 Link Analysis, hubs and authorities, Page Rank and HITS 07
algorithms, Similarity, Hadoop & Map Reduce, Evaluation,
Personalized search
2.2 Collaborative filtering and content-based recommendation of 08
documents and products, handling “invisible” Web, Snippet
generation, Summarization, Question Answering, Cross- Lingual
Retrieval
Unit 3

3.1 Web Search Engine: Web search overview, web structure, the 07
user, paid placement, search engine optimization/spam, Web
size measurement, search engine optimization/spam, Web
Search Architectures
3.2 XML retrieval: Basic XML concepts, Challenges in XML retrieval, A 08
vector space model for XML retrieval, Evaluation of XML
retrieval, Text-centric versus data-centric XML retrieval.
References:
• Introduction to Information Retrieval, C. Manning, P. Raghavan, and H. Schütze,
Cambridge University Press, 2008
• Modern Information Retrieval: The Concepts and Technology behind Search, Ricardo
Baeza -Yates and Berthier Ribeiro – Neto, 2nd Edition, ACM Press Books 2011.
• Search Engines: Information Retrieval in Practice, Bruce Croft, Donald Metzler and Trevor
Strohman, 1st Edition, Pearson, 2009.

Additional Reference(s):

• Information Retrieval Implementing and Evaluating Search Engines, Stefan Büttcher,


Charles L. A. Clarke and Gordon V. Cormack, The MIT Press; Reprint edition (February 12,
2016)
Course: Digital Image Processing
GNKUSCS605 (Credits: 03 Lectures/Week:3)
Learning Objectives:

• To study two-dimensional Signals and Systems.


• To understand image fundamentals and transforms necessary for image processing.
• To study the image enhancement techniques in spatial and frequency domain.
• To study image segmentation and image compression techniques.

Learning Outcome:

• Learner should review the fundamental concepts of a digital image processing system.
Analyze the images in the frequency domain using various transforms.
• Evaluate the techniques for image enhancement and image segmentation.
• Apply various compression techniques.
• They will be familiar with basic image processing techniques for solving real problems

Unit Title No. of


lectures

Unit 1

1.1 Introduction to Image-processing System : Introduction, Image 07


Sampling, Quantization, Resolution, Human Visual Systems,
Elements of an Image-processing System, Applications of Digital
Image Processing
2D Signals and Systems : 2D signals, separable sequence,
periodic sequence, 2D systems, classification of 2D systems, 2D
Digital filter
1.2 Convolution and Correlation : 2D Convolution through graphical 08
method, Convolution through 2D Z—transform, 2D Convolution
through matrix analysis, Circular Convolution, Applications of
Circular Convolution, 2D Correlation
Image Transforms: Need for transform, image transforms,
Fourier transform, 2D Discrete Fourier Transform, Properties of
2D DFT, Importance of Phase, Walsh transform, Hadamard
transform, Haar transform, Slant transform, Discrete Cosine
transform, KL transform

Unit 2

2.1 Image Enhancement :Image Enhancement in spatial domain, 07


Enhancement trough Point operations, Histogram manipulation,
Linear and nonlinear Gray Level Transformation, local or
neighborhood operation, Median Filter, Spatial domain High pass
filtering, Bit-plane slicing, Image Enhancement in frequency
domain, Homomorphic filter, Zooming operation, Image
Arithmetic

2.2 Binary Image processing :Mathematical morphology, Structuring 08


elements, Morphological image processing, Logical operations,
Morphological operations, Dilation and Erosion, Distance
Transform
Colour Image processing :Colour images, Colour Model, Colour
image quantization, Histogram of a colour image
Unit 3

3.1 Image Segmentation: Image segmentation techniques, Region 07


approach, Clustering techniques, Thresholding, Edge-based
segmentation, Edge detection, Edge Linking, Hough Transform
3.2 Image Compression: Need for image compression, Redundancy 08
in images, Image-compression scheme, Fundamentals of
Information Theory, Run-length coding, Shannon-Fano coding,
Huffman Coding, Arithmetic Coding, Transform-based
compression, Image-compression standard
References:

