MCA2022Syllabus
MCA2022Syllabus
1
Vision
Mission
PEO1: Apply principles of mathematics and computing to design, develop and test software
for quality, security, and utility.
PEO3: Engage in lifelong learning to keep pace with changing landscape of technologies
for professional advancement.
2
Programme Articulation Matrix
M1 M2 M3 M4
PEO1 X X
PEO2 X X X
PEO3 X
PEO4 X
2.Problem Analysis: Identify, formulate, research literature, and solve complex computing
problems reaching substantiated conclusions using fundamental principles of mathematics,
computing sciences and relevant domain disciplines.
5.Modern Tool Usage: Create, select, and apply appropriate techniques, resources, and modern
computing tools to complex computing activities, with an understanding of the limitations.
6.Professional Ethics: Understand and commit to professional ethics and cyber regulations
responsibilities, and norms of professional computing practice.
3
7.Life-long learning: Recognize the need and have the ability to engage in independent learning
for continual development as a computing professional.
8.Project management and finance: Demonstrate knowledge and understanding of the computing
and management principles and apply these to one’s own work, as the member and leader in a team
to manage projects and in multidisciplinary environments.
9.Communication Efficacy: Communicate effectively with the computing community, and with
society at large, about complex computing activities by being able to comprehend and write
effective reports, design documentation, make effective presentations and give and understand clear
instructions.
10.Societal and Environmental Concern: Understand and assess societal, environmental, health,
safety, legal and cultural issues within local and global context, and the consequential
responsibilities to professional computing practice.
4
MCA CURRICULUM 2022-2023
SYLLABUS REVISION
TOTAL 24
5
22-382-0207 Database Management Systems Lab 0 1 2 2
TOTAL 24
Elective 2 3 1 0 4
Elective 3 3 1 0 4
TOTAL 24
22-382-0401 Internship/Project 3 26 16
ELECTIVES:
6
Subject L T P Credit
ELECTIVE I
ELECTIVE 2
7
ELECTIVE 3
22-382-0333 Explainable AI 3 1 0 4
8
22-382- MATHEMATICAL CATEGORY L T P CREDIT
0101 FOUNDATION FOR
COMPUTING CORE 3 1 0 4
CO1 Solve system of linear equations using various (Cognitive level: Apply)
methods.
CO2 Apply various methods to find Eigenvalues and (Cognitive level: Apply)
Eigenvectors.
CO3 Apply Bayes theorem and various discrete and (Cognitive level: Apply)
continuous distributions.
CO4 Apply various optimization techniques for solving (Cognitive level: Understand)
real life problems.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 3 3 3 1
CO 2 3 3 3 1
CO 3 3 3 3 1
CO 4 3 3 3 1
CO 5 3 3 3 1
9
22-382-0101 MATHEMATICAL FOUNDATION FOR COMPUTING
UNIT I (8 Hours)
Linear Algebra- Solving systems of Linear Equations; Vector Spaces and sub spaces; Linear
Independence; Basis and rank; Linear maps-Image and kernel, Metric space and normed space,
Inner product space.
UNIT IV (8 Hours)
Optimization – Optimization using gradient descent, Constraint optimization and Langrage
multipliers, convex optimization, Maximum likelihood estimation, least Square estimation, Linear
regression, Linear regression as maximum likelihood, least squares and maximum likelihood.
UNIT V (7 Hours)
Dimensionality reduction and Density estimation – Feature extraction, feature selection, Principal
component analysis, Discrete wavelet transform; Gaussian mixture model, Expectation
maximization (EM) algorithm.
Text Books/References
1.“Mathematics for Machine Learning” by Marc Peter Deisenroth, A. Aldo Faisal, Cheng
Soon Ong, 2020, Cambridge University Press.
2.“Mathematics for Machine Learning”, by Jay Davani, Hands-on 2020 Packt publishers.
3.“Advanced Engineering Mathematics”, by Erwin Kreyszig,Edition 10, 2014 John Wiley
&Sons.
4. “Information Theory,Inference and Learning Algorithms”, by David J.C. MacKay,2003
Cambridge University Press.
10
22-382-0102 DATA STRUCTURES CATEGORY L T P CREDIT
AND ALGORITHMS
USING C CORE 3 1 0 4
Course Outcomes: After the completion of the course the student will be able to
CO 4 Illustrate the use of various data structures ( Heap / (Cognitive level: Analyse)
Graph) for solving a given computational problem.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 3 2 2
CO 2 3 3 2
CO 3 3 2 2 2
CO 4 3 3 3 3
CO 5 3 2 3
11
22-382-0102 DATA STRUCTURES AND ALGORITHMS USING C
12
TEXTBOOK
1. “Fundamentals of Data Structures in C", by Ellis Horowitz. SartajSahni and Anderson
Freed, Edition 2, 2008, Universities Press.
2.” Mastering C”, by K.R .Venugopal, S.R Prasad Edition 11, 2011 , Reprint, Tata
McGraw-Hill.
3. “Introduction to Algorithms”, by Thomas H. Cormen, Charles E. Leiserson, Ronald
L,Edition 4.
REFERENCE BOOKS
Web Resources
NPTEL
● Data Structures And Algorithms - (Computer Science and Engineering course from
IIT Delhi) NPTEL Lecture Videos by Prof. Naveen Garg from IIT Delhi
https://www.nptelvideos.com/course.php?id=401
13
22-382-0103 DIGITAL FUNDAMENTALS CATEGORY L T P CREDIT
AND COMPUTER
ARCHITECTURE CORE 3 1 0 4
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 2 1
CO2 3 3 1
CO3 2 1 1
CO4 3 3 2 1 1
CO5 1 1 1
14
22-382-0103 DIGITAL FUNDAMENTALS AND COMPUTER ARCHITECTURE
Text Books
1."Digital Design",by M. Morris Mano, Edition 6,2018, Prentice Hall of India Pvt. Ltd.
2. “Computer organization And Embedded Systems”, by Hamacher, Vranesic, Zaky,
Manjikian, Edition 6, 2012, McGraw-Hill.
15
Reference Books
Web Resources
1. NPTEL: https://onlinecourses.nptel.ac.in/noc19_ee51/preview
2. Coursera: https://www.coursera.org/learn/digital-systems
3. EDX/UPGRADE : https://www.edx.org/learn/electronics
16
22-382–0104 SOFTWARE CATEGORY L T P CREDIT
ENGINEERING
CORE 3 1 0 4
Prerequisite: NIL
Course Outcomes:
After completion of this course, students will be able to
CO1 Choose suitable life cycle models to be used in a particular (Cognitive level : Apply)
context.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 1 1 2 1
CO2 2 2 2 1 2 2 1
CO3 2 2 2 1 2 2 1
CO4 2 1 2 2 1
CO5 2 1 2 2
17
22-382-0104 SOFTWARE ENGINEERING
UNIT I ( 12 Hours)
Introduction to Software Engineering - Professional software development, Software engineering
ethics. Software process models - Software process models- Waterfall Model, V-process model,
Spiral Model, Prototyping Model, Software Iterative and Incremental Method. Agile software
development - Agile methods, agile manifesto - values and principles. Agile development
techniques- Scrum, Lean(LN),Extreme Programming (XP), Agile Unified Process (AUP). Agile
Project Management. Overview of DevOps and Code Management – Code management, DevOps
automation, Continuous Integration, Delivery, and Deployment (CI/CD/CD).
UNIT II( 8 Hours)
Functional and non-functional requirements, Requirements engineering processes. Requirements
elicitation, Requirements validation, Requirements change, Traceability Matrix. Developing use
cases, Software Requirements Specification Template, Software Design- Overview of Software
Design, How to characterize a good software design, Cohesion and coupling, Layered arrangement
of modules, Approaches to Software Design.
UNIT III( 8 Hours)
Software Maintenance – Characteristics of Software Maintenance, Software Reverse Engineering,
Software maintenance process models, Estimation of maintenance cost. Object Modeling using
UML – Basic object Orientation concepts, Unified Modeling Language, UML diagrams, Use Case
Model, Class Diagrams, Interaction Diagrams, Activity Diagram, State Chart diagram.
UNIT IV( 8 Hours)
Coding and Testing – Coding, code review, Software Documentation, Testing, Software testing
strategies - Unit Testing, Integration Testing, Validation testing, System testing, Debugging, White
box testing, Path testing, Control Structure testing, Black box testing, Testing Documentation.
[
UNIT V( 9 Hours)
Software Quality, Software Quality Dilemma, Achieving Software Quality Elements of Software
Quality Assurance, SQA Tasks, Software measurement and metrics. Software Process
Improvement (SPI), SPI Process CMMI process improvement framework, ISO 9001:2000 for
Software. Cloud-based Software - Virtualisation and containers, Everything as a service (IaaS,
PaaS), Software as a service. Microservices Architecture - Microservices, Microservice
deployment
18
Textbook:
● “Fundamentals of Software Engineering”,byRajib Mall, Edition 5, February 2019,PHI
Learning Pvt. Ltd.,
● “Software Engineering–a Practitioner’s approach” by Roger S Pressman, Edition
7,2017,McGraw Hill.
● “Software Engineering” by Ian Sommerville, Edition 10,October 2018,PEARSON
INDIA.
● “Software Engineering A Precise Approach” by Pankaj Jalote, 2010, WILEY INDIA
● “Software Testing- Principles, Techniques and Tools”, M G Limaye
● Software Quality Assurance from theory to implementation, Daniel Galin
19
22-382-0105 PYTHON CATEGORY L T P CREDIT
PROGRAMMING
CORE 3 1 0 4
Course Outcomes
After completion of this course, students will be able to
CO1 Discuss various control structures and data structures in (Cognitive level : Understand)
Python.
