Syllabus 2023 New Compressed
Syllabus 2023 New Compressed
SEMESTER I
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: I
7. Category of Course: DC
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
10
UNIT- 2
First C program - Hello world, How to open a command prompt on
Windows or Linux. How to read and print on screen -
printf(),scanf(),getchar(), putchar()
UNIT- III
Conditional statements: if statement, if-else statement, ternary
statement or ternary operator, nested if-else statement, switch
3 8
statement, Difference between performance of if else and switch,
Advantages of if else and switch over each other
Loops: ‘for’ loops, ‘while’ loops, ‘do while’ loops, entry control and exit
control, break and continue, nested loops
UNIT- IV
Functions: Function prototype, function return type, signature of a
function, function arguments, call by value, Function call stack,
Recursion v/s Iteration, passing arrays to functions,
4 7
Storage classes: Automatic, Static, Register, External, Static and
Dynamic linking implementation, C program memory (show different
areas of C program memory and where different type of variables are
stored), scope rules.
5 10
UNIT- V
Arrays: Single-dimensional arrays, initializing arrays, computing
address of an element in array, character arrays, segmentation fault,
bound checking, Searching and Sorting.
Total 43
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publicati
on/Repri
nt
Text Books
1. • Peter Prinz, Tony Crawford,”C in a Nutshell”, Oreilly 1st 2011
Publishers,
2. • Peter Norton, “Introduction to computers”, TMH, 6th 2009
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam / Lab Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER II
2. Contact Hours: L: 3 T: 0 P 0
3. Examination Duration (Hrs): Theory 3 Practical 0
5. Credits: 3
6. Semester: II
7. Category of Course : DC
** Describe the specific knowledge, skills, or competencies the students are expected to
acquire or demonstrate.
3 8
UNIT- III
File Handling – Reading text file, writing text file, copying one file to
another
Total 44
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication
/Reprint
Text Books
1. • Peter Prinz, Tony Crawford,”C in a Nutshell”, 1st 2011
Oreilly Publishers,
2. • Yashwant Kanetkar,”Let Us C”,BPB Publication 8th 2007
Reference Books
1. • Steve Oualline, “Practical C programming”, Orielly 3rd 2011
Publishers, 2011.
2. • Brian W Kernighan, Dennis M Ritcie,”The C 2nd 2000
Programming Language”,Prentice Hall, 1988. R3.
Herbert Schildt,” C: The Complete Reference”,
4thEdition.TMH, 2000.
3. • E.Balagurusamy,”Programming in ANSI C”, 6th 2015
McGraw Hill
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam / Lab Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
1. Subject Code: TCS-308 Course Title: Logic Design & Computer Organization
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 3
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome: CO1: Understand the process of minimizing Boolean function and
obtaining the combinational logic circuits from Boolean functions.
CO2: Analyze the basic storage elements in digital circuits and develop
sequential circuits by applying them.
CO3: Evaluate the design of different types of register, counter, and
programmable logic devices.
CO4: Apply the concept of digital logic circuits in computer organization
& architecture and evaluate the computer performance.
CO5: Create the arithmetic logic used in computer and describe the machine
instruction execution.
CO6: Understand the memory hierarchy of computer and how different I/O
devices interact with the processing unit.
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
5. Credits: 3
6. Semester: III
7. Category of Course: DC
8. Pre-requisite:
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Describe the concept of Data Structures and assess how the choice of data
structures impacts the performance of programs
CO2: Compare and contrast merits and demerits of various data structures in terms
of time and memory complexity.
CO3: Identify and propose appropriate data structure for providing the solution to
the real world problems.
CO5: Be familiar with advanced data structures such as balanced search trees,
hash tables, AVL trees, priority queues, ADT etc.
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate.
Unit 3:
Trees: Basic terminology, Binary Trees, Binary tree representation, algebraic
Expressions, Complete Binary Tree. Extended Binary Trees, Array and Linked
Representation of Binary trees, Traversing Binary trees, Threaded Binary trees.
3
Traversing Threaded Binary trees, Huffman algorithm & Huffman tree. 9
Searching and Hashing: Sequential search, binary search, comparison and
analysis, Hash Table, Hash Functions, Collision Resolution Strategies, Hash
Table Implementation
Unit 4:
Sorting: Insertion Sort, Bubble Sorting, Quick Sort, Two Way Merge Sort,
Heap Sort, Sorting on Different Keys, Practical consideration for Internal
4 Sorting. 9
Binary Search Trees: Binary Search Tree (BST), Insertion and Deletion in
BST, Complexity of Search Algorithm, Path Length, AVL Trees
Unit 5:
5 File Structures: Physical Storage Media File Organization, Organization of
records into Blocks, Sequential Files, Indexing and Hashing, Primary indices, 8
Secondary indices, B+ Tree index Files, B Tree index Files, Indexing and
Hashing Comparisons, Graph, Traversal(DFS,BFS) ,Minimum spanning tree
Total 46
2 R. Kruse etal, “Data Structures and Program Design in C”, 2nd 2006
Pearson Education Asia,
4 K Loudon, “Mastering Algorithms with C”, Shroff Publisher & 1st 2000
Distributors Pvt. Ltd.
5 Bruno R Preiss, “Data Structures and Algorithms with Object 1st 1998
Oriented Design Pattern in C++”, Jhon Wiley & Sons, Inc.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
5. Credits: 3
6. Semester: III
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**:
CO1: Demonstrate the C++ Program uses data types, operators, expressions,
array, strings and functions.
CO2: Implement Constructors (Parameterized, Copy), this pointer, friend
function, dynamic objects, arrays of objects.
CO3: Illustrate the Operator Overloading of +, -, preincrement,
postincrement, << and >>.
CO4: Implement the single, multiple, multilevel and hybrid inheritance in
C++.
CO5: Illustrate function overloading, Overriding and virtual functions.
CO6: Carry out exception handling techniques and provide solutions to
storage related problems using STL.
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate.
Unit 3:
Inheritance: Necessity of inheritance, Types of inheritance with examples,
3 Base Class and Derived class, Public, private and protected access modifiers, 9
inheriting multiple base classes, working of Constructors and Destructors in
Inheritance, Passing parameters to base class constructors, Virtual base classes
Unit 4:
Virtual functions and Polymorphism: Polymorphism, function overloading,
4 Overriding Methods, Virtual function, Calling a Virtual function through a 9
base class reference, Pure virtual functions, Abstract classes, Virtual
Destructors, Early and late binding
Unit 5:
I/O System Basics and STL: C++ stream classes, I/O manipulators, fstream
5 and the File classes, basic file operations, function templates Exception
9
Handling: Exception handling fundamentals, Throwing an Exception,
Catching an Exception, Re-throwing an Exception, An exception example.
STL: An overview, containers, vectors, lists, maps, Algorithms
Total 46
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 4
6. Semester: III
7. Category of Course: DC
9.Course After completion of the course the students will be able to:
Outcome**: CO1: Be able to specify and manipulate basic mathematical objects such as sets,
functions, and relations . Demonstrate an understanding of partial order
relations and Lattices.
CO2: Understand the basics of discrete probability and number theory, and be
able to apply the methods from these subjects in problem solving.
CO4: Discriminate, identify and prove the properties of groups and subgroups
CO6: Demonstrate different traversal methods for trees and graphs. Model
problems in Computer Science using graphs and trees.
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
5. Credits: 2
6. Semester: 3
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome: CO1: Understand various logic gates and digital circuits.
CO2: Identify various digital ICs and understand its operation.
CO3: Design elementary digital circuits under real and simulated environment.
CO4: Simulate various logic circuits using simulation tool.
10. Details of the Course:
Sl. List of problems for which student should develop program and execute Contact
No. in the Laboratory Hours
To realize two and three variable Boolean functions using basic gates and
1. 2
universal gates digital IC.
2. To design and test a half/full adder circuit using digital IC gates. 2
3. To design and test a half/full subtractor circuit using IC gates. 2
12. To design and simulate the implementation of Ring and Johnson counter using 2
OrCAD/PSPICE.
13. To design and simulate Booths Algorithm using Verilog HDL. 2
14. To design and simulate 32-bit Floating-Point multiplier using Verilog HDL. 2
15. To design and simulate 8-bit ALU using Verilog HDL. 2
Total 30
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
2. Contact Hours: L: 0 T: 1 P: 2
5. Credits: 2
6. Semester: 3
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Implement Stack, Queues using array in C programming language.
CO2: Create Linked lists (single, double, circular) and perform various
operations on Linked lists and implement Stack, Queue using Linked list
in C programming language.
CO3: Create Binary Search tree and perform operations such as traversal, deletion
and execute Linear, Binary search, hashing and simple graph structure.
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate.
a. Link list:
b. Create a Single Linked List with pointers left & right where new nodes
are always added after the right. Then user will input a key that should be
19. searched in the linked list & the element having the key value should be
deleted & linked list should be updated. If elements is not found then a
message “Unsuccessful Search" should be displayed.
Total
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
1. Subject Code: PCS 307 Course Title: OOP WITH C++ LAB
2. Contact Hours: L: 0 T: 1 P: 2
5. Credits: 2
6. Semester: III
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Evaluate the basic difference between object-oriented programming
and procedural language and their data types.
CO2: Implement the programs using C++ features such as object
creation, compile time polymorphism, inheritance, abstraction,
encapsulation etc.
CO3: Design and solve programs that incorporates the use of object-
oriented techniques such as abstract classes, pure virtual functions,
and constructors.
Input
First line contains an integer as input. Next line contains space separated integers
denoting the elements of the array
4.
Output
In the output you have to print an integer that denotes the maximum special sum
Input/Output Format
Typical Input Expected Output
5 8
13125
10 9
2 1 3 9 2 4 -10 -9 1 3
5. Implement a C++ program to demonstrate the concept of data abstraction using the
concept of Class and Objects
20. Implement a real case scenario by a proper C++ code to provide the solution to
Diamond Problem in C++
Create a base class called shape. Use this class to store two double type values that
could be used to compute the area of figures. Derive two specific classes called
triangle and rectangle from base shape. Add to the base class, a member function
get_data() to initialize base class data members and another member function
display_area() to compute and display the area of figures. Make display_area() as a
virtual function and redefine this function in the derived class to suit their
21. requirements. Using these three classes, design a program that will accept
dimensions of a triangle or a rectangle interactively and display the area. Remember
the two values given as input will be treated as lengths of
two sides in the case of rectangles and as base and height in the case of triangle and
used as follows:
Area of rectangle = x * y
Area of triangle = ½ *x*y
Create a base class called CAL_AREA(Abstract). Use this class to store float type
values that could be used to compute the volume of figures. Derive two specific
classes called cone, hemisphere and cylinder from the base CAL_AREA. Add to
the base class, a member function getdata ( ) to initialize base class data members
and another member function display volume( ) to compute and display the volume
21. of figures. Make display volume ( ) as a pure virtual function and redefine this
function in the derived classes to suit their requirements. Using these three classes,
design a program that will accept dimensions of a cone, cylinder and hemisphere
interactively
and display the volumes. Remember values given as input will be and used as
follows:
Volume of cone = (1/3)πr2h
Volume of hemisphere = (2/3)πr3
Volume of cylinder = πr2h
The task is to debug the existing code to successfully execute all provided test files.
You are required to extend the existing code so that it handles the
std::invalid_argument exception properly. More specifically, you have to extend the
implementation of the process_input function. It takes integer n as an argument and
has to work as follows:
1.It calls function largest_proper_divisor(n).
2.If this call returns a value without raising an exception, it should print in a single
line result=d where d is the returned value.
3.Otherwise, if the call raises an invalid_argument exception, it has to print in a
single line the string representation of the raised exception, i.e., its message.
4.Finally, no matter if the exception is raised or not, it should print in a single line
returning control flow to the caller after any other previously printed output.
Input Format
The input is read by the provided locked code template. In the only line of the input,
there is a single integer n, which is going to be the argument passed to function
process input.
22.
Output Format
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
2. Contact Hours: L: 3 T: P:
5. Credits: 3
6. Semester: III
7. Category of Course: DE
8. Pre-requisite: NA
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Identify the importance of cloud computing services for the digital age
technologies.
CO2: Differentiate the services and deployment models of cloud computing.
CO3: Evaluate the case studies of the different types of cloud computing
applications.
CO4: Analyze the cloud computing services management techniques, providers, and
standards.
CO5: Distinguish the cloud computing services using Bigdata and big data analytics.
CO6: Design and deploy a cloud based web application.
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate.
Unit 2:
Working of Cloud Computing, Cloud Computing comparison with traditional
computing architecture (client/server), Impact of Networks, Web Development and
2 User Interface (UI) on Cloud computing. 9
Cloud Deployment Models: Public cloud, Private cloud, Hybrid cloud, Community
cloud.
Unit 3:
Cloud Service Models: Infrastructure as a Service (IaaS), Platform as a Service
(PaaS), Software as a Service (SaaS).
Infrastructure as a Service (IaaS): IaaS definition, Virtualization, Hypervisors,
Machine Image, Virtual Machine (VM), Resource Virtualization, Server, Storage,
Networking, Virtual Machine (resource) provisioning and manageability, Data
centre physical plant/building, Networking firewalls/security, Data storage in cloud
computing (storage as a service), Amazon Elastic Compute Cloud (EC2), Eucalyptus,
3 Open Stack, Case Study of IaaS. 9
Platform as a Service (PaaS): PaaS definition, Service Oriented Architecture (SOA),
Cloud Platform and Management, Development tools, database management, business
analytics, Operating systems, Google App Engine, Microsoft Azure, and Salesforce,
Case Study of PaaS.
Software as a Service (SaaS): SaaS definition, Web services, Web 2.0, Case Study of
SaaS.
Unit 4:
Introduction to Big Data, Characteristics, Architectures, Technologies, Applications,
Advantages and Disadvantages of Big Data, Tools and Techniques applied in Big Data:
Association rule learning, Classification tree analysis, Genetic algorithms, Machine
learning, Regression analysis, Sentiment analysis, Social network analysis, Difference
4 between big data and big data analytics. 9
Introduction to Big Data analytics, Data Analysis Techniques: A/B testing, Data fusion
and data integration, Data mining, Machine learning, Natural language processing
(NLP), Statistics. Case study of Big Data.
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication /
No. Reprint
Textbooks
1. Rajkumar Buyya, Cloud Computing Principles and Paradigms, 1st 2013
Wiley,
Reference Books
1. Jared Dean, Bigdata Data Mining and Machine Learning, 1st 2014
Wiley,
2 Vince Reynolds, Bigdata for Beginners, Create space 1st 2016
Independent Publishing Platform,
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
2. Contact Hours: L: 3 T: P:
5. Credits: 3
6. Semester: III
7. Category of Course: DE
8. Pre-requisite: NA
9. Course After completion of the course the students will be able to:
Outcome**: CO1:Classify security vulnerabilities involved in data communication
over Internet and makeuse of classical algorithms to address the
vulnerabilities.
CO2: Apply symmetric block ciphers to secure data transmission and storage
CO3: Analyze the various public key cryptographic systems and usage of hashing
CO4 Appreciate the design of Public Key algorithms, mathematical
background and make useof the same for data communication and
message authentication
CO5: Categorize types of viruses, worms, intrusion and decide measures to
counter thethreats.
CO6: Understand the legal aspects related to Cybercrime,
Intellectual Property, Privacy,Ethical Issues.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
Unit 4:
Public-Key Cryptography: Public-Key Encryption Structure, Applications for
Public-Key Cryptosystems, Requirements for Public-Key Cryptography, The
4 RSA Public-Key Encryption Algorithm. 9
Message Authentication: Approaches to Message Authentication,
Authentication Using Conventional Encryption, Message
Authentication without Message Encryption, MD5 Hash Algorithm.
Unit 5: System Security: Intruders, Intrusion Detection, Password
Management, Types of Malicious Software, Viruses, Virus Countermeasures,
Worms and Principles of Firewalls
5 Legal and Ethical Aspects: Cybercrime and Computer Crime, Intellectual 8
Property, Privacy, Ethical Issues.
Total 44
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. William Stallings, Network Security Essentials 6th 2018
Applications and Standards, ,Pearson Education,
2 William Stallings , Cryptography and Network Security, 7th 2017
Pearson Education,
Reference Books
1. Behrouz Forouzan , Cryptography and Network Security, 3rd 2015
McGraw Hill,
2 Atul Kahate, "Cryptography and Network Security", 3rd 2017
McGraw Hill Education,,
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
2. Contact Hours: L: 3 T: 0 P: 0 C
3. Examination Duration (Hrs): Theory 3 Practical 0
4. Relative Weight: CIE 25 MSE 25 SEE 50
5. Credits: 3
6. Semester: III
7. Category of Course: DE
8. Pre-requisite: NA
9.Course After completion of the course the students will be able to:
Outcome**: CO1: Explain the terms used in IoT.
CO2: Describe key technologies in Internet of Things.
CO3: Identify components needed to provide a solution for certain applications.
CO4: Analyze security requirements in an IoT system.
CO5: Design wireless sensor network architecture and its framework along with
WSN applications.
CO6: Understand business models for the Internet of Things.
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate.
Unit 4:
RESOURCE MANAGEMENT IN THE INTERNET OF THINGS
Clustering, Software Agents, Clustering Principles in an Internet of Things
4 Architecture, Design Guidelines, and Software Agents for Object
Representation, Data Synchronization. Identity portrayal, Identity 10
management, various identity management models: Local, Network,
Federated and global web identity, user-centric identity management, device
centric identity management and hybrid-identity management, Identity and
trust.
Unit 5:
INTERNET OF THINGS PRIVACY, SECURITY AND
GOVERNANCE
Vulnerabilities of IoT, Security requirements, Threat analysis, Use cases and
misuse cases, IoT security tomography and layered attacker model, Identity
5 establishment, Access control, Message integrity, Non-repudiation and 10
availability, Security model for IoT.
Internet of Things Application: Smart Metering Advanced Metering
Infrastructure, e-Health Body Area Networks, City Automation, Automotive
Applications, Home Automation, Smart Cards.
Total 48
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
2. Contact Hours: L: T: 0 P: 0
5. Credits: 4
6. Semester: 3rd
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Describe the principles of structured programming and be able to describe, design,
implement, and test structured programs using currently accepted methodology.
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate.
Exception Handling - Exceptions, why use exceptions, raising an exception, try and
except, try, except and else clause; try and finally
Unit 4:
Regular Expressions and Python Packages
Regular Expressions - re module, searching a string (match and search), Finding a
4 string (findall), Break string into substrings (split), Replace part of a string (sub) 9
Python packages: Simple programs using the built-in functions of packages matplotlib,
NumPy, Pandas
Unit 5:
Python Functions and OOP Concepts
Python functions and modules - OS and SYS modules, defining python functions,
calling a function, function arguments, Lambda, and map function, Importing python
5 module. 10
Classes and OOP - Class definition syntax, objects, class, and instance
variables, Inheritance and multiple inheritance, Polymorphism, Overloading,
Overriding, Data Hiding
Total 48
2. 2nd 2015
Think Python: How to think like a Computer Scientist
3. 1st 2017
Python Programming using Problem Solving Approach
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
2. Contact Hours: L: 3 T: P:
5. Credits: 4
6. Semester: III
7. Category of Course: DE
8. Pre-requisite: NA
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Explain information security and blockchain
CO2: Know the working of information security techniques
CO3: Analyze the different information security protocols
CO4 Use Blockchain to implement information security protocols
CO5 Apply information security techniques in different applications
CO6: Develop blockchain enabled information security protocols
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
5. Credits: 4
6. Semester: III
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the basic concepts of Linear Algebra such as System
of Linear Equation, Matrices, Vector Space, Rank, etc.
CO2: Understand the basic principles of probability, Bayes theorem,
understand the definitions of discrete, continuous, and joint random
variables, compute the mean, variance and covariance of random
variables.
CO3: Solve problems on matrix decompositions such as Choleskey
Decomposition, Eigen Decomposition and Diagonalization, Singular
Value Decomposition
CO4: Describe the vector calculus concepts such as differentiation of
Univariate Function, Partial Differentiation and Gradients.
CO5: Analyze various mathematical concepts, that are required to build
AI & ML models.
CO6: Create an AI & ML models by applying the concepts of
mathematics such as Linear Algebra, Analytical Geometry, Matrix,
Calculus, Probability, etc.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate
10. Details of the Course:
Sl. Contact
Contents
No. Hours
Unit 1:
Linear Algebra:
1 System of Linear Equation, Matrices, Solving system of Linear Equation, 10
Vector Spaces, Linear Independences, Basis and Rank, Linear Mappings,
Affine Space.
