PES22 Scheme V & VI Sem Syllabus
PES22 Scheme V & VI Sem Syllabus
SYLLABUS
(With effect from 2024-25)
¥ÀoÀåPÀæªÀÄ
(±ÉÊPÀëtÂPÀ ªÀµÀð2024-25)
Bachelor Degree
In
Computer Science &Engineering
V & VI Semester
¸ÀA¸ÉÜ)
Ph : 08232- 220043, Fax : 08232 – 222075,Web : www.pescemandya.org
VISION
“PESCE shall be a leading institution imparting quality Engineering and
Management education developing creative and socially responsible
professionals.”
MISSION
Provide state of the art infrastructure, motivate the faculty to be
proficient in their field of specialization and adopt best teaching-
learning practices.
Impart engineering and managerial skills through competent and
committed faculty using outcome based educational curriculum.
Inculcate professional ethics, leadership qualities and entrepreneurial
skills to meet the societal needs.
Promote research, product development and industry-institution
interaction.
QUALITY POLICY
Highly committed in providing quality, concurrent technical education and
continuously striving to meet expectations of stake holders.
CORE VALUES
Professionalism
Empathy
Synergy
Commitment
Ethics
DM4: Sensitize social, legal, environmental and cultural diversity issues through professional
training and balanced curriculum.
The National Board of Accreditation (NBA) has defined twelve Program Outcomes for Under
Graduate (UG) engineering programs as listed below.
The Under Graduate (UG) of B.E Computer Science & Engineering Program has defined
Program Specific Outcomes (PSO) which are listed below.
PSO-1: Ability to apply problem solving skills in developing solutions through fundamentals
of Computer Science and Engineering.
PSO-2: Ability to apply Analytical Skills in the field of Data Processing Systems.
PSO-3: Ability to design and develop applications through Software Engineering
methodologies and Networking Principles.
Automation
Text Book(s):
1. Software Engineering – Ian Somerville, 10th Edition, ©2016 | Pearson .
2. Earned value Project Management by Quentin W. Fleming PhD MSc and Joel M. Koppelman, fourth Edition 2010, PMI
Reference Book(s):
1. Agile and Iterative Development by Craieg Larman 2003
2. Software Engineering: A Practitioners Approach - Roger S. Pressman, 7th Edition, McGraw-Hill, 2007.
3. Software Engineering Theory and Practice - Shari Lawrence Pfleeger, Joanne M. Atlee, 3rd Edition, Pearson Education,
2006.
4. Software Engineering Principles and Practice – Waman S Jawadekar, Tata McGraw Hill, 2004
5. Software Engineering – Pankaj Jalote, Tata McGraw Hill
Computer Networks
[As per Choice Based Credit System (CBCS) & OBE Scheme]
SEMESTER – V
Course Code: P22CS502 Credits: 03
Teaching Hours/Week (L:T:P): 3:0:0 CIE Marks: 50
Total Number of Teaching Hours: 40 SEE Marks: 50
Course Learning Objectives: This course will enable the students to:
Understand the fundamentals concepts of computer networks.
Familiarize with the standard models for the layered approach to set the communication between machines in a
network using protocols of the various layers.
Get prepare for advanced courses in computer networking.
UNIT – I 8 Hours
Introduction and Physical Layer : Data communication—Networks — Network Types — Protocol Layering — TCP/IP
Protocol suite — OSI Model — Physical Layer: Signals: analog signals, digital signals—Signal impairment—Multiplexing
—Transmission media : guided
Self-study component: Transmission media : unguided
UNIT – II 8 Hours
Data-Link Layer & Media Access : Introduction — Data-Link Control—Media Access Control —Layer Addressing —
Ethernet—Cellular telephony.
Self-study component: Satellite Network ,Connecting devices
UNIT – III 8 Hours
Network Layer : Network Layer Services — Packet switching —Internet protocol version 4: IP addressing, main and
auxiliary protocol, options, ICMPv4 — Next Generation IP (IPV6): IPV6 addressing , IPV6 protocol — Transition from
IPv4 to IPv6—Routing algorithms: —Unicasting routing protocols: RIP,OSPF—Multicasting Protocol: PIM— IGMP
Self-study component: BGP4, Multicasting protocol: DVMRP, MOSPF
UNIT – IV 8 Hours
Transport Layer : Transport Layer services— Transport Layer Protocols — User Datagram Protocol — Transmission
Control Protocol: TCP services, TCP features, Segment, TCP connection, Windows in TCP, Flow control, Error
control ,TCP congestion control— SCTP: Services and features, packet format.
Self-study component: Transport layer services: Connectionless and connection oriented protocols
UNIT – V 8 Hours
Application Layer : Introduction—Client /Server Paradigm—Standard Applications: World Wide Web and HTTP, FTP,
Electronic Mail, Domain Naming Services—Socket interface programming
Self-study component: Network management: Introduction
Course Outcomes: On completion of this course, students are able to:
Bloom’s
CO’s Level Indicator
Taxonomy Level
CO1 Recall the basic concepts of Computer network pertaining to each layer
of TCP/IP reference model.
CO2 Understand the different applicability of protocols in various layers.
CO3 Solve the problem by applying networking techniques for a given
scenario.
Text Book(s):
Behrouz A. Forouzan ”Data Communications and Networking with TCP/IP protocol suite” 6th Edition Published by
McGraw Hill LLC, 2022.
Reference Book(s): - Computer networks ,Andrew S. Tanenbaum, David J. Wetherall. -- 5th ed, Pearson Education, Inc,
2011.
Web and Video link(s):
https://www.youtube.com/watch?v=bR3l1L1oCb0&list=PL9P1J9q3_9fNXTTpJ1TM0gJDdjM9HBGxN
https://www.youtube.com/watch?v=VwN91x5i25g&list=PLBlnK6fEyqRgMCUAG0XRw78UA8qnv6jEx
E-Books/Resources:
https://drive.google.com/file/d/1BXjlY59ka2gYkxGLVPnSmH8Ew0IBqBLi/view?usp=drive_link
UNIT – I 8 Hours
Introduction to operating systems, System structures: What operating systems do; Computer System organization; Operating
System operations.
Operating System Structures: Operating System Services, System calls; Types of system calls; System programs; Operating
System structure
Process Management:
Process: Process concept; Process scheduling; Operations on processes; Inter process communication
Self-study component: Operating System Debugging; Operating System generation.
Practical topics: (4Hours) 1. Write a program to read data from the standard input device and write it on the
screen(using read()/write() system calls)
2. Write a program to print 10 characters starting from the 10th character from a
file(lseek() system call)
3. Write a program to implement IPC using shared memory
UNIT – II 8 Hours
Threads: Overview; Multithreading models; Thread Libraries; Threading issues
Process Synchronization: Background, The critical section problem; Peterson’s solution; Semaphores; Classical problems of
synchronization; Monitors.