1. Digital Image Processing, S Jayaraman, S Esakkirajan, T Veerakumar,Tata McGraw-Hill


Education Pvt. Ltd., 2009
Additional Reference(s):

1. Digital Image Processing 3rd Edition, Rafael C Gonzalez, Richard E Woods, Pearson, 2008
2. Scilab Textbook Companion for Digital Image Processing, S. Jayaraman, S. Esakkirajan And
T. Veerakumar, 2016 (https://scilab.in/textbook_companion/generate_book/125)
Course: Data Science
GNKUSCS606 (Credits: 03 Lectures/Week:3)
Learning Objectives:

• Understanding basic data science concepts.


• Learning to detect and diagnose common data issues, such as missing values, special
values, outliers, inconsistencies, and localization.
• Making aware of how to address advanced statistical situations, Modeling and Machine
Learning.
Learning Outcome:

• After completion of this course, the students should be able to understand &
comprehend the problem; and should be able to define suitable statistical method to be
adopted.
Unit Title No. of
lectures

Unit 1

1.1 Introduction to Data Science: What is Data? Different kinds of data 07


Introduction to high level programming language + Integrated
Development Environment (IDE), Exploratory Data Analysis (EDA) +
Data Visualization
1.2 Different types of data sources 08

Data Management: Data Collection, Data cleaning/extraction, Data


analysis & Modeling

Unit 2

2.1 Data Curation: Query languages and Operations to specify and 07


transform data, Structured/schema based systems as users and
acquirers of data
Semi-structured systems as users and acquirers of data,
Unstructured systems in the acquisition and structuring of data,

2.2 Security and ethical considerations in relation to authenticating and 08


authorizing access to data on remote systems, Software
development tools, Large scale data systems, Amazon Web Services
(AWS)
Unit 3

3.1 Statistical Modelling and Machine Learning: 07


Introduction to model selection: Regularization, bias/variance
tradeoff e.g. parsimony, AIC, BIC, Cross validation, Ridge regressions
and penalized regression e.g. LASSO
Data transformations: Dimension reduction, Feature extraction,
Smoothing and aggregating

3.2 Supervised Learning: Regression, linear models, Regression trees, 08


Time-series Analysis, Forecasting, Classification: classification trees,
Logistic regression, separating hyperplanes, k-NN
Unsupervised Learning: Principal Components Analysis (PCA), k-
means clustering, Hierarchical clustering, Ensemble methods

References:
1. Doing Data Science, Rachel Schutt and Cathy O’Neil, O’Reilly,2013
2. Mastering Machine Learning with R, Cory Lesmeister, PACKT Publication,2015

Additional Reference(s):

1. Hands-On Programming with R, Garrett Grolemund,1st Edition, 2014


2. An Introduction to Statistical Learning, James, G., Witten, D., Hastie, T., Tibshirani,
R.,Springer,2015
Course: Ethical Hacking

GNKUSCS607 (Credits: 03 Lectures/Week:3)

Learning Objectives:

• To understand the ethics, legality, methodologies and techniques of hacking


Learning Outcome:

• Learner will know to identify security vulnerabilities and weaknesses in the target
applications. They will also know to test and exploit systems using various tools and
understand the impact of hacking in real time machines.
Unit Title No. of
lectures