Unit 2:
Analytic Geometry:
2 Norms, Inner Products, Lengths and Distances, Angles and Orthogonality, 10
Orthonormal basis, Orthogonal Compliment, Inner Product of Function,
Orthogonal Projections, Rotations.
Unit 3:
Matrix Decomposition
3 Determinant and Trace, Eigen Values and Eigen Vectors, Choleskey 10
Decomposition, Eigen Decomposition and Diagonalization, Singular
Value Decomposition, Matrix Approximation, Matrix Pylogency
Unit 4:
Vector Calculus
4 Differentiation of Univariate Function, Partial Differentiation and 10
Gradients, Gradients of Vector-Valued Functions, Gradients of Matrices,
Linearization and Multivariate Taylor Series
Unit 5:
Probability and Distribution
5 10
Discrete and Continuous Probability, Sum Rule, Product Rule, Bayes’
Theorem, Gaussian Distribution, Change of Variables/Inverse Transform
Total 50
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication /
Reprint
Textbooks
1. Marc Peter Deisenroth , A. Aldo Faisal, Cheng Soon Ong, 1st 2020
MATHEMATICS FOR MACHINE LEARNING, Cambridge
University Press
2. Jay Dawani, Hands-On Mathematics for Deep Learning: Build 1st 2020
a solid mathematical foundation for training efficient deep
neural networks, Packt Publishing Limited
Reference Books
1. Tamoghna Ghosh , Shravan Kumar Belagal Math, Practical 1st 2022
Mathematics for AI and Deep Learning, BPB Publications
12. Mode of Test / Quiz / Assignment / Mid Term Exam / End Term Exam
Evaluation
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
5. Credits: 3 0
6. Semester: 3
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: To provide necessary basic concepts in probability and random processes
for applications such as random signals, linear systems in communication
engineering.
CO2: To understand the basic concepts of probability, one-dimensional and two-
dimensional random variables and to introduce some standard distributions
applicable to engineering which can describe real life phenomenon.
CO3: To understand the basic concepts of random processes which are widely
used in IT fields.
CO4: To understand the concept of correlation and spectral densities.
CO5: To understand the significance of linear systems with random inputs.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate
10. Details of the Course:
Sl. Contact
Contents
No. Hours
Unit 1: PROBABILITY AND RANDOM VARIABLES
Probability – Axioms of probability – Conditional probability – Baye‘s
1 theorem - Discrete and continuous random variables – Moments – 9
Moment generating functions – Binomial, Poisson, Geometric,
Uniform, Exponential and Normal distributions.
Unit 2: TWO - DIMENSIONAL RANDOM VARIABLES
2 distributions – Marginal and conditional distributions – Covariance – 9
Correlation and linear regression – Transformation of random
variables – Central limit theorem (for independent and identically
distributed random variables).
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
2. Contact Hours: L: T: 0 P: 0
3
3. Examination Duration (Hrs): Theory
3 Practical
0
4. Relative Weight: CIE 25 MSE 25 SEE
50
5. Credits: 3 Ja
va
6. Semester: 3 Pr
ogr
7. Category of Course: DE am
8. Pre-requisite: Fundamental of Computers (TCS 101),mi Programming for problem
solving (TCS 201) ng
La
9. Course After completion of the course the students
b will be able to:
Outcome: (P
CO1: Explain symmetric and asymmetricCS key cryptosystems.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate
10. Details of the Course:
Sl. Contact
Contents
No. Hours
Unit 1:
Introduction to information security
1 What is information security, why we need information security, the zero trust 10
model, overview of ethical hacking
Protection against- unauthorized modification, unauthorized deletion and
unauthorized access, different types of user authentication techniques,
access control techniques
Pillars of information security - confidentiality, availability and integrity Steps
to fix a cyberc rime - Identify cyber threats, analyze and evaluatethreat,
treatment
Type of hackers - white hat, grey hat, black hat
Penetration testing and its phases - reconnaissance, scanning, gaining
access, maintaining access, covering tracks. SSL and Transport layer
security.
Unit 2:
Basics of cryptography
What is cryptography, what is confidentiality, data integrity, authentication,
and nonrepudiation, applications of cryptography - chip based payment
cards, digital currencies, computer passwords, digital communications,
2 plaintext, cipher-text, cipher - characteristics of a good cipher, encryption,
10
decryption, Key - significance of key length, symmetric and asymmetric key
cryptography, cryptanalysis, OSI security architecture- security attacks,
security services, security mechanisms
Unit 3:
Mathematics applied in information security
Concept of divisibility, prime numbers, importance of prime numbers in
3 cryptography, euclid theorem for GCD, extended euclidean algorithm, 8
modular arithmetic, random number generators, deterministic and
nondeterministic random number generators, XOR, bit shifts, euler's
totient theorem, chinese remainder theorem.
Unit 4:
Symmetric key cryptosystem
Secret Key (symmetric) cryptography - stream and block ciphers,
4 10
additive and multiplicative ciphers, rail fence technique, playfair cipher,
hill cipher, vernam cipher, Vigenère Cipher, RC4 algorithm, DES,
2DES, 2-3DES, 3DES, AES, block cipher modes of operations.
Unit 5:
Asymmetric key cryptosystem, digital signature, and message
integrity
5 RSA, Diffie Hellman key exchange protocol, Elliptic curve cryptography 8
(ECC), ElGamal encryption system. DSS algorithm, RSADS algorithm,
ECDSA algorithm, Message integrity, hash functions, MAC functions,
HMAC
Total 46
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER III
5. Credits: 3
6. Semester: 3
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Critically analyze statistical methodologies in order to assess best
practice guidance when applied to real-world problems in specific
contexts
CO2: Investigate and evaluate key concepts of statistics and data
science techniques and assess when to apply such techniques in
practical situations
CO3: Contextualize, implement statistical models using different
statistical tools
CO4: Develop the ability to build and assess data-based models.
CO5: Understand fundamental principles of statistics and data science
applications and technologies in order to provide strategies to address
processing of datasets with a variety of characteristics.
CO6: Apply knowledge about algorithms for statistical analysis, machine
learning or data extraction in new areas within data science.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
Unit 4:
Naïve Bayes’ Theorem, Bayesian classification, Central Limit theorem,
4 Data Exploration & preparation, Confidence Interval, The hypothesis- 8
testing, Z-Score.
Unit 5:
5 Parametric Testing: t-Test and Z-Test, Non-parametric Testing: ANOVA 10
and chi-Square
Total 47
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Douglas C. Montgomery , George C. Runger , Applied 6th 2016
Statistics and Probability for Engineers, Wiley
2. M. Ross, Introduction to Probability and Statistics for 4th 2009
Engineers and Scientists, Academic Press
3. James D. Miller , Statistics for Data Science, Packt 1st 2017
Publishing Limited
Reference Books
1. Dr. D.C. Agarwal & Dr. Pradeep K. Joshi, Probability 1st 2022
& Statistics for Data Science, Shree Sai Prakashan
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: IV
7. Category of Course: DC
9. Course CO1. Explain the Java programming features and develop programs to
Outcome**: demonstrate the same.
CO2. Make use of object-oriented concepts to develop applications CO3.
Classify exceptions and demonstrate applications for file handling
and multithreading.
CO4. Analyze collection framework and develop applications using GUI.
CO5. Compare and utilize collection framework for programming
applications.
CO6. Design applications for event handling and accessing databases
using Java features.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 2:
Object Oriented Programming concepts: Inheritance, super classes,
2 multilevel hierarchy, abstract and final classes, overloading and overriding 9
Packages and interfaces: Packages, Defining Packages, Using Packages,
import and static import, Access protection.
Interface: Defining Interfaces, abstract methods declarations,
implementing interfaces, extended interfaces, interface references.
Unit 3: Exception handling: Exception Types, Exception class,
RuntimeException Class, Error Class, Checked and uncheced Exceptions,
Defining new exceptions; Handling: try, catch and finally; throw statement,
throws clause.
Input/Output:Basics, Byte and Character Streams, reading and writing
3 9
from console and file.
Multithreaded programming: Java thread model, synchronization,
messaging, thread class, Runnable interface, inter thread communication,
Producer/ consumer problems, Wait () and notify ().
Total 46
12. Mode of Test / Quiz / Assignment / Mid Term Exam / End Term Exam
Evaluation
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
2. Contact Hours: L: 3 T: 1 P: 0
6. Semester: IV
7. Category of Course: DC
9. Course CO1. Understand the concept of abstract machines and their power to
Outcome**: recognize languages.
CO2. Formulate DFA, RE and FA with output.
CO3. Design CFG and check the language is not CFL.
CO4. Design PDA and convert n-PDA into D-PDA.
CO5. Design and be familiar with Turing machines and computability.
CO6: Formulate finite machines, push down automata and Turing machines
for automated functioning of devices.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Contact
UNIT CONTENTS
Hrs
Total 47
12. Mode of Test / Quiz / Assignment / Mid Term Exam / End Term Exam
Evaluation
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: IV
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Remember the concept of microcomputer system.
CO2: Understand microprocessor 8085, 8086 and microcontroller 8051 hardware.
CO3: Apply the concepts of assembly language programming of 8085 and 8086 to
fulfil different tasks.
CO4: Examine the application of 8085 and 8086 microprocessor with interrupt
system, real time timer and counter.
CO5: Test different interfacing ICs and memory for defined tasks with 8085 and
8086 microprocessor.
CO6: Integrate the knowledge of 8085, 8086and 8051 in various embedded
systems.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
Textbooks
1. Ramesh Gaonkar, Microprocessor Architecture, 6th 2013
Programming, and Applications with the 8085, Penram
International Publication (India) Pvt. Ltd
2 A. K. Ray & K. M. Bhurchandi, Advanced 3rd 2012
Microprocessors and peripherals, Tata McGraw Hill
3. Muhammad Ali Mazidi, Janice Gillispie Mazidi, The 2nd 2007
8051 Microcontroller & Embedded System, Pearson /
PHI publication
Reference Books
1. Douglas V. Hall, Microprocessors and Interfacing, Tata 3rd 2012
McGraw Hill
2. Barry B. Brey, The Intel Microprocessors Architecture 8th 2012
Programming and interfacing, Pearson
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
6. Semester: IV
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand various asymptotic notations to analyze time and space complexity of
algorithms.
CO2: Analyze the various paradigms for designing efficient algorithms using concepts of
design and conquer, greedy and dynamic programming techniques.
CO3: Provide solutions to complex problems using the concept of back tracking and
branch and bound techniques.
CO4: Apply algorithm design techniques to predict the complexity of certain NP complete
problems.
CO5: Implement Dijkstra’s, Bellman-ford, Prims, Kruskal’s algorithms to solve the real
world problems like traveling salesman problem, job sequencing, packet routing etc
CO6: Apply pattern matching algorithms like Rabin Karp Algorithm, Brute-force
techniques etc to find a particular pattern.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY),
DEHRADUN
SEMESTER IV
6. Semester: IV
7. Category of Course:DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Identify the concept of virtualization technique in cloud computing
platform.
CO2: Demonstrate the use case of the virtual machines.
CO3: Analyze the use case of parallel and distributed computing.
CO4: Evaluate the architectures of cloud computing.
CO5: Assess the viability of developing, deploying, maintaining and securing
cloud computing solutions using a variety of resiliency virtualization
testing tools.
CO6:Create cloud-computing virtualization strategies using virtualization tools
to solve identified business needs on behalf of a client.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
Unit 4:
Cloud Computing Architecture
Fundamental Cloud Architectures, Workload Distribution Architecture,
Resource Pooling Architecture, Dynamic Scalability Architecture, Elastic
Resource Capacity Architecture, Service Load Balancing Architecture,
4 Cloud Bursting Architecture, Elastic Disk Provisioning Architecture, 9
Redundant Storage Architecture.
Cloud Computing Reference Architecture (CCRA): Introduction, Benefits
of CCRA, Migrating into a Cloud: Introduction, Challenges while
migrating to Cloud, Broad approaches to migrating into the cloud, Seven-
step model of migration into a cloud, Migration Risks and Mitigation. Case
study of Cloud Computing Architecture.
Unit 5:
Virtualization Tools and Techniques
Parasoft Virtualize, Mountebank, Hoverfly cloud, MicroFocus Data
5 Simulation Software, CA service Virtualization, Mocklab, Rational Test 9
Virtualization Server, Tricentis Tosca, Docker, Kubernetes, OpenShift,
and Istio. Assess the viability of developing, deploying, maintaining and
securing cloud computing solutions using a variety of resiliency
virtualization testing tools, Create cloud-computing virtualization
strategies using virtualization tools to solve identified business needs on
behalf of a client, Case study of Virtualization Tools and Techniques.
Design and Deploy an Online Healthcare Application on the Cloud.
Total 45 Hrs.
Reference Books
1. Barrie Sosinsky , Cloud Computing Bible, Wiley 1st 2011
Publishing Inc.,
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End
Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY),
DEHRADUN
SEMESTER IV
5. Credits: 3
6. Semester: IV
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Define the concepts of statistics.
CO2: Understand the probability distribution techniques in different applications.
CO3: Identify the needs of data preprocessing.
CO4: Implement the manipulation and processing of data in R
CO5: Apply the concepts of functions in R
CO6: Evaluate the use of R in data analytics
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
Unit 4: Data Objects-Data Types & Data Structure. Viewing Named Objects,
Structure of Data Items, Manipulating and Processing Data in R (Creating,
4 Accessing, Sorting data frames, Extracting, Combining, Merging, reshaping data 8
frames), Control Structures
Total 47
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication /
Reprint
Textbooks
1. Dr. Mark Gardener, “Beginning R: The Statistical 1st 2012
Programming Language”, John willey& Sons, 2012
2. Gareth James, Daniela Witten, Trevor Hastie and Robert 2nd 2021
Tibshirani, “An Introduction to Statistical Learning with
Applications in R,” Springer, Germany,
Reference Books
1. N.G Das, “Statistical Methods (Combined edition 1st 2017
volume 1 & 2),” Mc Graw Hill
12. Mode of Test / Quiz / Assignment / Mid Term Exam / End Term Exam
Evaluation
GRAPHIC ERA (DEEMED TO BE UNIVERSITY),
DEHRADUN
SEMESTER IV
5. Credits: 3
6. Semester: IV
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understanding the concept of embedded system.
CO5: Design and develop systems based on 8051 microcontroller and its interfaces.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
Reference Books
1. Kenneth Ayala, “The 8051 Microcontroller”, West 1st 1993
Publishing Company,
Julien Bayle,”C-Programming for Arduino” , 2nd 2013
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
2. Contact Hours: L 3 T: 0 P: 0
5. Credits: 3
6. Semester: IV
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Explain the three pillars of cyber security, types of hackers and penetration
testing.
CO2: . Implement the scripting concepts used in cyber security.
CO3: Use the netcat, ping and wireshark tools to analyze the security of network.
CO4: Use the Javascript, php, sql to analyze the web security.
CO5: Explain the use of cyber security protocols for cyber threats.
CO6: Analyze the security level of web applications.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
5. Credits: 3
6. Semester: IV
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Demonstrate knowledge of statistical and exploratory data analysis data
analysis techniques utilized in decision making.
CO2: Apply principles of Data Science to the analysis of business problems.
CO5: To learn the basic concepts and techniques of AI and machine learning
CO6: To explore the various mechanism of Knowledge and Reasoning used for
building expert system
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
Unit 3:
An Introduction to Data Science, Data Processing and Visualization
Definition, working, benefits and uses of Data Science, Data science vs.
3 Business Intelligence, The data science process, Role of a Data Scientist.
Data Processing and Visualization: Data Formatting, Exploratory Data Analysis, 9
Filtering, and hierarchical indexing using Pandas. Data Visualization: Basic
Visualization Tools, Specialized Visualization Tools, Seaborn Creating and
Plotting Maps.
Unit 4:
Statistical Data Analysis & Inference
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 4
6. Semester: IV
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Outline the theory of big data, and explain challenges of big data
CO2: Understand the types of Big data and its characteristics
CO3: Compare Business Intelligence vs Big Data
CO4: Get the idea of NoSQL databases, different types of
NoSQL/NewSQL datastores
CO5: Discuss various types of Big Data analytics
CO6: Elaborate a Big Data management architecture
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Unit 3:
Technology Foundations of Big Data
Exploring the Big Data Stack: - Layer 0: Redundant Physical Infrastructure
- Physical redundant networks, Managing hardware: Storage and servers,
3 9
Infrastructure operations - Layer 1: Security Infrastructure, Interfaces and
Feeds to and from Applications and the Internet- Layer 2: Operational
Databases. Layer 3: Organizing Data Services and Tools. Layer 4:
Analytical Data Warehouses, Big Data Analytics, Big Data Applications.
Unit 4:
Introduction to NoSQL and NewSQL
Introduction to NoSQL, Uses, Features and Types, Need, Advantages,
Disadvantages and Application of NoSQL, Overview of NewSQL. RDBMSs
4 Are Important in a Big Data Environment. PostgreSQL relational database. 8
Nonrelational Databases. Key-Value Pair Databases - Riak keyvalue
database. Document Databases MongoDB, CouchDB . Columnar
Databases, HBase columnar database. Graph Databases- Neo4J graph
database.
Unit 5:
Big Data Analytics
Basic analytics, Advanced analytics, Operationalized analytics, Monetizing
5 8
analytics. Modifying Business Intelligence Products to Handle Big Data,
Studying Big Data Analytics Examples, Terminologies used in Big Data
environment.
Total 42
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Judith Hurwitz, Alan Nugent , Fern Halper , 1st 2013
Reference Books
1. Michele Chambers, Michael Minelli , Ambiga 1st 2013
Dhiraj ,Big Data, Big Analytics: Emerging Business
Intelligence and Analytic Trends for Today's
Businesses, Wiley
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
2. Contact Hours: L: 0 T: 1 P: 2
5. Credits: 2
6. Semester: IV
7. Category of Course: DC
8. Pre-requisite: PCS-307 OOPS with C++ Lab, TCS 307 Object oriented Programming
with C++
9. Course After completion of the course the students will be able to:
Outcome**:
CO1: Understand the object-oriented approach in programming along with
the purpose and usage principles of inheritance, polymorphism,
encapsulation, and method overloading etc.
CO2: Demonstrate ability to test and debug Java programs using IDE.
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate.
Name: UniversityRollNo:Course:
Semester:
For option (ii) accept monthly installment (p), rate of interest (r) and time period
in months (n). Calculate and output the maturity amount (a) receivable using
the formula a = p * n + p * n(n + 1) / 2 * r / 100 * 1 / 12. For an incorrect option,
an appropriate error message should be displayed.
[ Use Scanner Class to take input ]
Program to find if the given numbers are Friendly pair or not (Amicable or
not). Friendly Pair are two or morenumbers with a common abundance.
Input & Output format:
Program to check whether the given numbers are friendly pair or not
Program to replace all 0's with 1 in a given integer. Given an integer as an input,
all the 0's in the number has to be replaced with 1.
For example, consider the following number Input: 102405
25. Output: 112415 2
Input: 56004
Output: 56114
Steps to replace all 0's with 1 in a given integer
• Input the integer from the user.
• Traverse the integer digit by digit.
• If a '0' is encountered, replace it by '1'.
• Print the integer.
Array in Java:
Printing an array into Zigzag fashion. Suppose youwere given an array of
integers, and you are told to sort the integers in a zigzag pattern. In general, in
a zigzag pattern, the first integer is less than the second
integer, which is greater than the third integer, which is less than the fourth
integer, and so on. Hence, the converted array should be in the form of e1 < e2
> e3 < e4 > e5 < e6.
Test cases: Input 1:
7
4378621
26. 2
Output 1:
3748261
Input 2:
4
1432
Output 2:
1423
The problem to rearrange positive and negative numbers in an array .
Method: This approach moves all negative numbers to the beginning and
positive numbers to the end but changes the order of appearance of the
elements of the array.
Steps:
Test case:
• Input: 1 -1 2 -2 3 -3
Output: -1 -2 -3 1 3 2
Program to find the saddle point coordinates in a given matrix. A saddle point
28. is an element of the matrix,which is the minimum element in its row and the 2
maximum in its column.
For example, consider the matrix given belowMat [3][3]
123
456
789
Here, 7 is the saddle point because it is the minimum element in its row and
maximum element in its column.
Steps to find the saddle point coordinates in a givenmatrix.