Self-study component: Implicit threading, Synchronization hardware, mutex locks
Practical Topics: ( 6 Hours) 1. Implement the Producer & consumer Problem (Semaphore)
2. Implement the solution to dining philosopher’s problem using monitors.
UNIT – III 8 Hours
CPU Scheduling: Basic concepts; Scheduling Criteria; Scheduling Algorithms; Multiple-processor scheduling;
Deadlocks: System model; Deadlock characterization; Methods for handling deadlocks; Deadlock prevention; Deadlock
avoidance; Deadlock detection.
Self-study component: Thread scheduling, Recovery from deadlock
Practical Topics: (6Hours) 1. Implement the following Memory Allocation Methods for fixed partition
a) First Fit b) Worst Fit
2.Implement the following Page Replacement Algorithms
a) FIFO b) LRU
UNIT – V 8 Hours
Storage Management:
Mass storage structures: Overview of mass storage structure, Disk structure; Disk scheduling;
File System Interface: File concept; Access methods; Directory structure
File System Implementation: File system structure; Directory implementation; Allocation methods;
Self-study component: Disk Attachment , RAID structure, File system implementation;
Practical Topics: (4Hours)
1.Implement the following Disk Scheduling Algorithms:
a) SSTF Scheduling b) SCAN Scheduling
2.Implement the following File Allocation Strategies
a) Sequential b) Indexed
Course Outcomes: On completion of this course, students are able to:
Bloom’s
Level
CO’s Course Outcomes with Action verbs for the Course topics Taxonomy
Indicator
Level
CO1 Explain the structure of operating system and its various operations. Understand L2
CO2 Apply different techniques for management of resources. Apply L3
CO3 Implement various algorithm related to operating system concepts. Apply L3
Text Book(s):
1. Operating System Concepts, Abraham Silberschatz, Peter Baer Galvin, Greg Gagne ,9 th Edition, Wiley-India-2013
Reference Book(s):
1. Operating Systems: A Concept Based Approach – D.M Dhamdhere, 2nd Edition, Tata McGraw- Hill, 2017.
2. Operating systems internals and design principles 7th edition, , PHI, 2012
Web and Video links:
1. https://nesoacademy.org/cs/03-operating-system
2. https://archive.nptel.ac.in/courses/106/105/106105214/
Cyber Security
[As per Choice Based Credit System (CBCS) & OBE Scheme]
SEMESTER – V
Course Code: P22CS505 Credits: 03
Teaching Hours/Week (L:T:P): 3:0:0 CIE Marks: 50
Total Number of Teaching Hours: 40 SEE Marks: 50
Course Learning Objectives: This course will enable the students to:
To understand Cyber offenses and various attacks
To gain knowledge on tools and methods used in cybercrimes
To understand computer forensics and forensics for handheld devices
UNIT – I 8 Hours
Introduction to Cybercrime: Introduction, Cybercrime and information security, who are Cyber criminals? Classification
of Cybercrimes, Cybercrime – The Legal Perspectives and Indian Perspective.
Self-study component: Case Study : Cybercrimes - Banking frauds, Email-phishing
UNIT – II 8 Hours
Cyber Offenses: How Criminals Plan Them: Introduction, Categories of Cybercrime, how criminals plan the attack,
classification of social engineering, Cyber stalking, Cybercafé and Cybercrimes.
Self-study component: Botnet – The fuel of cybercrimes
UNIT – III 8 Hours
Tools and Methods used in Cybercrime: Introduction, Proxy servers and anonymizers, Phishing, Password cracking, Key
loggers and Spywares, virus and worms, Trojan horses and backdoors, SQL injection
Self-study component: DoS and DDoS attacks
UNIT – IV 8 Hours
Cyber Forensics: Introduction, historical background of Cyber forensics, digital forensic science, the need for computer
forensics, cyber forensics and digital evidence, digital forensics life cycle, chain of custody concept, Approaching a
computer forensics investigation, Relevance of the OSI 7 Layer model to computer forensics.
Self-study component: Setting up a computer forensics laboratory: understanding the requirements
UNIT – V 8 Hours
Forensics of Handheld Devices: Introduction, handheld devices and digital forensics, Toolkits for Hand-held device
forensics, Mobile phone evidence guidelines, organizational guidelines on cell phone forensics.
Self-study component: An Illustration on real life use of forensics
Course Outcomes: On completion of this course, students are able to:
Bloom’s Taxonomy
COs Course Outcomes with Action verbs for the Course topics Level Indicator
Level
Bloom’s Taxonomy
COs Course Outcomes with Action verbs for the Course topics Level Indicator
Level
CO1 Understand the basics of system software and phases of compiler Understanding L2
Text Book(s):
1. Compilers- Principles, Techniques and Tools, Alfred V Aho, Monica S.Lam, Ravi Sethi, Jeffrey D Ullman, Pearson Education,
2nd Edition 2007.
2. System Programming and Operating Systems, D M Dhamdhere , Mcgraw Hill. 2nd Revised Edition.
Reference Book(s):
1. Compiler Construction Principles & Practice, Kenneth C Louden, Thomson Education, 1997.
2. Modern Compiler Implementation in C, Andrew W Appel, First Edition, Cambridge University Press, 2010
UNIT – I 8 Hours
Computer Graphics Hardware: Video Display Devices: , Raster-Scan Systems, Computer Graphics Software: Coordinate
Representations, Graphics Functions, Software Standards, Introduction To OpenGL, Graphics Output Primitives: Coordinate
Reference Frames, Specifying A Two Dimensional World-Coordinate Reference Frame In OpenGL, OpenGL Point Functions,
OpenGL Line Functions, Opengl Curve Functions, Fill Area Primitives, OpenGL Polygon Fill Area Functions, OpenGL Vertex
Arrays, OpenGL Pixel-Array Functions, Character Primitives, OpenGL Character Functions, OpenGL Display Lists, OpenGL
Display-Window Reshape Function.
Self-Study Content: Input Devices, Hardcopy devices, Polygon Fill Areas.
UNIT – II 8 Hours
Attributes of Graphics Primitives: OpenGL State Variables, Color and Gray Scale, OpenGL Color Functions, Point
Attributes, OpenGL Point-Attribute Functions, Line Attributes, OpenGL Line-Attribute Functions, Curve Attributes, Fill Area
Attributes, OpenGL Fill-Area Attribute Functions, Open-GL Antialiasing Functions, OpenGL Query Functions.