CO2 Describe procedural and object oriented concepts (Cognitive level : Understand)
CO3 Implement GUI programming, and exception handling (Cognitive level : Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 1 1 2 2 2
CO2 2 2 2 2 2 2
CO3 2 2 3 2 2
CO4 3 2 2 3 3 2 2
CO5 2 2 2 3 3 2 2
20
22-382-0105 PYTHON PROGRAMMING
UNIT I (6 Hours)
Introduction to computer programming: Python as a programming language. Python Data Types,
Strings: Basic Operation, Indexing and Slicing, String Methods, String Formatting Expressions,
String Formatting Method Calls, Comments, Expressions, Variables, and Assignments, Control
Structures, Looping and Branching.
UNIT II (8 Hours)
List: Basic List Operations, List Iteration and Comprehensions, Indexing, Slicing, Two
Dimensional Lists, Iterating through Two Dimensional Lists. Dictionaries: Basic Dictionary
Operations, Changing Dictionaries in Place, Methods, Example: Movie Database. Tuples and Sets
(Properties, Operators, and Methods). User-Defined Functions, Lambda Function, Zip Function,
Parameter Passing (thrusting mutable and immutable parameters). Recursion, Memory
Management During Recursive Function Calls. Global versus Local Namespaces.
UNIT IV (12 Hours)Stack and Queue, Tree, Linked List : Operations (search, insert, delete).
Decorators in Python. Database Programming in Python with sqlite3: Creating Tables, Querying
(Inserting Tuples, Selecting Rows and Updating Tuples), Using Cursor to Iterate over Selected
Tuples. Files: Opening Files, Using FileText and Binary Files, Storing Python Objects in Files:
Conversions, Storing Native Python Objects: pickle, Storing Python Objects in JSON Format,
Storing Packed Binary Data: struct. NumPy: Creating Arrays (array() and arange(), reshape(),
sum(), min() and max() methods, Item wise arithmetic operations. Pattern Matching Using Regular
Expressions: Python Standard Library Module RE.
UNIT V (8 Hours)
Introduction to Pandas: Pandas data structures – Series and DataFrame, Data wrangling using
pandas: Loading a dataset into a dataframe, Selecting Columns from a dataframe, Selecting Rows
from a dataframe, Adding new data in a dataframe, Deleting data from a dataframe. Introduction to
Matplotlib: Scatter plot, Line plot, Bar chart, Histogram, Box plot. Visualize Distributions With
Seaborn. Web scraping: Beautiful Soup.
21
TEXT BOOKS/REFERENCES
1. Mark Lutz, ‘Learning Python’, 5th Edition, O'Reilly Media, Inc.
2. LjubomirPerkovic, “Introduction to Computing Using Python: An Application
Development Focus”, Wiley, 2012.
3. Charles Dierbach, “Introduction to Computer Science Using Python: A Computational
Problem-Solving Focus”, Wiley, 2013.
4. Kenneth A Lambert., Fundamentals of Python : First Programs, 2/e, Cengage
Publishing,2016
Web Resource:
1. https://onlinecourses.nptel.ac.in/noc19_cs41/preview
2. https://nptel.ac.in/courses/106106212
3. https://www.coursera.org/specializations/python-3-programming
4. https://www.coursera.org/specializations/python
22
22-382-0106 DATA STRUCTURES CATEGORY L T P CREDIT
LAB
LAB 0 1 2 2
Course Outcomes: After the completion of the course the student will be able to
CO2 Develop programs using C data types, Functions with (Cognitive level: Apply)
recursion, Pointers and Structures.
CO3 Apply elementary data structures, Non linear data structures (Cognitive level: Apply)
and binary search tree using C.
CO4 Implement Heap and Graph operations using C. (Cognitive level: Apply)
CO5 Apply sorting techniques and Dictionary operations using C. (Cognitive level: Apply)
CO1 3 3
CO2 2 3
CO3 3 2 3
CO4 3 3
CO5 2 2 3
23
22-382-0106- DATA STRUCTURES LAB
24
22-382-0107 PYTHON CATEGORY L T P CREDIT
PROGRAMMING
LAB LAB 0 1 2 2
Course Outcomes: After the completion of the course the student will be able to
CO1 Apply different data types based on the requirement (Cognitive level : Apply)
CO3 Employ exception handling and database connectivity to (Cognitive level : Apply)
develop robust applications in python
CO4 Able to develop websites using Django framework (Cognitive level : Apply)
CO5 Analyse data using Pandas library and Numpy package (Cognitive level : Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3
CO2 3 3
CO3 3 3
CO4 3 3 3
CO5 3 3
25
22-382-0107 PYTHON PROGRAMMING LAB
26
Textbook & References
Online References
http://www.tutorialspoint.com/python/,http://docs.python.org/tutorial/,
http://zetcode.com/tutorials/pythontutorial/,http://www.sthurlow.com/python/,
http://www.djangoproject.com/, http://www.djangobook.com/ ,https://realpython.co
27
22-382-0201 COMPUTER CATEGORY L T P CREDIT
NETWORKS
CORE 3 1 0 4
Prerequisite: NIL
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2
CO2 2 2
CO3 3 3
CO4 2 2
CO5 2 2 3
28
22-382-0201 COMPUTER NETWORKS
UNIT I (7 Hours)
Introduction, history and development of computer networks, network topologies. Layering and
protocols. Physical Layer: Different types of transmission media, errors in transmission:
attenuation, noise. Repeaters. Encoding (NRZ, NRZI, Manchester, 4B/5B, etc.), MAC Layer:
Aloha, CSMA, CSMA/CD, CSMA/CA protocols. Examples: Ethernet, including Gigabit Ethernet
and WiFi (802.11), Token Ring, Bluetooth, WiMax
29
Text Books/References
1. Kurose and Ross, Computer Networks A systems approach , Pearson Education.7th Edition .
2016.
2. AS Tanenbaum, DJ Wetherall, Computer Networks, 5th Ed., Prentice-Hall, 2010.
3. William Stallings, Data and Computer Communications, Pearson Education.
4. W. R. Stevens.TCP/IP Illustrated, Volume 1: The protocols,Addison Wesley, 1994.
5.G. R. Wright.TCP/IP Illustrated, Volume 2: The Implementation,Addison Wesley, 1995.
6. W. R. Stevens.TCP/IP Illustrated, Volume 3: TCP for Transactions, HTTP, NNTP, and the Unix
Domain Protocols,Addison Wesley, 1996.
7. B.A. Forouzan, Data communication & networking, 5th Edition, Tata Mc-Graw Hills.
30
22-382-0202 OPERATING SYSTEMS CATEGORY L T P CREDIT
CORE 3 1 0 4
Prerequisite: NIL
Course Outcomes:
CO1 2 2 1
CO2 2 2 1
CO3 2 2 1
CO4 2 2 1
CO5 2 2 1
31
22-382-0202 OPERATING SYSTEMS
UNIT I (10 Hours)
Introduction to Operating Systems, Functions of Operating System,Design Approaches and Types
of Advanced Operating Systems. Dual-mode operation, concept of multiprogramming,
multiprocessing.Synchronization Mechanisms: Concept of Processes and Threads, Process states
and processes state transition diagram, Process control block , process context, CPU Scheduling
and Process Scheduling–The Critical Section Problem – Other Synchronization Problems:– Process
Synchronization using semaphores & Monitors.
UNIT II (8 Hours)
Distributed Operating Systems:- Issues in Distributed Operating System, Deadlock prevention,
avoidance and detection & recovery - Dead Lock Characterization, Methods for handling Deadlock,
Deadlock Prevention, Deadlock avoidance, Deadlock detection & recovery
32
22-382-0203 MACHINE CATEGORY L T P CREDIT
LEARNING
CORE 3 1 0 4
Course Outcomes: After the completion of the course the student will be able to
CO3 Apply association rule mining algorithms for (Cognitive level : Apply)
frequent pattern mining.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 2 1
CO 2 3 2
CO 3 3 2 1 3 2
CO 4 3 2 3 3 2
CO 5 3 2 2 3 3 2
33
22-382-0203 MACHINE LEARNING
UNIT II (8 Hours)
Association rule mining - Associations, and correlations, Market Basket Analysis, Frequent
Itemsets and Association Rules, Mining Methods – The Apriori Algorithm, Generating Association
Rules from Frequent Itemsets, Finding Frequent Itemsets without Candidate Generation, FP-
Growth, FP-Tree.
34
TEXT BOOKS
1. Jiawei Han, Micheline Kamber, Jian Pei, “Data Mining - Concepts and Techniques” - Morgan
Kaufmann Publishers, Third Edition, 2012.
2. T. M. Mitchell, “Machine Learning”, McGraw Hill, 2017.
REFERENCES
1. Ian H. Witten, Eibe Frank, “Data Mining - Practical Machine Learning Tools and Techniques”,
Morgan Kaufmann Publishers, Third Edition, 2011.
2. Soman, Divakar and Ajay, “Data Mining – Theory and Practice”, PHI, 2006.
3. Pang-Ning Tan, Michael Steinbach, Vipin Kumar, “Introduction to Data Mining”, Pearson
Addison Wesley, 2006.
4. Arun K Pujari, “Data Mining Techniques”, Universities Press, 2001.
5. Margaret H Dunham, “Data Mining: Introductory and Advanced Topics”, Pearson Education
India, 2006.
35
22-382-0204 OBJECT ORIENTED CATEGORY L T P CREDIT
PROGRAMMING
CORE 3 1 0 4
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO 12
CO 1 2 1 1 1 2
CO 2 2 2 2 3 3 2
CO 3 2 2 2 3 3 2
CO 4 2 2 2 3 3 2
CO 5 1 2 2 3 3 2
36
22-382-0204 OBJECT ORIENTED PROGRAMMING
UNIT 1: (7 Hours)
Introduction to object oriented concepts and an Overview of Java : Principles of OOP, Applications
of OOP, Java program structure and execution, Primitive data types, Type casting and conversion,
Arrays, Operators, Control statements.
Object oriented programming in java : Class, objects, methods, basic input and output,
Constructors, this keyword, Overloading methods and constructors, Using object as parameters and
returning objects, Recursion, Access control, Static members, Final variables, Nested and inner
classes, Handling Strings, Command line arguments.