30. Write a java program to delete vowels from given string using StringBuffer 2
class
Class definition, creating objects and constructors:
Write a java program to create a class named 'Bank ' with the following data
members:
• Name of depositor
• Address of depositor
• Account Number
• Balance in account
31. 2
Class 'Bank' has a method for each of the following:
1. Generate a unique account number for each depositor.
2. For first depositor, account number will be 1001, for second depositor
it will be 1002 and so on
3. Display information and balance of depositor
4. Deposit more amount in balance of any depositor
5. Withdraw some amount from balance deposited.
6. Change address of depositor
After creating the class, do the following operations.
1. Enter the information (name, address, account number, balance) of the
depositors. Number of depositors is to be entered by the user.
2. Print the information of any depositor.
3. Add some amount to the account of any depositor and then display
final information of that depositor.
4. Remove some amount from the account of any.
depositor and then display final information of that depositor.
5. Change the address of any depositor and then display the final
information of that depositor.
6. Randomly repeat these processes for some other
bank accounts.
Define a class Word Example having the followingdescription:
Data members/instance variables:
sentence which
32. may be terminated by either’.’, ‘? ’or’!’ only. The wordsmay be separated by 2
more than one blank space and are in UPPER CASE.
Member Methods:
void countWord(): Find the number of wordsbeginning and
ending with a vowel.
void placeWord(): Place the words which begin andend with a vowel at the
beginning, followed by the remaining words as they occur in the sentence
Method overloading (Compile time Polymorphism):
Write a Java program to create a class called
ArrayDemo and overload arrayFunc() function.
Example:
Input :
int[] A = { 1, 5, 6, 7, 8, 10 }
int[] B = { 2, 4, 9 }
Output:
Sorted Arrays:
A: [1, 2, 4, 5, 6, 7]
B: [8, 9, 10]
(Use Compile time Polymorphism MethodOverloading)
Method overriding (Runtime Polymorphism), Abstract class and Abstract
method, Inheritance, interfaces:
Write a java program to calculate the area of a rectangle, a square and a circle.
Create an abstract class 'Shape' with three abstract methods namely
rectangleArea() taking two parameters, squareArea() and circleArea() taking
34. one parameter each. 2
Now create another class ‘Area’ containing all the three methods
rectangleArea(), squareArea() and circleArea() for printing the area of
rectangle, square and circle respectively. Create an object of class Area and call
all the three methods.
(Use Runtime Polymorphism)
Write a java program to implement abstract class andabstract method with
following details:
Write a java program to accept and print the employee details during runtime.
The details will include employee id, name, dept_ Id. The program should
raise an exception if user inputs incomplete or incorrect data. The entered
value should meet the following conditions:
If the above conditions are not met, then the application should raise specific
exception else should complete normal execution.
Create a class MyCalculator which consists of a single method power (int, int).
This method takes two integers, n and p, as parameters and finds np. If either
n or p is negative, then the method must throw an exception which says, "n
and p should be non- negative".
Input Format
Each line of the input contains two integers, n and p. Output Format
Each line of the output contains the result, if neither of n and p is negative.
Sample Input
35
38. 2 4 2
00
-1 -2
-1 3
Sample Output
243
16
java.lang.Exception: n and p should not be zero. java.lang.Exception: n or p
should not be negative. java. lang. Exception: n or p should not be negative.
Explanation
In the first two cases, both n and p are positive. So, the power function returns
the answer correctly.
In the third case, both n and p are zero. So, the exception, "n and p should not
be zero.” is printed.
In the last two cases, at least one out of n and p is negative. So, the exception,
"n or p should not be negative.” is printed for these two cases.
File Handling in Java:
Write a java file handling program to count and display the number of
palindromes present in a text file "myfile.txt".
39. Example: If the file "myfile.txt" contains the following lines, 2
My name is NITIN
Hello aaa and bbb wordHow are You
ARORA is my friendOutput will be => 4
Multithreaded programming:
Write a program MultiThreads that creates two threads-one thread with the
name CSthread and the other thread named ITthread.
40.
Each thread should
display its respective name and execute after a gap of 500 milliseconds. Each
thread should also display a number indicating the number of times it got a
chance to execute.
Write a java program for to solve producer consumer problem in which a
41. producer produces a value and consumer consume the value before producer 2
generate the next value
Collection and Generic Framework:
Write a method removeEvenLength that takes an ArrayList of Strings as a
42.
parameter and that removesall the strings of even length from the list.
(Use ArrayList)
Write a method swapPairs that switches the order of values in an ArrayList of
Strings in a pairwise fashion. Your method should switch the order of the first
two values, then switch the order of the next two, switch the order of the next
two, and so on.
For example, if the list initially stores these values: {"four", "score", "and",
"seven", "years",
"ago"} your method should switch the first pair, "four", "score", the second
43. pair, "and", "seven", and the third pair, "years", "ago", to yield this list: 2
{"score", "four", "seven", "and", "ago", "years"}
If there are an odd number of values in the list, the final element is not moved.
For example, if the original list had been: {"to", "be", "or", "not", "to", "be",
"hamlet"} It would again switch pairs of values, but the final value, "hamlet"
would not be moved, yielding this list: {"be", "to", "not", "or", "be", "to",
"hamlet"}
Write a method called alternate that accepts two Listsof integers as its
parameters and returns a
new List containing alternating elements from the twolists, in the
following order:
• First element from first list
• First element from second list
• Second element from first list
• Second element from second list
44. • Third element from first list 2
• Third element from second list
If the lists do not contain the same number of elements, the remaining elements
from the longer list should be placed consecutively at the end. For example,
for a first list of (1, 2, 3, 4, 5) and a second
list of (6, 7, 8, 9, 10, 11, 12), a call of alternate (list1,
list2) should return a list containing (1, 6, 2, 7, 3, 8, 4,
9, 5, 10, 11, 12). Do not modify the parameter lists passed in.
AWT & Swing, Event Handling:
Write a GUI program to develop an application that receives a string in
one text field, and count number ofvowels in a string and returns it in
another text field, when the button named “CountVowel” is clicked.
When the button named “Reset” is clicked it will resetthe value of
textfield one and Textfield two.
When the button named “Exit” is clicked it will closed the application.
45. 2
46. • Name 2
• Code
• Designation
• Salary
a) Write a java program to create GUI java application to take
employee data from the TextFields and store it in database
using JDBC connectivity.
b) Write a JDBC Program to retrieve all the records from the
employee database.
Total 48
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
2. Contact Hours: L: 0 T: 1 P: 2
5. Credits: 2
6. Semester: 4
7. Category of Course: DC
8. Pre-requisite: PEC151/251 Basic Electronics Engineering Lab, PCS 308 Logic design lab
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Remember 8085 and 8086 instruction set.
CO2: Understand different assembly language programs on
microprocessor-based microcomputer kit.
CO3: Apply the programming concepts to test and debug assembly
language programs in the laboratory.
CO4: Assemble various devices and memories with microprocessor for any
defined task.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate
10. Details of the Course:
Sl. List of problems for which student should develop program and execute Contact
No. in the Laboratory Hours
1. Write program in 8085 to swap two 8-bit numbers. 2
Write a program in 8085 to move a block of data bytes from one location to 1
2.
another location.
Write programs in 8085 to perform addition & subtraction of 8-bit number 1
3.
with carry / borrow.
4. Write a program in 8085 for addition of 16 bits numbers with carry. 1
5. 1
Write a program for multiplication of two 8-bit numbers in 8085.
6. 1
Write an ALP in 8085 to add two 8-bit BCD data.
(a) Write an ALP in 8085 to find larger number between two numbers. 2
7.
(b) Write an ALP in 8085 to find smaller number between two numbers.
8. 1
Write an ALP in 8085 to find largest /smallest in a series of n number.
9. 1
Write a program to find square root of a number in 8085.
10. Write a program for division of two 8 bit numbers in 8085. 1
11. Write a program in 8085 to count number of ones in an 8 bit number. 1
16. Write a program in 8086 to add and subtract two 8-bit BCD numbers. 1
Write a program in 8086 to convert a BCD number to its Binary code 1
17. equivalent.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
5. Credits: 2
6. Semester: IV
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Analyze algorithmic time and space complexity using asymptotic
notations.
1. Note: Input, output format for problem I, II and III is same and is given at the 2
end of this exercise.
I. Given an array of nonnegative integers, design a linear algorithm and
implement it using a program to find whether given key element is present in
the array or not. Also, find total number of comparisons for each input case.
(Time Complexity = O(n), where n is the size of input)
Input format:
The first line contains number of test cases, T. For each test case, there will be
three input lines. First line contains n (the size of array).
Second line contains n space-separated integers describing array.
Third line contains the key element that need to be searched in the array.
Output format:
The output will have T number of lines.
For each test case, output will be “Present” if the key element is found in the
array, otherwise “Not Present”.
Also for each test case output the number of comparisons required to search the
key.
Input: Output:
3 Present 3
5 Not Present 4
12 23 36 39 41 Present 3
41
8
21 39 40 45 51 54 68 72
69
10
101 246 438 561 796 896 899 4644 7999 8545
7999
Week 2:
Input format:
The first line contains number of test cases, T. For each test case, there will be
three input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array.
Third line contains the key element that need to be searched in the array.
Output format:
The output will have T number of lines.
For each test case T, output will be the key element and its number of copies in
the array if the key element is present in the array otherwise print “ Key not
present”.
Input format:
The first line contains number of test cases, T. For each test case, there will be
two input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array.
Output:
The output will have T number of lines.
For each test case T, print the value of i, j and k, if found else print “No sequence
found”.
Input format:
The first line contains number of test cases, T. For each test case, there will be
three input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array. Third line
contains the key element.
Output format:
The output will have T number of lines.
For each test case T, output will be the total count i.e. number of times such pair
exists.
Input Format:
The first line contains number of test cases, T. For each test case, there will be
two input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array.
Output Format:
The output will have T number of lines.
For each test case T, there will be three output lines. First line will give the
sorted array.
Second line will give total number of comparisons.
Third line will give total number of shift operations required.
Input Format:
The first line contains number of test cases, T. For each test case, there will be
two input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array.
Output Format:
The output will have T number of lines.
For each test case T, there will be three output lines. First line will give the
sorted array.
Second line will give total number of comparisons. Third line will give total
number of swaps required.
Input Format:
The first line contains number of test cases, T. For each test case, there will be
two input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array.
Output Format:
Input Format:
The first line contains number of test cases, T. For each test case, there will be
two input lines. First line contains n (the size of array).
4. Second line contains space-separated integers describing array. 1
Output Format:
The output will have T number of lines.
For each test case T, there will be three output lines. First line will give the
sorted array.
Second line will give total number of comparisons. Third line will give total
number of inversions required.
Input Format:
The first line contains number of test cases, T. For each test case, there will be
two input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array.
Output Format:
The output will have T number of lines.
For each test case T, there will be three output lines. First line will give the
sorted array.
Second line will give total number of comparisons. Third line will give total
number of swaps required.
Input Format:
The first line contains number of test cases, T. For each test case, there will be
three input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array. Third line
contains K.
Output Format:
The output will have T number of lines.
For each test case, output will be the Kth smallest or largest array element. If
no Kth element is present, output should be “not present”.
Input Format:
The first line contains number of test cases, T. For each test case, there will be
two input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array.
Output:
5. 2
The output will have T number of lines.
For each test case, output will be the array element which has maximum
occurrences and its total number of occurrences.
If no duplicates are present (i.e. all the elements occur only once), output should
be “No Duplicates Present”.
Input Format:
The first line contains number of test cases, T. For each test case, there will be
two input lines. First line contains n (the size of array).
Second line contains space-separated integers describing array. Third line
contains key
Output Format:
The output will have T number of lines.
For each test case, output will be the elements arr[i] and arr[j] such that
arr[i]+arr[j] = key if exist otherwise print 'No Such Elements Exist”.
III. You have been given two sorted integer arrays of size m and n. Design
an algorithm and implement it using a program to find list of elements which
are common to both. (Time Complexity = O(m+n))
Input Format:
First line contains m (the size of first array).
Second line contains m space-separated integers describing first array. Third
line contains n (the size of second array).
Fourth line contains n space-separated integers describing second array.
Output Format:
Output will be the list of elements which are common to both.
Note: Consider the following input format in the form of adjacency matrix for
graph based questions (directed/undirected/weighted/unweighted graph).
Week 6:
Input Format:
Input will be the graph in the form of adjacency matrix or adjacency list.
Source vertex number and destination vertex number is also provided as an
input.
Output Format:
Output will be 'Yes Path Exists' if path exists, otherwise print 'No Such Path
Exists'. Sample I/O Problem I:
II. Given a graph, design an algorithm and implement it using a program
to find if a graph is bipartite or not. (Hint: use BFS)
Input Format:
Input will be the graph in the form of adjacency matrix or adjacency list.
Output Format:
Output will be 'Yes Bipartite' if graph is bipartite, otherwise print 'Not Bipartite'.
Sample I/O Problem II:
Input Format:
Input will be the graph in the form of adjacency matrix or adjacency list.
Output Format:
Output will be 'Yes Cycle Exists' if cycle exists otherwise print 'No Cycle
Exists'. Sample I/O Problem III:
Week 7:
Note: Input, output format along with sample input output for problem I and II
is same and is provided at the end of problem II.
I. After end term examination, Akshay wants to party with his friends. All
his friends are living as paying guest and it has been decided to first gather at
Akshay’s house and then move towards party location. The problem is that no
one knows the exact address of his house in the city. Akshay as a computer
science wizard knows how to apply his theory subjects in his real life and came
up with an amazing idea to help his friends. He draws a graph by looking in to
location of his house and his friends’ location (as a node in the graph) on a map.
He wishes to find out shortest distance and path covering that distance from
7. each of his friend’s location to his house and then whatsapp them this path so 3
that they can reach his house in minimum time. Akshay has developed the
program that implements Dijkstra’s algorithm but not sure about correctness of
results. Can you also implement the same algorithm and verify the correctness
of Akshay’s results? (Hint: Print shortest path and distance from friends’
location to Akshay’s house)
Input Format:
Input will be the graph in the form of adjacency matrix or adjacency list. Source
vertex number is also provided as an input.
Output Format:
Output will contain V lines.
Each line will represent the whole path from destination vertex number to
source vertex number along with minimum path weigth.
III. Given a directed graph with two vertices ( source and destination).
Design an algorithm and implement it using a program to find the weight of the
shortest path from source to destination with exactly k edges on the path.
Input Format:
First input line will obtain number of vertices V present in the graph.
Graph in the form of adjacency matrix or adjacency list is taken as an input in
next V lines.
Next input line will obtain source and destination vertex number. Last input line
will obtain value k.
Output Format:
Output will be the weigth of shortest path from source to destination having
exactly k edges. If no path is available then print “no path of length k is
available”.
Note: Input, output format along with sample input output for problem I and II
is same and is provided at the end of problem II.
Input Format:
The first line of input takes number of vertices in the graph.
Input will be the graph in the form of adjacency matrix or adjacency list.
Output Format:
Output will be minimum spanning weight
III. Assume that same road construction project is given to another person.
The amount he will earn from this project is directly proportional to the budget
of the project. This person is greedy, so he decided to maximize the budget by
constructing those roads who have highest construction cost. Design an
algorithm and implement it using a program to find the maximum budget
required for the project.
Input Format:
The first line of input takes number of vertices in the graph.
Input will be the graph in the form of adjacency matrix or adjacency list.
Output Format:
Out will be maximum spanning weight.
Input Format:
The first line of input takes number of vertices in the graph.
Input will be the graph in the form of adjacency matrix or adjacency list. If a
direct edge is not present between any pair of vertex (u,v), then this entry is
shown as AdjM[u,v] = INF.
Output Format:
Output will be shortest distance matrix in the form of V X V matrix, where each
entry (u,v) represents shortest distance between vertex u and vertex v.
Input Format:
First input line will take number of items N which are provided.
Second input line will contain N space-separated array containing weights of
all N items. Third input line will contain N space-separated array containing
values of all N items.
Last line of the input will take the maximum capacity w of knapsack.
Output Format:
First output line will give maximum value that can be achieved.
Next Line of output will give list of items selected along with their fraction of
amount which has been taken.
III. Given an array of elements. Assume arr[i] represents the size of file i.
Write an algorithm and a program to merge all these files into single file with
minimum computation. For given two files A and B with sizes m and n,
computation cost of merging them is O(m+n). (Hint: use greedy approach)
Input Format:
First line will take the size n of the array. Second line will take array s an input.
Output Format:
Output will be the minimum computation cost required to merge all the
elements of the array.
Solved example: Consider arr[5] = { 10, 5, 100, 50, 20, 15}. As per the brute
force approach, first of all merge first two files (having 10 and 5 file size).
Cost of merging will be = 10+5=15. List will become {15, 100, 50, 20, 15}.
Similarly, again merging first two files ( i.e. having 15 and 100 file size). Cost
of merging will be = 15+100=115.
List will become {115, 50, 20, 15}.
For the subsequent steps the list becomes, (165, 20, 15}, {185, 15} and {200}.
Therefore total cost of merging = 15+115+165+185+200 = 680.
But this is not minimum computation cost. To find minimum cost, consider the
order arr[5] = {5, 10, 15, 20, 50, 100}. By applying the same approach, the total
cost of merging =
15+30+50+100+200 = 395.
Week 10:
I. Given a list of activities with their starting time and finishing time. Your
goal is to select maximum number of activities that can be performed by a single
person such that selected activities must be non-conflicting. Any activity is said
to be non-conflicting if starting time of an activity is greater than or equal to the
finishing time of the other activity. Assume that a person can only work on a
single activity at a time.
Input Format:
First line of input will take number of activities N.
Second line will take N space-separated values defining starting time for all the
N activities. Third line of input will take N space-separated values defining
finishing time for all the N activities.
Output Format:
10.Output will be the number of non-conflicting activities and the list of selected 2
activities.
II. Given a long list of tasks. Each task takes specific time to accomplish it
and each task has a deadline associated with it. You have to design an algorithm
and implement it using a program to find maximum number of tasks that can be
completed without crossing their deadlines and also find list of selected tasks.
Input Format:
First line will give total number of tasks n.
Second line of input will give n space-separated elements of array representing
time taken by each task.
Third line of input will give n space-separated elements of array representing
deadline associated with each task.
Output Format:
Output will be the total number of maximum tasks that can be completed.
Input Format:
First line of input will give size n of array.
Output Format:
First line of output will be 'yes' if majority element exists, otherwise print 'no'.
Second line of output will print median of the array.
Week 11:
Input Format:
First line of input will take number of matrices n that you need to multiply.
For each line i in n, take two inputs which will represent dimensions aXb of
matrix i.
1
Output Format:
Output will be the minimum number of operations that are required to
multiply the list of matrices.
II.Given a set of available types of coins. Let suppose you have infinite supply
of each type of coin. For a given value N, you have to Design an algorithm
and implement it using a program to find number of ways in which these coins
can be added to make sum value equals to N.
Input Format:
First line of input will take number of coins that are available. Second line of
input will take the value of each coin.
Third line of input will take the value N for which you need to find sum.
Output Format:
Output will be the number of ways.
Input: Output:
4 5
2563
10
Solved Example: Let coin value set is C = {2,3,6,5} and the value N = 10.
There are five solutions: {2,2,2,2,2}, {2,2,3,3}, {2,2,6}, {2,3,5} and {5,5}.
Hence the output is 5.
III.Given a set of elements, you have to partition the set into two subsets such
that the sum of elements in both subsets is same. Design an algorithm and
implement it using a program to solve this problem.
Input Format:
First line of input will take number of elements n present in the set. Second
line of input will take n space-separated elements of the set.
Output Format:
Output will be 'yes' if two such subsets found otherwise print 'no'.
Solved Example: Let set is S = {1, 5, 4, 11, 5, 14, 10}. Sum of the elements =
1+5+4+11+5+14+10 = 50. Now dividing the set into two halves such that sum
of elements of both the subsets = (50/2) = 25. Therefore, subsets are {1, 5, 5,
14} and {4, 11, 10}.
Week 12:
2
I.Given two sequences, Design an algorithm and implement it using a program
to find the length of longest subsequence present in both of them. A
subsequence is a sequence that appears in the same relative order, but not
necessarily contiguous.
Input Format:
First input line will take character sequence 1. Second input line will take
character sequence 2.
Output Format:
Output will be the longest common subsequence along with its length.
Input Format:
First line of input will provide number of items n.
Second line of input will take n space-separated integers describing weights
for all items. Third line of input will take n space-separated integers
describing value for each item.