Implementation Algorithms for Graphics Primitives and Attributes: Line Drawing Algorithms, Circle Generating
Algorithms, General Scan-Line Polygon-Fill Algorithm
Self-Study Content: OpenGL Character Attribute Functions, Fill Methods for Areas with Irregular Boundaries.
UNIT – III 8 Hours
Two Dimensional Transformations: Basic Two-Dimensional Geometric Transformations, Matrix Representations and
Homogeneous Coordinates, Inverse Transformations, Two Dimensional Composite Transformations, Other Two Dimensional
Transformations, Transformations Between Two Dimensional Coordinate System, OpenGL Functions for Two-Dimensional
Geometric Transformations.
Three Dimensional Geometric Transformations: Three-Dimensional Translation, Three-Dimensional Rotation, Three-
Dimensional Scaling, Composite Three-Dimensional Transformations, Other Three-Dimensional Transformations, Affine
Transformations, OpenGL Geometric-Transformation Functions.
Self-Study Content: Raster Methods for Geometric Transformations, OpenGL Raster Transformations.
UNIT – IV 8 Hours
Two-Dimensional Viewing: The Two-Dimensional Viewing Pipeline, The Clipping Window, Normalization and Viewport,
OpenGL Two-Dimensional Viewing Functions, Clipping Algorithms, Two-Dimensional Point Clipping, Two-Dimensional Line
Clipping (Cohen-Sutherland Line Clipping and Liang-Barsky Line Clipping), Polygon Fill-Area Clipping (Sutherland-
Hodgeman Polygon Clipping), Text Clipping.
Self-Study Content: Curve Clipping, Weiler-Atherson Polygon Clipping.
UNIT – IV 8 Hours
Three-Dimensional Viewing: Transformation from World to Viewing Coordinates, Projection Transformations, Orthogonal
Projections, Perspective Projections, OpenGL Three-Dimensional Viewing Functions.
Illumination Models and Surface Rendering Methods: Light Sources, Surface Lighting Effects, Basic Illumination Models
Self-Study Content: Transparent Surfaces, OpenGL Illumination and Surface Rendering Functions.
Course Outcomes: At the end of the course students should be able to : Expected Bloom’s Level
CO1 Understand graphics hardware and OpenGL Graphics primitive attributes L2
CO2 Apply algorithms for graphics Primitives and attributes L3
CO3 Apply various Algorithms of Transformations/Clipping/Viewing on different type of L3
objects
CO4 Design computer graphics programs using OpenGL L4
Textbooks:
Computer Graphics with OpenGL - Donald Hearn & M Pauline Baker, 2014 , 4th Edition, Pearson Publisher
Reference Books:
1. Computer Graphics using OpenGL - FS Hill & Stephen M Kelley, 2009 , 3rd Edition , Pearson Education.
2. Interactive Computer Graphics – A Top-down Approach using Opengl - Edward Angel , 2012, 6th Edition, Pearson
Education.
Web links and Video Lectures ( e-resources) :
1. https://www.youtube.com/watch?v=lTN7bDyHrfE
2. https://www.youtube.com/watch?v=XYWjnRV3ty8
UNIT – I 8 Hours
Introduction to Cloud Infrastructure: Cloud computing, Cloud computing delivery models and services, Ethical issues, Cloud
vulnerabilities, Major Challenges Faced by Cloud Computing, Cloud computing at Amazon, Cloud computing the Google
perspective, Microsoft Windows Azure and online services, Open source software platforms for private clouds, Cloud storage
diversity and vendor lock-in, Energy use and ecological impact, Service level agreements, User experience and software licensing.
Self-study component: Comparative analysis on Services provided by AWS AND GCP
UNIT – II 8 Hours
Cloud Computing: Application Paradigms and Concepts : Challenges of cloud computing, Architectural styles of cloud
computing, Workflows: Coordination of multiple activities, Coordination based on a state machine model: The Zookeeper, The
Map Reduce programming model, A case study: The Grep The Web application. Cloud Resource Virtualization-Virtualization,
Layering and virtualization, Virtual machine monitors, Virtual Machines, Performance and Security Isolation, Full virtualization
and Para virtualization, Hardware support for virtualization.
Self-study component: Virtualization in AWS and Microsoft Azure
UNIT – III 8 Hours
Resource Management and Scheduling : Policies and mechanisms for resource management, Application of control theory to
task scheduling on a cloud, Stability of a two level resource allocation architecture, Feedback control based on dynamic
thresholds, Coordination of specialized autonomic performance managers, A utility-based model for cloud-based Web services,
Resourcing bundling: Combinatorial auctions for cloud resources, Scheduling algorithms for computing clouds, Fair queuing,
Start-time fair queuing, Borrowed virtual time, Cloud scheduling subject to deadlines, Scheduling Map Reduce applications
Bloom’s Taxonomy
COs Course Outcomes with Action verbs for the Course topics Level Indicator
Level
Artificial intelligence
(Professional Elective Effect from the academic year 2024-2025)
SEMESTER - V
Course Code: P22CS5034 Credits: 03
Teaching Hours/Week (L:T:P): 3:0:0 CIE Marks: 50
Total Number of Teaching 40 SEE Marks: 50
Hours:
Course Learning Objectives:
Gain a historical perspective of AI and its foundations.
Become familiar with basic principles of AI toward problem solving.
Get to know approaches of inference, perception, Uncertain Knowledge and Reasoning
UNIT – I 8 Hours
Introduction - The Foundations of Artificial Intelligence, The History of Artificial Intelligence.
Intelligent Agents - Agents and Environments, Good Behaviour: The Concept of Rationality, The Nature of
Environments, The Structure of Agents.
Self-study component: AI - State of the Art
UNIT – II 8 Hours
Solving Problems by Searching - Problem-Solving Agents, Searching for Solutions, Uninformed Search
Strategies, Informed (Heuristic) Search Strategies, Heuristic Functions
Self-study component: Problem‐solving agents - Example problems
UNIT – III 8 Hours
Beyond Classical Search - Local Search Algorithms and Optimization Problems, Example problems, Searching
with Nondeterministic Actions, Searching with Partial Observations.
Self-study component: Learning in online search.
UNIT – IV 8 Hours
Adversarial Search – Games, Optimal Decisions in Games, Alpha–Beta Pruning, Stochastic Games.
Logical Agents - Knowledge-Based Agents, The Wumpus World, Logic, Propositional Logic: A Very Simple
Logic, Propositional Theorem Proving.
Self-study component: State-of-the-Art Game Programs.
UNIT – V 8 Hours
First-Order Logic - Representation, Syntax and Semantics of First-Order Logic, Using First-Order Logic.
Inference in First-Order Logic - Propositional vs. First-Order Inference, Unification and Lifting, Forward
Chaining, Backward Chaining, Resolution.