Inheritance : Inheritance basics, Access control during inheritance, the keyword super, method
overriding, Abstract Classes and Methods, using final with Inheritance. Packages and Interfaces,
File Handling.
UNIT 4: (8 Hours)
Exception Handling : Fundamentals and types, try Block and catch Clause, multiple catch clause,
Nested try statements, throw, throws, finally, Creating custom exceptions. Multithreaded
Programming : The Java Thread Model, The Main Thread, Creating Thread, Creating Multiple
Threads,CustomThreads,Thread states, Thread synchronization.
Event handling : Event Handling Mechanisms, Event Classes, Sources of Events, Event Listener
Interfaces. GUI programming using Swing - Swing Key Features, Model View Controller (MVC),
Swing Controls, Components and Containers, Swing Packages, Event Handling in Swings,
Database Connectivity.
37
Text Book
Reference Books
1. Paul Deitel, Harvey Deitel, Java How to Program, Early Objects 11th Edition, Pearson,
2018.
2. Horstmann and Coronell ,”Core Java -, Volume 1 and 2” , 10 th Ed, Pearson, 2016
3. E. Balagurusamy, Programming with Java, 6th Edition, McGraw-Hill Education, 2019.
4. Object-Oriented Design & Patterns, Cay Horstmann, Second Edition, Wiley 2006
Web Resources
1. https://onlinecourses.nptel.ac.in/noc21_cs56/preview
2. https://www.coursera.org/learn/object-oriented-programming-with-java
38
22-382–0205 DATABASE CATEGORY L T P CREDIT
MANAGEMENT
SYSTEM CORE 3 1 0 4
CO 2 Solve database queries using SQL and various database designs using (Cognitive level:
logical database design principles including functional dependencies and Apply)
normalization.
CO 3 Explain the concepts of a database transaction and related database (Cognitive level:
facilities (concurrency control and deadlock handling). Understand)
CO 4 Describe the primary methods of organizing files of records on disk and the (Cognitive level:
indexing techniques for files including B+ tree indexing and hash based Understand)
indexing.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO1 PO12
1
CO 1 2 2 1
CO 2 3 2 2
CO 3 1 2 1
CO 4 3 3
CO 5 2 2 3
39
22-382-0205 DATABASE MANAGEMENT SYSTEM
Relational Algebra- SQL Data Definition- Basic Structure of SQL Queries- Additional Basic
Operations- Set Operations- Aggregate Functions- Nested Subqueries- Modification of the
Database – Views – Integrity and Security – triggers, cursor, functions, procedure – Embedded
SQL.Relational Database Design: Features of Good Relational Designs- Decomposition Using
Functional Dependencies- Normal Forms(1NF, 2NF, 3NF, BCNF)
UNIT IV (8 Hours)
UNIT V (7 Hours)
Text Book
1.Database System Concepts Seventh Edition. AviSilberschatz · Henry F. Korth · S. Sudarshan.
McGraw-Hill
2.AviSilberschatz, Henry F. Korth, S. Sudarshan Database System Concepts, 7th Ed., McGraw Hill
International Edition, 2019
40
Reference Books
41
22-382-0206 JAVA LAB (OOPS) CATEGORY L T P CREDIT
LAB 0 1 2 2
CO 2 Implement basic OOPs concepts like class, objects, (Cognitive level : Apply)
methods, etc. using java.
CO 3 Write programs in java using inheritance, packages and (Cognitive level : Apply)
interfaces.
CO 4 Write programs in java using exception handling and (Cognitive level : Apply)
multithreading concepts.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 3 1 2
CO2 2 2 3 3 3 3 2 1 1
CO3 2 2 3 3 3 3 2 1 1
CO4 2 2 3 3 3 3 2 1 1
CO5 2 2 3 3 3 3 2 1 1
42
Experiment
43
16.Write a code to demonstrate arithmetic exception and array index out of bound exception.
Assign values into array and demonstrate the same. Include the finally block along with the
super class exception in the catch clause.
17.Create a user defined exception “MinBalExp‟ to be invoked when the read number is less than
a pre-set value, use try, catch, and finally.
18.Write a multithreaded java program for displaying odd numbers and even numbers up to a
limit.
19.Write a java program that simulates a traffic light. Let the user select one of the three lights:
red, yellow, or green with radio buttons. On selecting a button, an appropriate message with
“stop” or “ready” or ”go” should appear above the buttons in a selected colour, initially there is
no message shown.
20.Write a Java GUI program to accept the details of an employee and use JDBC to store the
same on to a database table.
44
22-382–0207 DBMS LAB CATEGORY L T P CREDIT
LAB 0 1 3 2
Course Outcomes: After the completion of the course the student will be able to
CO 1 Design a normalized database schema(upto 3NF) for a given (Cognitive level : Apply)
problem domain using standard modeling techniques.
CO 2 Apply SQL (DDL/DML commands) to create, secure, populate, (Cognitive level : Apply)
maintain, and query a database.
CO 4 Employ integrity constraints on a database design using SQL. (Cognitive level : Apply)
CO 5 Implement stored functions, stored procedures, cursor, trigger (Cognitive level : Apply)
using PL/SQL block.
Mapping of Course Outcomes with Programme Outcomes - Low=1, Medium=2, High=3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 2 3 2
CO 2 2 3 3
CO 3 3 3 3
CO 4 2 3 3 2
CO 5 2 3 3
45
Text Books/References
46
22-382–0207- DBMS LAB
1. Design a database schema for any application with ER diagrams. Convert ER diagram into
relational model. Normalize the above tables upto 3NF.
2. Create a table using SQL DDL commands. Apply integrity constraints (primary key, foreign
key , not null) and change the existing schema definition using ALTER and DROP.
3. Modify the table by inserting, deleting, and updating records using SQL DML commands
4. Create a table Bank with the following fields (Acc_no integer primary key,
Acc_namevarchar(20), branch_name varchar(20), Acc_type varchar(10), amount
decimal(10,2)
Insert at least 5 records into the table.
1.Display the account details of “Savings Account” in Kochi branch.
2. Change the branch_name “Trivandrum” to “Thiruvanathapuram”.
3.Display the details of customers in Thiruvananthapuram, Kochi and Palakkad.
4.List the details of customers in Thrissur branch having a minimum balance of Rs5000
5.Delete all the current accounts in the Mahe branch.
5. Use a Bank table and write SQL statements for the following.
1.Display the branch wise details of account holders in the ascending order of the amount.
2.Insert a new column named Minimum_amount into the table with default value 1000.
3.Update the Minimum_amount column with the value 1000 for the customers in branches
5..Remove the details of SB accounts from Thiruvananthapuram branch who have zero (0)
balance in their account.
6. Create table CLIENT_MASTER with attributes Client_No as primary key, Name, City,
Pincode and Bal_due.
Create table SALE_ORDER with attributes Order_No, Order_Date, Client_No,
Order_Status and Dely_Date.
47
Insert values into tables.
Write SQL queries to
1.List all details from the client_master table for clients whose Bal_due = 0.
2.Update table client_master, Change city of Client_no C00004 to Jaipur.
3.Retrieve records of clients residing in Mumbai.
4.Find the name and address of customer who has placed Order_no ‘O19003’ and
‘O19002’ respectively.
5.List the client_no, name, city and pincode of clients whose Order_status is “In process”
7. Create table supplier with attributes supplier number as primary key, supplier name and
city.
Create a table parts with attributes partno as primary key, partname, color, weight and city.
Create a table shipment with attributes sno as references supplier number of supplier table,
pno references partnumber of parts table, quantity, sno and pno as primary key.
Insert values into 3 tables.
Write SQL queries to
1.Change the city of suppliers whose sno is S1 to Hyderabad.
2.Update the quantity of all parts in the shipment table to quantity +10.
3.Get supplier name for all suppliers who supply part p1.
4.Get supplier number for suppliers who are located in same city as sno=S1.
5.Get supplier number for suppliers who supply at least one part supplied by sno=S2.
6. Get Sno’s for suppliers who do not supply any part supplied by sno=S2.
8. Student(snum: integer, sname: string, major: string, level: string, age: integer)
Class(name: string, meets at: time, room: string, fid: integer)
Enrolled(snum: integer, cname: string)
Faculty(fid: integer, fname: string, deptid: integer)
The meaning of these relations is straightforward; for example, Enrolled has one record per
48
student-class pair such that the student is enrolled in the class.
Write the following queries in SQL.
1.Find the names of all Juniors (Level = JR) who are enrolled in a class taught by I. Teach.
2.Find the age of the oldest student who is either a History major or is enrolled in a course
taught by I. Teach.
3.Find the names of all classes that either meet in room R128 or have five or more students
enrolled.
4.Find the names of all students who are enrolled in two classes that meet at the same time.
5.Find the names of faculty members who teach in every room in which some class is taught.
9. Consider the following relations
Product (P_code, Description, Stocking_date, QtyOnHand, MinQty, Prices, Discount, V_code)
. Vendor (V_code, Name, Address, Phone).
Here a vendor can supply more than one product but a product is supplied by only one
vendor. (NOTE: Identify the primary keys and foreign key from this statement)
Write SQL queries for the following:
1.List the names of all the vendors who supply more than one product.
2.List the details of the products whose prices exceed the average product price.
3.Create a view that contains Name, Address and Phone of the vendors who are currently not
supplying any product.
10.Consider the following schema for a Library Database:
BOOK(Book_id, Title, Publisher_Name, Pub_Year)
BOOK_AUTHORS(Book_id, Author_Name)
49
1.Retrieve details of all books in the library – id, title, name of publisher, authors, number of
copies in each Programme, etc.
2.Get the particulars of borrowers who have borrowed more than 3 books, but from Jan 2017
to Jun 2017.
3 .Delete a book in BOOK table. Update the contents of other tables to reflect this data
manipulation operation.
4.Partition the BOOK table based on year of publication.
5.Create a view of all books and its number of copies that are currently available in the
Library.
50
4.Write a program using cursor to find the first 5 highest paid employee and insert into temp.