Unit 1 Information Security : Attacks and Vulnerabilities

1.1 Introduction to information security : Asset, Access Control, CIA, 15


Authentication, Authorization, Risk, Threat, Vulnerability, Attack,
Attack Surface, Malware, Security-Functionality-Ease of Use Triangle
Types of malware :Worms, viruses, Trojans, Spyware, Rootkits
Types of vulnerabilities : OWASP Top 10 : cross-site scripting (XSS),
cross site request forgery (CSRF/XSRF), SQL injection, input parameter
manipulation, broken authentication, sensitive information disclosure,
XML External Entities, Broken access control, Security
Misconfiguration, Using components with known vulnerabilities,
Insufficient Logging and monitoring, OWASP Mobile Top 10, CVE
Database
1.2 Types of attacks and their common prevention mechanisms :
Keystroke Logging, Denial of Service (DoS /DDoS), Waterhole attack,
brute force, phishing and fake WAP, Eavesdropping, Man-in-the-
middle, Session Hijacking, Clickjacking, Cookie Theft, URL Obfuscation,
buffer overflow, DNS poisoning, ARP poisoning, Identity Theft, IoT
Attacks, BOTs and BOTNETs
Case-studies : Recent attacks – Yahoo, Adult Friend Finder, eBay,
Equifax, WannaCry, Target Stores, Uber, JP Morgan Chase, Bad Rabbit
Unit 2 Ethical Hacking – I (Introduction and pre-attack)

2.1 Introduction: Black Hat vs. Gray Hat vs. White Hat 15L 07
(Ethical) hacking, Why is Ethical hacking needed?, How is
Ethical hacking different from security auditing and
digital forensics?, Signing NDA, Compliance and
Regulatory
2.2 Approach : Planning - Threat Modeling, set up security verification 08
standards, Set up security testing plan – When, which systems/apps,
understanding functionality, black/gray/white, authenticated vs.
unauthenticated, internal vs. external PT, Information gathering,
Perform Manual and automated (Tools: WebInspect/Qualys, Nessus,
Proxies, Metasploit) VA and PT, How WebInspect/Qualys tools work:
Crawling/Spidering, requests forging, pattern matching to known
vulnerability database and Analyzing results, Preparing report, Fixing
security gaps following the report
Enterprise strategy : Repeated PT, approval by security testing team,
Continuous Application Security Testing,
Phases: Reconnaissance/foot-printing/Enumeration, Phases: Scanning,
Sniffing
Unit 3 Ethical Hacking :Enterprise Security

3.1 Phases : Gaining and Maintaining Access : Systems hacking – 07


Windows and Linux – Metasploit and Kali Linux, Keylogging, Buffer
Overflows, Privilege Escalation, Network hacking - ARP Poisoning,
Password Cracking, WEP Vulnerabilities, MAC Spoofing, MAC Flooding,
IPSpoofing, SYN Flooding, Smurf attack, Applications hacking :
SMTP/Email-based attacks, VOIP vulnerabilities, Directory traversal,
Input Manipulation, Brute force attack, Unsecured login mechanisms,
SQL injection, XSS, Mobile apps security
3.2 Malware analysis : Netcat Trojan, wrapping definition, reverse 08
engineering
Phases : Covering your tracks : Steganography, Event Logs alteration
Additional Security Mechanisms : IDS/IPS, Honeypots and evasion
techniques, Secure Code Reviews (Fortify tool, OWASP Secure Coding
Guidelines)
References:
1. Certified Ethical Hacker Study Guide v9, Sean-Philip Oriyano, Sybex; Study Guide
Edition,2016
2. CEH official Certified Ethical Hacking Review Guide, Wiley India Edition, 2007

Additional Reference(s):

1. Certified Ethical Hacker: Michael Gregg, Pearson Education,1st Edition, 2013


2. Certified Ethical Hacker: Matt Walker, TMH,2011
3. http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines
4. https://www.owasp.org/index.php/Category:OWASP_Top_Ten_2017_Project
https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10
5. https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents
6. https://www.owasp.org/index.php/OWASP_Secure_Coding_Practices_-
_Quick_Reference_Guide
7. https://cve.mitre.org/
8. https://access.redhat.com/blogs/766093/posts/2914051
9. http://resources.infosecinstitute.com/applications-threat-modeling/#gref
10. http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html
Course (Credits: 02 Lectures/Week:06)
Practical of Elective-I
GNKUSCSP601