Self-study component: Knowledge Engineering in First-Order Logic
Level
COs Course Outcomes with Action verb for the Course topics Bloom’s Level
Indicator
CO1 Apply knowledge of agent architecture and searching for different Apply L3
applications.
CO2 Analyze Searching and Inferencing Techniques. Analyze L4
CO3 Develop knowledge base sentences using propositional logic and Develop L5
first order logic
Text Book(s):
1. Stuart J. Russell and Peter Norvig , Artificial Intelligence, 3rd Edition, Pearson,2015
Reference Book(s):
1. Elaine Rich, Kevin Knight, Artificial Intelligence, 3rd edition, Tata McGraw Hill,2013
2. George F Lugar, Artificial Intelligence Structure and strategies for complex, Pearson Education, 5th
Edition, 2011
Web and Video link(s):
1. https://www.kdnuggets.com/2019/11/10-free-must-read-books-ai.html
2. https://www.udacity.com/course/knowledge-based-ai-cognitive-systems--ud409
3. https://nptel.ac.in/courses/106/105/106105077/
1. Write a program to implement error detection/ error correction using hamming code.
2. Write a program to show working of the Stop and wait protocol.
3. Implementation of CSMA/CD.
4. Write a program to implement Distance Vector Routing algorithm.
5. Write program to create a least cost tree using Link State Routing algorithm.
Course Outcomes: On completion of this course, students are able to: Bloom’s Level
Cos Course Outcomes with Action verbs for the Course topics
CO1 Understand the working of various networking components in the simulation environment. L1
CO2 Analyse the working principle of the protocols in the TCP/IP protocol suite. L2
Data Analytics
[As per Choice Based Credit System (CBCS) & OBE Scheme]
SEMESTER – VI
Course Code: P22CS601 Credits: 03
Teaching Hours/Week (L:T:P): 3:0:0 CIE Marks: 50
Total Number of Teaching Hours: 40 Hours SEE Marks: 50
Course Learning Objectives: This course will enable the students to:
Apply quantitative modeling and data analysis techniques to draw conclusion regarding the dataset.
Employ predictive modeling techniques.
Identify, assess, and select appropriate data analytics methods and models for solving a particular real-world
problem, weighing their advantages and disadvantages.
UNIT – I 8 Hours
Introduction to Data Science: Data Analysis Life Cycle Overview. Data analysis Discovery, Framing Problem,
Developing Initial Hypothesis, Sources of Data, Process for Making Sense of Data, Data Preparation, Performing ETLT,
Data Conditioning, Survey and Visualize, Common tools for Data Preparation Phase, Data Exploration and Variable
Selection, Common tools for the Model Planning and Building Phase, Communicate Results, Operationalize.
Self-study component: The KDD Process, The CRISP-DM Methodology.
UNIT – II 8 Hours
Descriptive Statistics: Scale Types, Descriptive Univariate Analysis, Descriptive bivariate Analysis.
Multivariate Analysis: Multivariate Frequencies, Multivariate Data Visualization, Multivariate Statistics.
Statistical Methods for Evaluation: Hypothesis Testing, Difference of Means, Wilcoxon Rank-Sum Test, Type I and Type
II Errors, Power and Sample Size, ANOVA.
Self-study component: Visualization Before Analysis, Dirty Data, Visualizing a Single Variable, Examining
Multiple Variables, Data Exploration Versus Presentation.
Data Quality and Pre-processing: Data Quality, Missing Values, Redundant Data, Inconsistent Data, Noisy Data Outliers,
Converting to a Different Scale Type, Converting to a Different Scale, Data Transformation, Dimensionality Reduction:
Attribute Aggregation: Principal Component Analysis. Attribute selection: filters, wrappers.
Self-study component: Introduction to R, Exploratory Data Analysis.
UNIT – IV 8 Hours
Clustering : Distance Measures, Difference between Values of Common Attribute Types, Distance Measures for Objects
with Quantitative Attributes, Distance Measures for Non-conventional Attributes, Clustering Validation, Clustering
Techniques, K-means, Centroids and Distance Measures, How K-means Works, Density-based spatial clustering of
applications with noise (DBSCAN ).
Frequent Pattern Mining: Frequent Item sets, Setting the min_sup Threshold, Apriori – a Join-based Method, Eclat, FP-
Growth, Maximal and Closed Frequent Item sets, Association Rules.
Self-study component: Agglomerative Hierarchical Clustering Technique.
UNIT – V 8 Hours
Regression: Predictive Performance Estimation, Generalization, Model Validation, Predictive Performance Measures for
Regression, Finding the Parameters of the Model, Linear Regression.
Classification : Binary Classification , Predictive Performance Measures for Classification, Distance-based Learning
Algorithms ,K-nearest Neighbor Algorithms, Case-based Reasoning, Logistic Regression Algorithm, Naive Bayes
Algorithm.
Self-study component: Search-based Algorithms, Decision Tree Induction Algorithms, Decision Trees for
Regression.
Course Outcomes: On completion of this course, students are able to:
CO’s Course Outcomes with Action verbs for the Course topics Bloom’s Taxonomy Level Indicator
Level
CO3 Apply data pre processing methods on raw data set. Apply L3
UNIT – II 8 Hours
Pipelining: Basic and Intermediate Concepts : Introduction, How is pipelining implemented, The major hurdle of Pipeling –
pipeline hazards, Data Hazards, Branch Hazards, Reducing the Cost of Branches Through Prediction, Static Branch Prediction.
Self-study component: Extending the RISC V Integer pipeline to handle Multicycle operations.
Practical Topics: 1. Write a OpenMp program to illustrate
a) Data hazard b) Eliminating data hazard
2. Write a OpenMp program to illustrate data dependency.
Bloom’s
COs Course Outcomes with Action verbs for the Course topics Level Indicator
Taxonomy Level
1. John L. Hennessy and David A. Patterson : Computer Architecture, A quantitative approach, Sixth Edition, Morgan
Kaufmann Publishers, Elsevier 2019
2. Multicore Programming, Increased Performance through Software Multi-threading by Shameem Akhter and Jason Roberts ,
Intel Press , 2006
Reference Book(s):
1. Kai Hwang & Naresh Jotwani,” Advanced Computer Architecture”, Parallelism, scalability, Programmability 3rd edition
McGraw Hill 2017.
2. John P Hayes, Computer Architecture & Organization 3rd Ed. McGraw Hill 2017.
3. Thomas Rauber and Gudula Runger Parallel Programming for Multicore and cluster systems, Springer International Edition,
2009.