14. Create a table Student(Rollno, Name, Sub1, Sub2, Sub3).
1.Insert values into the table.
2.Create another table Student_grade with Rollno, Total, percentage, grade.
3.Create a cursor to calculate total and percentage of students. Then find grade of students
as given below:
< 40% FAIL
40 - 49.99% C
50 - 59.99% B
60 - 79.99% A
>= 80% HONORS
and insert into Student_grade.
15. Procedure for bank transaction:
1. Create a table with attributes id, nm, account number and balance.
2.Write a program for bank transaction using procedure.
18. Create a table STUDENT with attributes student_ number, student_ name and total_ marks.
1.Insert values into the table.
2.Create a TRIGGER to check whether the total_ marks is less than zero if so then set it as
zero.
51
19. Create a table supplier with attributes supplier_ name , quantity, item_ name.
1.Enter values into the table.
2.Create a TRIGGER to check whether the quantity entered is zero if so then delete the entire
row.
20. Write a program to check whether a given number is Armstrong or not using the concept of
stored procedure in MySQL.
52
22-382-0301 WEB TECHNOLOGIES CATEGORY L T P CREDIT
AND PROGRAMMING
CORE 3 1 0 4
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2
CO2 2 2 2
CO3 1 2 2
CO4 1 1 1
CO5 2 2 2 2
53
22-382-0301 WEB TECHNOLOGIES AND PROGRAMMING
Text Books
54
Reference Books
55
22-382-0302 CRYPTOGRAPHY CATEGORY L T P CREDIT
AND NETWORK
SECURITY
CORE 3 1 0 4
CO1 Solve the problems using Classical Cryptography. (Cognitive level : Apply)
CO2 Compare Feistel and Non Feistel ciphers, and Describe (Cognitive level : Analyze)
Block Cipher modes of operation.
CO3 Apply public key cryptosystems – RSA,Elgamal and ECC (Cognitive level : Apply)
for confidentiality.
CO4 Describe the use of hash functions and explain hash (Cognitive level : Understand)
algorithms MD5 and SHA.
CO5 Discuss Digital Signature Schemes and Various Protocols. (Cognitive level : Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 2 2 1 2 2
CO2 3 3
CO3 3 3 2 2 1 2 2
CO4 3 3
CO5 3 3
56
22-382-0302 - CRYPTOGRAPHY AND NETWORK SECURITY
UNIT I (9 Hours)
Classical cryptography: Shift cipher, Substitution cipher, Affine cipher, Vigenere cipher, Hill
cipher, Permutation cipher, Stream ciphers, Product Ciphers: Playfair Cipher. LFSR, Cryptanalysis
on Classical Ciphers.
UNIT IV (6 Hours)
Pseudo Random Number Generators(PRNG): LCRNG, RSA, BBS. Cryptographic Hashes for
Integrity, Hash functions: MD5, Secure Hash Algorithm(SHA1, SHA512, SHA1024), Message
Authentication Code(MAC),Signature schemes: RSA signature, ElGamal signature, ECDSA.
UNIT V (7 Hours)
Network Security protocols:SSL,TLS,IPSec.Application Layer Security Protocols:
PGP,S/MIME,SET.
57
References:
1. Behrouz A Forouzan, Cryptography and Network Security, Tata Mc Graw Hill, 2005.
2. Cryptography: Theory and Practice, (Third Edition), Douglas R. Stinson.
3. William Stalings, Cryptography and Network Security, Principles and Practices. 6th
EdPearson Education, 2014.
4. Handbook of Applied Cryptography, (Second Edition), Alfred J. Menezes, Paul C. van
Oorschot, Scott A. Vanstone.
Web Resource:
1. https://nptel.ac.in/courses/106/105/106105162/
2. https://nptel.ac.in/courses/106/105/106105183/
3. https://nptel.ac.in/courses/106/107/106107155/
4. https://www.coursera.org/learn/crypto
58
CATEGORY L T P CREDIT
22-382-0303 MINI PROJECT
PROJECT 0 1 6 4
Course Outcomes
After completion of the mini project students will be able to
CO 1 Analyze the requirements and existing systems/literature for the (Cognitive Level:
identified problem. Analyze)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO 10 PO11 PO 12
CO 1 3 3 3
CO 2 3 3 3 3 3 3 3
CO 3 3 3 3 3 3 3 3
CO 4 3 3 3 3 3 3 3 3 3 3
CO 5 3 3 3 3 3 3 3 3 3 3 3 3
Mark Division
59
22-382-0311 NETWORK SECURITY CATEGORY L T P CREDIT
ESSENTIALS
ELECTIVE 3 1 0 4
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 2 2 2 2
CO2 3 3 3 2 2 2 2 2
CO3 3 3 2 2 2
CO4 3 3 3 2 2 2
CO5 2 2 3 3 2 2 3 2
60
22-382--0311 NETWORK SECURITY ESSENTIALS
UNIT I ( 8 Hours)
Vulnerability, Threat, Attacks and Countermeasures(Cryptography, Controls, Firewalls, IDS,
Digital Signatures)Introduction to network security - Security requirements, Challenges of security,
Network security models.
61
22-382-0312 DIGITAL IMAGE CATEGORY L T P CREDIT
PROCESSING
ELECTIVE 3 1 0 3
Course Outcomes: After the completion of the course the student will be able to
CO 1 Explain the basics and fundamentals of Digital Image Cognitive Level: Understand
Processing and to manipulate images based on spatial
domain techniques.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 3 1
CO2 3 2 2 2 3 1
CO3 3 2 2 3 1
CO4 3 2 1 2 3 1
CO5 3 2 1 2 3 1
62
22-382-0312 DIGITAL IMAGE PROCESSING
UNIT I (7 Hours)
Image segmentation: Point, Line and Edge segmentation. Edge linking and Boundary
detection. Segmentation using thresholding, Region based segmentation.Morphological Image
Processing-Structuring Element,Dilation,Erosion,opening and Closing, Hit or Miss
transformation,Basic Morphological Algorithms
63
TEXT BOOK
1. Rafael C. Gonzalez, Richard E. Woods, Digital Image Processing (English) 3rd
Edition,Pearson India, 2013.
2. A K. Jain, Fundamentals of digital image processing, Prentice Hall of India, 1989.
3. Video Processing and Communication – Yao Wang, Joem Ostermann and Ya–quin
Zhang.1st Ed., PH Int
REFERENCE BOOKS
1. S Jayaraman, S Esakkirajan and T Veerakumar, Digital Image Procesing, McGraw Hill
Education , 2009.
2.Digital Video Processing – M. Tekalp, Prentice Hall International.
Web Resources
NPTEL
● Digital Image Processing - (Course from IIT Kharagpur)
● NPTEL Lecture Videos by Prof. P K Biswas from IIT Kharagpur
https://nptel.ac.in/courses/117105079
64
22-382-0313 CLOUD COMPUTING CATEGORY L T P CREDIT
ELECTIVE 3 1 0 4
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
CO1 Describe the features of cloud computing architecture Cognitive level : Understand
and different computing models
CO2 Explain various public cloud platforms and software Cognitive level : Understand
environments
CO3 Apply virtualization techniques such as VMM and Cognitive level : Apply
Hypervisor
CO4 Analyze different aspects of cloud security including Cognitive level : Analyze
security defense strategies
CO1 2
CO2 2 2
CO3 3
CO4 2 2 3
CO5 2
65
22-382-0313 CLOUD COMPUTING
UNIT I (8 Hours)
Introduction-Evolution of new computing models: Parallel computing, Edge computing, Grid
Computing, Cloud computing. Cloud computing Basics: Architecture, Storage, Services,
Applications. Significance of Cloud computing in modern era: Example-Server crashes/Failures-
Preventing server Failures-Solution.
UNIT II (8 Hours)
Cloud deployment models: Public, Private, Hybrid, Community -Cloud Service models: software
as a Service (SaaS), Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Service
Oriented Architecture (SoA)- Public Cloud Platforms: GAE – AWS – Azure, Emerging Cloud
UNIT V (9Hours)
Cloud Programming and Software Environments: (Hadoop, GFS, Map Reduce, NoSQL systems) -
Fog computing- Green cloud-Sensor cloud computing- ubiquitous computing Containers: Docker,
IOT cloud.
66
References:
1. RajkumarBuyya, Christian Vecchiola and ThamaraiSelvi S, “Mastering Cloud
Computing”, Tata McGraw Hill Education Private Limited,New Delhi,2013.
2. Dan C. Marinescu , Cloud computing: Theory and Practice, Morgan Kaufmann, 2013.
3. David S Linthicium, “Cloud computing and SOA convergence in your enterprise”,
Pearson, USA,2010.
4. Diane Barrett and Gregory Kipper, “Virtualization and Forensics: A Digital Forensic
Investigators Guide to Virtual Environment”, Elsevier, USA,2010.
5. John R. Vacca, “Cloud Computing Security”/O′Reilly Publisher.
6. Toby Velte, Anthony Velte, Robert Elsenpete. “Cloud Computing, A Practical
Approach”/O′Reilly Publisher..
Web Resources:
1.NPTEL :: Computer Science and Engineering - NOC:Cloud computing
2. Introduction to Cloud Computing | Coursera
3. Cloud Computing Basics (Cloud 101) | Coursera
67
22-382-0314 THEORY OF CATEGORY L T P CREDIT
COMPUTATION
ELECTIVE 3 1 0 4
Course Outcomes: After the completion of the course the student will be able to
CO2 Apply regular languages, grammar and expressions to (Cognitive level : Apply)
perform conversions with Finite automata.
CO3 Solve push-down automata and context-free grammar (Cognitive level : Apply )
representations for context-free languages.
CO4 Apply Turing Machines for accepting recursively (Cognitive level : Apply )
enumerable languages
CO5 Analyze the Decidability and Undecidability of various (Cognitive level :Analyze )
problems
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3 1
CO2 3 3 3 1
CO3 3 3 3 1
CO4 3 3 3 1
CO5 3 3 3 1
68
22-382-0314- THEORY OF COMPUTATION
Context-sensitive Grammar. Linear Bounded Automata. Turing Machine (TM) – Basics and
formal definition, TMs as language acceptors, TMs as Transducers, Designing Turing Machines,
Variants of TMs -Universal Turing Machine, Multi- tape TMs, Non Deterministic TMs.
