5th 6th
5th 6th
6TH SEMESTER
Contact
Course
Course Code Course Hours Credit
Category
(L-T-P)
THEORY
Open Elective-I
SESSIONALS
TOTAL CREDIT 22
24
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
To introduce the concept of electronic commerce, and to understand how electronic
commerce is affecting business enterprises, governments, consumers and people in general.
25
Department of Computer Science & Engineering
6thSemester
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST309.1 Explain the components and roles of the Electronic APPLY
Commerce environment.
ETCST309.2 Explain how businesses sell products and services on APPLY
the Web.
ETCST309.3 Describe the qualities of an effective Web business CREATE
presence
ETCST309.4 Explain how to meet the needs of Web site visitors APPLY
ETCST309.5 Understand legal and ethical issues related to E- UNDERSTAND
Commerce
TEXT BOOKS
1. Ravi Kalakota, Andrew Winston, “Frontiers of Electronic Commerce”, Addison Wesley.
2. Enterprise Resource Planning- Concepts and Practices; V K Garg and N K Venkatkrishna,
PHI.
REFERENCE BOOKS
1. E- Commerce and Enterprise Resource Planning: CSV Murthy, HPH.
2. Bajaj and Nag, “E-Commerce the cutting edge of Business”, TMH.
3. Pete Lohsin, John Vacca “Electronic Commerce”, New Age International.
4. Laudon, “E-Commerce: Business, Technology, Society”, Pearson Education.
26
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
1. Describe the core syntax and semantics of Python programming language.
2. Discover the need for working with the strings and functions.
3. Illustrate the process of structuring the data using lists, dictionaries, tuples andsets.
4. Indicate the use of regular expressions and built-in functions to navigate the filesystem.
5. Infer the Object-oriented Programming concepts inPython.
27
Department of Computer Science & Engineering
6thSemester
Module IV (10 Classes)
Data Structures Lists – Dictionaries, Creating Dictionary, Accessing and Modifying key value
Pairs in Dictionaries, Built-In Functions Used on Dictionaries, Dictionary Methods, The del
Statement,Tuples and Sets,Creating Tuples, Basic Tuple Operations, Indexing and Slicing in
Tuples, Relation between Tuples and Lists, Relation between Tuples and Dictionaries, Tuple
Methods, Operations, Sequences. Comprehensions. Modules: Creating modules, import
statements, from. The import statement, namespacing, Python packages, Introduction to PIP,
Installing Packages via PIP, Using Python Packages
TEXT BOOK:
1. Gowrishankar S, Veena A,“Introduction to Python Programming”,1st
Edition,CRCPress/Taylor&Francis,2018.ISBN-13: 978-0815394372.
REFERENCE BOOKS / WEBLINKS:
1. Jake VanderPlas,“Python Data Science Handbook: Essential Tools for Working with
Data”,1st Edition, O'Reilly Media, 2016.ISBN-13:978-1491912058
2. AurelienGeron,“Hands-On Machine Learning with Scikit-Learn and TensorFlow: Concepts,
Tools, and Techniques to Build Intelligent Systems”,2nd Edition, O’Reilly Media, 2019.ISBN–
13:978-9352139057.
3. Wesley J Chun,“Core Python Applications Programming”,3rd Edition, Pearson Education
India, 2015.ISBN-13:978-9332555365
4. Miguel Grinberg,“Flask Web Development: Developing Web Applications with Python”,2nd
Edition, O'Reilly Media, 2018.ISBN-13:978-1491991732.
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST310.1 Interpret the fundamental Python syntax and
semantics and be fluent in the use of Python control Remembering
flow statements.
ETCST310.2 Express proficiency in the handling of strings and
Evaluate
functions.
ETCST310.3 Determine the methods to create and manipulate
Python programs by utilizing the data structures like Analyze
lists, dictionaries, tuples and sets.
ETCST310.4 Identify the commonly used operations involving file
Evaluate
systems and regular expressions.
ETCST310.5 Articulate the Object-Oriented Programming concepts
Analyze
such as encapsulation, inheritance and polymorphism.
28
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
• Concept and implementation of computer networks; architecture, protocol layers,
internetworking and addressing; network application development.