Web and Video link(s):
1. https://people.math.sc.edu/Burkardt/c_src/openmp/openmp.html
2. https://www.openmp.org/wp-content/uploads/openmp-examples-4.5.0.pdf
3. https://www.youtube.com/results?search_query=openmp+parallel+programming
E-Books/Resources:
1. http://archive.nitjsr.ac.in/course_assignment/CS01CS6021.BookwithcommentComputerarchitecture
AQuantitativeApproachbyJohnL.HennesseyandDavidA.Patterson,6thEdition.pdf
2. https://dl.acm.org/doi/book/10.5555/2821564
3. http://grsotudeh.ir/pardazeshmovazi/%DA%A9%D8%AA%D8%A7%D8%A8%D9%87%D8%A7%DB%8C%20%D9%BE%D8%B1%D8%AF
%D8%A7%D8%B2%D8%B4%20%D9%85%D9%88%D8%A7%D8%B2%DB%8C/Multi-Core_Programming_Digital_Edition_(06-29-06).pdf
Bit Coin : Introduction – Transactions – Structure - Transactions types – The structure of a block– The genesis block – The
bitcoin network– Wallets and its types– Bitcoin payments– Bitcoin investment and buying and selling bitcoins – Bitcoin
installation – Bitcoin programming and the command-line interface.
Self-study component: Bitcoin installation – Bitcoin programming and the command-line interface
UNIT- IV 8 Hours
Ethereum: Ethereum block chain- Elements of the Ethereum block chain– Precompiled contracts –Accounts and its types –
Block header- Ether – Messages – Mining - Clients and wallets – Trading and investment – The yellow paper - The
Ethereum network - Applications developed on Ethereum – Scalability and security issues.
Self-study component: Scalability and security issues of Ethereum
UNIT- V 8 Hours
Smart Contract and Hyper ledger: History of Smart Contract – Ricardian contracts - The DAO. Hyper ledger projects –
Hyperledger as a protocol – Fabric - Hyperledger Fabric - Sawtooth lake – Corda Architecture.
Self-study component: Corda Architecture
Course Outcomes: On completion of this course, students are able to:
COs Course Outcomes with Action verbs for the Course topics Bloom’s Taxonomy Level Indicator
Level
CO1 Student will be able to to understand the fundamentals of blockchain Understanding L2
technology.
CO2 To use the working of an immutable distributed ledger and trust model that Understanding L2
defines blockchain.
CO3 To illustrate the essential components of a blockchain platform. Understanding L2
CO4 Apply knowledge of implementations of Bitcoin, Ethereum and Understanding L2
Hyperledger to develop solutions in the appropriate domains.
Textbooks:
1. Bashir, Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts explained, 2nd
Edition, 2nd Revised edition edition. Birmingham: Packt Publishing, 2018.
Reference Books:
1. A. M. Antonopoulos, Mastering bitcoin, First edition. Sebastopol CA: O‘Reilly,2015.
2. Z. Zheng, S. Xie, H. Dai, X. Chen, andH. Wang, ―An Overviewof Blockchain Technology Architecture,Consensus,
and Future Trends,‖ in 2017 IEEE International Congress on Big Data (BigData Congress), 2017.
Web and Video link(s):
1. https://www.coursera.org/specializations/blockchain .
2. https://nptel.ac.in/courses/106105184/
3.Introduction to Blockchain Technology and Application
4. https://swayam.gov.in/nd1_noc20_cs01/preview
Network Management
[As per Choice Based Credit System (CBCS) & OBE Scheme]
SEMESTER – VI
Course Code: P22CS6022 Credits: 03
Teaching Hours/Week (L:T:P): 3:0:0 CIE Marks: 50
Total Number of Teaching Hours: 40 SEE Marks: 50
Course Learning Objectives: This course will enable the students to:
Understand the principles of network management
Understand different standards and protocols used in managing networks
Understanding the Automation of network management
Understand remote monitoring of network statistics for Ethernet networks.
UNIT – I 8 Hours
Introduction: Common Network Problems, Challenges of Information Technology Managers, Network Management: Goals,
Organization and Functions: Goal of Network Management, Network Provisioning, Network Operations and NOC. Network
Management, Architecture and Organization. Network Management Perspectives, Service Management Perspectives
Basic Foundations: Network Management Standards, Network Management Models, Organization Model, Information Model
– Management Information Trees, Managed Object Perspective. Communication Model; ASN.1-(Abstract syntax notation)
Terminology, Symbols, and Conventions, Objects and Data Types, Object Names. Functional Models
SNMPv1 Network Management: Managed Network: The History of SNMP Management, Internet Organizations and
standards, Internet Documents, The SNMP Model, The Organization Model, System Overview. The Information Model –
Introduction, The Structure of Management Information Management Information Base (MIB)- Object group, System group, IP
group and TCP group.
SNMP Communication Model – The SNMP Architecture, Administrative Model, SNMP Protocol specification, SNMP
operation- PDU operations, SNMP MIB groups, Functional Models.
SNMP Management–RMON: Remote Monitoring, RMON SMI and MIB, RMONI1- RMON1 Textual Conventions, RMON1
Groups and Functions, Relationship Between Control and Data Tables, RMON1 Common and Ethernet Groups, RMON Token
Ring Extension Groups.
Network Management Applications: Configuration Management- Network Provisioning, Inventory Management, Network
Topology, Fault Management- Fault Detection, Fault Location and Isolation Techniques, Performance Management –
Performance Metrics, Data Monitoring, Problem Isolation, Performance Statistics; Security Management – Policies and
Procedures, Resources to prevent Security Breaches, Firewalls, Cryptography, Authentication and Authorization, Client/Server
Authentication Systems.
Self-study component: Event correlation Techniques: Rule based and Model based
Course Outcomes: On completion of this course, students are able to:
COs Course Outcomes with Action verbs for the Course topics Bloom’s Taxonomy Level Indicator
Level
CO1 Enumerate the applications of NM and challenges pertaining to
Remember L1
security management of an IT Manager
CO2 Articulate network management standards and models Remember L1
CO3 Develop insight knowledge about SNMP network management Understand L2
CO4 Identify various network management applications to monitor a network Apply L3
Text Book(s):
Mani Subramanian: Network Management- Principles and Practice, 2nd Pearson Education, 2010.
edition.pdf
Reference Book(s):
J. Richard Burke: Network management Concepts and Practices: Hands-On Approach, PHI, 2008.
Web and Video link(s):
https://www.youtube.com/watch?v=liBB_Q7Go5k
https://www.youtube.com/watch?v=FmKbxjUZhmk&t=10s
https://www.youtube.com/watch?v=J_Z1BsfB1gM
https://www.youtube.com/watch?v=Lq7j-QipNrI&t=36s
https://www.youtube.com/watch?v=o6rtuFcYofo
E-Books/Resources:
Network Management Fundamentals, Alexander Clemm, Cisco Press, 1st Edition.