Wireless Sensor Networks and Mobile Communication

Practical experiments require software tools like INET Framework for OMNeT++, NetSim , TOSSIM,
Cisco packet tracer 6.0 and higher version.
1. Understanding the Sensor Node Hardware. (For Eg. Sensors, Nodes(Sensor mote), Base
Station, Graphical User Interface.)
2. Exploring and understanding TinyOS computational concepts:- Events, Commands and Task.
a. nesC model
b. nesC Components
3. Understanding TOSSIM for
c. Mote-mote radio communication
d. Mote-PC serial communication
4. Create and simulate a simple adhoc network
5. Understanding, Reading and Analyzing Routing Table of a network.
6. Create a basic MANET implementation simulation for Packet animation and Packet Trace.
7. Implement a Wireless sensor network simulation.
8. Create MAC protocol simulation implementation for wireless sensor Network.
9. Simulate Mobile Adhoc Network with Directional Antenna
10. Create a mobile network using Cell Tower, Central Office Server, Web browser and Web
Server. Simulate connection between them.

Cloud Computing

1. Study and implementation of Infrastructure as a Service.


2. Installation and Configuration of virtualization using KVM.
3. Study and implementation of Infrastructure as a Service
4. Study and implementation of Storage as a Service
5. Study and implementation of identity management
6. Study Cloud Security management

7. Write a program for web feed.


8. Study and implementation of Single-Sing-On.
9. User Management in Cloud.
10. Case study on Amazon EC2/Microsoft Azure/Google Cloud Platform

Cyber Forensics
1. Creating a Forensic Image using FTK Imager/Encase Imager :
a. Creating Forensic Image
b. Check Integrity of Data
c. Analyze Forensic Image
2. Data Acquisition:
a. Perform data acquisition using:
b. USB Write Blocker + Encase Imager
c. SATA Write Blocker + Encase Imager
d. Falcon Imaging Device
3. Forensics Case Study:
a. Solve the Case study (image file) provide in lab using Encase Investigator or Autopsy

4. Capturing and analyzing network packets using Wireshark (Fundamentals) :


a. Identification the live network
b. Capture Packets
c. Analyze the captured packets
5. Analyze the packets provided in lab and solve the questions using Wireshark :
a. What web server software is used by www.snopes.com?
b. About what cell phone problem is the client concerned?
c. According to Zillow, what instrument will Ryan learn to play?
d. How many web servers are running Apache?
e. What hosts (IP addresses) think that jokes are more entertaining when they are
explained?
6. Using Sysinternals tools for Network Tracking and Process Monitoring :
a. Check Sysinternals tools
b. Monitor Live Processes
c. Capture RAM
d. Capture TCP/UDP packets
e. Monitor Hard Disk
f. Monitor Virtual Memory
g. Monitor Cache Memory
7. Recovering and Inspecting deleted files
a. Check for Deleted Files
b. Recover the Deleted Files
c. Analyzing and Inspecting the recovered files
Perform this using recovery option in ENCASE and also Perform manually through command
line
8. Acquisition of Cell phones and Mobile devices
9. Email Forensics
a. Mail Service Providers
b. Email protocols
c. Recovering emails
d. Analyzing email header
10. Web Browser Forensics
a. Web Browser working
b. Forensics activities on browser
c. Cache / Cookies analysis
d. Last Internet activity
Course (Credits: 02 Lectures/Week:06)
Practical of Elective-II
GNKUSCSP602

Information Retrieval

Practical may be done using software/tools like Python / Java / Hadoop


1. Write a program to demonstrate bitwise operation.
2. Implement Page Rank Algorithm.
3. Implement Dynamic programming algorithm for computing the edit distance between
1. strings s1 and s2. (Hint. Levenshtein Distance)
4. Write a program to Compute Similarity between two text documents.
5. Write a map-reduce program to count the number of occurrences of each alphabetic
character in the given dataset. The count for each letter should be case-insensitive (i.e.,
include both upper-case and lower-case versions of the letter; Ignore non-alphabetic
characters).
6. Implement a basic IR system using Lucene.
7. Write a program for Pre-processing of a Text Document: stop word removal.
8. Write a program for mining Twitter to identify tweets for a specific period and identify
trends and named entities.
9. Write a program to implement simple web crawler.
10. Write a program to parse XML text, generate Web graph and compute topic specific page
rank.
Digital Image Processing