Last line of input will give the knapsack capacity.
Output Format:
Output will be maximum value that can be achieved and list of items selected
along with their weight and value.
Input Format:
String of characters is provided as an input.
Output Format:
Output will be the list of all possible permutations in lexicographic order.
Week 13:
I.Given an array of characters, you have to find distinct characters from this
array. Design an algorithm and implement it using a program to solve this
problem using hashing. (Time Complexity = O(n))
Input Format:
First line of input will give the size n of the character array.
Second line of input will give n space-separated elements to character array.
Output Format: Output will be the list of characters present in the array in
alphabetical order and frequency of each character in the array.
Input Format:
First input line contains number of test cases T. For each test case T, there will
be three input lines. First line contains size n of array.
Second input line contains n space-separated array elements. Third input line
2
contains value k.
Output Format:
Output will have T number of lines.
For each test case, output will be “Duplicate present in window k” if the
duplicate element is found in the array, otherwise “Duplicate not present in
window k”.
Input Format:
First line of input will give size of array n.
Second line of input will give n space-separated array elements.
Output Format:
First line of output will give pair (a,b) Second line of output will give pair
(c,d).
Input:
First line of input will give number of test cases T. For each test case T, enter
a number n.
Output:
There will be T output lines.
For each test case T, Output will be nth ugly number.
1
Sample I/O Problem I:
Input:
Graph in the form of adjacency matrix or adjacency list is provided as an
input.
Output:
Output will be the mother vertex number. Solved Example: Consider a
directed graph: In this graph, vertex 0 is mother vertex.
Total 24
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication /
Reprint
Textbooks
1. Thomas H. Cormen, Charles E. Leiserson, Ronal L. 2nd 2006.
Rivest, Clifford Stein:” Introduction to Algorithms”,
2nd Edition, PHI,
Reference Books
1. Donald E.Knuth:”The Art of Computer Programming: 3rd 1997
Volume 1: Fundamental Algorithms”,3rd Edition
2 Ellis Horowitz, Sartaj Sahni, SanguthevarRajasekaran:” 2nd 2007
Fundamentals of Computer Algorithms”, 2nd Edition,
University press,.
12. Mode of Test / Quiz / Assignment / Mid Term Exam / End Term Exam
Evaluation
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
5. Credits: 3
6. Semester: 4
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: represent mathematical and other knowledge using logical formalism
CO2: understand the history of formalizing mathematical knowledge
CO3: know and understand the advantages and limitations of the main approaches
and techniques in automated reasoning of mathematical knowledge
CO4: apply different automated reasoning techniques to new problems
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate
10.Details of the Course:
Contact
Sl. No. Contents
Hours
Unit 1: Introduction and motivation: Role of logic in Computer Science, problem
1 representation. Basic notions: language, models, interpretations, validity, proof, 8
decision problems in logic. decidability.
Unit 2: Propositional logic: Syntax, semantics, proof systems, Validity,
2 satisfiability and unsatisfiability, soundness and completeness. 8
12. Mode of Test / Quiz / Assignment / Mid Term Exam / End Term Exam
Evaluation
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
Introduction to cryptography
1. Subject Code: TCS 493 Course Title: and PKC
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 4th
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1 Explain symmetric and asymmetric key cryptosystems.
CO2: Know the working of cryptography techniques.
CO3: Analyze the different types of cryptosystems.
CO4: Use cryptographic techniques to implement information
security protocols.
CO5: Apply cryptographic techniques in different applications.
CO6: Develop symmetric and asymmetric key cryptosystems.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate
10.Detailed Syllabus
UNIT CONTENTS Contact
Hrs
Unit-I
Basics of cryptography
5. Unit-V 10
Digital signature and message integrity mechanisms
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
5. Credits: 3
6. Semester: 4
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1Information Security and Risk Management
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate
10. Detailed Syllabus
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER IV
2. Contact Hours: L: T: 0 P: 0
5. Credits: 03
6. Semester: 4
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Basic information on the fundamental physical and organic science.
CO2: Understand designing standards of biometric frameworks.
CO3: Understand biometric frameworks and be able to examine and design for essential
biometric framework applications.
CO4: Understand various Biometric security issues.
CO5: Describe Cryptography security
CO6: Understanding of Fuzzy model
** Describe the specific knowledge, skills or competencies the students are expected to acquire
or demonstrate
10.Details of the Course:
Sl. Contact
Contents
No. Hours
Unit 1: Introduction- Authentication systems, Development of biometric
authentication. Basic terms, biometric data, biometric characteristics,
biometric features, biometric templates and references. Expected properties of
1 09
biometric identifiers. Basics in biometric errors estimation. Enrolment,
verification and identification. Applications of Biometrics.
Unit 3:
3 Biometric System Security: Secure transfer of biometric data. Secure storage, 10
use of smart cards, principles of match-off-card and match-on-card
techniques. Biometrics in the cloud. Points of attack. Privacy models.
Spoofing: Static and dynamic liveness features. Liveness detection in
biometrics. Selected liveness detection techniques, frequency analysis for
paper printouts detection.
Unit 4:
4 Protection: Overview of principles from cryptography to secure fuzzy data. 08
Template protection strategies: feature protection, key-binding, key-
generating, hybrids.
Unit 5:
Reference Books
1. 1. John Chirillo and Scott Blaul,” Implementing Biometric 2005
Security”, Wiley Eastern Publications, 2005
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: V
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Define system software and differentiate system software with other software’s.
CO2: Assess the working of Assembler, Loader/Linker and Macroprocessor.
CO3: Understand the concept of passes in translators.
CO4: Determine the purpose of linking, and types of linking.
CO5: Develop the system software according to machine limitations.
CO6: Compare and Contrast the various text editors.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
3. Contact Hours: L: 3 T: 0 P: 0
0
4. Examination Duration (Hrs): Theory 3 Practical
6. Credits: 3
7. Semester: 4
8. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome CO1 Understand the concept and design issues associated with an operating system.
**:
CO2: Identify the problems related to process management, synchronization and apply
learned methods to solve basic problems.
CO3. Explain the basics of memory management and the use of virtual memory in
modern operating systems.
CO6: Analyze the data structures and algorithms used for developing an operating
system.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
10.Details of the Course:
Sl. Contact
Contents
No. Hours
Introduction to Operating Systems, UNIX: What operating systems do; Operating
System structure; Operating System Services; User - Operating System interface; System
1 8
calls; Types of system calls; Operating System structure; Unix command: Command
Structure, Internal and External commands, filters; vi editor.
Process Management: Process concept; Operations on processes; Multithreading
models; Threading issues. Process Scheduling: Basic concepts; Scheduling criteria;
Scheduling algorithms; Multiple-Processor scheduling; Thread scheduling.
2 10
Process Synchronization: Inter-process communication; Synchronization: The Critical
section problem; Peterson’s solution; Synchronization hardware; Semaphores; Classical
problems of synchronization.
Deadlocks: Deadlocks: System model; Deadlock characterization; Methods for handling
deadlocks; Deadlock prevention; Deadlock avoidance; Deadlock detection and recovery
from deadlock.
3 Memory Management: Memory Management Strategies: Background; Swapping; 10
Contiguous memory allocation; Paging; Structure of page table; Segmentation. Virtual
Memory Management: Background; Demand paging; Page replacement; Allocation of
frames; Thrashing
File System, Implementation of File System: File System: File concept; Access
methods; Directory structure; Protection. File system structure; Directory
implementation; Allocation methods; Free space management.
4 8
Secondary Storage Structures: Mass storage structures; Disk structure; Disk scheduling;
Disk management; Swap space management. Protection: Goals of protection, Principles
of protection, Access matrix.
File System, Implementation of File System: File System: File concept; Access
methods; Directory structure; Protection. File system structure; Directory
implementation; Allocation methods; Free space management.
5 8
Secondary Storage Structures: Mass storage structures; Disk structure; Disk
scheduling; Disk management; Swap space management. Protection: Goals of protection,
Principles of protection, Access matrix.
Total 44
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication /
No. Reprint
Textbooks
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne: 7st 2006
Operating System Principles, 7th edition, Wiley India,
2006.
2. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne: 7th 2006
Operating System Principles, 7th edition, Wiley India, 2006.
3. Unix concepts and applications – Sumitabha Das 1st 2005
Reference Books
1. Andrew S Tanenbaum: Operating Systems: Design and 3rd 2006
Implementation, 3rd edition, Prentice Hall, 2006
2. Stuart E. Madnick, John Donovan: Operating Systems, 2008
Tata McGraw Hill, 2008
10.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
Name of Department: - Computer Science and Engineering
Database Management
1. Subject Code: TCS-503 Course Title: System
2. Contact Hours: L: 3 T: 0 P: 0
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the different issues involved in the design and implementation of a
database system.
CO2: Study the physical and logical database designs, database modeling, relational,
hierarchical, and network models.
CO3: Understand and use data manipulation language to query, update, and manage a
database.
CO4: Develop an understanding of essential DBMS concepts such as: database security,
integrity, concurrency.
CO5: Design and build a simple database system and demonstrate competence with the
fundamental tasks involved with modeling, designing, and implementing a DBMS.
CO6: Evaluate a business situation and designing & building a database application
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
10.Details of the Course:
Sl.
Contents Contact Hours
No.
Unit 1:
Introduction: An overview of DBMS; Advantages of using DBMS
approach; Database systems vs File Systems, Database system concepts
and architecture
1 Data models, schemas, and instances; Three-schema architecture and data 9
independence; Database languages and interfaces; The database system
environment; Centralized and client-server architectures; Classification of
Database Management systems.
Unit 2:
Entity-Relationship Model: Using High-Level Conceptual Data Models
2 9
for Database Design; An Example Database Application; Entity Types,
Entity Sets, Attributes and Keys; Relationship types, Relationship Sets,
Roles and Structural Constraints; Weak Entity Types; Refining the ER
Design; ER Diagrams, Naming Conventions and Design Issues;
Relationship types of degree higher than two.
Unit 5:
Transaction Management: The ACID Properties; Transactions and
Schedules; Concurrent Execution of Transactions; Lock- Based
Concurrency Control; Performance of locking; Transaction support in SQL;
5 Introduction to crash recovery; 2PL, Serializability and Recoverability; 10
Lock
9Management; Log Files; Checkpointing; Recovering from a System Crash;
Media Recovery
Total 48
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication /
Reprint
Textbooks
1. McGraw-Hill. Date K., Swamynathan S. An Introduction to 2nd 2012
Database Systems. Eight Edition. Pearson.
2. Elmasri R. and Navathe S.B., Fundamentals of Database 2nd 2012
Systems.
3. Fifth Edition.Pearson. Singh S.K., Database Systems- 2nd 2011
Concepts, Designs and Application. 2nd Edition. Pearson
4. Date, C.J. Introduction to Database Systems (Vol I & II) 8th 8th 2004
Edition. Addison- Wesley.
Reference Books
1. Silberschatz A. Korth H. F. Sudarshan S., Database System 1st 2014
Concepts. Sixth Edition
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 5
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome* CO1: Develop the notation of errors, finding of errors, roots and apply them in problem
*: solving in concern subject.
CO2: Understand the methods of interpolation techniques and apply them.
CO3: Elaborate the basics of numerical differentiation and integration and implement
them.
CO4: Explain the concepts of differential equation.
CO5: Elaborate the basics of correlation and regression, curve fitting and be able to
apply the methods from these subjects in problem solving.
CO6: Examine statistical techniques and able to relate these to real problems.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Total 45
11. Suggested Books:
SL Name of Authors/Books/Publishers/Place of Edition Year of
. Publication Publication /
N Reprint
o.
Textbooks
1. Gupta C. B. Singh S. R. and Kumar Mukesh First 2016
“Engineering Mathematics for Semesters III and IV” edition
McGraw Hill Education,
2. Rajaraman V, “Computer Oriented Numerical First 2020
Methods”, Pearson Education. edition
Reference Books
1. Sastry, S. S, “Introductory Methods of Numerical Second 2009
Analysis”, Pearson Education.
2. Jain, Iyengar and Jain, “Numerical Methods for Fourth 2003
Scientific and Engineering Computations”, New Age
Int.
12 Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 0 T: 1 P: 2
6. Semester: 5th
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Students get practical knowledge on designing and analysis of conceptual model
and mapping of conceptual model to relational database systems.
CO2: Design and implement SQL queries using DDL and DML concepts for updation
and managing a database.
CO3: Design and implement advance SQL queries such as relational constraints,
joins, set operations, aggregate functions, and views.
CO4: Design and implement queries using optimization techniques.
CO5: Application of transaction control language (TCL), data control language
(DCL) in SQL to evaluate practical implications of DBA such as transaction,
recovery, and security.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Sl. List of problems for which student should develop program and execute in Contact
No. the Laboratory Hours
Problem Statement 1:
Granting Permissions: Data Control Language (DCL) Commands: 2
1.
Grant/Revoke.
Problem Statement 2:
Creation of database/tables for different applications (DDL commands):
2. 2
Creating tables (without constraints)
3. Problem Statement 3: 2
Creation of database/tables for different applications (DDL commands):
Creating tables (with Column level and Table level constraints)
Problem Statement 4:
Inserting data into database (DML Commands): updating / deleting records in a
4. table. 2
Problem Statement 5:
5. TCL command: saving (commit) and undoing (rollback) 2
Problem Statement 6:
6. Data retrieval (DR) command: Fetching data from database using SELECT, 2
FROM and WHERE command (Projection and Selection)
Problem Statement 7:
7. 2
Perform the following: Altering a Table, Dropping/ Truncating/ renaming
Tables, backing up/ restoring a database
Problem Statement 8:
For a given set of relational schemas, create tables and perform the following:
8. Simple queries; Simple queries with aggregate functions (group by and having 2
clause).
Problem Statement 9:
Queries involving, Date functions, string functions (character manipulations and
9. 2
case manipulation functions)
Text Books
Reference Books
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 5
7. Category of Course: DE
8. Prerequisite: TCS-451
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Recognize the cloud based application development platforms and
economic benefits.
CO2: Analyze the use case of various cloud service provider’s applications and
platforms.
CO6: Develop and deploy the cloud based server-side application using Node.js
and the front-end using React.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: V
7. Category of Course: DE
9. Course After completion of the course, the students will be able to:
Outcome**: CO1: Create and adapt visualizations to represent complex data sets and
emphasize targeted concepts for effective communication
CO2: Analyze and interpret large volumes of data to identify patterns, trends,
and insights.
CO3: Apply data visualization techniques to communicate complex data sets
effectively.
CO4: Develop skills in storytelling with data, effectively conveying narratives
through visual representations.
CO5: Demonstrate proficiency in using tools and technologies for big data
visualization.
CO6: Use leading open-source and commercial software packages (Tableau) to
create and publish visualizations that enable clear interpretations of big,
complex, and real-world data
** Describe the specific knowledge, skills, or competencies the students are expected to acquire or
demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: V
7. Category of Course: DE
8. Pre-requisite: NA
9. Course After completion of the course the students will be able to:
Outcome**:
CO1: Understand the common network communication primitives as part of
programming tasks in various languages.
CO3: Analyze more complex protocol engineering and network management tasks
CO5: Describe and analyze the Data Encoding and Transmission techniques.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Unit 3:
Data Encoding and Transmission: Data encoding and transmission concepts,
Digital data transmission over digital signal: NRZ encoding, Multilevel binary
encodings, Biphase encodings, Scrambling techniques, Digital data transmission
over analog signal: Public telephone system, Amplitude Shift Keying (ASK),
3 Frequency Shift Keying (FSK), Phase Shift Keying (PSK), Performance of digital 10
to analog modulation schemes, Quadrature Amplitude Modulation (QAM), Analog
data transmission over digital signal: Digitization, Pulse Code Modulation, Non-
linear encoding, Delta modulation, Analog data transmission over analog signal:
Asynchronous transmission, Synchronous transmission, Ethernet link layer frame
example.
Unit 4:
4 Data Link Control: Introduction and services, Error detection and correction, 8
Multiple access protocols, LANs, Addressing & ARP, Ethernet, Switches, VLANs,
PPP, Link virtualization, MPLS, Data center networking, Web request processing.
Unit 5: Wireless and Mobile Networks
Reference Books
1. Seymour Lipschutz, Data Structures Schaum's Outlines, 1st 2014
McGraw Hill
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
Name of Department: - Computer Science and Engineering
Computer System Security
1. Subject Code: Course Title:
TCS 591
2. Contact Hours: L: 3 T: 0 P: 0
9. Course After completion of the course, the students will be able to:
Outcome**: CO1: Explain different security threats and attacks.
Unit 3:
Web Security:
Same origin Policy, Cross site scripting attack, Cross site request forgery attack,
3 10
Sql Injection attack, Clickjacking attack, Content Security Policies (CSP) in
web, Web Tracking, Session Management and User Authentication, Session
Integrity, Https, SSL/TLS, Threat Modelling
Unit 4:
Smartphone Security:
Android vs. ioS security model, threat models, information tracking, rootkits,
4 9
Access control in Android operating system, Rooting android devices,
Repackaging attacks, Attacks on apps, Whole- disk encryption, hardware
protection, Viruses, spywares, and keyloggers and malware detection
Unit 5:
Hardware and system security:
Meltdown Attack, spectre attack, Authentication and password, Access control
5 6
concept, Access control list, Capability, Sandboxing, Threats of Hardware
Trojans and Supply Chain Security, Side Channel Analysis based Threats, and
attacks. Issues in Critical Infrastructure and SCADA Security.
Total 45
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: P: 0
5. Credits: 3
6. Semester: V
7. Category of Course: DE
8. Pre-requisite: Design and Analysis of Algorithm, Fundamental of Statistics and AI (TCS 421 /
Statistical Data Analysis with R (TCS 471), Discrete Structures and Combinatorics (TMA 316)
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Acquire concepts and methods in statistical machine learning
CO2: Analyze fundamental principles of machine learning algorithms
CO3: Understand machine learning motivated by case-studies
CO4: Investigate and evaluate key topics in machine learning
algorithms for data science industry
** Describe the specific knowledge, skills, or competencies the students are expected to acquire or
demonstrate.
Unit 2:
Unsupervised Learning
Clustering, Clustering methods – Partition vs. Hierarchical, k-Means and k-
2 8
Medoids, Hierarchical: Agglomerative & Divisive, Error Analysis in Clustering,
Ensemble - clustering, Case study: Clustering in Health care, Causal cluster,
Graph cluster
Unit 3:
Supervised Learning
Main objectives and types of Supervised methods (Parametric, Semi parametric,
3 Non-parametric), Linear Regression and Weiner filter, Grammar based/
10
Inductive learning - Decision Trees – CART, ID-3, Pruning metrics for tree; D-
tree examples, Linear SVM (basics and V-C bound), k-NN rule and examples,
Learning as Factorization, Ensemble learning: Bagging, Boosting. Case studies:
covered for mentioned Supervised learning techniques.
Unit 4:
Reinforcement & Interaction Learning
4 Basic model of Reinforcement Learning as game (Agent, Critic, Environment),
8
Optimal policy & Q – values, Bellman equation, Case studies on R Learning
Active learning, Deep Reinforcement, Transfer learning with examples,
Federated Machine Learning with examples.
Unit 5:
Special topics in Machine Learning
Sentiment Mining: NLP pipeline process, Data Analytics – Big data and Hadoop
5 8
model, Business Analytics – Competitive Machine Learning, ANN building
blocks (problem solving), Deep learning, Feed forward, Backpropagation, C-
NN, Recurrent-NN.
Total 48
Reference Textbooks
1. Machine Learning – Tom M. Mitchell, Mc Graw Hill 1st 2017
Publisher
2. Introduction to Machine Learning – E. Alpaydin, PHI 3rd. 2015
Publisher
5. Credits: 3
6. Semester: 5
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the concepts of Artificial Intelligence and Data Science
with their related terminologies.
CO2: Analyze and Apply various programming skills for understanding
Data nature and its requirements.
CO3: Analyze and apply various modelling techniques for basic data
Analytics.
CO4: Demonstrate Problem Solving using AI algorithms.
CO5: Understand, Apply and Demonstrate different techniques and tools
for Data Analysis.
CO6: Analyze Real World Case Studies on Applications of Data Science.
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Unit 02:
2 Introduction to Data, Types, Data Preprocessing, Understanding 10
Data Requirements, Dealing with Erroneous/Missing Values,
Standardizing Data, Steps involved in EDA using Python
Programming/R.