UNIT – II 8 Hours
Enterprise Applications; Architecture Considerations, Solution Architecture for enterprise application, Software platforms for
enterprise Applications; Package Application Platforms, Enterprise Application Platforms, Service-oriented-Enterprise
Applications; Considerations for Service-Oriented Enterprise Applications, Patterns for SOA, Pattern-Based Architecture for
Service-Oriented Enterprise Application(java reference model only).Composite Applications.
Self-study component: SOA programming models
UNIT – III 8 Hours
SOA ANALYSIS AND DESIGN: Need For Models, Principles of Service Design, Design of Activity Services, Design of Data
services, Design of Client services and Design of business process services, Technologies of SOA; Technologies For Service
Enablement, Technologies For Service Integration.
Self-study component: Technologies for Service orchestration
UNIT – IV 8 Hours
Business case for SOA: Stakeholder OBJECTIVES, Benefits of SOA, Cost Savings, Return on Investment, SOA
Governance, Security and implementation; SOA Governance, SOA Security, approach for enterprise wide SOA implementation,
Trends in SOA; Technologies in Relation to SOA.
Self-study component: Advances in SOA
UNIT – V 8 Hours
SOA Technologies-PoC; Loan Management System(LMS), PoC-Requirements Architectures of LMS SOA based integration;
integrating existing application, SOA best practices, Basic SOA using REST.
Self-study component: Role of WSDL,SOAP and JAVA/XML Mapping in SOA
Course Outcomes: On completion of this course, students are able to:
COs Course Outcomes with Action verbs for the Course topics Bloom’s Taxonomy Level Indicator
Level
CO1 Explore the different IT architectures Remember L1
CO2 Elaborate SOA based applications. Understanding L2
CO3 Asses web service and realization of SOA Understanding L2
CO4 Derive restful services Applying L3
CO5 Understand SOA Technologies-PoC Understanding L2
Text Book(s):
1. Shankar Kambhampaly, “Service–Oriented Architecture for Enterprise Applications”,Wiley Second Edition, 2014.
2. Mark D. Hansen, “SOA using Java Web Services”, Practice Hall, 2007
Reference Book(s):
1. WaseemRoshen, “SOA-Based Enterprise Integration”, Tata McGraw-HILL, 2009, 2004
Software Testing
[As per Choice Based Credit System (CBCS) & OBE Scheme]
SEMESTER – VI
Course Code: P22CS6024 Credits: 04
Teaching Hours/Week (L:T:P): 3:0:0 CIE Marks: 50
Total Number of Teaching Hours: 40 SEE Marks: 50
Course Learning Objectives: This course will enable the students to:
Differentiate the various testing techniques
Analyze the problem and derive suitable test cases.
Apply suitable technique for designing of flow graph and tool support for model-based testing.
UNIT – I 8 Hours
Basics of Software Testing and Examples: Basic definitions, Test cases, Insights from a Venn diagram, Identifying test cases,
Error and fault taxonomies, Levels of testing. Examples: Generalized pseudo code, the triangle problem, The Next Date function,
The commission problem.
Self-study component: Currency converter.
UNIT – II 8 Hours
Software Testing, Decision Table-Based Testing: SATM problem, Decision tables, Test cases for the triangle problem, Test
cases for the Next Date function. Data Flow Testing: Definition-Use testing, Slice-based testing. Levels of Testing: Traditional
view of testing levels, Alternative life-cycle models.
Self-study component: The SATM system, separating integration and system testing, case study.
UNIT – III 8 Hours
System Testing: Threads, Basic concepts for requirements specification, Finding threads, Structural strategies and functional
strategies for thread testing, SATM test threads, System testing guidelines. Interaction Testing: Context of interaction, taxonomy
of interactions, Client/Server Testing.
Self-study component: Interaction, composition, and determinism
UNIT – IV 8 Hours
Object-Oriented Integration Testing: UML support for integration testing, MM-paths for object-oriented software, A
framework for object-oriented dataflow integration testing.GUI Testing: The currency conversion program, Unit testing,
Integration Testing and System testing for the currency conversion program. Object-Oriented System Testing: Currency
converter UML description, UML-based system testing.
Self-study component: State chart-based system testing.
UNIT – V 8 Hours
Exploratory Testing: The context-driven school, Exploring exploratory testing, Exploring a familiar example, Exploratory and
context-driven testing observations. Model-Based Testing: Testing based on models, Appropriate models, Use case-based testing,
Commercial tool support for model-based testing. Test-Driven Development: Test-then-code cycles, Automated test execution,
Java and JUnit example, Pros, cons, and open questions of TDD.
Self-study component: Retrospective on MDD versus TDD.
Course Outcomes: On completion of this course, students are able to:
Bloom’s
COs Course Outcomes with Action verbs for the Course topics Level Indicator
Taxonomy Level
1. Paul C. Jorgensen: Software Testing, A Craftsman’s Approach, 4rd Edition, Auerbach Publications, 2014.
Reference Book(s):
2. Mauro Pezze, Michal Young: Software Testing and Analysis – Process, Principles and Techniques, John Wiley & Sons, 2008.
and model management, DSS Knowledge base, User interfaces. The DSS user, Categories and classes of DSSs.
Decisions and Decision makers: who are they, Decision styles, why are decision so hard? , A Typology of decisions.
Self-study component: Decision effectiveness, How can a DSS help?
UNIT – II 8 Hours
Decisions and Decision makers (contd.): Decision theory and Simon’s model of problem solving Decisions in the
organization, Bounded decision making, The process of choice, Cognitive processes, Biases and heuristics in decision
making.
Decisions in the organization: Understanding the organization, Organizational culture, Power and politics, supporting
organizational decision making.
Self-study component: Rational decision making, Effectiveness and efficiency.
Reference Book(s):
Decision support system- George M. Marakas , 2nd Edition, Pearson publisher, 2015.
Fundamentals of DevOp’s
[As per Choice Based Credit System (CBCS) & OBE Scheme]
SEMESTER – VI
Course Code: P22CS6032 Credits: 03
Teaching Hours/Week (L:T:P): 3:0:0 CIE Marks: 50
Total Number of Teaching Hours: 40 SEE Marks: 50
Course Learning Objectives: This course will enable the students to:
The objective of the course is to acquaint students with the principles and philosophies of DevOps and to explain the
foundational material for DevOps.
It also introduces students to basic DevOps tools used in the industry for DevOps Engineering.
Students will have a hands-on experience of building a CI/CD pipeline for continuous Integration, continuous delivery
from start to finish.
It also introduces students to Docker and its details.