Practical need to be performed using Scilab under Linux or Windows


1. 2D Linear Convolution, Circular Convolution between two 2D matrices
2. Circular Convolution expressed as linear convolution plus alias
3. Linear Cross correlation of a 2D matrix, Circular correlation between two signals and
Linear auto correlation of a 2D matrix, Linear Cross correlation of a 2D matrix
4. DFT of 4x4 gray scale image
5. Compute discrete cosine transform, Program to perform KL transform for the given 2D
matrix
6. Brightness enhancement of an image, Contrast Manipulation, image negative
7. Perform threshold operation, perform gray level slicing without background
8. Image Segmentation
9. Image Compression
10. Binary Image Processing and Colour Image processing

Data Science

1. Practical of Data collection, Data curation and management for Unstructured data (NoSQL)
2. Practical of Data collection, Data curation and management for Large-scale Data system
(such as MongoDB)
3. Practical of Principal Component Analysis
4. Practical of Clustering
5. Practical of Time-series forecasting
6. Practical of Simple/Multiple Linear Regression
7. Practical of Logistics Regression
8. Practical of Hypothesis testing
9. Practical of Analysis of Variance
10. Practical of Decision Tree
Course Project Implementation
(Credits: 01 Lectures/Week:03)
GNKUSCSP603

Please Refer to Project Implementation Guidelines

Course Ethical Hacking


(Credits: 03 Lectures/Week:03)
GNKUSCSP604

1. Use Google and Whois for Reconnaissance


2. a) Use CrypTool to encrypt and decrypt passwords using RC4 algorithm

b) Use Cain and Abel for cracking Windows account password using Dictionary attack and
to decode wireless network passwords
3. a) Run and analyze the output of following commands in Linux – ifconfig, ping, netstat,
traceroute
b) Perform ARP Poisoning in Windows
4. Use NMap scanner to perform port scanning of various forms – ACK, SYN, FIN, NULL,
XMAS
5. a) Use Wireshark (Sniffer) to capture network traffic and analyze

b) Use Nemesy to launch DoS attack


6. Simulate persistent cross-site scripting attack
7. Session impersonation using Firefox and Tamper Data add-on

8. Perform SQL injection attack


9. Create a simple keylogger using python
10. Using Metasploit to exploit (Kali Linux)
Project Implementation Guidelines

1. A learner is expected to carry out two different projects: one in Semester V and another in
Semester VI.
2. A learner can choose any topic which is covered in Semester I- semester VI or any other topic
with the prior approval from head of the department/ project in charge.
3. The Project has to be performed individually.
4. A learner is expected to devote around three months of efforts in the project.
5. The project can be application oriented/web-based/database/research based.
6. It has to be an implemented work; just theoretical study will not be acceptable.

7. A learner can choose any programming language, computational techniques and tools which
have been covered during BSc course or any other with the prior permission of head of the
department/ project guide. 8. A project guide should be assigned to a learner. He/she will
assign a schedule for the project and hand it over to a learner. The guide should oversee the
project progress on a weekly basis by considering the workload of 3 lectures as assigned.
9. The quality of the project will be evaluated based on the novelty of the topic, scope of the
work, relevance to the computer science, adoption of emerging techniques/technologies and
its real-world application.
10. A learner has to maintain a project report with the following subsections
a) Title Page
b) Certificate
A certificate should contain the following information –
- The fact that the student has successfully completed the project as per the
syllabus and that it forms a part of the requirements for completing the BSc
degree in computer science of University of Mumbai.
- The name of the student and the project guide
- The academic year in which the project is done
- Date of submission,
- Signature of the project guide and the head of the department with date along
with the department stamp,
- Space for signature of the university examiner and date on which the project is
evaluated.

c) Self-attested copy of Plagiarism Report from any open source tool.