Knowledge and Reasoning in AI: Knowledge based Agents, Syntax
and Semantics, Forward Chaining, Backward Chaining, Knowledge
Engineering, Belief Network
Unit 3:
Introduction to Modelling Techniques, Supervised Learning
Algorithms- Regression, Classification, and Unsupervised Learning
3 Algorithms- Clustering, Association Rule Mining 10
Feature Selection, Dimensionality Reduction, Independent and
Dependent Variables, Relationship between Variables: Correlation,
Multicollinearity, Factor Analysis, Treatment of Outliers
Unit 4:
4 Problem Solving Agent, Formulating Problems, Example Problems, 10
Uninformed Search Methods, Informed Search Method, Local
Search Methods, Genetic algorithms, Adversarial Search
Unit 5:
Applications of Analytics in Healthcare, Applications of Analytics in
5 Agriculture, Applications of Analytics in Business, Applications of 8
Analytics in Sports, Forms of Learning, Introduction to Expert
Systems, Expert System Architecture, Capstone Project
Total 48
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Deepak Khemani, A First Course in Artificial 6th 2018
Intelligence, McGraw Hill Education
2. N. P. Padhy, Artificial Intelligence and 1st 2005
Intelligent Systems, Oxford
3 B.Uma Maheshwari, R.Sujatha, Introduction to Data 1st 2021
Science, Wiley
4 Jake VanderPlas, Python Data Science Handbook, 1st 2022
O’Reilly
Reference Books
1. Stuart J. Russell and Peter Norvig, Artificial Intelligence 3rd 2009
a Modern Approach, McGraw Hill
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 5
7. Category of Course: DE
8. Pre-requisite:
9. Course After completion of the course the students will be able to:
Outcome**: CO1: To discuss multimodal data and its applications
CO2: To apply text processing techniques in the relevant applications
CO3: To analyze various speech processing approaches
CO4: To create a model based on digital image and video processing
CO5: To analysis data of imbalance for multimodal design
CO6: To compare various types of processing such as Text process,
Speech processing, Image and Video processing
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 5
7. Category of Course: DE
8. Pre-requisite:
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Clean up, format and analyze data to prepare for interactives
CO2: Design visualizations that represent the relationships contained
in complex data sets and adapt them to highlight the ideas we want to
communicate
CO3: Use principles of human perception and cognition in
visualization design.
CO4: Identify the statistical analysis needed to validate the trends
present in data visualizations.
CO5: Critically evaluate visualizations and suggest improvements and
refinements.
CO6: Use leading open source and commercial software packages
(Tableau) to create and publish visualizations that enable clear
interpretations of big, complex and real world data
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 5
7. Category of Course: DC
8. Pre-requisite:
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Ability to compare different AI algorithms in terms of design issues,
computational complexity, and
assumptions
CO2: Apply basic search techniques and AI algorithms for problem solving
CO3: Identify the machine learning algorithms which are more appropriate for
various types of learning tasks in
various domains
CO4: Analyse and Differentiate various classification approaches
CO5: Implement machine learning algorithms on real datasets
CO6: The student will learn about the basic concepts of ANN and CNN
** Describe the specific knowledge, skills or competencies the students are expected to acquire or
demonstrate.
Reference Books
1. Dan W. Patterson, Introduction to Artificial Intelligence 1st 2015
and Expert Systems, Pearson
Education India
2. Devroye L., Gyorfi L., Lugosi G., A Probabilistic 1st 1996
Theory of Pattern Recognition, Springer
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
5. Credits: 3
6. Semester: 5
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Use logic programming and knowledge representation languages for
modelling simple application domains in Artificial Intelligence
CO2: Apply reasoning mechanisms in knowledge representation languages to test
the correctness of models and to formulate more expressive queries.
CO3: Design ontology-based knowledge systems with reasoning mechanism;
integrate with other systems for building applications.
CO4: Understand the entire process of how to design, construct, and query a
knowledge graph to solve real-world problems.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Contact
Sl. No. Contents
Hours
Principles of knowledge representation, Propositional Logic- Proof
Systems, Natural Deduction, Tableau Method, Resolution Method. First
1 Order Logic Syntax and Semantics, Unification, Forward Chaining, Horn 10
Fragments of First Order Logic.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
2. Contact Hours: L: 3 T: 1 P: 0
5. Credits: 3
6. Semester: V
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO 1: Understand the basics of the theory and practice of Artificial Intelligence.
CO 2: Learn the basics of Artificial Intelligence programming.
CO 3: Understand various searching techniques use to solve the AI problems.
CO 4: Apply knowledge representation techniques and problem solving strategies to
common AI applications.
CO 5: Build self-learning and research skills to tackle a topic of interest on his/her
own or as part of a team.
CO 6: Apply the knowledge of AI and agents in developing multidisciplinary real
world projects
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Reference Books
1. Stuart J. Russell and Peter Norvig, Artificial Intelligence a 3rd 2009
Modern Approach, McGraw Hill
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
5. Credits: 2
6. Semester: V
7. Category of Course: DC
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
To register and use Teachable machine (Google API) and perform multiple
6 2
class / pose analysis and classification.
To use quillbot.com and study basic machine transcription roles in
7 summarization: as NLP application 2
6. Semester: V
7. Category of Course: DC
Unit 5: Link Layer and Local Area Networks: Introduction to Link Layer and
its services, Where Link Layer is implemented? Error detection and correction
techniques: Parity checks, Checksum, CRC; Multiple Access protocols:
5 Channel Partitioning, Random Access (Slotted Aloha, Aloha, CSMA), Taking 10
Turns; Link Layer Addressing: MAC addresses, ARP, Ethernet, CSMA/CD,
Ethernet Technologies, Link Layer Switches, Switches vs Routers, VLANS
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publicati
on /
Reprint
Textbooks
1. Computer Networking: “A Top Down Approach (5th edition)”, 7th 2017
Ross and Kurose, Pearson/Addison-Wesley
Reference Books
1. Andrew Tanenbaum and David Wetherhall, “Computer Networks”, 5th 2010
Prentice Hall
2. Peterson and Davie, “Computer Networks: A System Approach”, 4th 2007
Elsevier
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
2. Contact Hours: L: 0 T: 0 P: 2
5. Credits: 2
6. Semester: 5th
7. Category of Course: DC
Problem Statement 4:
Problem Statement 6:
6. To configure a local DNS server to resolve domain names within a network. 2
(Using packet Tracer)
Problem Statement 7:
7. To analyze complete TCP/IP protocol suite layer’s headers using Wire 2
Shark
Problem Statement 8:
Static Routing: Configure static routes on multiple routers to enable
8. 2
communication between different networks. Test the connectivity by pinging
between hosts in different networks. (Using packet Tracer)
Problem Statement 9:
Dynamic Routing (RIP): Configure routers to use the Routing Information
Protocol (RIP) for dynamic routing. Enable RIP on the interfaces connected
9. 2
to different networks and verify that routes are being learned and propagated.
Test the connectivity between hosts in different networks. (Using packet
Tracer)
Problem Statement 10:
Dynamic Routing (OSPF): Configure routers to use the Open Shortest Path
First (OSPF) routing protocol. Set up OSPF on the routers and advertise
10. 2
network information. Verify that OSPF is establishing neighbor relationships
and propagating routes. Test connectivity between hosts in different
networks. (Using packet Tracer)
Problem Statement 11:
TCP Client-Server Communication:
Implement a TCP client program that sends a message to a TCP server
program.
11. Implement the corresponding TCP server program that receives the message 2
and displays it.
Test the communication between the client and server by exchanging
messages
(Using ‘C’ Language)
Problem Statement 12:
UDP Client-Server Communication:
Implement a UDP client program that sends a message to a UDP server
12. program. 2
Implement the corresponding UDP server program that receives the message
and displays it
(Using ‘C’ Language)
Optional programs for advanced learner
1. 2
Problem Statement 1:
File Transfer using TCP:
Implement a UDP client program that sends a domain name to a DNS server.
3. 2
Implement the corresponding DNS server program that resolves the domain
name to an IP address.
The server should send the resolved IP address back to the client.
Test the program by performing DNS lookups for different domain names
Problem Statement 4:
HTTP Server using TCP:
Implement a TCP server program that acts as an HTTP server.
4. 2
The server should be able to handle HTTP requests and send back appropriate
HTTP responses.
Test the server by accessing it through a web browser and requesting different
resources.
Problem Statement 5:
Text Books
Reference Books
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER V
3 0 0 ProfessionaCommuni
2. Contact Hours: L: T: P:
cation
6. Semester: 5th
7. Category of Course: DE
Web Security:
Same origin Policy, Cross site scripting attack, Cross site request forgery
3 attack, Sql Injection attack, Clickjacking attack, Content Security Policies 10
(CSP) in web, Web Tracking, Session Management and User Authentication,
Session Integrity, Https, SSL/TLS, Threat Modelling
Smartphone Security:
Android vs. ioS security model, threat models, information tracking, rootkits,
4 Access control in Android operating system, Rooting android devices, 9
Repackaging attacks, Attacks on apps, Whole- disk encryption, hardware
protection, Viruses, spywares, and keyloggers and malware detection
Hardware and system security:
Meltdown Attack, spectre attack, Authentication and password, Access
5 control concept, Access control list, Capability, Sandboxing, Threats of 6
Hardware Trojans and Supply Chain Security, Side Channel Analysis based
Threats, and attacks. Issues in Critical Infrastructure and SCADA Security.
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication /
Reprint
Textbooks
1. Security in Computing, Book by Charles P Pfleeger and 5th 2011
Shari Lawrence Pfleeger, V edition
2. Cryptography and Network Security: Principles and 7th 1998
Practice, Book by William Stallings, VII edition
Reference Books
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term
Exam
2. Contact Hours: L: 0 T: 1 P: 2
5. Credits: 2
6. Semester: 5th
7. Category of Course: DC
8. Pre-requisite:
9. Course After completion of the course the students will be able to:
Outcome**: 1. Explain different security threats and attacks
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 5
7. Category of Course: DC
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Introduction of IoT
1 Overview of IoT, Motivations, Applications of IoT, Internet of Things IoT 8
Architecture, IoT Frameworks, Vulnerabilities of IoT, Security
requirements, Threat analysis, IoT security tomography and layered
attacker model, Security model for IoT.
UNIT-2
Blockchain technology
UNIT-5
Reference Books
1. Sudhir K. Sharma, Bharat Bhushan, Parma N. Astya, 1st 2021
Narayan C. Debnath, "Blockchain Applications for
Secure IoT Frameworks: Technologies Shaping the
Future," Bentham books, 2021.
2. William Stallings, “Network Security Essentials: 6th 2016
Applications and Standards”, 6th Edition, Prentice Hall,
2016
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: 5th
7. Category of Course: DE
8. Pre-requisite: TCS 302 Data Structure with C, TCS 332 Fundamental of
Information security and Block Chain
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Explain blockchain technology and its immutable property.
CO2: Know the working of distributed ledger.
CO3: Analyze the different consensus protocols.
CO4: Use Ethereum to implement Blockchain.
CO5: Apply blockchain techniques in different applications.
CO6: Develop blockchain based frameworks to secure a
communication environment
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Reference Books
1. Andreas M. Antonopoulos, “Mastering Bitcoin: unlocking digital 2nd 2017
cryptocurrencies”, O'Reilly Media,(2e) 2017.
2. Roger Wattenhofer, “Distributed Ledger Technology, 2nd 2017
The science of the Blockchain”, Inverted Forest
Publishing, (2e), 2017
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DC
CO2: Compare and contrast various parsing techniques such as SLR, CLR,
LALR etc.
CO3: Use annotated tree to design the semantic rules for different aspects of
programming language.
CO4: Implement lexical analyzer and parser by using modern tools like Flex
and Bison.
CO5: Examine patterns, tokens & regular expressions for solving a problem in
the field of data mining.
Unit 2:
2 Syntax Analysis – 1: The Role of the Parser; Context-free Grammars; Writing
a Grammar; Top-down Parsing; Bottom-up Parsing. Operator-Precedence 9
Parsing; LR Parsers; Using ambiguous grammars; Parser Generators
Unit 3:
Syntax-Directed Translation: Syntax-Directed definitions; Constructions of
3 Syntax Trees; Bottom-up evaluation of S-attributed definitions; L-attributed 8
definitions; Top-down translation. Run-Time Environments : Source
Language Issues; Storage Organization; Storage-allocation strategies, Storage-
allocation in C; Parameter passing
Unit 4:
Intermediate Code Generation: Intermediate Languages; Declarations;
Assignment statements; Boolean Expressions; Case statements; Back patching;
4 Procedure calls. 9
Code Generation: Issues in the design of Code Generator; The Target Machine;
Run-time Storage Management; Basic blocks and Flow graphs; Next-use
information; A Simple Code Generator; Register allocation and assignment; The
dag representation of basic blocks; Generating code from dags.
5 Unit 5: 9
Code Optimization, Compiler Development: Code Optimization:
Introduction; The principal sources of optimization; Peephole optimization;
Optimization of basic blocks; Loops in flow graphs.
Compiler Development: Planning a compiler; Approaches to compiler
development; the compiler development environment; Testing and
maintenance.
Total 44
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Alfred V Aho, Ravi Sethi, Jeffrey D Ullman: “Compilers- 2nd 2013
Principles, Techniques and Tools”, Pearson Education,
Reference Books
1. Charles N. Fischer, Richard J. leBlanc, Jr.:” Crafting a 1st 1991
Compiler with C”, Pearson Education,.
2 Andrew W Apple: “Modern Compiler Implementation in 1st 1997
C”, Cambridge University Press,.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 6
7. Category of Course: DC
CO6: Study various software testing techniques and identify their relevance to
developing a quality software.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DC
CO3: Evaluate and Select the most suitable Application Layer protocol (such
as HTTP, FTP, SMTP, DNS, BitTorrent) as per the requirements of the
network application and work with available tools to demonstrate the
working of these protocols.
CO5: Describe the essential principles of Network Layers and use IP addressing
to create subnets for any specific requirements
CO6: Evaluate and select the appropriate technology to meet Data Link Layer
requirements and design a framework to implementing TCP/IP protocol
suite.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DC
CO6: Ability to design and deploy simple web applications using MVC architecture.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 3:
XML: Introduction to XML, uses of XML, simple XML, XML key components, DTD
and Schemas.
3 Ajax : Introduction to Ajax , XMLHttpRequest Methods and Properties, JavaScript 10
code for Ajax , Implementing Ajax techniques with a server scripting language ,
Handling the Response, Ajax with JSon
JQuery: jQuery Introduction, Install and Use jQuery Library, jQuery Syntax, Ajax
with jQuery, Load method, jQuery get and getJson methods.
Unit 4:
PHP
XAMPP Server Configuration, Introduction and basic syntax of PHP, decision and
4 looping with examples, PHP and HTML, Arrays, Functions, Browser control and 10
detection, string, Form processing, Files.
Advance Features: Cookies and Sessions, Basic commands with PHP examples,
Connection to server, creating database, selecting a database, listing database, listing
table names, creating a table, inserting data, altering tables, queries, deleting database,
deleting data and tables.
Unit 5:
MERN
Web Application Deployment, Content Management System (CMS). MERN Stack:
5 MongoDB: Overview , Environment, Data Modelling, Database Operations. Express: 12
Installing ExpressJS, Environment, Routing React: React Intro, , React Lifecycle,
Building Forms using React, states and components. Node: Install node, simple server,
HTML and JSON Response.
Total 48
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Learning PHP, MySQL, JavaScript, CSS & HTML5: A 3rd 2014
Step-byStep Guide to CreatingDynamic Websites by Robin
Nixon
Reference Books
3. Learning PHP, MySQL & JavaScript: With jQuery, CSS 1st 2015
& HTML5 by Robin Nixon
4 Paul Deitel, Harvey Deitel, Abbey Deitel, Internet & World 6th 2020
Wide Web - How to Program, 2020 6th edition, Pearson
Education.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VI
2. Contact Hours: L: 0 T: 1 P: 2
5. Credits: 2
6. Semester: 6
7. Category of Course: DC
5. Design a LEX Code to count and print the number of total characters, words, white
spaces in given ‘Input.txt’ file.
6. Design a LEX Code to replace white spaces of ‘Input.txt’ file by a single blank
character into ‘Output.txt’ file.
7. Design a LEX Code to remove the comments from any C-Program given at run-time
and store into ‘out.c’ file.
8. Design a LEX Code to extract all html tags in the given HTML file at run time and
store into Text file given at run time.
9. Design a DFA in LEX Code which accepts string containing even number of ‘a’ and
even number of ‘b’ over input alphabet {a, b}.
10. Design a DFA in LEX Code which accepts string containing third last element ‘a’
over input alphabet {a, b}.
11. Design a DFA in LEX Code to Identify and print Integer & Float Constants and
Identifier.
12. Design YACC/LEX code to recognize valid arithmetic expression with operators +,
-, * and /.
Design YACC/LEX code to evaluate arithmetic expression involving operators +, -,
13. * and / without operator precedence grammar & with operator precedence
grammar.
Total
11. Suggested Books:
S Name of Authors/Books/Publishers Edition Year of
N Publication Reprint
Textbooks
1. 2nd 2012
Charles N. Fischer, Richard J. leBlanc, Jr.:” Crafting a Compiler
with C”, Pearson Education, 1991.
2. 2nd 2012
Andrew W Apple: “Modern Compiler Implementation in C”,
Cambridge University Press, 1997.
3. 6th 2011
Kenneth C Louden: “Compiler Construction Principles & Practice”,
Thomson Education, 1997.
Reference Books
1. 5th 2014
Alfred V Aho, Ravi Sethi, Jeffrey D Ullman: “Compilers-
Principles, Techniques and Tools”, Pearson Education, 2007
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 0 T: 0 P: 2
5. Credits:
6. Semester: 6th
7. Category of Course: DC
Problem Statement 4:
Problem Statement 6:
6. To configure a local DNS server to resolve domain names within a network. 2
(Using packet Tracer)
Problem Statement 7:
NAT (Network Address Translation): Set up NAT on a router to translate
7. private IP addresses to public IP addresses for outbound internet 2
connectivity. Test the translation and examine how NAT helps conserve
IPv4 address space. (Using packet Tracer)
Problem Statement 8:
1.
File Transfer using TCP:
Implement a UDP client program that sends a domain name to a DNS server.
3.
Implement the corresponding DNS server program that resolves the domain
name to an IP address.
The server should send the resolved IP address back to the client.
Test the program by performing DNS lookups for different domain names
Problem Statement 4:
HTTP Server using TCP:
Reference Books
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 0 T: 1 P: 2
5. Credits: 2
6. Semester: VI
7. Category of Course: DC
Html Tags (List, Table) : To create a simple html file to demonstrate the
2. use of different tags.
CSS: Inline, Internal and External Style sheets To create an html file by
6. applying the different styles using inline, external & internal style sheets.
Event Handling - calendar for the month and year by combo box: To
create an html page with 2 combo box populated with month & year, to
10. display the calendar for the selected month & year from combo box using
javascript.
12. PHP XAMPP Server: Install and configure PHP, web server, MYSQL
(XAMPP), Write a program to print “Welcome to PHP”, Create a php
program to find odd or even number from given number. Write a php
program to find maximum of three numbers.
PHP Basic : Write a program to enter TWO numbers and print the Swap
13. Numbers using PHP Example.
15. Session Handling Using PHP: Create login page using session variables
Cookies Management: Write PHP program to implement a cookie and
16. session based counter. Create Cookies variable using PHP, Display the
cookies variable using PHP.
File Uploading Using PHP (To Understand File Uploading in PHP) : Create
17. PHP To upload the user input file and using constraints file type, file size.
File Handling Using PHP: Write a php program to Read from existing file.,
19. Write a php program to Write a file.
2. Full
2 Stack JavaScript: Learn Backbone.js, Node.js and 2nd 2018
.