Containerized Applications with Kubernetes : Managing Containers Effectively with Kubernetes, Technical requirements,
Installing Kubernetes, Kubernetes architecture overview, Installing Kubernetes on a local machine, Installing the Kubernetes
dashboard, First example of Kubernetes application deployment, Using HELM as a package manager, Using Azure Kubernetes
service, Configuring kubectl for Azure Kubernetes services Advantages of Azure Kubernetes Service, Creating a CI/CD pipeline
for Kuberrnetes with Azure Pipelines, The build and push of the image in the Decker Hub , Automatic deployment of the
application in Kubermetes
Self-study component: Practically implement the above concepts
Course Outcomes: On completion of this course, students are able to:
Bloom’s Level
COs Course Outcomes wit Action verbs for the Course topics
Taxonomy Level Indicator
CO1 Apply various Concepts and Principles used in the topics to understand the
Remember L1
theory related to DevOps.
CO2 Discuss the fundamental Definitions of DevOps &Github relevant to Software
Understanding L2
development and deployment.
CO3 Assess the CI/CD problems by applying proper solutions to verify the
Understanding L2
theoretical concepts.
CO4 Understand the various Properties and Applications pertaining to Dockers. Applying L3
CO5 Understand the various Properties and Applications pertaining to Kubernetes. Applying L3
Text Book(s):
1. Mikel Krief: Learning DevOps, Published by Packt Publishing Ltd, October 2019.
2. Mitesh Soni: DevOps Bootcamp, Published by Packt Publishing Ltd, May 2017.
Reference Book(s):
1. Michael Duffy: DevOps Automation Cookbook,Published by Packt Publishing Ltd, Nov 2015.
2. Jennifer Davis: Effective DevOps,Published by O’Reilly Media,in. June 2016
3. David Gonzalez: implementing Modern DevOps,Published by Packt Publishing Ltd,Oct 2017
Web and Video link(s):
1. https://learn.microsoft.com/en-us/azure/devops
2. https://www.guvi.in/devops
3. https://www.youtube.com/watch?v=hQcFE0RD0cQ
UNIT- I 8 Hours
The UNIX architecture and command usage: UNIX Architecture, Features of UNIX, POSIX and Single UNIX specification.
Locating commands, internal and external commands, understanding the man documentation, Basic Unix commands: cal, date,
echo, printf, bc, script, email basics, mailx, passwd, who, uname, tty, stty.
The File system: The File, What’s in a (File)name?, The Parent-Child Relationship, The HOME variable, pwd, cd, mkdir,
rmdir, Absolute Pathnames, Relative Pathnames, ls, The UNIX File System, File related commands – cat, cp, rm, mv, more, file,
wc, od, cmp, comm, diff, gzip, gunzip, tar, zip, unzip, ls, chmod commands.
Self-Study Content: Pattern matching, escaping and quoting, redirection, /dev/null and /dev/tty, tee
UNIT- II 8 Hours
The vi Editor: vi basics, input mode, ex mode, navigation, editing text.
Simple Filters: The sample database, pr, head, tail, cut, paste, sort, An example: displaying a word count list
Filters using Regular Expressions: grep, BRE introduction, ERE and egrep, sed
Self-Study Content: Undoing last editing instructions, repeating last command, searching for a pattern
UNIT- III 8 Hours
Essential Shell programming:
Shell Scripts, read, exit and exit status of command, the logical operators && and || - conditional execution, the if conditional,
using test and [ ] to evaluate expressions, the case conditional, expr, $0, while, for, set and shift, the here document(<<) ,trap,
debugging shell scripts with set –x
UNIX File APIs:
General File APIs, File and Record Locking, Directory File APIs, Device File APIs, FIFO File APIs, Symbolic Link File APIs
Self-Study Content: uniq, tr, using command line arguments
UNIT- IV 8 Hours
Process environment: Introduction, main function, Process Termination, Command-Line Arguments, Environment List,
Memory Layout of a C Program, Shared Libraries, Memory Allocation, Environment Variables, setjmp and longjmp Functions,
getrlimit, setrlimit Functions, UNIX Kernel Support for Processes.
Process Control: Introduction, Process Identifiers, fork, vfork, exit, wait, waitpid, wait3, wait4 Functions, Race Conditions,
exec Functions
Self-Study Content: changing user IDs and Group IDs, process scheduling, process times
UNIT- V 8 Hours
Signals: Introduction, signals function, unreliable signals, interrupted system calls, kill, raise, alarm, pause, signal sets , abort,
system and sleep functions.
Interprocess Communication: Pipes, popen and pclose Functions, Co-processes, FIFOs, XSI IPC, Message Queues,
Semaphores. shared memory, client server properties
Self-Study Content: Job control signals, signal names and numbers, POSIX Semaphores
Course Outcomes: At the end of the course students should be able to : Expected Bloom’s Level
CO1: Understand Unix Architecture, File system and use of Basic Commands L2
CO2: Select commands related to Shell basics, vi editor and regular expression commands. L2
CO3: Apply UNIX / LINUX commands for process control , Signal and IPC
L3
CO4: Analyze the given commands & shell programs, to identify the errors
and generate the desired outputs L4
Textbooks:
1. Unix Concepts and Applications - Sumitabha Das, 4thEdition (Latest) , Tata McGraw Hill Publisher.
2. Advanced Programming in the UNIX Environment - W. Richard Stevens , 3 rd Edition, 2016 ,
Pearson Publisher.
3. Unix System Programming Using C++ - Terrence Chan, 2015 , PHI Publisher.
Reference Books:
1. UNIX & Shell Programming- M.G. Venkatesh Murthy, Pearson Education
2. Linux Command Line and Shell Scripting Bible - Richard Blum , Christine Bresnahan ,
2ndEdition,2014 , Wiley Publishing.
3. Linux Shell Scripting Cookbook - Clif Flynt, Sarath Lakshman, Shantanu Tushar , Third Edition,
2017 , Packt Publishing.
Bloom’s Taxonomy
CO’s Course Outcomes with Action verbs for the Course topics Level Indicator
Level
CO1 Demonstrate Robotic Process Automation & Record and Play feature
Understand L2
of UiPath Studio.
CO2 Create different types of variables, control flow and data manipulation
Apply L3
techniques.
CO3 Apply various control techniques, plugins and extensions in RPA Apply L3
CO4 Illustrate various types and strategies to handle events and exceptions Apply L3
Text Book(s):
1. Learning Robotic Process Automation: Create Software robots and automate business processes with the leading RPA tool –
UiPath by Alok Mani Tripathi, Packtpub, March 2018.
Reference Book(s):
1. Learning ServiceNow by Tim Woodruff, Packtpub, March 2017.
2. ServiceNow Automation by Ashish Rudra Srivastava, Packtpub.
Web and Video link(s):
1. https://www.uipath.com/rpa/robotic-process-automation
2. https://www.academy.uipath.com
UNIT – IV 8 Hours
The Basics of JavaScript: Overview of JavaScript, Object orientation and JavaScript, General syntactic
characteristics, Primitives, operations, and expressions, Screen output and keyboard input, Control statements,
Object creation and modification, Arrays, Functions, Constructor.