29
Department of Computer Science & Engineering
6thSemester
Module – IV (10 Hours)
Transport Layer: Process to Process Delivery, User Datagram Protocol (UDP) and
Transmission Control Protocol (TCP).Domain Name System (DNS): Name Space, Domain
Name Space, DNS in Internet, Resolution andDynamic Domain Name System (DDNS), Remote
logging, Electronic Mail (SMTP) and filetransfer (FTP), WWW: Architecture & Web document,
HTTP: Transaction & Persistent vs.Non-persistent connection.Introduction to Wi-Fi and Li-Fi
Technology.
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST311.1 Independently understand basic computer network Remembering
technology and Understand and explain Data
Communications System and its components.
ETCST311.2 Identify the different types of network topologies and Evaluating
protocols.
ETCST311.3 Identify the different types of network devices and their Evaluating
functions within a network
ETCST311.4 Understand and building the skills of sub-netting and Understanding
routing mechanisms
ETCST311.5 Familiarity with the basic protocols of computer Creating
networks, and how they can be used to assist in
network design and implementation.
Text Books:
1. Data Communications and Networking, Behrouz A. Forouzan, Tata McGraw-Hill.
2. Computer Networks, A. S. Tannenbum, D. Wetherall, Prentice Hall, Imprint of Pearson.
Reference Books:
1. Computer Networks A system Approach, Larry L, Peterson and Bruce S. Davie,
Elsevier.
2. Data Communication and Computer network ,Dr.SanjayaSharma,edited by Deeksha
Sharma and V. Sharma S.K Kataria and sons.
3. Data and Computer Communications, William Stallings, Prentice Hall, Imprint of Pearson.
30
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
1. To introduce students to the fundamental concept of Big data.
2. To learn the different ways of Data Analysis.
3. To learn the concept of clustering.
4. Be familiar with Virtualization.
COURSE CONTENT:
MODULE– IV (8 Classes)
Framework and Visualisation: MapReduce-Hadoop, MapR-sharding, No SQL Database, S3-
Hadoop, Distributed file system, Visualisation, Visual Data Analysis technique.
31
Department of Computer Science & Engineering
6thSemester
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST305.1 Design an efficient recommendation system. Create
ETCST305.2 Design the tools for visualization. Create
ETCST305.3 Working with Big Data tools and its analysis Apply
techniques.
TEXT BOOKS:
1. AnandRajaraman and Jeffery David Ullman, Mining of Massive Datasets, Cambridge
University Press, 2012.
2. Trevor Hastie, Robert Tibshirani, Jerome Friedman,”The Element of Statical Learning-Data
mining, Inference and prediction”, 2nd Edition, Springer, Verlag,2009.
3. E. Alpaydin, Introduction to machine learning, Prentice Hall of India, 2010(Chapter-19).
REFERENCE BOOKS:
1. Michael Berthold, David J. Hand, Intelligent Data Analysis, Springer, 2007.
2. David Loshin, “Big Data Analytics: From strategic planning to Enterprise Integration with
Tools, Techniques, NoSQL and graph, 2013.
32
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
To learn the advanced concepts of Parallel and Distributed Computing andits
implementation for assessment of understanding the course by the students
MODULE- II [8 Classes]
Principles of Parallel Algorithm Design: Decomposition Techniques, Characteristics of Tasks
and Interactions, Mapping Techniques for Load Balancing.
33
Department of Computer Science & Engineering
6thSemester
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST313.1 Students will be knowledgeable in concept of Parallel Create
systems.
ETCST313.2 Students will be knowledgeable with different Apply
Parallel Programming Methods
ETCST313.3 Students will be fluent in different types of calculation Apply
related to Parallel Models.
ETCST313.4 Students will be apply different Graph and Search Apply
algorithms to solve various Problems
TEXT BOOK
1. A Grama, AGupra, G Karypis, V Kumar. Introduction to Parallel Computing (2nd ed.).
Addison Wesley, 2003
REFERENCE BOOKS
1. C Lin, L Snyder. Principles of Parallel Programming. USA: Addison-Wesley Publishing
Company, 2008.
2. J Jeffers, J Reinders. Intel Xeon Phi Coprocessor High-Performance Programming. Morgan
Kaufmann Publishing and Elsevier, 2013.
3. T Mattson, B Sanders, B Massingill. Patterns for Parallel Programming. Addison-Wesley
Professional, 2004.
34
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
This course will introduce the concepts of data ware house and data mining, which gives
a complete description about the principles, used, architectures, applications, design and
implementation of data mining and data ware housing concepts.