MongoDB. Copyright © 2015 BYAZAT MARDAN
Reference Books
2. Steven
2 Holzener, PHP – The Complete Reference,2017, 1st 1st 2017
Edition,
. Mc-Graw Hill
3. Learning
3 PHP, MySQL & JavaScript: With jQuery, CSS & 1st 2015
HTML5
. by Robin Nixon
4. Paul
4 Deitel, Harvey Deitel, Abbey Deitel, Internet & World 6th 2020
Wide
. Web - How to Program, 2020 6th edition, Pearson
Education.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 6th
7. Category of Course: DE
Unit 5:
APPLICATIONS OF IMAGE PROCESSING AND COMPUTER VISION: Video
5 Surveillance Systems, Medical Diagnosis, Facial recognition system, Automatic activity 10
recognition system, Fire detection System, traffic sign detection and recognition
Total 48
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Digital Image Processing, by R. C. Gonzalez, R. E. Woods 4th 2017
and S. L. Eddins , Publisher: Pearson. Edition
2. 2nd 2017
Digital Image Processing using Matlab, by R. C. Gonzalez,
R. E. Woods and S. L. Eddins , Publisher: Pearson.
3. 1st 2018
Deep Learning for Computer Vision, by Rajalingappaa
Shanmugamani, Publisher: O Reilly
Reference Books
1. Deep Learning with Keras by Antonio Gulli, Sujit Pal, 1st 2017
Publisher: O Reilly
2. 1st 2012
Programming Computer Vision with Python", Jan Salem,
Publisher: O Reilly
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Define and understand ideas of DevOps.
CO2: Describe and demonstrate how DevOps relate to working in the cloud.
CO3: Describe and demonstrate how DevOps tools work together.
CO4: Use a public/private cloud environment as a framework to examine the ideas of
DevOps.
CO5: Examine some use cases, deployment, test automation, continuous delivery,
and the public/private cloud toolsets for DevOps .
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
10. Details of the Course:
Sl. Contact
Contents
No. Hours
Unit 1:An introduction to DevOps, Gain insights of the DevOps environment, 9
1
DevOps Vs Agile, DevOps Ecosystem.
Unit 2: Version Control with Git, Install GIT and work with remote repositories,
GIT workflows, Branching and Merging in Git. Understand the importance of
2 Continuous Integration, Introduction to Jenkins, Jenkins management. Build and 9
automation of Test using Jenkins and Maven.
Unit 3:Continuous Testing, learn and Install Selenium, create test cases in
3 Selenium, Integrate Selenium with Jenkins, Continuous Deployment. 10
Total 44
Reference Books
1. Continuous Delivery: Reliable Software Releases 3rd 2010
through Build, Test, and Deployment Automation by
Jez Humble and David Farley
2. The Phoenix Project by Gene Kim, Kevin Behr, George 3rd 2013
Spafford
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DE
8. Pre-requisite: TCS-351 Fundamental of Cloud Computing and Bigdata,
9. Course After completion of the course, the students will be able to:
Outcome**: CO1: Understand the concepts and significance of big data, including its
capture, management, organization, and analysis
CO2: Utilize the HDFS command line interface to interact with the file system,
manage data nodes, and work with the data flow.
CO3: Describe the concept of MapReduce, its features, types, and formats, and
comprehend the workflow of a MapReduce job.
CO4: Set up a Hadoop cluster, considering system requirements, and understand
the different installation mode
CO5: Analyze and manage big data using Hadoop ecosystem tools and
techniques, such as HDFS, MapReduce, and NoSQL databases.
CO6: Apply critical thinking and problem-solving skills to address
technological challenges associated with big data and propose appropriate
solutions.
** Describe the specific knowledge, skills, or competencies the students are
expected to acquire or demonstrate.
Reference Books
1. Fei Hu, Big Data: Storage, Sharing and Security, CRC 1st 2016
Press, Taylor, and Francis.
12. Mode of Evaluation Test / Quiz / Assignment / Mid-Term Exam / End-Term Exam
6. Semester: VI
DE
7. Category of Course:
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the basics of computer security
CO2: Elaborate the cryptographic techniques.
CO3: Discuss the transport layer security
CO4: Find the pros and cons of various key distribution methods
CO5: Analyze the wireless Network security
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 5:
System Security
Intruders
Intruders, Intrusion Detection, Password Management,
Malicious Software
Types of Malicious Software, Viruses, Virus
5 Countermeasures, Worms, Distributed Denial of Service Attacks. 10
Firewalls
The Need for Firewalls, Firewall Characteristics, Types of Firewalls, Firewall
Basing, Firewall Location and Configurations,
Legal and Ethical Aspects
Cybercrime and Computer Crime, Intellectual Property, Privacy, Ethical Issues
Total 46
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VI
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DE
8. Pre-requisite: NA
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Demonstrate an understanding of techniques, processes, technologies and
equipment used in virtual reality
CO2: Identify appropriate design methodologies for immersive technology
development, especially from a physiological perspective
Unit 3:
Visual Perception and Tracking Systems: Depth perception, Motion Perception,
Frame rates and displays, Orientation Tracking, Tilt drift correction, Yaw drift
3 9
correction, Tracking with a camera, Perspective n-point problem, Filtering,
Lighthouse approach
Unit 4:
Visual Rendering: Shading models, rasterization, Pixel shading, VR
4 9
specific problems, Distortion shading, Post-rendering image wrap
Unit 5:
Audio: Physics and physiology, Auditory perception, Auditory
5 8
Localization, Rendering, Spatialization and display, Combining other
senses, Spatial Sound
Interfaces: Locomotion, Manipulation, System Control, Social Interaction,
VR Engines and Other Aspects of VR, Evaluation of VR systems
Total 43
Reference Books
1. 1. K. S. Hale and K. M. Stanney, “Handbook on Virtual 2nd 2015
Environments”, 2nd edition, CRC Press, 2015
2 George Mather,” Foundations of Sensation and 1st 2007s
Perception:” Psychology Press
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
5. Credits: 3
6. Semester: VI
7. Category of Course: DC
8. Pre-requisite: Design and Analysis of Algorithm, Fundamental of Statistics
and AI (TCS 421 / Statistical Data Analysis with R (TCS 471), Discrete Structures
and Combinatorics (TMA 316)
9. Course After completion of the course the students will be able to:
Outcome**:
CO1: Acquire concepts and methods in statistical machine learning
CO2: Analyze fundamental principles of machine learning algorithms
CO3: Understand machine learning motivated by case-studies
CO4: Investigate and evaluate key topics in machine learning
algorithms for data science industry
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Sl. Contact
Contents
No. Hours
Unit 1: Machine learning foundation
Review of logic and knowledge system - language, axiom, hypothesis,
theorem, logic & types, what is ML, Inductive bias in ML, AI pyramid,
Pattern classification pipeline, Linear algebra in ML, Probabilistic logic
and statistical inference (Random expt./ variable, CDF, WLLN, Bayes,
Markov & Chernoff bound, Hypothesis testing and performance indices
1 14
- ROC, Estimation - detection, Optimality of Bayes, bias-variance,
underfit-overfit, entropy as Information, Cover’s packing lemma, Curse
of dimensionality, Case study: Wealth – optimal payoffs in portfolios
(stock market)
Reference Textbooks
1. Machine Learning – Tom M. Mitchell, Mc Graw Hill 1st 2017
Publisher
2. Introduction to Machine Learning – E. Alpaydin, 3rd. 2015
PHI Publisher
3. Elements of Information Theory – T M. Cover, J 2nd. 2006
A. Thomas, Wiley Publisher
12. Mode of Internal Seminar – presentation on topic in ML & internal viva
OR
Evaluation
Simulation of ML method with real dataset & internal viva
2. Contact Hours: L: T: 1 P: 2
5. Credits: 2
6. Semester: VI
7. Category of Course: DC
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
To take two - category input file and use thresholding to design binary
4 2
classifier for 1 feature, for 2 feature dataset
To register and use monkeylearn.com and create model, train and
classify sentiments that lead to sentiment prediction using corpus of
5 2
hotel reviews as part of NLU
To register and use Teachable machine (Google API) and perform multiple class /
6 2
pose analysis and classification.
To use quillbot.com and study basic machine transcription roles in summarization:
7 as NLP application 2
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VI
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VI
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Investigate Hadoop related tools for Big Data Analytics and perform basic
Hadoop Administration
CO2: Analyse the technological foundations for Big data with Hadoop and design
of Hadoop distributed file system
CO3: Understand the concept of MapReduce workflow
CO4: Develop program using Hive and Apache Pig for large data processing
CO5: Outline the theory of big data, and explain applications of big data
CO6: Build Big Data Analytics application to solve real world problem
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
5. Credits: 3
6. Semester: 6
7. Category of Course: DC
8. Pre-requisite:
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand and analyze the basic terminologies of Machine Learning
CO2: Understand the Parametric and non_parametric methods
CO3: Understand the concepts of various Kernel methods
CO4: Evaluate the working of different kernel and classifier models
CO5: Understand the different Graphical and Mixture Model techniques
CO6: Analyse and Differentiate various learning approaches
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Total 40
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Christopher M. Bishop, Pattern Recognition and 3rd 2016
Machine Learning, Springer
2. Stephen Marsland, Machine Learning: An Algorithc 2nd 2014
Perspective, CRC Press
Reference Books
1. Wasserman L., All of Statistics: A Concise Course in 1st 2010
Statistical Inference, Springer
2. Devroye L., Gyorfi L., Lugosi G., A Probabilistic 1st 1996
Theory of Pattern Recognition, Springer
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VI
1. Subject Code: PCS 682 Course Title: Advanced Machine Learning Lab
2. Contact Hours: L: 0 T: 1 P: 2
5. Credits: 2
6. Semester: 6
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the mathematics behind Machine Learning Model
CO2: Understand how Markov Model Work
CO3: Understand functioning of Convolutional Neural Network model
CO4: Understand the Regression and classification, associativity rules.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
2. Vijay Kumar Sharma, Vimal Kumar, Swati Sharma, and 2nd 2021
Shashwat Pathak, Python Programming: A Practical
Approach, CRC Press
Reference Books
1. Gowrishankar S., Veena A., Introduction to Python 1st 2018
Programming, CRC Press
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VI
5. Credits: 3
6. Semester: 6
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: develop a knowledge in the field of optimization techniques and
their basic concepts, principles and algorithms.
CO2: understand fundamentals of linear programming, Integer
programming and Dynamic programming.
CO3: apply the theory of optimization methods for modelling various
types of decision-making problems.
CO4: solve the mathematical results and numerical algorithms of
optimization theory to concrete Engineering problems
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
5. Credits: 3
6. Semester: VI
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the basics of computer security
CO2: Elaborate the cryptographic techniques.
CO3: Discuss the transport layer security
CO4: Find the pros and cons of various key distribution methods
CO5: Analyze the wireless Network security
Unit 4:
Network security Application - II
Wireless Network Security
IEEE 802.11 Wireless LAN Overview, IEEE 802.11i Wireless LAN Security,
Wireless Application Protocol Overview, Wireless Transport Layer Security,
4 WAP End-to-End Security
8
Electronic Mail Security
Pretty Good Privacy, S/MIME, DomainKeys Identified Mail,
IP Security
IP Security Overview, IP Security Policy, Encapsulating Security Payload,
Combining Security Associations, Internet Key Exchange, Cryptographic Suites
Unit 5:
System Security
5 Intruders 10
Intruders, Intrusion Detection, Password Management,
Malicious Software
Types of Malicious Software, Viruses, Virus
Countermeasures, Worms, Distributed Denial of Service Attacks.
Firewalls
The Need for Firewalls, Firewall Characteristics, Types of Firewalls, Firewall
Basing, Firewall Location and Configurations,
Legal and Ethical Aspects
Cybercrime and Computer Crime, Intellectual Property, Privacy, Ethical Issues
Total 46
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VI
2. Contact Hours: L: 0 T: 1 P: 2
3. Examination Duration (Hrs): Theory Practical
3
0
4. Relative Weight: CIE 25 MSE 25 SEE 50
5. Credits: 2
6. Semester: 6
7. Category of Course: DC
8. Pre-requisite: Java Programming Language (TCS 408), Database
Management System (TCS 503)
9. Course After completion of the course the students will be able to:
Outcome**:
CO1: Explain different threats and attacks on network and system.
2 Write down a program for the encryption and decryption procedure of hill 3
cipher scheme.
3 Write down a program for the encryption and decryption procedure of rail 3
fence technique.
4 Write down a program for the encryption and decryption procedure of RSA 3
algorithm.
(i) Sender and receiver use symmetric key cryptography for the bulk data
secure exchange.
(ii) Use the RSA algorithm for the encryption of shared secret keys.
(vi) Use various random secret values, pseudo identities and timestamp
values to get protection against the MITM attack, impersonation attack and
replay attack.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 6th
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**:
CO1: Explain blockchain technology and its platforms.
CO2: Know the working of blockchain platforms.
CO3: Analyze the mechanism of various blockchain platforms.
CO4: Use different blockchain platforms to implement blockchain.
CO5: Apply security mechanism to secure the networks and system.
CO5: Apply blockchain platforms in different applications.
CO6: Develop blockchain platforms.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VII
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Analyze Global and Centralized Routing protocols and utilize tools (such
as NS2) to examine routing protocols of LS and DV types
CO2: Evaluate and select the appropriate technology to meet Data Link Layer
requirements
CO3: Specify the devices, components and technologies to build a cost-
effective LAN
CO4: Appreciate issues for supporting real time and multimedia traffic over
public network
CO5: Identify the availability strategies in a Network Management System that
will improve network availability and limit the effects of failures
CO6: Implement client server applications with TCP/UDP Socket Programming
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 2: Link Layer and Local Area Networks: Introduction to Link Layer and its
services, Where Link Layer is implemented? Error detection and correction
techniques: Parity checks, Checksum, CRC; Multiple Access protocols: Channel
2 Partitioning, Random Access (Slotted Aloha, Aloha, CSMA), Taking Turns; Link 10
Layer Addressing: MAC addresses, ARP, Ethernet, CSMA/CD, Ethernet
Technologies, Link Layer Switches, Switches vs Routers, VLANS
Total 45
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 7th
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Discuss the classes of computers, and new trends and developments in
computer architecture.
CO2: Study advanced performance enhancement techniques such as pipelines,
dynamic scheduling branch predictions, caches.
CO3: Compare and contrast the modern computer architectures such as RISC, Scalar,
and multi-CPU systems.
CO4: Critically evaluate the performance of different CPU architecture.
CO5: Improve the performance of applications running on different CPU
architectures.
CO6: Develop applications for high performance computing systems
** Describe the specific knowledge, skills, or competencies the students are
expected to acquire or demonstrate.
Unit-4
Instruction Level Parallelism: Concepts and Challenges, Basic Compiler
4 techniques for exploiting ILP, Reducing the branch penalty with advanced branch 8
predictions, overcoming data hazards with dynamic scheduling, exploiting ILP
using multiple issues state scheduling
Unit-5
Multiprocessor architecture: Taxonomy of parallel architectures. Centralized
shared-memory, distributed shared-memory architecture, Message passing vs
Shared Memory
5 8
Thread and Process Level Parallel Architecture: Instruction Level Data
Parallel Architecture, SIMD Architecture, Fine Grained and Coarse-Grained
Associative and Neural Architecture, Data Parallel Pipelined and Systolic
Architectures, Vector Architectures
Total 45
3. 1st 2011
Hennessy and Patterson,” Computer Architecture: A
Quantitative Approach”, Elsevier
4. 2nd 2004
Dezso and Sima,” Advanced Computer Architecture”,
Pearson
Reference Books
1. 1st 2014
Quinn, “Parallel Programming in C with MPI and Open MP”,
TMH
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: VII
7. Category of Course: DC
8. Pre-requisite: NA
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand research problem formulation
CO2: Analyze research related information
CO3: Follow research ethics
CO4: Understand that today’s world is controlled by Computer, Information
Technology, but tomorrow world will be ruled by ideas, concept, and
creativity.
CO5: Understanding that when IPR would take such important place in growth of
individuals & nation, it is needless to emphasis the need of information
about Intellectual Property Right to be promoted among students in general
& engineering in particular.
CO6: Understand that IPR protection provides an incentive to inventors for
further research work and investment in R & D, which leads to creation of
new and better products, and in turn brings about, economic growth and
social benefits.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 3:
Effective technical writing, how to write report, Paper Developing a Research
3 9
Proposal, Format of research proposal, a presentation and assessment by a review
committee.
Unit 4:
Nature of Intellectual Property: Patents, Designs, Trade and Copyright. Process of
Patenting and Development: technological research, innovation, patenting,
4 9
development. International Scenario: International cooperation on Intellectual
Property. Procedure for grants of patents, Patenting under PCT.
Unit 5:
Patent Rights: Scope of Patent Rights. Licensing and transfer of technology. Patent
information and databases. Geographical Indications.
5 12
New Developments in IPR: Administration of Patent System. New developments
in IPR; IPR of Biological Systems, Computer Software etc. Traditional knowledge
Case Studies, IPR and IITs.
Total 47
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication /
No. Reprint
Textbooks
Stuart Melville, Wayne Goddard, Research Methodology: 1st 1996
1. An Introduction for Science & Engineering Students, Juta
& Co. Ltd.
Wayne Goddard, Stuart Melville, Research methodology: 2nd 2014
2.
An introduction, Juta Academic
Ranjit Kumar, Research Methodology: A Step by Step 2nd 2005
3.
Guide for Beginners, Pearson India
Halbert, Resisting Intellectual Property, Taylor & Francis 1st 2007
4.
Ltd ,
Reference Books
1. Robert P. Merges, Peter S. Menell, Mark A. Lemley, “ 2nd 2016
Intellectual Property in New Technological Age”, Wolters
Kluwer Law and Business
2. T. Ramappa, “Intellectual Property Rights Under WTO”, S. 1st 2008
Chand
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
9. Course After completion of the course the students will be able to:
Outcome* CO1: Apply the concepts of cloud automation, orchestration, load balancing and resource
*: scheduling management techniques.
CO2: Demonstrate the cloud orchestration and automation tools in the cloud services.
CO3: Distinguish cloud management techniques in the cloud services.
CO5: Evaluate the different orchestration and automation tools and services to achieve a
performing cloud-based web-service.
CO6: Design and deploy a cloud-based web-service that uses the RESTful API
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
5. Credits: 3
6. Semester: 7
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome CO1: Understand basics of Natural Language Processing (NLP)
CO2: Analyze and Evaluate NLP models
CO3: Understand neural language models for NLP
CO4: Apply Recurrent neural network models in NLP
CO5: Understand transformers and self-attention models for NLP
CO6: Apply deep learning to create interesting NLP applications
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
Reference Books
1. Steven Bird, Ewan Klein and Edward Loper, Natural First 2009
Language Processing with Python edition
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
5. Credits: 3
6. Semester: VII
7. Category of Course: DE
8. Pre-requisite: NA
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the importance of a systematic procedure for investigation of data
found on digital storage media that might provide evidence of wrong-doing.
CO2: Identify and document potential security breaches of computer data that suggest
violations of legal, ethical, moral, policy and/or societal standards
CO3: Use tools for faithful preservation of data on disks for analysis and find data that
may be clear or hidden on a computer or another device
CO4: Work with computer forensics tools used in data analysis, such as searching,
absolute disk sector viewing and editing, recovery of files, password cracking, etc.
CO5: Present the results of forensics analysis as an expert.
CO6: Discuss the Cyber Laws and Cyber Crimes.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
2. Contact Hours: L: T: 0 P: 0
5. Credits: 3
6. Semester: 7
7. Category of Course: DE
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
10. Details of the Course:
SL. Contact
Contents
NO. Hours
Unit - I
Introduction to Cloud Infrastructure
1 Cloud Evolution, Cloud Services, Cloud Deployment Types, Main
9
Challenges of Cloud Infrastructure, Cloud Reference Model, Cloud
Management, Cloud Structure, Infrastructure Components, Cloud
Layers, Cloud Relations, Cloud Dynamics, Data Types
Unit - II
2
Exploring Cloud Infrastructures
Managing the Cloud - Administrating the Clouds , Management
responsibilities , Lifecycle management , Cloud Management Products 9
,Emerging Cloud Management Standards, DMTF cloud management
standards, Cloud Commons and SMI ,Infrastructure Security : Network
Level , Host Level , Application Level
Unit – III
Understanding Services Oriented Architecture
3 SOA : Introduction , Event driven SOA , SOA 2.0 , Enterprise Service
10
Bus , Service catalogues, Defining SOA Communications , Managing
& Monitoring SOA , SOA Security , Relating SOA & Cloud
Computing
Unit – IV
Exploring Cloud Infrastructure Services Overview of cloud Infrastructure
Services, Measuring the Digital Universe: Cloud storage in the Digital
4 Universe, Cloud storage definition, Provisioning Cloud Storage: Unmanaged
cloud storage, 9
Managed cloud storage, creating cloud storage systems, Virtual storage containers,
Exploring Cloud Backup Solutions: Backup types, Cloud backup features, Cloud
attached backup, Cloud Storage Interoperability: Cloud Data Management
Interface (CDMI), Open Cloud Computing Interface (OCCI).