UNIT V( 7Hours)
69
Text Books/References :
1. John E Hopcroft, Rajeev Motwani and Jeffrey D Ullman, Introduction to
Automata Theory, Languages, and Computation, 3/e, Pearson Education, 2007
2. John C Martin, Introduction to Languages and the Theory of Computation,
TMH, 2007
3. Michael Sipser, Introduction To Theory of Computation, Cengage Publishers, 2013
4. K.Krithivasan and R.Rama; Introduction to Formal Languages,Automata Theory and
Computation; Pearson Education, 2009.
5. H.R. Lewis and CH.Papadimitriou, Elements of Theory of Computation, 2nd Edition,
Prentice Hall, ISBN: 0132624788.
6. J. E. Savage, Models of Computation, Exploring the Power of Computing, Addison
Wesley, 1998, Available at http://cs.brown.edu/~jes/book/.
Web Resources
NPTEL
● Theory of Automata, Formal Languages and Computation NPTEL Lecture Videos by
Prof. Kamala Krithivasan from IIT Madras.
https://www.nptelvideos.com/course.php?id=451
70
22-382-0315 SOFTWARE PROJECT CATEGORY L T P CREDIT
MANAGEMENT
ELECTIVE 3 1 0 4
Course Outcomes: After the completion of the course the student will be able to
CO 1 Choose suitable life cycle models to be used based on the (Cognitive level : Apply)
requirement.
CO 3 Apply software estimation approaches for effort and cost (Cognitive level : Apply)
estimation.
CO 4 Describe the concepts of risk management and resource (Cognitive level : Understand)
allocation.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 1 1 2 1
CO2 2 2 2 1 2 2 1
CO3 2 2 2 1 2 1
CO4 2 1 2 2 1
CO5 2 1 2 2
71
22-382-0315 SOFTWARE PROJECT MANAGEMENT
UNIT I( 10 Hours)
Introduction to software engineering: - Software engineering a layered technology – processes,
methods, and tools. Software process models. Introduction to Software project management:-
software project vs other types of projects. Types of software projects. Factors in Designing a
Project Structure, Types of Project Organization Structures, Definition of management-
management principles- management control. Functions and activities of management- planning,
organizing, staffing, directing, and controlling. Importance of software project management- major
issues of software project management, Activities in software project management.
UNIT II ( 7Hours)
Project Planning- Planning Objectives, Project Plan, Types of project plan, Elements of a Project
Plan. Stepwise project planning activities,. Work Breakdown Structure (WBS), Types of WBS,
Functions, Activities and Tasks, Methods of representing WBS, Application of the WBS. Structure
of a Software Project Management Plan.
UNIT IV ( 10 Hours)
Activity Planning and Risk Management : Objectives- Project Schedules- Projects and Activities-
Sequencing and Scheduling Activities- Network Planning Models- Forward Pass- Backward pass-
Identifying Critical Path and Critical Activities- Activity-on-arrow networks. Risk Management:
Risk- Categories of Risk- Risk Identification- Risk Assessment- Risk Planning- Risk management-
Risk Evaluation- PERT, Monte Carlo Simulation, Critical Chain. Resource Allocation: Nature of
Resources- Identifying and Scheduling Resources- Creating Critical Paths- Cost Schedule-
Scheduling sequence
UNIT V ( 10 Hours)
Monitoring and Control: Creating the framework, collecting data, Visualizing Progress- Gantt
Chart, Slip Chart, Timeline. Cost Monitoring- Earned Value Analysis-prioritizing monitoring.
Getting the project back to target- Change control. Software Configuration Management- Managing
Contracts-Types of contracts, Stages in contract placement, terms of a contract, Contract
Management, Acceptance. Managing people and organizing teams- Organizational Behavior,
Selecting the right person- Motivation, The Oldham – Hackman job characteristic model – Stress
– Health and Safety – Ethical and Professional concerns, working in teams – Decision making
Organization and Team Structures- Dispersed and Virtual teams, Leadership.
72
Text Books
1. Bob Hughes and Mike Cotterell, “Software Project Management”, Tata McGraw-Hill, Edition
2004.
Reference Books
73
22-382-0316 SOFT COMPUTING CATEGORY L T P CREDIT
TECHNIQUES
ELECTIVE 3 1 0 4
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
CO 4 Examine genetic algorithm techniques to find the optimal solutions for a Analyze
given problem.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 2 1 1
CO 2 3 2 2 3 3
CO 3 3 2 2 1
CO 4 3 2 2 3 2 1
CO 5 3 2 2 3 3
74
22-382-0316- SOFT COMPUTING TECHNIQUES
UNIT I (8 Hours)
Introduction: Soft and Hard Computing, Evolution of soft computing, Soft computing
constituents.Artificial Neural Networks: Biological foundations –ANN models - Characteristics
of ANNTypes of activation function - McCulloch-Pitts neuron model, Realization of logic gates
using McCulloch-Pitts neuron model - simple perceptron.
UNIT II (8 Hours)
Fuzzy Logic: Introduction to crisp sets and fuzzy sets, Properties, Basic fuzzy set operations, Fuzzy
relations, Membership functions ,Fuzzycontroller.Neuro-Fuzzy Hybrid Systems. Rough Set
theory- Knowledge, Imprecise Categories,Approximation and rough sets,Reduction of knowledge,
Knowledge representation,reasoning about knowledge
UNIT IV (9 Hours)
Genetic Algorithm: Genetic algorithms basic concepts, encoding, fitness function, reproduction-
Roulette wheel,tournament, rank, and steady state selections, Convergence of GA, Applications of
GA case studies.Neuro-Genetic Hybrid Systems,Fuzzy-Genetic Hybrid Systems.
75
Text Books
Reference
1.Genetic Algorithms: Search and Optimization, E. Goldberg.
2.Neuro-Fuzzy Systems, Chin Teng Lin, C. S. George Lee, PHI
3.Kennedy J and Russel C Eberhart, “Swarm Intelligence”, Morgan Kaufmann Publishers,
USA, 2001.
Web Resources
1. https://www.digimat.in/nptel/courses/video/106105173/L01.html
2. https://onlinecourses.nptel.ac.in/noc22_ee21/preview
3. https://www.digimat.in/nptel/courses/video/127105006/L01.html
4. https://www.youtube.com/watch?v=xbYgKoG4x2g
76
CATEGORY L T P CREDIT
22-382-0321 CYBER FORENSICS ELECTIVE 3 1 0 4
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
CO2 Apply forensic procedure to collect and recoverdigital evidence (Cognitive level : Apply)
using tools.
CO3 Judge the validity of digital evidence beforepresenting using (Cognitive level : Analyze)
cryptographic hashes.
CO4 Create forensic duplicates for investigation using tools and (Cognitive level : Create)
commands for capturing digital evidence .
CO5 Describe steps to follow for network , email and mobile forensics. (Cognitive level : Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 2 2
CO2 2 2 2 1 2 2 2 2
CO3 2 2 2 2 2
CO4 2 2 2 1 2 2 2 2
CO5 2 2 2 2 2
77
22-382-0321 CYBER FORENSICS
UNIT I (8 Hours)
Computer Forensics Fundamentals: Computer Crime, challenges with computer crime, different
types of computer crime-Identity Theft, Identity fraud, Email and internet Fraud, Theft of financial
data , Corporate Data Theft, Cyber extortion-Ransomware attack, Phishing, Hacking, Spoofing,
Harassment, Intellectual property Theft , Ethical Hacking, Windows Hacking . Computer Forensics
Fundamentals- Type of Computer Forensics Technology, Computer forensics specialist approaches
- Scientific method in forensic analysis, Computer Forensics Services.
UNIT IV (9 Hours)
Initial Response & Volatile Data Collection from Windows system - Initial Response & Volatile
Data Collection from Unix system, Forensic Duplication, Qualified Duplication, Forensic
Duplicates as Admissible Evidence, Forensic Duplication using Linux commands, Creating
windows Forensic Duplicate using tool, Forensic Duplicate of a Hard Disc.
UNIT V (8 Hours)
Collecting Network-Based Evidence - Investigating Routers - Network Protocols - Email Tracing
- Internet Fraud. Hackers Tools. Cellphone and mobile device forensics. Forensics hardware and
software, Information Security Investigations, Corporate Cyber Forensics, Investigating large scale
Data breach cases, Analyzing Malicious software.
78
Text Books
Web Resources
1. https://www.coursera.org/learn/smarter-contracts
79
22-382-0322 ANDROID APPLICATION CATEGORY L T P CREDIT
PROGRAMMING
ELECTIVE 3 1 0 4
Prerequisite: Java
Course Outcomes
After completion of this course, the students will be able to
CO3 Create applications that work with databases to store (Cognitive level : Analyze)
data using Shared preferences and SQLite database.
CO4 Apply built in widgets and components in mobile (Cognitive level : Apply)
app
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2 2 2
CO2 2 2 2 2
CO3 2 2 2 2
CO4 3 2 2 2 1
CO5 3 2 2 1
80
22-382-0322 ANDROID APPLICATION PROGRAMMING
81
TEXTBOOK
Web Resources
[1] https://nptel.ac.in/courses/106/106/106106147/
[2] https://www.coursera.org/learn/androidapps
82
22-382-0323 DEEP LEARNING CATEGORY L T P CREDIT
CORE 3 1 0 4
CO1 Discuss the basics concepts of neural networks. (Cognitive level :Understand)
CO3 Examine the working of different types of Autoencoders and (Cognitive level : Analyze)
Generative Adversarial Networks
CO5 Describe the basic concepts in Reinforcement Learning and (Cognitive level :
Understand)
Unsupervised learning.