COURSE CONTENT:
MODULE – I (10 Classes)
Introduction: Fundamentals of data mining, Data Mining Functionalities, Classification of Data
Mining systems, Data Mining Task Primitives, Integration of a Data Mining System with a
Database or a Data Warehouse System, Major issues in Data Mining. Data Preprocessing:
Need for Preprocessing the Data, Data Cleaning, Data Integration and Transformation, Data
Reduction, Discretization and Concept Hierarchy Generation.
35
Department of Computer Science & Engineering
6thSemester
Cluster Analysis Introduction :Types of Data in Cluster Analysis, A Categorization of Major
Clustering Methods, Partitioning Methods, Hierarchical Methods, Density-Based Methods, Grid-
Based Methods, Model-Based Clustering Methods, Clustering High-Dimensional Data,
Constraint-Based Cluster Analysis, Outlier Analysis
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
1 Understand the functionality of the various data mining Understand
and data warehousing component Knowledge
2 Appreciate the strengths and limitations of various data Apply, Create
mining and data warehousing models Apply
3 Explain the analyzing techniques of various data Analyze
Analyze
4 Describe different methodologies used in data mining Analyze
and data ware housing.
5 Compare different approaches of data ware housing Evaluating
and data mining with various technologies.
TEXT BOOKS:
1. Data Mining-Concepts and Techniques- Jiawei Han, MichelineKamber, Morgan Kaufmann
Publishers, Elsevier, 2 Edition, 2006.
2. Introduction to Data Mining, Pang-Ning Tan, Vipin Kumar, Michael Steinbanch, Pearson
Education.
REFERENCE BOOKS:
1. Data Mining Techniques, Arun K Pujari, 3rd Edition, Universities Press.
2. Data Ware Housing Fundamentals, PualrajPonnaiah, Wiley Student Edition.
3. The Data Ware House Life Cycle Toolkit- Ralph Kimball, Wiley Student Edition.
4. Data Mining, VikaramPudi, P Radha Krishna, Oxford University.
36
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
1. Understand the design issues in ad hoc and sensor networks.
2. Learn the different types of MAC protocols.
3. Be familiar with different types of Adhocrouting protocols.
4. Be expose to the TCP issues in Adhocnetworks.
5. Learn the architecture and protocols of wireless sensor networks.
MODULE – I (8 Classes)
INTRODUCTION
Fundamentals of Wireless Communication Technology – The Electromagnetic Spectrum –
Radiopropagation Mechanisms – Characteristics of the Wireless Channel -mobile ad hoc
networks(MANETs) and wireless sensor networks (WSNs):Concepts and architectures,
Applications of Ad Hoc and Sensor networks. Design Challenges in Ad hoc and Sensor
Networks.
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCST315.1 Explain the concepts, network architectures and Apply
applications of ad hoc and wireless sensor networks
ETCST315.2 Analyze the protocol design issues of ad hoc and Apply
sensor networks
ETCST315.3 Design routing protocols for ad hoc and wireless Apply
sensor networks with respect to some protocol design
issues
ETCST315.4 Evaluate the QoS related performance measurements Apply
of ad hoc and sensor networks
TEXT BOOK:
1. C. Siva Ram Murthy, and B. S. Manoj, “Ad Hoc Wireless Networks: Architectures and
Protocols “,Prentice Hall Professional Technical Reference, 2008.
REFERENCE BOOKS:
1. Carlos De MoraisCordeiro, Dharma Prakash Agrawal “Ad Hoc & Sensor Networks:Theory
and Applications”, World Scientific Publishing Company, 2006.
2. Feng Zhao and LeonidesGuibas, “Wireless Sensor Networks”, Elsevier Publication –2002.
3. Holger Karl and Andreas Willig “Protocols and Architectures for Wireless Sensor
Networks”,Wiley, 2005
4. KazemSohraby, Daniel Minoli, &TaiebZnati, “Wireless Sensor Networks-
Technology,Protocols, and Applications”, John Wiley, 2007.
5. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, 2003.
38
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
1. This course is an introduction to a broad range of numerical methods for solving
mathematical problems that arise in Science and Engineering.
2. The goal is to provide a basic understanding of the derivation, analysis, and use of
these numerical methods along with a rudimentary understanding of finite precision.
3. This will help to choose, develop and apply the appropriate numerical techniques for
day to day problems. Moreover, it interprets the results and assesses accuracy.