Unit – V 8
5 Case Study: AWS Cloud Infrastructure Services AWS networking and databases:
Virtual private clouds, Cloud models, Private DNS servers (Route 53)), Relational
database service – DynamoDB, ElastiCache, Redshift. Case Study: AZURE Cloud
Infrastructure Services Azure Virtual Machines, Azure Kubernetes Service (AKS),
Azure Red Hat OpenShift, Azure Arc, Azure Stack HCI, Azure Stack Edge, Azure
Stack Hub, Azure IoT
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Editi Year of
No. on Publication /
Reprint
Textbooks
1. Barrie Sisisky,“Cloud Computing Bible”, Published by Wiley 1st 2011
Publishing, Inc.
2 Berners Lee, Godel and Turing, “Thinking on the Web” - Wiley 1st 2008.
inter science,
3 Peter Mika, “Social Networks and the Semantic Web”, 2nd 2007.
Springer,
4 Thomas ,“Cloud Computing: Concepts, Technology & 1st 2013
Architecture” ,Erl Published May
5 David S. Linthicum ,“Cloud Computing and SOA Convergence 2nd 2009
in your Enterprise, a step by step guide
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 7
7. Category of Course: DE
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
5. Credits: 3
6. Semester: 7
7. Category of Course: DE
Unit 5:
Software tools – Specification methods, interface – Building Tools.
5 Interaction Devices – Keyboard and function keys – pointing devices – speech 8
recognition digitization and generation – image and video displays.
– drivers
Total 41
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. “The essential guide to user interface design”, Wilbert O 2nd 2016
Galitz, Wiley DreamaTech.
2. “Designing the user interface”. 3rd Edition Ben 3rd 2009
Shneidermann , Pearson Education Asia.
Reference Books
1. “Human – Computer Interaction”. ALAN DIX, JANET 3rd 2003
FINCAY, GRE GORYD, ABOWD, RUSSELL BEALG,
PEARSON.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VII
7. Category of Course: DE
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VII
7. Category of Course: DE
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 5:
Distributed file systems: Design Goals, DFS architecture, Naming Schemes,
Mounting Remote Directories, Caching to improve performance, Design issues of
cache, cache location, Cache update policies, Cache consistency, Sharing semantics
5 in DFS, Stateless vs Stateful service NFS, Basic NFS architecture, Caching in NFS3,
NFS v4 improvements, NFSv4 details: Compounding, Open/Close, Locking, 10
Caching, Open Delegation, Recalling Delegation, Replication and Security
Case Study: Google File System(GFS): Design constraints, Architectural Design,
GFS Architecture, Single Master Design, Chunk Size, Metadata, System
Interactions, Write process, Consistency Model, Master Operations, Locking
Operations, Replica Placements, Garbage collection, Fault Tolerance and Diagnosis
Total 46
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Singhal & Shivaratri, "Advanced Concept in Operating 1st 2007
Systems", McGraw Hill
2 Coulouris, Dollimore, Kindberg, "Distributed System: 4th 2008
Concepts and Design”, Pearson Ed.
3 Gerald Tel, "Distributed Algorithms", Cambridge 2nd 2000
University Press
LaxmiPublicationa (P) Ltd., New Delhi.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 7
7. Category of Course: DE
8. Pre-requisite: TIT 501
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Demonstrate the application of verification and validation tasks and their
outcomes during the software life cycle.
CO2: Apply various verification and validation techniques based on various
characteristics of the system/software (safety, security, risk, etc).
CO3: Differentiate between the overall role of verification and validation and
the specific role of software/system testing.
CO4: Compare and Contrast the theoretical and practical limitations to software
verification and validation analysis.
2 Unit 2:
Functional Testing: Boundary Value Analysis, Equivalence Class Testing,
Decision Table Based Testing, Cause Effect Graphing Technique. 12
Structural Testing: Path testing, DD-Paths, Cyclomatic Complexity, Graph
Metrics, Data Flow Testing, Mutation testing.
Unit 3:
3 Reducing the number of test cases: 12
Prioritization guidelines, Priority category, Scheme, Risk Analysis, Regression
Testing, Slice based testing
Unit 4:
Testing Activities: Unit Testing, Levels of Testing, Integration Testing, System
4 10
Testing, Debugging, Domain Testing.
Unit 5:
Object Oriented Testing: Issues in Object Oriented Testing, Class Testing,
5 GUI Testing, Object Oriented Integration and System Testing.Testing Tools:
Static Testing Tools, Dynamic Testing Tools, Characteristics of Modern Tools.
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. William Perry, “Effective Methods for Software Testing”, 3rd 2006
John Wiley & Sons, New York,.
2 CemKaner, Jack Falk, Nguyen Quoc, “Testing Computer 2nd 1993
Software”, Second Edition, Van Nostrand Reinhold, New
York,.
3 Boris Beizer, “Software Testing Techniques”, Second 2nd 1990.
Volume, Second Edition, Van Nostrand Reinhold, New
York,
4 Louise Tamres, “Software Testing”, Pearson Education 1st 2002
Asia,
Reference Books
1. Roger S. Pressman, “Software Engineering – A 8th 2019
Practitioner’s Approach”, Fifth Edition, McGraw-Hill
International Edition, New Delhi,
2 Boris Beizer, “Black-Box Testing – Techniques for 1st 1995
Functional Testing of Software and Systems”, John Wiley
& Sons Inc., New York,.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: 7
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: To understand the fundamental concepts and principles of deep learning.
CO2: To evaluate and use the most important concepts and the methods in the
area ML and deep learning.
CO3: Examine modern practical deep networks.
CO4: Know deep Learning Research Areas.
CO5: Use software libraries of deep learning
CO6: Use deep learning models.
. ** Describe the specific knowledge, skills or competencies the students are
expected to acquire or demonstrate.
Sl. Contact
Contents
No. Hours
Unit 1: Introduction to deep learning: basics of Machine Learning, Machine
1 Learning vs Deep Learning, deep learning process, neural network, 8
Total 44
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: 7
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: To Understand the basic concepts of RPA
CO2: To Describe various components and platforms of RPA
CO3: To Describe the different types of variables, control flow and data
manipulation techniques
CO4: To Understand various control techniques and OCR in RPA
CO5: To Describe various types and strategies to handle exceptions
CO6: To Discuss the benefits of RPA
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate
10. Details of the Course:
Sl. Contact
Contents
No. Hours
Unit 1:
RPA Foundations- What is RPA – Flavors of RPA- History of RPA- The
Benefits of RPA- The downsides of RPA- RPA Compared to BPO, BPM and
1 BPA – Consumer Willingness for Automation- The Workforce of the Future- 10
RPA Skills-On-Premise Vs. the Cloud- Web Technology- Programming
Languages and Low Code- OCR-Databases-APIs- AI-Cognitive Automation-
Agile, Scrum, Kanban and Waterfall0 DevOps- Flowcharts.
2 Unit 2: 8
RPA Platforms- Components of RPA- RPA Platforms-About Ui Path- About
UiPath - The future of automation - Record and Play - Downloading and
installing UiPath Studio -Learning Ui Path Studio- - Task recorder - Step-by-
step examples using the recorder.
Unit 3:
Sequence, Flowchart, and Control Flow-Sequencing the workflow-Activities-
Control flow, various types of loops, and decision making-Step-by-step
example using Sequence and Flowchart-Step-by-step example using Sequence
3 9
and Control flow-Data Manipulation-Variables and Scope-
CollectionsArguments – Purpose and use-Data table usage with examples-
Clipboard management-File operation with step-by-step example-CSV/Excel
to data table and vice versa (with a step-by-step example).
Unit 4:
Taking Control of the Controls- Finding and attaching windows- Finding the
control- Techniques for waiting for a control- Act on controls – mouse and
4 9
keyboard activities- Working with UiExplorerHandling events- Revisit
recorder- Screen Scraping- When to use OCR- Types of OCR available- How
to use OCR- Avoiding typical failure points.
Unit 5:
Exception Handling, Debugging, and Logging- Exception handling- Common
5 exceptions and ways to handle them- Logging and taking screensHOT- 9
Debugging techniques- Collecting crash dumps- Error reporting- Future of
RPA
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Tom Taulli , The Robotic Process Automation Handbook : 1st 2020
A Guide to Implementing RPA Systems, Publisher : Apress
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VII
7. Category of Course: DE
CO4: Analyze strengths of public key algorithms and explore applications in exchange,
authentication and hashing of messages.
CO6: Appraiserisks related to wireless, web, cloud security and measures to be adopted to
secure organizational network.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 3:
Prime and relative prime numbers, modular arithmetic, Primality testing,
Euclid's Algorithm for GCD and Extended Euclid's Algorithm for
3 Multiplicative inverse
Principals of public key crypto systems, RSA algorithm, security of RSA, key 8
management, Diffle-Hellman key exchange algorithm
Message Authentication: Requirements, Message Authentication Functions
Cryptographic Hash Functions:Applications of Cryptographic Hash Functions,
Secure Hash Algorithm (SHA)-512
Unit 4:
Authentication Applications: Kerberos and X.509 directory authentication
service, electronic mail security-S /MIME 9
4 IP Security: Architecture, Authentication header, Encapsulating security
payloads, combining security associations, key management.
Unit 5:
Wireless Network Security: Wireless Network Threats, Wireless Security
Measures, Mobile Device Security, Security Threats and Security Strategy,
IEEE 802.11 Wireless LAN Overview, The Wi-Fi Alliance, IEEE 802
Protocol Architecture, IEEE 802.11 Network Components and Architectural
5 Model, IEEE 802.11 Services.Concept of Wireless LAN security and brief
of phases of operation 10
Web and Cloud Security: Web Security Considerations, Transport Layer
Security, HTTPS,Cloud Security risks and Countermeasures; Data protection in
cloud.
System Security: The Need for Firewalls, Firewall Characteristics, Types of
Firewalls
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. William Stallings, “Cryptography and Network Security: 7th 2017
Principals and Practice”, 7th Edition, Pearson,
2 William Stallings, “Network Security Essentials – 4th 2011
Applications and Standards”, 4th edition, Pearson
Education,
Reference Books
1. Behrouz A Forouzan, Debdeep Mukhopadhyay, 3rd 2015
“Cryptography and Network Security”Mc-GrawHill, 3rd
Edition,
2 Johannes A. Buchmann, “Introduction to Cryptography”, 2nd 2012
Springer-Verlag,
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
Name of Department: - Computer Science and Engineering
1. Subject Code: Course Title: Artificial Intelligence
TCS 706
2. Contact Hours: L:
3 T: 0 P: 0
3. Examination Duration (Hrs): Theory 3 Practical 0
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the basics of the theory and practice of Artificial Intelligence.
CO6: Apply the knowledge of AI and agents in developing multidisciplinary real world
projects.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
10. Details of the Course:
SL. Contact
Contents
No. Hours
Unit 1:
IntroductionIntroduction to Artificial Intelligence, Simulation of sophisticated &
Intelligent Behavior indifferent area, problem solving in games, natural language, 10
1
automated reasoning visualperception, heuristic algorithm versus solution guaranteed
algorithms.
2 Unit 2:
Understanding Natural Languages Parsing techniques, context free and
transformational grammars, transition nets, augmentedtransition nets, 9
Fillmore’s grammars, Shanks Conceptual Dependency, grammar free
analyzers, sentence generation, and translation.
3 Unit 3:
10
Knowledge Representation
First order predicate calculus, Horn Clauses, Introduction to PROLOG,
Semantic NetsPartitioned Nets, Minskey frames, Case Grammar Theory,
Production Rules KnowledgeBase, The Inference System, Forward & Backward
Deduction
Unit 4:
Expert System
4 Existing Systems (DENDRAL, MYCIN), domain exploration, Meta 9
Knowledge, Expertise Transfer, Self Explaining System
Unit 5:
Pattern Recognition
Introduction to pattern Recognition, Structured Description, Symbolic
5 Description, Machineperception, Line Finding, Interception, Semantic, & 8
Model, Object Identification, SpeechRecognition.
Programming Language: Introduction to programming Language, LISP,
PROLOG
Total 46
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication /
No. Reprint
Textbooks
1. Charnick “Introduction to Artificial Intelligence.” 2nd 2010
Addision Wesley.
2. Rich & Knight, “Artificial Intelligence”.TMH 3rd 2017
Reference Books
1. Charnick “Introduction to Artificial Intelligence.” Addision 1st 2010
Wesley.
2. Rich & Knight, “Artificial Intelligence”.TMH 3rd 2017
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
5. Credits: 3
6. Semester: 7
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Demonstrate an understanding of the detailed architecture of
Column Oriented NoSQL databases, Document databases, Graph
databases.
CO2: Make use of the concepts pertaining to all the types of databases
CO3: Apply performance tuning on Column-oriented NoSQL databases
and Document-oriented NoSQL Databases.
CO4: Analyze the structural Models of NoSQL.
CO5: Evaluate several applications for location based service and
recommendation services. Devise an application using the components
of NoSQL.
CO6: Develop various applications using NoSQL databases.
** Describe the specific knowledge, skills or competencies the students are expected to
acquire or demonstrate.
Unit 2:
Distribution Models: Single Server, Sharding, Master-Slave Replication,
Peer-to-Peer Replication, Combining Sharding and Replication
Consistency, Update Consistency, Read Consistency, Relaxing
2 8
Consistency, The CAP Theorem, Relaxing Durability, Quorums. Version
Stamps, Business and System Transactions, Version Stamps on Multiple
Nodes
Unit 3:
Map-Reduce: Basic Map-Reduce, Partitioning and Combining,
Composing Map-Reduce Calculations, A Two Stage Map-Reduce
Example, Incremental Map-Reduce Key-Value Databases: What Is a
Key-Value Store, Key-Value Store Features, Consistency, Transactions,
3 9
Query Features, Structure of Data, Scaling, Suitable Use Cases, Storing
Session Information, User Profiles, Preference, Shopping Cart Data,
When Not to Use, Relationships among Data, Multioperation
Transactions, Query by Data, Operations by Sets
Unit 4:
Document Databases: What Is a Document Database?, Features,
Consistency, Transactions, Availability, Query Features, Scaling,
Suitable Use Cases, Event Logging, Content Management Systems,
4 9
Blogging Platforms, Web Analytics or Real-Time Analytics, E- Commerce
Applications, When Not to Use, Complex Transactions Spanning Different
Operations, Queries against Varying Aggregate Structure
Unit 5:
Graph Databases: What Is a Graph Database?, Features, Consistency,
Transactions, Availability, Query Features, Scaling, Suitable Use Cases,
5 Connected Data, Routing, Dispatch, and Location-Based Services, 9
Recommendation Engines, When Not to Use
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Editio Year of
No. n Publication /
Reprint
Textbooks
1. Sadalage, P. & Fowler, NoSQL Distilled: A Brief Guide to 1st 2012
the Emerging World of Polyglot Persistence, Pearson
Addision Wesley
Reference Books
1. Dan Sullivan, "NoSQL For Mere Mortals", Pearson 1st 2015
Education India
2. Dan McCreary and Ann Kelly, "Making Sense of 1st 2013
NoSQL: A guide for Managers and the Rest of us",
Manning Publication/Dreamtech Press
3. Kristina Chodorow, "Mongodb: The Definitive Guide- 2nd 2013
Powerful and Scalable Data Storage", O'Reilly
Publications
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
1. Subject Code: TCS 763 Course Title: Social and Web Analytics
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 7
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Be able to understand social media, web and social media
analytics, and their potential impact.
CO2: Be able to identify key performance indicators for a given goal,
identify data relating to the metrics and key performance indicators.
CO3: Be able to design and analyze understand usability metrics,
web, and social media metrics.
CO4: Be able to use ready-made web analytics tools (Google
Analytics)
CO5: Be able to understand a statistical programming language (R)
and use its graphical development environment (Deduce) for data
exploration and analysis.
CO6: Be able to create web analytics solutions for Real World
Problems
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 3:
Measuring user experience - Usability metrics (performance metrics,
issues-based metrics, self-reported metrics), Planning and performing a
usability study (study goals, user goals, metrics and
3 evaluation methods, participants, data collection, data analysis), Typical 9
types of usability studies and their corresponding metrics (comparing
alternative designs, comparing with competition, completing a task or
transaction, evaluating the
impact of subtle changes)
Unit 4:
Web metrics and web analytics- PULSE metrics (Page views, Uptime,
Latency, Seven-day active users) on business and
4 technical issues; HEART metrics (Happiness, Engagement, Adoption, 9
Retention, and Task success) on user behavior issues; On-site web
analytics, off-site web analytics, the goal-signal-metric process.
Unit 5:
Social media analytics – Introduction, Social media KPIs (reach and
engagement), Performing social media analytics (business goal, KPIs,
data gathering, analysis, measure and feedback), Data analysis
5 language and tools: Ready-made tools for Web and social media 10
analytics (Key Google Analytics metrics, Dashboard, social reports)
Statistical programming language (R), its graphical development
environment (Deducer) or data exploration and analysis, and its social
media analysis packages
Total 49
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication /
Reprint
Textbooks
1. Avinash Kaushik, Web Analytics 2.0: The Art of 1st 2009
Online Accountability and Science of Customer
Centricity, Sybex
2 Matthew Ganis, Avinash Kohirkar ,Social Media 1st 2015
Analytics: Techniques and Insights for Extracting
Business Value Out of Social Media, IBM Press
Reference Books
1. Marshall Sponder, Social Media Analytics: Effective 1st 2014
Tools for Building, Interpreting, and Using Metrics,
McGraw Hill
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER
5. Credits: 3
6. Semester: 7
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: To understand the fundamental concepts and principles of deep
learning.
CO2: To evaluate and use the most important concepts and the methods
in the area ML and deep learning.
CO3: Examine modern practical deep networks.
CO4: Know deep Learning Research Areas.
CO5: Use software libraries of deep learning
CO6: Use deep learning models.
. ** Describe the specific knowledge, skills or competencies the students are
expected to acquire or demonstrate.
Sl. Contact
Contents
No. Hours
Unit 1: Introduction to deep learning: basics of Machine Learning, Machine
1 Learning vs Deep Learning, deep learning process, neural network, 8
Total 44
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Ellis Horowitz and Sartaj Sahni, Fundamentals of Data 2014
Structures in C, Universities Press
2. Josh Patterson, Adam Gibson "Deep Learning: A 2017
Practitioner's Approach", O'Reilly Media, 2017.
3. Umberto Michelucci “Applied Deep Learning. A Case- 2018
based Approach to Understanding Deep Neural Networks”
Apress, 2018.
4. Giancarlo Zaccone, Md. Rezaul Karim, Ahmed Menshawy 2017
"Deep Learning with TensorFlow: Explore neural networks
with Python", Packt Publisher, 2017.
Reference Books
1. Deep Learning A Practitioner’s Approach Josh Patterson and 2017
Adam Gibson O’Reilly Media, Inc.2017
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
5. Credits: 3
6. Semester: 7
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the relations between the most important evolutionary
algorithms.
CO2: Understand the implementation issues of evolutionary algorithms.
CO3: Determine the appropriate parameter settings to make different
evolutionary algorithms work well.
CO4: Design new evolutionary operators, representations, and fitness
functions
. ** Describe the specific knowledge, skills or competencies the students are
expected to acquire or demonstrate.
Total
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Melanie Mitchell, “An introduction to genetic algorithms”, 1st 1998
MIT Press.
2 A.P. Engelbrecht, “Computational Intelligence: An 2nd 2007
Introduction”, Wiley.
Reference Books
1. D. E. Goldberg , “Genetic Algorithm in Search 1st 2008
Optimization and Machine Learning”, Pearson Education
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
5. Credits: 3
6. Semester: 7th
7. Category of Course: DC
9. Course After completion of the course the students will be able to:
Outcome**: CO1: To understand the fundamental concepts and principles of deep
learning.
CO2: To evaluate and use the most important concepts and the methods
in the area ML and deep learning.
CO3: Examine modern practical deep networks.
CO4: Know deep Learning Research Areas.
CO5: Use software libraries of deep learning
CO6: Use deep learning models.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Sl. Contact
Contents
No. Hours
Unit 1: Introduction to deep learning: basics of Machine Learning, Machine
1 Learning vs Deep Learning, deep learning process, neural network, 8
Total 44
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
2. Josh Patterson, Adam Gibson "Deep Learning: A 1st 2017
Practitioner's Approach", O'Reilly Media, 2017.
3. Umberto Michelucci “Applied Deep Learning. A Case- 1st 2018
based Approach to Understanding Deep Neural Networks”
Apress, 2018.