CO1 2 1 1 2 1 2
CO2 2 1 1 2 1 2
CO3 2 1 1 2 1 2
CO4 2 1 1 2 2 2
CO5 2 1 1 2 1 2
83
22-382-0323 DEEP LEARNING
UNIT I (8 Hours)
Recurrent Neural Network: RNN cell, RNN cell variants, RNN variants, RNN topologies, Encoder-
Decoder architecture, Attention mechanism, Transformer architecture.
84
TEXTBOOK/ References:
1. Deep learning with Tensor flow 2 and Keras,AntonioGulli,Amita Kapoor, Sujith Pal,2019
2. Dive into Deep Learning, Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola,2020
3. Deep Learning, Ian Goodfellow and YoshuaBengio and Aaron Courville, MIT Press, 2016.
4. Yuxi( Hayden), Liu and Savansh Mehta, “Hands -on Deep Learning Architectures with Python”,
Packt, 2019
5. Josh Patterson & Adam Gibson, “Deep Learning: A Practitioners Approach”, published by
O’Reilly Media.,2017
6. Nikhil Ketkar, “Deep Learning with Python”, published by Apress Media,2017
85
22-382-0324 BIG DATA ANALYTICS CATEGORY L T P CREDIT
ELECTIVE 3 1 0 4
Course Outcomes: After the completion of the course the student will be able to
CO1 Solve the problems using MapReduce programming (Cognitive level : Apply)
paradigm.
CO2 Apply spark libraries for solving distributed applications. (Cognitive level : Apply)
CO3 Analyze streaming data using Spark Streaming libraries (Cognitive level : Analyze)
CO4 Demonstrate the usage of MongoDB, Hbase and Hive (Cognitive level : Apply)
CO5 Explain the concepts of Spark MLlib libraries and (Cognitive level :
Visualization tools Understand)
PO PO PO PO PO PO PO PO PO PO PO PO
1 2 3 4 5 6 7 8 9 10 11 12
CO 1 2 2 3 3 2 2 1
CO 2 2 2 3 3 2 2
CO 3 2 2 3 3 3 2 2
CO 4 3 2 2 2
CO 5 1
86
22-382-0324 BIG DATA ANALYTICS
UNIT I (7 Hours)
Introduction to Big Data: Big Data – Introduction, data life cycle, Structuring Big Data,
Characteristics of Big Data, Big data applications, Technologies for handling big data – Distributed
and Parallel Computing for Big Data, Introducing Hadoop – Hadoop multi node cluster
architecture, Introduction to data lake, data cleansing and transformations, Data lake reference
architecture, HDFS and MapReduce. HDFS Concepts– MapReduce Execution, Algorithms using
MapReduce, Limitations of Hadoop, Overcoming the limitations of Hadoop
UNIT II (8 Hours)
Apache Spark: Eco system, Components of the Spark unified stack-Spark SQL, Spark Streaming,
Spark GraphX, Spark MLLib. Spark context, spark stage, spark executor.Spark Architecture, RDD
and RDD Operations-RDD Features and limitations, RDD- Persistence and Cashing mechanism,
DAG, spark cluster management, performance tuning, DataFrames and Dataset – In-memory
distributed processing using Apache Spark. Spark shell commands.
87
Text books
1. Bill Chambers AndMateiZaharia, “Spark: The Definitive Guide: Big Data Processing Made
Simple”, O'Reilly Media, 2018
2. Tathagata Das, Jules S. Damji, Brooke Wenig, Denny Lee, “Learning Spark: Lightning-
Fast Data Analytics,” Second Edition, O’Reilly Media, 2020
Reference books
1. DT Editorial Services,“Big Data, Black Book : Covers Hadoop 2, MapReduce, Hive,
YARN, Pig, R and Data Visualization”, DreamTech Press, 2016
2. Natraj Dasgupta, “Practical Big Data Analytics”, Packt, 2018
3. Gerard Maas, Francois Garillot “Stream Processing with Apache Spark”, O'Reilly Media,
2019
4. Bart Baesens, “Analytics in Big Data World," Wiley, 2014
5. Tom White, “HADOOP: The definitive Guide”, O Reilly 2012.
6. Kristina Chodorow and Michael Dirolf, “MongoDB: The Definitive Guide”,O'Reilly
Media, 2019
7. Andy Konwinski, Holden Karau, MateiZaharia, and Patrick Wendell, “Learning Spark:
LightningFast Big Data Analysis," O Reilly, 2015.
Web Resources
1. Coursera -Introduction to Big Data with Spark and Hadoop Introduction to Big Data with
Spark and Hadoop.
88
22-382-0325 CATEGORY L T P CREDIT
SEMANTIC WEB ELECTIVE 3 1 0 4
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
CO 1 Describe rationale behind the semantic web and (Cognitive level : Understand)
structured web documents with XML
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 3 3
CO2 3 3 3
CO3 3 3 3 2 2
CO4 3 3 3 2 2
CO5 3 3 3 2
89
22-382-0325 SEMANTIC WEB
HTML to XML - Building Models - Exchanging Information - Ontologies and semantic web -
Semantic Web Technologies - A Layered Approach - Introduction to XML Language - Addressing
and Querying XML Documents - tree model of XML documents - XML Schema
UNIT II (1Hours)
Introduction to RDF - Basic Ideas - RDF: XML- Based Syntax - RDF Schema, An Axiomatic
Semantics for RDF and RDF Schema - A Direct Inference System for RDF and RDFS - Querying
in RQL.
UNIT III (9Hours)
SPARQL Infrastructure - Matching pattern - filters - constructs-organising results sets - other forms
of SPARQL queries - Querying schema.
UNIT IV (9Hours)
OWL and RDF/RDFS - OWL syntax and intuitive semantics- The forthcoming OWL2 standard -
Description Logics - Requirements for Ontology languages- compatibility of OWL2 with
RDF/RDS - OWL2 profiles
UNIT V (9Hours)
90
Text Books/References
1. Hitzler, P., Krotzsch, MRudolph, S., “Foundations of Semantic Web Technologies”,1st ed.,
Chapman and Hall/CRC. (2010).
2. Groth, Paul., Antoniou, Grigoris., Hoekstra, Rinke., Van Harmelen, Frank. A Semantic Web
Primer. United Kingdom: MIT Press, 2012.
3. Fensel, Dieter, Holger Lausen, Axel Polleres, Jos de Bruijn, Michael Stollberg, Dumitru
Roman, and John Domingue. "Enabling Semantic Web Services: The Web Service
Modelling Ontology." (2006).
4. Fisher, Matthew, Ryan Blace, John Hebeler, and Andrew Perez-Lopez. Semantic web
programming. John Wiley & Sons, 2011.
5. Yu, Liyang. Introduction to the Semantic Web and Semantic Web Services, CRC Press,
2007.
Web Resources
[1] Knowledge Engineering with Semantic Web Technologies | openHPI
[2] Web of Data | Coursera
[3]https://doi.org/10.1201/9781420090512
91
22-382-0326 COMPUTER VISION CATEGORY L T P CREDIT
ELECTIVE 2 1 0 3
Prerequisite : Nil
Course Outcomes
After completion of this course, the students will be able to
CO1 Describe digital image formation and representation (Cognitive level: Understand)
to perform low level image processing
CO2 Compare Feature detection and image transformation (Cognitive level: Analyze)
techniques
CO4 Apply structure from motion and perform dense (Cognitive level: Apply)
motion estimation.
CO5 Apply depth estimation, Object Detection, Face (Cognitive level: Apply)
recognition, Instance recognition and understand
multi-camera views.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2
CO2 3 2 1 1 2 2
CO3 3 2 1 1 2 2
CO4 3 2 1 1 2 2
CO5 3 2 1 1 2 2
92
22-382-0326 COMPUTER VISION
UNIT I (9 Hours)
UNIT II (8 Hours)
Feature Detection: Edges - Canny, Laplacian of Gaussian (LoG), Difference of Gaussian (DoG);
Lines - Hough Transform, Corners - Harris and Hessian Affine, Orientation Histogram, SIFT,
SURF, HOG, GLOH, Scale-Space Analysis- Image Pyramids and Gaussian derivative filters,
Gabor Filters and DWT.
Structure from motion: Triangulation, Two-frame structure from motion, Factorization, Bundle
adjustment, constrained structure and motion; Dense motion estimation – Translational alignment,
Parametric motion, Spline-based motion, Optical flow, Layered motion.
Depth estimation and Multi-camera views: Perspective, Binocular Stereopsis: Camera and Epipolar
Geometry; Homography, Rectification, 3-D reconstruction framework; Autocalibration. Stereo;
Recognition - Object Detection, Face recognition, Instance recognition
93
TEXT BOOK
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer Vision, Second
Edition, Cambridge University Press, March 2004.
2. K. Fukunaga; Introduction to Statistical Pattern Recognition, Second Edition, Academic Press,
Morgan Kaufmann, 1990.
3. R.C. Gonzalez and R.E. Woods, Digital Image Processing, Addison- Wesley, 1992.
4. Christopher M. Bishop; Pattern Recognition and Machine Learning, Springer, 2006
94
22-382-0327 SOFTWARE CATEGORY L T P CREDIT
TESTING
ELECTIVE 3 1 0 4
Course Outcomes:
After completion of this course, students will be able to
CO2 Examine different software testing techniques and strategies. (Cognitive level : Analyze)
CO4 Compare different testing tools in different scenarios. (Cognitive level : Analyze)
CO5 Write test cases for a given scenario. (Cognitive level :Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 1 1 2 1
CO2 2 2 2 1 2 1
CO3 2 2 2 1 2 1
CO4 2 1 2 2 2 1
CO5 2 1 2 2 2
95
22-382-0327 SOFTWARE TESTING
UNIT I ( 8 Hours)
Fundamentals of Software Testing- Definition, Essentials of testing, Misconceptions about testing,
test policy, challenges in testing, Cost aspect, test strategy or test approach. STLC. Categories of
Defects, Defect, Error or Mistakes in Software. Testing techniques and tools- Levels of testing –
Proposal Testing, Requirement Testing, Design Testing, Code Review, Unit Testing, Module
Testing, Integration Testing, Big Bang Testing, Sandwich Testing, Critical Path First, Subsystem
Testing, System Testing, Testing Stages.