COURSE CONTENT
Curve Fitting and Regression Analysis: Least square method, Linear regression, Polynomial
regression, Fouries regression, Non linear regression, Interpolation – Newton’s forward and
backward interpolation, Newton’s divided difference interpolation, Lagrange’s interpolation,
Gauss’s central difference interpolation
39
Department of Computer Science & Engineering
6thSemester
MODULE-IV (10 hours)
Partial Differential Equations: Introduction to PDE Elliptic, Parabolic & Hyperbolic Equation,
Finite Difference Schemes, Forward, Backward and Central Difference, Application to Laplace &
Poisson’s Equation, Iterative & Relaxation Techniques, Laplacian Operator in Cartesian, polar
and other coordinate systems. Solution of Parabolic Equations, Implicit & Explicit Schemes,
Crank Nicholson, ADI scheme. Solution of Hyperbolic Equations.
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETMAT301.1 Implement these methods for solving algebraic, Apply
transcendental and linear equations.
ETMAT301.2 Select these methods for solving single variable Evaluate
optimization problems.
ETMAT301.2 Use these methods for fitting different curves using Apply
regression and interpolation techniques.
ETMAT301.3 Design the methods for solving ordinary and partial Create
differential equations and design computer programs
for the various numerical methods in order to solve
engineering problems.
TEXT BOOKS:
1. Numerical Analysis9th Edition, by Richard L. Burden , J. Douglas Faires,Annette M. Burden,
Cengage Publication
2. Optimization for Engineering Design - Algorithms and Examples, Kalyanmayi Deb, PHI Pvt.
Ltd
REFERENCE BOOKS:
1. Numerical Methods by Engineers by Steven Chapra and Raymond P Canale, TMH
Publications.
2. Numerical Methods for Engineers and Scientists, J D Hoffman, Marcel Dekker.
3. Numerical Methods, B. S. Grewal, Khanna Publishers Ltd.
40
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
1. Understand privacy, intellectual property rights, contracts & licenses as well as common
criminal issues.
2. Understand the legal obligations of a computer professional.
3. Understand computer ethics and the importance of professional codes of conduct.
COURSE CONTENT:
41
Department of Computer Science & Engineering
6thSemester
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
HST 301-1 1. Students identify and analyze statutory, regulatory, Analyze ,Apply
constitutional, and organizational laws that affect the
information technology professional.
HST 301-2 2. Students locate and apply case law and common Analyze
law to current legal dilemmas in the technology field.
HST 301-3 3. Students apply diverse viewpoints to ethical Apply
dilemmas in the information technology field and
recommend appropriate actions.
HST 301-4 4. Students distinguish enforceable contracts from Analyze
non-enforceable contracts.
TEXT BOOKS:
1. Karnika Seth, Computers, Internet and New Technology Laws, Lexis
NexisButterworthsWadhwa Nagpur.
2. Justice YatindraSingh,Cyber Laws, Universal Law Publishing Co, New Delhi, (2012).
REFERENCES BOOKS:
1. SudhirNaib, The Information Technology Act, 2005: A Handbook, OUP, New York, (2011)
2. S. R. Bhansali, Information Technology Act, 2000, University Book House Pvt. Ltd., Jaipur
(2003).
42
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
1. To provide a thorough understanding of various transform used in digital signal
processing.
2. To understand the concept of design, implementation and analysis of Digital filters as
well as discrete time system.
COURSE CONTENT:
Module – I (12 Hrs)
Review of Z-Transform , Discrete Fourier Transform and Implementation of Discrete-Time
Systems:The Z-Transform: The Direct Z-Transform, The Inverse Z-Transform; Properties of the
Z-Transform, The Discrete Fourier Transform, Inverse Discrete Fourier, Properties of the DFT:
Periodicity, Linearity, and Symmetry Properties, Multiplication of Two DFTs and Circular
Convolution, Structure for the Realization of Discrete-Time Systems, Structure for FIR Systems:
Direct-Form Structure, Cascade-Form Structures, Structure for IIR Systems: Direct-Form
Structures, Signal Flow Graphs and Transposed Structures, Cascade-Form Structures, Parallel-
Form Structures.
Module –II (10 Hrs)
Design of Digital Filters: General Considerations: Causality and Its Implications, Characteristics
of Practical Frequency-Selective Filters; FIR Filters, Design of Linear-Phase FIR Filters by using
Windows, Design of Linear-Phase FIR Filters by the Frequency-Sampling Method; Design of IIR
Filters from Analog Filters: IIR Filter Design by Impulse Invariance, IIR Filter Design by the
Bilinear Transformation, Design of Butterworth IIR Digital Filters.