d) Index Page detailing description of the following with their subsections:
- Title: A suitable title giving the idea about what work is proposed.
- Introduction: An introduction to the topic giving proper back ground of the topic.
- Requirement Specification: Specify Software/hardware/data requirements.
- System Design details :
Methodology/Architecture/UML/DFD/Algorithms/protocols etc. used(whichever
is applicable)
- System Implementation: Code implementation
- Results: Test Cases/Tables/Figures/Graphs/Screen shots/Reports etc.
- Conclusion and Future Scope: Specify the Final conclusion and future scope
- References: Books, web links, research articles, etc.
11. The size of the project report shall be around twenty to twenty five pages, excluding the
code.
12. The Project report should be submitted in a spiral bound form
13. The Project should be certified by the concerned Project guide and Head of the
department. 14. A learner has to make a presentation of working project and will be evaluated
as per the Project evaluation scheme
Scheme of Examination

1. Theory:
I. Internal 25 Marks :
a) Test – 20 Marks

20 marks Test – Duration 40 mins It will be conducted either using any open
source learning management system like Moodle (Modular object-oriented
dynamic learning environment)
OR
A test based on an equivalent online course on the contents of the concerned
course (subject) offered by or build using MOOC (Massive Open Online Course)
platform.

b) 5 Marks
- Active participation in routine class instructional deliveries Overall conduct as a
responsible student, manners, skill in articulation, leadership qualities demonstrated
through organizing co-curricular activities, etc.

II. External 75 Marks as per University Guidelines

11. Practical and Project Examination:


There will be separate Practical examination for Elective-I, II, Skill enhansement and project of
these Elective-I 100, Elective-II: 100 and Skill Enhansement: 50 and Project Implementation: 50.

In the Practical Examination of Elective-I and II, the student has to perform practical on each of
the subjects chosen. The Marking Scheme for each of the Elective is given below:
Subject Code Experiment-I Experiment-II Total Marks

Elective-I USCSP501/ Experiment- Experiment- 100 M


USCSP601 35+Journal 5 +viva 35+Journal 5 +viva
5+05 Content 5+05 Content
beyond syllabus beyond syllabus
Total:50M Total:50M

Elective-II USCSP502/ Experiment- Experiment- 100 M


USCSP602 35+Journal 5 +viva 35+Journal 5 +viva
5+05 Content 5+05 Content
beyond syllabus beyond syllabus
Total:50M Total:50M
Project USCSP503/ **Project Evaluation Scheme 50M
Implementation USCSP603

Skill USCSP504/ Experiment-40+Journal:5+viva-5 50M


Enhancement USCSP604 Total-50M

Total Marks 300M

(Certified Journal is compulsory for appearing at the time of Practical Examination)

**Project Evaluation Scheme:


Presentation Working of the Quality of the Viva Documentation
Project Project

10Marks 10Marks 10Marks 10Marks 10Marks

(Certified Project Document is compulsory for appearing at the time of Project Presentation)
Content beyond Syllabus

value addition courses, activities, trainings, certification courses, Industrial Visits, minor/ major project
development.

Delivery of Content Beyond Justification


Syllabus
Class Room Teaching Delivery of the contents of the topic which is beyond syllabus is done in
the class room with black board or Multimedia presentations which is
the best method when the contents are theoretical and informative.

In addition, the faculty members conduct prerequisite tests of the


subject so that he/she can identify weak students and knowledge level
of the students before start of the teaching. Faculty delivers the
information of the course with the history, background theory of the
topics, its concept with examples effectively so that student can get
the knowledge and related practical concepts, application etc.

Additional Laboratory Topics which are important and not the part of lab experiments such
Experiments additional experiments are conducted to enhance the knowledge.
Case Studies Group of students are given an advanced topic. They discuss on the
topic and prepare a document.
Project Societal, environmental, need based and real-time application based
Development/certification projects are carried out by the students under the guidance by faculty.
courses (Paid) Students must do certification courses at departmental level.
Workshops/Seminars/ Various workshops, seminars, Expert talks by
Guest Lectures academicians/industrialists on different technologies are organized to
gain the knowledge
Industrial Visits/Tours Visit to the large or small-scale industries are organized for the
students to bridge the gap.
Internships Software development cell provides in-house internship for the
students to work on real time projects, need based projects.
Pre-placement Trainings Seminars are organized to groom students for aptitude tests,
interviews and overall development of students
Online Certification Students should participate in NPTEL online courses
courses (free of cost)

You might also like