UNIT II ( 7 Hours)
Acceptance testing - Acceptance Testing Criteria, Importance of Acceptance Criteria, Acceptance
Criteria, Alpha Testing, Beta Testing, Gamma Testing, Acceptance Testing During Each Phase of
Software Development, Consideration of Alpha and Beta Acceptance Testing Process, Developing
Acceptance Test Plan, Software Acceptance Plan, User Responsibilities in Acceptance Test Plan,
Executing Acceptance Plan.
96
UNIT V (10 Hours)
Testing process: Test policy, Test plan, Test cases, Test Scripts. Test metrics and Test reports –
Testing Related Data, Defect Data, Efficiency/Productivity Data, and Categories of the
Product/Project Test Metrics, Estimated Budgeted, Approved and Actual, Resources Consumed in
Testing, Effectiveness of Testing, Defect Density, Defect Leakage Ratio(Defect Life), Residual
Defect Density (RDD), Test Team Efficiency, Test Case Efficiency, Rework, MTBF/MTTR,
Implementing Measurement Reporting System in an Organization, Test Reports, Project Test
Status Report, Integration Test Report, System Test Report, Acceptance Test Report, Guidelines
for Writing and Using Report, Final Test Reporting, Test Status Report, Benchmarking.
References:
1. Software Testing- Principles, Techniques and Tools, M G Limaye, Tata Mc Graw Hill,
2009.
97
22-382-0331 NATURAL CATEGORY L T P CREDIT
LANGUAGE
PROCESSING ELECTIVE 3 1 0 4
Course Outcomes: After the completion of the course the student will be able to
CO 2 Explain preprocessing steps in NLP and describe grammars and how a language is built based on
grammar
CO 4 Explain Neural Language Models and apply supervised ML techniques to various datasets
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 2 1
CO 2 2 2
CO 3 2 3 3
CO 4 2 2 3 3
CO 5 2 1
98
22-382-0331 NATURAL LANGUAGE PROCESSING
UNIT I (7 Hours)
Regular Expressions, Text Normalization, Edit Distance, Regular Expressions, Words, Corpora,
Text Normalization, Minimum Edit Distance, N-gram Language Models, N-Grams, Evaluating
Language Models
Preprocessing: Handling corpus-raw text - Stemming and Lemmatization for raw text, Stop word
removal, Feature Engineering: Understanding feature engineering, a Basic feature of NLP - Parsers
and parsing, Types of grammar, POS tagging and POS taggers, n-grams, Bag of words, TF-IDF,
Encoders, and decoders, Probabilistic models,NLTK
UNIT IV (6 Hours)
Understanding ML algorithms for NLP: Supervised ML algorithms: Decision tree, Random forest,
Naive Bayes, Support vector machines,UnSupervised ML algorithms:-K means
clustering,DBSCAN
UNIT V (7Hours)
Neural Networks and Neural Language Models: Training Neural Nets, Neural Language Models
,Deep Learning Architectures for Sequence Processing: Recurrent Neural Networks, Managing
Context in RNNs: LSTMs and GRUs, Self-Attention Networks: Transformers Case studies: Word
sense disambiguation system, Automatic Question Answering system
99
TEXTBOOK
1. Jurafsky, Dan. Speech & language processing. Pearson Education India, 2020.
2. Thanaki, Jalaj. Python natural language processing. Packt Publishing Ltd, 2017.
REFERENCE BOOKS
1. Goldberg, Yoav. "Neural network methods for natural language processing." Synthesis
lectures on human language technologies 10.1 (2017): 1-309.
2. Manning, Christopher, and Hinrich Schutze. Foundations of statistical natural language
processing. MIT Press, 1999.
3. Kulkarni, Akshay, and Adarsha Shivananda. Natural language processing recipes:
Unlocking text data with machine learning and deep learning using python. Apress, 2019.
100
22-382-0332 INTERNET OF CATEGORY L T P CREDIT
THINGS
ELECTIVE 3 1 0 4
Prerequisite: Nil
Course Outcome: After the completion of the course the student will be able to
CO 3 Describe about various devices, sensors required for IoT (Cognitive level : Understand)
applications
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO 1 2 3
CO 2 2 2 3
CO 3 2
CO 4 3 3 3 3 2 2 1
CO 5 3 3 3 3 2 2 3 1
101
22-382-0332- INTERNET OF THINGS
UNIT I (10 Hours)
Internet of Things - Definition and Characteristics of IoT, Sensors, Actuators,
Physical Design of IoT – IoT Protocols, IoT communication models, IoT Communication APIs,
IoT enabled Technologies – Wireless Sensor Networks, Cloud Computing, Embedded Systems,
UNIT II (8 Hours)
Design of IoT, IoT Application Areas, Domain Specific IoTs – Home, City, Environment, Energy,
Agriculture and Industry, IoT Examples, Layered architecture of IoT.Protocols for IoT- IEEE
802.15.4-, Zigbee, Zigbee Architecture ,WiFi, LowPAN, LoRaWAN. Machine to Machine
communication – Differences and Similarities between M2M and IoT, CoAP.
IoT Data Management - Device Management Gateways.Data Acquiring and Storage foR IoT
Services.
Data Analytics for IoT, Web server for IoT, Blockchain and IoT,Cloud computing for data
storage,Big data platform for the internet of things, Big Data Management Systems for the
Exploitation of Pervasive Environments - Big Data challenges and requirements coming from
different IoT based applications. Case studies- Smart Home, Smart Environment, Smart
healthcare, Smart agriculture
102
Textbooks/References
103
22-382-0333 EXPLAINABLE AI CATEGORY L T P CREDIT
ELECTIVE 3 1 0 4
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 1 2 2 1
CO2 2 3 2 2 3 1
CO3 2 3 2 2 3 1
CO4 2 3 2 2 3 1
CO5 2 3 2 2 3 2 1
104
22-382-0333- EXPLAINABLE AI
UNIT I (7 Hours)
Machine Learning and Explainable AI, Need for XAI, Explainability and interpretability,XAI flow,
Making ML models Explainable: Intrinsic Explanations, Post Hoc Explanations,Global or Local
Explainability, Properties of Explanations.
UNIT II (8 Hours)
Intrinsic Explainable models: Loss Function, Linear Regression, Logistic Regression, Decision
Trees, KNN.
Model Agnostic Methods For XAI: Global Explanations, Local Explanations,
shap.KernelExplainer, Local Linear Surrogate Models (LIME): mathematical representation,
creating agnostic AutoML template, Bagging classifier, Boosting classifier, Decision Tree, Extra
Trees, Creating Lime Explainer, SHAP for Boosted Trees
105
Text Books
[1] Explainable AI with Python, Antonio Di Cecco and Leonida Gianfagna, Springer, 2021
[2] Hands-On Explainable AI (XAI) with Python: Interpret, visualize, explain, and integrate
reliable AI for fair, secure, and trustworthy AI apps, Denis Rothman, Packt publisher, 2020
[3] Interpretable Machine Learning with Python: Learn to build interpretable high-performance
models with hands-on real-world examples, by SergMasís , Packt publisher, 2021
References
[1] Interpretable Machine Learning, by Christoph Molnar
https://christophm.github.io/interpretable-ml-book/
[2] Deep Learning with Python, François Chollet, O’Reilly, ISBN 9781617294433, 2017
106
CATEGORY L T P CREDIT
Course Outcomes: After the completion of the course the student will be able to
CO 1 Describe the basic concepts of molecular Biology, different (Cognitive level: Understand)
biological databases & various data retrieval tools
CO 2 Apply the sequence alignment algorithms for any given (Cognitive level: Apply)
sequences.
CO 4 Analyze the primary and secondary protein structure (Cognitive level: Analyze)
prediction methods.
CO 5 Develop a solution using machine learning techniques for (Cognitive level: Create)
problems in Bioinformatics.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 1 2 3 3 2
CO2 3 3 3 2 3 2
CO3 3 3 3 2 3 2
CO4 2 2 3 2 2 2
CO5 2 2 3 2 3 3 3 2 2
107
22-382-0314 BIOINFORMATICS
UNIT I (12 Hours)
Basics of Molecular Biology- Cell as a unit of life-Nucleic Acid, Protein. Central Dogma of
Molecular Biology, Genetic Code, Informatics in Biology- Bioinformatics and Computational
Biology – Nature & Scope. Biological Databases – Primary DBs - Nucleotide Sequence databases,
Protein Sequence databases. Secondary Dbs. Molecular Structure database. Literature database.
Data Retrieval Tools – Entrez, SRS. Basic file formats- Ethical issues in Bioinformatics.
UNIT IV (6 Hours)
Structural Bioinformatics: Structure Visualization using Pymol. Protein Structure- Primary,
Secondary – alpha helics, beta-sheets & turns, Tertiary and Quaternary structures. Protein Structure
Prediction. Structure and function.
UNIT V (7 Hours)
Overview of branches: Nature and Scope of Computational Genomics, Computational Proteomics,
Systems Biology & Synthetic Biology, Computer-Aided Drug Design, Next Generation
Sequencing. Applications of Machine Learning in Bioinformatics- classification and clustering
problems. HMM in bioinformatics.
108
Text Books
1. Lesk, Arthur, Introduction to genomics, Oxford University Press, 2017
2. Zvelebil, Marketa J., and Jeremy O. Baum. Understanding bioinformatics. Garland Science,
2007.