Module –III (10 Hrs)
Efficient Computation of the DFT: Fast Fourier Transform Algorithms: Efficient Computation of
the DFT: FFT Algorithms: Direct Computation of the DFT, Radix-2 FFT Algorithms: Decimation-
In-Time (DIT), Decimation-In-Time (DIF); Use of the FFT Algorithm in Linear Filtering and
Correlation.
Module – IV (08 Hrs)
Adaptive Filters:Application of Adaptive Filters: System Identification or System Modeling,
Adaptive Channel Equalization, Adaptive Line Enhancer, Adaptive Noise Cancelling; Adaptive
Direct-Form FIR Filters-The LMS Algorithm: Minimum Mean Square Error Criterion, The LMS
Algorithm, Introduction to multirate signal processing.
43
Department of Computer Science & Engineering
6thSemester
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETECT324.1 Recall signals mathematically in continuous and Remember
discrete time and frequency domain
ETECT324.2 Use concepts of trigonometry, complex algebra, Apply
Fourier transform, z-transform to analyze the
operations on signals and acquire knowledge about
Systems
ETECT324.3 Design implementation, analysis and comparison of Create
digital filters for processing of discrete time signals
ETECT324.4 Distinguish FIR and IIR filter design and its Analyze
applications.
Text Books:
1. Digital Signal Processing, Principles, Algorithms and Applications,J. G. Proakis and D.
G. Manolakis, 4th Edition, Pearson Education ,India. 2007
2. Digital Signal Processing, a Computer-Based Approach ,Sanjit K. Mitra, 4th Edition,
TMH. 2013
Reference Books:
1. Digital Signal Processing,S. Salivahan, A. Vallavraj and C. Gnanapriya, 2ndEdition,TMH.
2007
2. Digital Signal Processing,A Modern Introduction , Ashok Ambardar, 1st Edition ,Cengage
Learning. 2007
3. Digital Signal Processing, A MATLAB-Based Approach ,Vinay K. Ingle and John G.
Proakis, 3rd Edition, Cengage Learning,2011.
.
44
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
1. To develop communication competence in prospective engineers.
2. To enable them to convey thoughts and ideas with clarity and focus.
A
COURSE CONTENT:
Module-I (9 Hours)
Communication Skill: Introduction to Communication, The Process of Communication, Barrier to
Communication, Listening Skills, Writing Skills, Technical Writing, Letter Writing, Job
Application, Report Writing, Non-verbal Communication and Body Language, Interview Skills,
Group Discussion.
Module-II (9 Hours)
Presentation Skills, Technology-based Communication.
Critical Thinking & Problem Solving: Creativity, Lateral thinking, Critical thinking,
MultipleIntelligence, Problem Solving, Six thinking hats, Mind Mapping & Analytical Thinking.
Teamwork: Groups, Teams, Group Vs Teams, Team formation process, Stages of Group,
Group Dynamics, Managing Team Performance & Team Conflicts.
45
Department of Computer Science & Engineering
6thSemester
Module-III (9 Hours)
Ethics, Moral & Professional Values: Human Values, Civic Rights, Engineering Ethics,
Engineering as Social Experimentation, Environmental Ethics, Global Issues, Code of Ethics
like ASME, ASCE, IEEE.
Module-IV (9Hours)
Leadership Skills: Leadership, Levels of Leadership, Making of a leader, Types of leadership,
Transactions Vs Transformational Leadership, VUCA Leaders, DART Leadership, Leadership
Grid & leadership Formulation.
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETHSS302.1 Communicateeffectively. Evaluate
ETHSS302.2 Make effectivepresentations. Create
ETHSS302.3 Write different types ofreports. Analyze
ETHSS302.4 Face interview & groupdiscussion. Analyze
ETHSS302.5 Critical think on a particular problem. Solve problem. Evaluate
ETHSS302.6 Work in Group & Teams Apply
ETHSS302.7 Handle Engineering Ethics and Human Values. Remember
ETHSS302.8 Become an effective leader. Apply
References:
1. Barun K. Mitra; (2011), “Personality Development & Soft Skills”, First Edition; Oxford
Publishers.