Self-study component: Pattern matching using regular expressions, Errors in scripts.
UNIT – V 8 Hours
JavaScript and HTML documents: The JavaScript execution environment; The Document Object Model;
Element access in JavaScript, Events and event handling; Handling events from the Body elements, Button
elements, Text box and Password elements.
Dynamic documents with javascript: Introduction to dynamic documents; Positioning elements; Moving
elements; Element visibility; Changing colors and fonts; Dynamic content
Self-study component: Stacking elements, Slow movement of elements, Dragging and dropping
elements.
CO’s Course Outcomes with Action verb for the Course topics
CO1 Understand the basic concepts used to develop web pages.
CO2 Develop web pages using HTML and CSS features with different layouts as per need of application.
Text Book(s):
1. Programming the World Wide Web –Robert W. Sebesta, 8th Ed., Pearson Ed., 2015.
Reference Book(s):
1. Internet & World Wide Web How to program – M. Deitel, P.J Deitel, A. B. Goldberg, 3rd Edition, Pearson
Education / PHI, 2004.
2. Web Programming Building Internet Applications – Chris Bates, 3rd Edition, Wiley, India, 2006.
3. The Web Warrior Guide to Web Programming – XueBai et al.
E-Books/Resources:
1. https://www.amazon.in/Programming-World-Wide-Robert-Sebesta/dp/0133775984
2. https://www.amazon.in/Web-Development-jQuery-Richard-York/dp/111886607X
3. https://www.teamwerx.org/wp-content/uploads/2017/10/Web-Development-with-jQuery.pdf
topics Taxonomy
Level
CO1 Understand the database concepts to create the relations by specifying
Understand L2
various constraints.
CO2 Design an ER diagram for given scenario. Design L3
CO3 Develop SQL commands for a given queries. Develop L3
CO4 Apply suitable normalization technique to improve
Apply L3
database design
Text Book(s):
1. Fundamentals of Database Systems – Elmasri and Navathe, 7 th Edition, Addison-Wesley, 2011
Reference Book(s):
2. Data Base System Concepts – Silberschatz, Korth and Sudharshan, 5th Edition, Mc-GrawHill, 2006.
3. An Introduction to Database Systems – C.J. Date, A. Kannan, S.Swamynatham, 8th Edition, Pearson Education, 2006.
4. Database Management Systems – Raghu Ramakrishnan and Johannes Gehrke, 3rd Edition, McGraw-Hill, 2003.
Web and Video link(s):
1. https://onlinecourses.nptel.ac.in/noc22_cs91/
2. https://youtu.be/c5HAwKX-suM
E-Books/Resources:
1. https://www.ebooks-for-all.com/bookmarks/detail/Database-Management-Systems/onecat/0.html
2. https://ebooks.lpude.in/management/mba/term_3/
DCAP204_MANAGING_DATABASE_DCAP402_DATABASE_MANAGEMENT_SYSTEMS.pdf
Bloom’s
CO’s Course Outcomes with Action verbs for the Course topics Taxonomy Level Indicator
Level
CO1 Understand the fundamental concept of different types of data used in Remember L1
data mining.
CO2 Apply different preprocessing techniques for different data types. Apply L3
CO3 Generate different frequent item sets using mining methods. Apply L3
CO4 Apply suitable classification or clustering technique to classify the given Apply
data set. L3
Text Book(s):
1. Jiawei Han, Jian Pei, Hanghang Tong , “Data Mining Concepts and Techniques”, 4th Edition, 2022, Elsevier, MK
Publishers.
Reference Book(s):
1. Jiawei Han, Micheline Kamber, Jian Pei, “Data Mining: Concepts and Techniques”, 3rd Edition, 2012, Elsevier, MK
Publishers.
2. Pang-Ning Tan, Michael Steinbach, Anuj Karpatne, Vipin Kumar, “Introduction to Data Mining”, 2 nd Edition, 2021,
Pearson Publishers.
E-Books/Resources:
1. https://link.springer.com/book/10.1007/978-3-540-34351-6
Introduction: What is Machine Learning? Why Use Machine Learning? Types of Machine Learning Systems:
Supervised/Unsupervised Learning, Batch and Online Learning, Instance-Based Versus Model-Based Learning. Main Challenges
of Machine Learning: Insufficient Quantity of Training Data, Non-representative Training Data, Poor-Quality Data, Irrelevant
Features, Overfitting the Training Data, Under fitting the Training Data, Testing and Validating: Hyper parameter Tuning and
Model Selection , Data Mismatch.
Self-study component: Training and running a linear model using Scikit-Learn
UNIT – II 8 Hours
The Machine Learning Toolbox: Data, Infrastructures, Algorithms, Visualization, DATA Scrubbing: Feature selection, Row
Compression, One-hot Encoding, Binning, Normalization, Standardization, Missing Data, Setting up your Data: Cross validation.
Self-study component: Needs of data to train the model
Reference Book(s):
1. Machine Learning, Step-by-Step Guide to Implement Machine Learning Algorithms with Python by Rudolph Russell.
2. Machine Learning A Probabilistic Perspective Kevin P. Murphy, The MIT Press Cambridge, Massachusetts, London,
England.
3. Introduction to Machine Learning, 3rd edition, Ethem Alpaydın, The MIT Press Cambridge, Massachusetts, London,
England
Web and Video link(s):
1. https://www.youtube.com/playlist?list=PL1xHD4vteKYVpaIiy295pg6_SY5qznc77
2. https://nptel.ac.in/courses/106/106/106106139/
E-Books/Resources:
1. https://www.analyticsvidhya.com/machine-learning/
2. https://www.hackerearth.com/practice/machine-learning/machine-learning-algorithms/ml-decision-tree/tutorial/
a. Calculate the Euclidean distance between these friends to find the most similar friends
b. Do the same calculation measuring the ages in decades(Divide the age by 10)
c. Normalize the data using min-max method and find the most similar friends
d. Compare the results with normalized and without normalized data
6 Data Conversion from Qualitative to Quantitative
Dimensionality Reduction: Attribute Selection – Filters
In the given table, name of the contact, the maximum temperature registered last week in their town, their
weight, height, year of experience and gender, together with the information on how good their company is
given. Show how similar the behavior of each predictive attribute is to the target attribute Company and rank
the attributes according to Pearson correlation and filter the predictive attribute with correlation below the
given threshold
Bloom’s
COs Course Outcomes with Action verbs for the Course topics Level Indicator
Taxonomy Level