3. Xiong, Jin.Essential bioinformatics. Cambridge University Press, 2006.
Reference Books
1. Bergeron, Bryan P, Bioinformatics Computing, Prentice Hall Professional, 2003
2. Neil James, Pavel A Pevnezer, An Introduction to Bioinformatics Algorithms, MIT Press, 1st
ed, 2004
3. Gibas , Cynthia, Developing bioinformatics computer skills, O'reilly 2003
Web Resources
109
BLOCKCHAIN CATEGORY L T P CREDIT
TECHNOLOGY
22-382-0335 ELECTIVE 3 1 0 4
Prerequisite: Nil
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2
CO2 2 2 2 1 2
CO3 2 2 1 2
CO4 2 2 2 1 2
CO5 2 2
110
22-382-0335 BLOCKCHAIN TECHNOLOGIES
UNIT I (8 Hours)
Introduction to Blockchain, Bitcoin Blockchain: Structure, Operations, Features, Consensus
Model, Incentive Model. The Double-Spend Problem, Byzantine Generals’ Computing Problems,
Public-Key Cryptography, Hashing, Distributed Systems, Distributed Consensus, Proof of Work,
Proof of Stake, Delegated Proof of Stake, Proof of Elapsed Time, Deposit based consensus, Proof
of importance, Federated consensus or federated Byzantine consensus, Reputation-based
mechanisms, Practical Byzantine Fault Tolerance.
UNIT IV (9 Hours)
Security Issues: Blockchain Related Issues, Higher-Level Language (Solidity) Related Issues,
EVM Bytecode Related Issues, Real-Life Attacks on Blockchain Applications Smart Contracts,
Trusted Execution Environments.Security Tools for Smart Contracts: Working, Advantages, And
Disadvantages of Tools- Oyente, Security, Maian, SmartCheck.
UNIT V (8 Hours)
Alternative Decentralized Solutions: Interplanetary File System (IPFS), Blockchain Use Cases:
Financial Services Related Use Cases, Revolutionization of Global Trade, Digital Identity,
Auditing Services, Supply Chain Management, Healthcare Related Services, Blockchain and IOT,
Blockchain and AI.
111
Text Books
1. Tiana Laurence, Blockchain for Dummies, 2 nd Edition 2019, John Wiley & Sons.
2. Building Blockchain Projects, Narayan Prusty, Packt Publishing.
3. Mastering Ethereum: Building Smart Contracts and Dapps Book by Andreas
4. Antonopoulos and Gavin Wood, Shroff Publisher/O′Reilly Publisher.
5. Mastering Blockchain: Deeper insights into decentralization, cryptography, Bitcoin, and
popular Blockchain frameworks by Imran Bashir, Packt Publishing (March 17, 2017).
6. Blockchain: Blueprint for a New Economy by Melanie Swan, Shroff Publisher
publisher/O’Reilly Publisher Media; 1 st edition (2015).
7. Andreas M. Antonopoulos, Mastering Bitcoin - Programming the Open Blockchain, O’Reilly
Media, Inc., 2017
8. Melanie Swan, Blockchain - Blueprint for a new economy, O’Reilly Media, Inc., 2015.
9. Abhijit Das and VeniMadhavan C. E., Public-Key Cryptography: Theory and Practice:
Theory and Practice, Pearson Education India, 2009.
10. Joseph J. Bambara and Paul R. Allen, Blockchain – A practical guide to developing business,
law, and technology solutions, McGraw Hill, 2018.
Web Resources
1. https://www.coursera.org/learn/smarter-contracts
2. Introduction to Blockchain Technology and Applications,
https://swayam.gov.in/nd1_noc20_cs01/preview
3. https://nptel.ac.in/courses/106105184/
4. https://www.coursera.org/learn/blockchain-platforms
5. https://www.edx.org/course/blockchain-and-fintech-basics-applications-and-imitations
6. https://www.accenture.com/in-en/insight-blockchain-technology-how-banks-
buildingreal-time
7. https://medium.com/search?q=decentralized%20exchange
8. Emerging Technology Projection: The Total Economic Impact TM Of IBM Blockchain
https://www.ibm.com/downloads/cas/QJ4XA0MD
9. https://www.globallegalinsights.com/practice-areas/blockchain-laws-and-
regulations/india#chaptercontent1
10. https://www.eduonix.com/blockchain-and-cryptoc
112
22-382-0336 SOCIAL NETWORK CATEGORY L T P CREDIT
ANALYSIS
ELECTIVE 3 1 0 4
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2 2
CO2 2 2
CO3 3 3
CO4 2 2
CO5 3 3 3
113
22-382-0336- SOCIAL NETWORK ANALYSIS
UNIT I (8 Hours)
Introduction to Social Network Analysis, Mathematical representations of Social Networks:
Notations for Social Network data – Graph theoretic, sociometric. Graphs – Subgraphs, Dyads,
Triads, Nodal degree, Density, Walks, trails and paths, Connected graphs and components,
Geodesics, distance and diameter, Connectivity, Isomorphic graphs and subgraphs.
UNIT II(10 Hours)
Directed graphs – Dyads, Nodal indegree and outdegree, Density, directed walks, paths and semi
paths, Reachability and connectivity, Geodesics, distance and diameter. Signed graphs and signed
directed graphs Matrices – for graphs, digraphs, valued graphs, two-mode networks, Basic matrix
operations, Computing simple network properties.
UNIT III (10 hours)
Centrality: Actor centrality, Nondirectional relationships – degree, closeness, betweenness
centrality, Directional relations – centrality.
UNIT IV( 7 Hours)
Structural relationships – strong and weak ties, homophily, positive and negative relationships,
Link analysis.
UNIT V( 10 Hours)
Network dynamics – cascading behavior, small-world phenomenon, epidemics. Tools for Social
Network Analysis - UCINET-PAJEK-ETDRAW-StOCNET- Splus-R-NodeXL-SIENA and
RSIENAReal world Social Networks (Facebook-Twitter etc.)
Text Books
[1] Social Network Analysis: Methods and Applications, Book by Katherine Faust and Stanley
Wasserman Cambridge ; New York : Cambridge University Press, 8th series.
[2] Networks, Crowds, and Markets: Reasoning about a Highly Connected World Book by David
Easley and Jon Kleinberg
[3). Social and Economic Networks Book by Matthew O. Jackson, Illustrated, 21 November
2010
Web Resources
[1] NPTEL: https://onlinecourses.nptel.ac.in/noc19_cs66/preview
[2] Courseera: https://www.coursera.org/learn/social-network-analysis
[3] EDX/UPGRAD: https://www.edx.org/course/social-network-analysis-sna
114
22-382-0337 MALWARE CATEGORY L T P CREDIT
ANALYSIS
ELECTIVE 3 1 0 4
Course Outcomes
After completion of this course, the students will be able to
(Cognitive level :
CO1 Describe nature of malware and its capabilities
Understand)
Examine scientific and logical limitations on ability to combat (Cognitive level :
CO2
malware. Analyze)
Explain social, economic and historical context in which (Cognitive level :
CO3
malware occurs. Understand)
Apply static and dynamic analysis techniques to synthetic with (Cognitive level :
CO4
real-life examples Apply)
Apply suitable measures based on the context to detect and (Cognitive level :
CO5
mitigate popular infection methods. Apply)
Mapping of Course Outcomes with Programme Outcomes - Low=1, Medium=2, High=3
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2
CO2 3 3
CO3 2
CO4 3 3 2
CO5 3 3 2
115
22-382-0337- MALWARE ANALYSIS
UNIT I (5 Hours)
Introduction: The taxonomy of malware and its capabilities: viruses, Trojan horses, rootkits,
backdoors, worms, targeted malware; History of malware, The social and economic context for
malware: crime, anti-malware companies, legal issues, the growing proliferation of malware
Basic Analysis: Signature generation and detection; clone detection method
UNIT II (8 Hours)
Static analysis theory: program semantics, and abstract interpretation framework
Static Analysis: System calls: dependency analysis issues in assembly languages; semantic
invariance of system call sequences; abstract interpretation as a formal framework for detection;
constraint-based analyses; semantic clones
116
References
1. Michael Sikorski, Andrew Honig, Practical Malware Analysis: The Hands-On Guide
Dissecting Malicious Software, No Starch Press, 2012 (for lab work).
2. Jamie Butler and Greg Hoglund, Rootkits: Subverting the Windows Kernel, Addison-
Wesley, 2005
3. Dang, Gazet, Bachaalany, Practical Reverse Engineering, Wiley, 2014.
4. Reverend Bill Blunden, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of
the System, Second Edition, Jones & Bartlett, 2012.
117
22-382-0338 DESIGN THINKING CATEGORY L T P CREDIT
ELECTIVE 3 1 0 4
Prerequisite: NIL
Course Outcomes:
After completion of this course, students will be able to
CO3 Analyze design prototype and implementation details (Cognitive level : Analyze)
CO4 Describe design thinking process in IT and agile (Cognitive level : Understand)
software development.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 2
CO2 1 2 2 2
CO3 3 2
CO4 1 3 2 1
CO5 3 1 2 1
118
22-382-0338- DESIGN THINKING
UNIT I ( 7 Hours)
Stages of thinking – The design process and stages- define the problem, conduct research, define,
research, ideate, prototype, select, implement and learn. Example project.
UNIT V( 8 Hours)
Design thinking for service design: How to design a service, Principles of service design, Benefits
of service design, Service blueprint, Design strategy, organization, principles for information
design, principles of technology for service design.
Textbook:
1. Design Thinking The act or practice of using your mind to consider design by Gavin
Ambrose and Paul Harris (pdf version) Production by AVA Book Production Pvt. Ltd.,
Singapore.
2. AdersRiiseMaehlum, “Extending the TILES Toolkit” from Ideation to Prototyping. (
3. Marc stickdorn and Jacob Schneider, “This is Service Design Thinking”, Wiely, 2011
119
22-382-0401 Internship/Project Work
Course Outcomes
CO 2 Examine the literature and describe solution for the (Cognitive level: Analyse)
identified problem
CO 3 Develop the solution using appropriate software tools (Cognitive level: Create)
CO 5 Deploy the developed product and document the project (Cognitive level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO1
2
CO 1 3 3 3
CO 2 3 3 3 3 3 3 3
CO 3 3 3 3 3 3 3 3
CO 4 3 3 3 3 3 3 3 3 3 3
CO 5 3 3 3 3 3 3 3 3 3 3 3 3
120
Mark Division
121