2. Tatyana; (2015) ”Soft Skill for Managers”; First Edition; Wiley Publishing Ltd.
3. Larry James (2016); "The First Book of Life Skills"; First Edition; Embassy Books.
4. ShaliniVerma (2014); “Development of Life Skills and Professional Practice"; First Edition;
Sultan Chand (G/L) & Company
5. John C. Maxwell (2014); ‘be 5 Levels of Leadership", Centre Street, A division
46
Department of Computer Science & Engineering
6thSemester
COURSE OBJECTIVES:
1. To understand the working principle of various communication protocols.
2. To analyze the various routing algorithms.
3. To know the concept of data transfer between nodes.
COURSE CONTENT:
1. Study of LAN Topology and various Network devices
2. IP address configuration and LAN setup
3. Build class A, B and C Network using router in Network tool
4. Implement Sub-netting concept using Network tool
5. Write a program to find out class of a given IP address, sub-net mask, first &Last IP
address of that subnet
6. Installation & Configuration of NS2 in Linux environment
7. Basic wired & wireless topology in NS2
8. Congestion Control: Stop & Wait, Sliding Window & Selective Repeat, GoBack N and
Throughput analysis
9. IP Addressing, Static and Dynamic Routing
10. Write a program to build client-server model on different computers
11. Socket Programming, Network Management/ Monitoring Tools
12. DHCP, DNS, FTP Server configuration.
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCSS305.1 Develop programs for client-server applications Creating
ETCSS305.2 Perform packet sniffing and analyze packets in Creating
network traffic
ETCSS305.3 Implement error detecting and correcting codes Creating
47
Department of Computer Science & Engineering
6thSemester
(PYTHON)
TEACHING SCHEME:3-0-0 (L-T-P) CREDIT: 3
COURSE OBJECTIVES:
1. To understand why Python is a useful scripting language for developers.
2. To learn how to design and program Pythonapplications.
3. To learn how to use lists, tuples, and dictionaries in Python programs.
COURSE CONTENT:
Session1: Introduction To Python Installation and Working with Python Understanding Python
variables Python basic Operators Understanding python blocks
Session 2:Python Data Types Declaring and using Numeric data types: int, float, complex
Using string data type and string operations Defining list and list slicing Use of
Tuple data type
Session 3:Python Program Flow Control Conditional blocks using if, else and elif Simple for
loops in python For loop using ranges, string, list and dictionaries Use of while
loops in python Loop manipulation using pass, continue, break and else
Programming using Python conditional and loops block
Session4:Python Functions, Modules And Packages Organizing python codes using functions
Organizing python projects into modules Importing own module as well as
external modules Understanding Packages Powerful Lamda function in python
Programming using functions, modules and external packages
Session5:Python String, List And Dictionary Manipulations Building blocks of python programs
Understanding string in build methods List manipulation using in build methods
Dictionary manipulation Programming using string, list and dictionary in build
functions
Session 6:Python File Operation Reading config files in python Writing log files in
pythonUnderstanding read functions, read(), readline() and readlines()
Understanding write functions, write() and writelines() Manipulating file pointer
using seek Programming using file operations
48
Department of Computer Science & Engineering
6thSemester
Session7: Python Object Oriented Programming – Oops Concept of class, object and
instances Constructor, class attributes and destructors Real time use of class in
live projects Inheritance , overlapping and overloading operators Adding and
retrieving dynamic attributes of classes Programming using Oops support.
Session8: Python Regular Expression Powerful pattern matching and searching Power of
pattern searching using regex in python Real time parsing of networking or
system data using regex Password, email, url validation using regular expression
Pattern finding programs using regular expression
Session 9: Python Exception Handling Avoiding code break using exception handling Safe
guarding file operation using exception handling Handling and helping developer
with error code Programming using Exception handling
Session 10:Python Database Interaction SQL Database connection using python Creating and
searching tables Reading and storing config information on database
Programming using database connections
Session 12:Contacting Use r Through Emails Using Python Installing smtp python module
Sending email Reading from file and sending emails to all users addressing them
directly for marketing
Session 13: Python CGI Introduction Writing python program for CGI applications Creating
menus and accessing files. Server client program
Session14:Sample Project
References:
1. Python-(Mark Lutz)
2. Python Training Guide (BPB Publications)
COURSE OUTCOMES:
At the end of the course, the student will be able to:
CO CODE CO STATEMENT COGNITIVE LEVEL
ETCSS306.1 Problem solving and programming capability. Analyze ,Apply
ETCSS306.2 Computation to enhance implements programs in Analyze ,Apply
Python.
49