4. Giancarlo Zaccone, Md. Rezaul Karim, Ahmed Menshawy 1st 2017
"Deep Learning with TensorFlow: Explore neural networks
with Python", Packt Publisher, 2017.
Reference Books
1. Deep Learning A Practitioner’s Approach Josh Patterson and 1st 2017
Adam Gibson O’Reilly Media, Inc.2017
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: 7
7. Category of Course: DC
9. Course After completion of the course, the students will be able to:
Outcome**:
CO1: Explain the architecture of the Internet.
Sl. Contact
Contents
No. Hours
Unit 1:
Introduction and Overview:
1 5
Internet Architecture, How the Internet Works (high-level overview), IP
address.
Unit 2:
2 Internet SecurityMechanism: 10
Denial-of-Service, Traceback, DoS Defence, Network Intrusion Detection
Systems, Fundamental NIDS Issues,NIDS Evaluation, Scanning (NMAP, Nessus,
NetTools, Smart Whois), Anonymity Tor browser
Unit 3:
Cryptography Basics and Applications:
3 10
Secret Key encryption, DES, AES, One-way Hash functions, MD5, SHA-1 and
SHA-2, collision attacks, Diffie-Hellman Key Exchange, Public-Key Encryption
(RSA), Digital Signatures, Public-key Infrastructure (PKI).
Unit 4:
Network Security Mechanisms:
4 Ip Tunneling and SSH Tunneling, Virtual Private Networks, Firewalls, 9
Bypassing Firewalls, Transport Layer Security (TLS/SSL), TLS
Programming, Packet Sniffer (Wireshark), Man in the middle attack
Unit 5:
5 Monitoring systems over network. 8
Malware attacks, Virus, Worms, Trojans horse, ransomware, keylogger, spyware,
bot, botnet, botnet detection, and intrusion detection techniques.
Total 42
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
1 Cryptography and Network Security - Principles and 7th 2016
Practice, Seventh Edition, by William Stallings.
2. Firewalls and Internet Security: Repelling the Wily 2nd 2003
Hacker (Addison-Wesley Professional Computing
Series) by William Cheswick, Steven Bellovin, Aviel
Rubin.
Reference Books
1. Network Security Essentials: Applications and 4th 2011
Standards, 4/Ed, by William Stallings.
12. Mode of Evaluation Test / Quiz / Assignment / Mid-Term Exam / End-Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 7th
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Explain information security audit.
CO2: Know the working of information security audit and monitoring.
CO3: Analyze the various mechanisms of information security audit.
CO4: Use information security audit and monitoring to prevent the information
securityattacks.
CO5: Apply information security audit and monitoring in various applications.
CO6: Develop strategies for information security audit and monitoring.
** Describe the specific knowledge, skills, or competencies the students are
expected to acquire or demonstrate.
Unit-4
Domains of IT security
4 Authentication and access control, physical access, Internet access, e-mail, digital 8
signature, outsourcing, software development and acquisition, hardware
acquisition, security organization structure.
Unit-5
Auditing and controls
Auditing concepts, information security audit (ISA) need, concept, standards,
5 performance, steps, techniques, methodologies, around and through computer, 8
controls-concept objectives, types, risk, input, process,validation, output, logical
access, physical access database, network, environment, BCP, evidence
collection, evaluation and reporting methodologies
Total 46
11. Suggested Books:
S Name of Authors/Books/Publishers Edition Year of
N Publication
Reprint
Textbooks
1. 2nd 2007
Michael E. Whitman and Herbert J. Mattord, Principles of
Information Security, (2e), Thomson Learning, 2007
2. 2nd 2018
Angel R. Otero, "Information Technology Control and Audit",
2018, CRC Press
Reference Books
1. 6th 2016
William Stallings, “Network Security Essentials:
Applications and Standards”, Prentice Hall.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VII
5. Credits: 3
6. Semester: 7th
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understanding the need of cloud security, cloud security reference models
and standards.
CO2: Understand security & privacy concepts and various cloud security issues.
CO3: Identify threat model and attacks in cloud environment.
CO4: Understand advanced security concepts.
CO5: Understand and analyze intrusion detection techniques.
CO6: Implement some intrusion detection tools.
** Describe the specific knowledge, skills, or competencies the students are
expected to acquire or demonstrate.
Unit 4:
Advanced Security Concepts
Securing the Cloud , The security boundary ,Security service boundary Security 10
4 mapping , Securing Data , Brokered cloud storage access , Establishing Identity
and Presence ,Identity protocol standards , Windows Azure identity standards ,
Identity and Access Management: Why IAM, IAM Challenges, Definitions,
Architecture &Practice
Unit 5:
Cloud Security Defensive Approaches Evolution of Cloud-Intrusion 08
5 Detection System (IDS), Deployment of IDS in Cloud, Intrusion Detection
Techniques in Cloud, Brief Discussion on Virtual Machine Introspection and
Hypervisor Introspection Techniques
Total 44
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication /
Reprint
Textbooks
1. Barrie Sisisky, “Cloud Computing Bible” Published by Wiley 1st 2011
Publishing, Inc. Cloud
2 “Cloud Security and Privacy” by Tim Mather, Subra, Shahed Latif 1st 2009
(Publ. Orielly Media),
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: VIII
7. Category of Course: DE
8. Pre-requisite: NIL
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understanding foundations of hazards, disasters and associated
natural/social phenomena of India
CO2: Study the various natural disasters.
CO3: Study the various manmade disasters.
CO5: Study the modern techniques used in disaster mitigation and management.
CO6: Formulate Technological innovations in Disaster Risk Reduction
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
SL. Contact
Contents
NO. Hours
Unit 1:
Introduction, Definitions and Classification:
Concepts and definitions - Disaster, Hazard, Vulnerability, Resilience, Risks
Natural disasters : Cloud bursts, earth quakes, Tsunami, snow, avalanches,
landslides, forest fires,diversion of river routes (ex. Kosi river), Floods,
1 Droughts Cyclones, volcanic hazards/ disasters(Mud volcanoes): causes and
distribution, hazardous effects and environmental impacts of naturaldisasters, 9
mitigation measures, natural disaster prune areas in India, major natural disasters
in
India with special reference to Uttarakhand.Man-induced disasters: water
logging, subsidence, ground water depletion, soil erosion,, release
of toxic gases and hazardous chemicals into environment , nuclear explosions
Unit 2:
Inter-relationship between Disasters and Development
Factors affecting vulnerabilities, differential impacts, impacts of development
projects such asdams, embankments, changes in land use etc. climate change
2 adaption, relevance of indigenous knowledge, appropriate technology and local 8
resources, sustainable development and its role in disaster mitigation, roles and
responsibilities of community, panchayat raj institutions/urban local bodies, state,
centre and other stake holders in disaster mitigation.
Unit 3:
Disaster Management (Pre-disasterstage, Emergency stage and Post
Disaster Stage)
1. Pre-disaster stage (preparedness): Preparing hazard zonation maps,
predictably/forecastingand warning, preparing disaster preparedness plans, land
3 use zoning, preparedness through information, education and communication
(IEC), disaster resistant house construction, population reduction in vulnerable 9
areas, awareness2. Emergency Stage: Rescue training for search & operation at
national & regional level,immediate relief, assessment surveys
3. Post Disaster stage: Rehabilitation and reconstruction of disaster affected
areas; urban disaster mitigation: Political and administrative aspects, social
aspects, economic aspects, environmental aspects.
Unit 4:
Disaster Management Laws and Policies in India Environmental legislations
related to disaster management in India: Disaster Management Act,2005;
Environmental policies & programs in India- Institutions &nationalcentres for
4 natural disaster mitigation: National Disaster Management Authority 8
(NDMA):structure and functional responsibilities, National Disaster Response
Force (NDRF): Rule andresponsibilities, National Institute Of Disaster
Management (NlDM): Rule and responsibilities.
Total 34
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: 8th
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the principals the computer vision and image procesing used
to describe features of images.
CO2: Understand the mathematical foundations for digital manipulation of
images
CO3: Design, code and test computer applications using MATLAB/OpenCV.
CO4: Analyze a wide range of problems and provide solutions related to the
design of computer applications through suitable algorithms, structures,
diagrams, and other appropriate methods.
CO5: Plan and undertake a major individual computer applications.
CO6: Write programs in MATLAB/OpenCV.for digital manipulation of images;
image acquisition; preprocessing; segmentation.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
Name of Department: - Computer Science and Engineering Services Oriented Cloud architecture
1. Subject Code: TCS 859 Course Title:
2. Contact Hours: L: 3 T: 0 P: 0
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Identify the concept of service-oriented cloud architecture.
CO3: Analyze the service-oriented cloud architecture for business technology and
policy management.
2 Berners Lee, Godel and Turing, “Thinking on the Web”, Wiley 1st 2008
inter science,.
3 Peter Mika, “Social Networks and the Semantic Web”, Springer,. 1st 2007
Reference Books
1. Thomas Erl ,“Cloud Computing: Concepts, Technology & 1st 2013
Architecture” Published May
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Exemplify the concepts, techniques, protocols and architecture employed
in wireless local area networks, cellular networks, and Adhoc Networks
based on the standards
CO2: Describe and analyze the network infrastructure requirements to support
mobile devices and users.
CO3: Design and implement mobile applications to realize location-aware
computing
CO4: Asses the important issues and concerns on security and Data management
CO5: Development of various scenarios for mobile computing systems.
CO6: Evaluate the concepts of mobile agents and mobile Adhoc algorithms with
the help of NS2.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
3 Unit 3:
Data management issues, data replication for mobile computers, adaptive 9
clustering for mobile wireless networks, File system, Disconnected operations
Unit 4:
Mobile Agents computing, security and fault tolerance, transaction processing
4 8
in mobile computing environment.
Unit 5:
Ad Hoc networks, localization, MAC issues, Routing protocols, global state
5 routing (GSR), Destination sequenced distance vector routing (DSDV), 9
Dynamic source routing (DSR), Ad Hoc on demand distance vector routing
(AODV), Temporary ordered routing algorithm (TORA), QoS in Ad Hoc
Networks, applications
Total 45
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. J. Schiller,” Mobile Communications”, Addison Wesley. 2nd 2008
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: VIII
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand and apply the key technological principles and methods for
delivering and maintaining mobile applications,
CO5: Interpret a scenario, plan, design and develop a prototype hybrid and
native mobile application,
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 2:
Building blocks of mobile apps
2 App user interface designing – mobile UI resources (Layout, UI elements, Draw-
able, Menu), Activity- states and life cycle, interaction amongst activities. 8
App functionality beyond user interface - Threads, Async task, Services – states
and life cycle, Notifications, Broadcast receivers, Telephony and SMS APIs
Native data handling – on-device file I/O, shared preferences, mobile databases
such as SQLite, and enterprise data access (via Internet/Intranet)
Unit 3:
Sprucing up mobile apps
Graphics and animation – custom views, canvas, animation APIs, multimedia –
3
audio/video playback and record, location awareness, and native hardware access 9
(sensors such as accelerometer and gyroscope)
Unit 4:
4 Testing mobile apps
Debugging mobile apps, White box testing, Black box testing, and test automation 9
of mobile apps, JUnit for Android, Robotium, MonkeyTalk
Unit 5:
Taking apps to Market
5 Versioning, signing and packaging mobile apps, distributing apps on mobile 8
market place
Total 43
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**:
CO1: Summarize about soft computing techniques and their applications
CO2: Analyze various neural network architectures
CO3: Designperceptrons and counter propagation networks.
CO4: Classify the fuzzy systems
CO5: Analyze the genetic algorithms and their applications.
CO6: Compose the fuzzy rules.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Unit 3:
3 Fuzzy Sets, properties and operations - Fuzzy relations, cardinality, operations 9
andproperties of fuzzy relations, fuzzy composition.
Unit 4:
Fuzzy variables - Types of membership functions - fuzzy rules: Takagi and
4 9
Mamdani –fuzzy inference systems: fuzzification, inference, rulebase,
defuzzification.
Unit 5:
Genetic Algorithm (GA): Biological terminology – elements of GA: encoding,
5 types ofselection, types of crossover, mutation, reinsertion – a simple genetic 9
algorithm –Theoretical foundation: schema, fundamental theorem of GA, building
block hypothesis.
Total 44
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
5. Credits: 3
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Demonstrate the basic concept of multimedia information representation.
Delve into the requirement of multimedia communication in today’s digital
world.
CO2: Compare circuit mode and packet mode.Explain QoS and its applications.
CO3: Summarize the various multimedia information representations
CO4: Compute Arithmetic, Huffman, Lempel –Ziv and Lempel–Ziv Welsh
coding. Summarize Joint Photographic Expert Group (JPEG).
CO5: Differentiate between the audio compression techniques: PCM, DPCM,
ADPCM, LPC, CELPC and MPEG. Differentiate MPEG1, MPEG2 and
MPEG4.
CO6: Construct Haptic Interfaces and Virtual reality Systems
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Reference Books
1. David Salomon, “Data Compression: The Complete 1st 2003
Reference”, Fourth Edition, Springer Books
2. GrigoreBurdea, Philippe Coiffet, “Virtual reality 2nd 2003
technology, Volume 1”, Wiley,
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Experiment with various system calls
CO2: Compare between ANSI C AND C++ AND POSIX standards
CO3: Mapping the relationship between UNIX Kernel support for files
CO4: Use Kernel support for process creation and termination and memory
allocation
CO5: Analyze Process Accounting process UID ,Terminal logins, network logins
CO6: Analyze process control,Deamon characteristics, coding rules and error
logging
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**:
CO1: Understand the different aspects of storage management
CO6: Design a complete data center and enhance employability in this field
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
1 Introduction to storage network, Five pillars of IT, parameters related with storage, 10
data proliferation, problem caused by data proliferation, Hierarchical storage
management, Information life cycle management (ILM), Role of ILM, Information
value vs. time mapping, Evolution of storage, Storage infrastructure component, basic
storage management skills and activities, Introduction to Datacenters, Technical &
Physical components for building datacenters
Unit 2:
Technologies for Storage network
2
Server centric IT architecture & its limitations, Storage centric IT architecture &
advantages, replacing a server with storage networks, Disk subsystems, Architecture
of disk subsystem, Hard disks and Internal I/O channel, JBOD, RAID& RAID levels, 9
RAID parity, comparison of RAID levels, Hot sparing, Hot swapping, Caching :
acceleration of hard disk access, Intelligent Disk subsystem architecture
Tape drives: Introduction to tape drives, Tape media, caring for Tape& Tape heads,
Tape drive performance, Linear tape technology, Helical scan tape technology
Unit 3:
I/O techniques
I/O path from CPU to storage systems, SCSI technology – basics & protocol, SCSI
and storage networks, Limitations of SCSI
Fibre channel: Fibre channel, characteristic of fibre channel, serial data transfer vs.
parallel data transfer, Fibre channel protocol stack, Links, ports & topologies, Data
3 transport in fibre channel, 10
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
5. Credits: 3
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Explain and compare a variety of pattern classification, structural pattern
recognition, and pattern classifier combination techniques.
CO2. Summarize, analyze, and relate research in the pattern recognition area
verbally and in writing.
CO3. Apply performance evaluation methods for pattern recognition, and
critique comparisons of techniques made in the research literature.
CO4. Apply pattern recognition techniques to real-world problems such as
document analysis and recognition.
CO5. Implement simple pattern classifiers, classifier combinations, and
structural pattern recognizers.
CO6. Describe the various clustering methods
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Reference Books
1. Christopher M. Bishop, “Pattern Recognition and Machine 1st 2016
Learning”, Springer
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
5. Credits: 3
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Describe two or more agile software development methodologies.
CO2: Identify the benefits and pitfalls of transitioning to agile.
CO3: Compare agile software development to traditional software
development models.
CO4: Apply agile practices such as test-driven development, standup meetings,
and pair programming to their software engineering practices.
CO5: Apply the agile testing
CO6: Describe the agile in current market scenario.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Total 46
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Ken Schawber, Mike Beedle, “Agile Software 2008
Development with Scrum”, Pearson
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Identify strategic situations and represent them as games
CO2: Find dominant strategy equilibrium, pure and mixed strategy Nash
equilibrium,
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Reference Books
1. Roger B. Myerson: “Game Theory: Analysis of Conflict”, 1st 1997
Harvard University Press,
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 8th
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the principles of quantum computation.
CO2: Learn the circuit and gates involved in quantum computing.
CO3: Understand the algorithms used in quantum computing.
CO4: Study the information theory aspects of quantum computing.
CO5: Use and build Quantum algorithms for solving various problems.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
5. Credits: 3
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: learn about the current trends in AI in chatbots and virtual assistants
CO2: understand the research progress being made in AI-driven cyber-
security and ITOps
CO3: learn current applications of AI in healthcare
CO4: learn about the applications of AI in in IoT and quantum computing
CO5: understand and create an AI application from recent trends
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
Apply the knowledge gained from the recent trends in AI to develop and
demonstrate an application that demonstrates their learning.
5 6
Total 42
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
There is no textbook, recent research papers and material
available online will be discussed
Reference Books
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 8
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Apply Fairness in designing AI algorithms.
CO2: Understand and Examine Accountability in AI
CO3: Understand and Examine pitfalls of various contemporary AI
applications.
CO4: Analyze the ethics for designing future AI systems.
CO5: Evaluate fairness and transparency of AI systems.
CO6: Examine Real World Cases from policy perspectives
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
3 Unit 3: 8
Accountability & Ethics: Introduction, Guidelines in AI ethics; AI in
practice; Advances in AI ethics;
Unit 4: Transparency (Explainability): Importance of explainability in AI
systems, Case studies; Accuracy-interpretability tradeoff in machine
4 learning; Different types of interpretability approaches: Rule-based, 10
Prototype-based, Feature importance-based, post-hoc explanations.
Unit 5:
FATE incorporation in AI designing systems, Issues, Effectiveness,
5 12
Responsible AI, Algorithm Inclusivity and Accessibility, Real World use
case examination.
Total 48
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of
No. Publication /
Reprint
Textbooks
1. Aileen Nielsen, Practical Fairness: Achieving Fair and 1st 2021
Secure Data Models, O'Reilly Media, Inc
2. Solon Barocas, Moritz Hardt, Arvind Narayanan, 1st 2019
Fairness And Machine Learning Limitations and
Opportunities
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
6. Semester: 8th
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Understand the security and privacy concerns in Online social media.
CO2: Develop Secure Web Applications
CO3: Understand the Architecture of Web and working with social media
APIs.
CO4: Perform social media analysis and visualization using various
tools and techniques.
CO5: Know the various cases and data protection laws.
CO6: Analyze the security parameters in social media.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
1 12
Unit – II
2 10
Social Media Attacks-Phishing, Reconnaissance, Fake Profiles, Social
Engineering, Fake News, Profile Compromise
Unit – III
3 10
Unit – IV
4 10
Unit – V
5 8
Total 50
11. Suggested Books:
SL. Name of Authors/Books/Publishers Edition Year of Publication
No. / Reprint
Textbooks
1. Social Media Security: Leveraging Social Networking While 1st 2017
Mitigating Risk 1st Edition by Michael Cross
Reference Books
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
6. Semester: 8th
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Explain e-privacy and trust.
2 Peter Carey, Eduardo Ustaran, “E-privacy and Online Data 1st 2002
Protection”, Tottel publishing.
3 Michael E. Whitman and Herbert J. Mattord, Principles of 2nd 2007
Information Security, (2e), Thomson Learning, 2007
Reference Books
2 Ronald Leenes, Rosamunde van Brakel, Serge Gutwirth, 1st 2017
Paul de Hert, "Data Protection and Privacy: The Age of
Intelligent Machines", Hart Publishing, 2017
3
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam
GRAPHIC ERA (DEEMED TO BE UNIVERSITY), DEHRADUN
SEMESTER VIII
2. Contact Hours: L: 3 T: 0 P: 0
5. Credits: 3
6. Semester: 8th
7. Category of Course: DE
9. Course After completion of the course the students will be able to:
Outcome**: CO1: Explain fundamentals of crypto assets and crypto.
CO2: Know the working mechanism of crypto assets.
CO3: Analyze the different mechanism of crypto assets and crypto economy.
CO4: Use blockchain mechanism to maintain crypto assets.
CO5: Apply crypto assets in crypto economy applications.
CO6: Develop policies of crypto economy.
.
** Describe the specific knowledge, skills or competencies the students are expected
to acquire or demonstrate.
12. Mode of Evaluation Test / Quiz / Assignment / Mid Term Exam / End Term Exam