M.Sc_.-Computer-Science
M.Sc_.-Computer-Science
Uni.
SEMESTER II CIA Total
Exam
9. Core Paper -4 5 3 Advanced Enterprise Java 25 75 100
Programming
10. Core Paper -5 4 3 Design and Analysis of Algorithm 25 75 100
11. Core Paper -6 4 3 Web Application using C#.NET 25 75 100
1
17. *Field Study - 2 100 - 100
18. Compulsory 2 2 Human Rights 25 75 100
Paper
30 25 1000
Uni.
SEMESTER III CIA Total
Exam
19. Core Paper -7 5 4 Distributed Operating System 25 75 100
20. Core Paper -8 5 4 XML and Web Services 25 75 100
21. Core Paper -9 5 3 Programming using Python 25 75 100
22. Practical Paper -7 3 2 Practical 7: Distributed Operating 25 75 100
System
23. Practical Paper -8 3 2 Practical 8: XML and Web Services 25 75 100
24. Practical Paper -9 3 2 Practical 9: Programming using Python 25 75 100
Internal Elective for same major students
25. Core Elective Paper -3 3 3 (To choose one out of 3) 25 75 100
A. Block chain Technology
B. Internet of Things
C. Network Security
External Major for other major Students (Inter/multi-disciplinary papers)
26. Open Elective Paper - 3 3 3 (To choose one out of 3) 25 75 100
A. Programming using C
B. Programming using C++
C. Programming using Python
27. **MOOC - - 100
Courses
30 23 200 600 900
Uni.
SEMESTER IV CIA Total
Exam
28. Core Paper-10 5 4 Mobile Application Development 25 75 100
29. Core Paper-11 6 4 Software Project Management 25 75 100
30. Practical Paper-10 3 2 Practical 1: Mobile Application 25 75 100
Development
31. Core Project 10 5 100 100
Project with viva voce (Compulsory) (75 Project + 25
viva)
Internal Elective for same major students (Choose any one)
32. Core Elective Paper - 4 3 3 (To choose one out of 3) 25 75 100
A. Big Data Analysis
B. Artificial Intelligence
C. Machine Learning
External Major for other major Students (Inter/multi-disciplinary papers)
33. Open Elective Paper - 4 3 3 (To choose one out of 3) 25 75 100
A. Cyber Security
B. Decision Support system
C. Research Methods & Ethics
30 21 125 375 600
120 90 3300
* Field Study
There will be field study which is compulsory in the first semester of all PG courses with
2 credits. This field study should be related to the subject concerned with social impact.
Field and Topic should be registred by the students in the first semester of their study
along with the name of a mentor before the end of the month of August. The report with
problem identification and proposed solution should be written in not less than 25 pages
in a standard format and it should be submitted at the end of second semester. The period
2
for undergoing the field study is 30 hours beyond the instructional hours of the respective
programme. Students shall consult their mentors within campus and experts outside the
campus for selecting the field and topic of the field study. The following members may be
nominated for confirming the topic and evaluating the field study report.
**Mooc Courses
Inclusion of the Massive Open Online Courses (MOOCs) with zero credits available on
SWAYAM, NPTEL and other such portals approved by the University Authorities.
3
SEMESTER III
PAPER - 7
DISTRIBUTED OPERATING SYSTEM
COURSE OBJECTIVES
To understand foundations of Distributed Systems.
To introduce the idea of memory management
To understand in detail the system level and support required for distributed system.
To understand the shell script commands of Unix
COURSE OUTCOMES
CO1 - Students are able to understand foundations of Distributed Systems.
CO2 - Students are able to get the idea of memory management
CO3 - Students are able to comprehend in detail the system level and support required for
distributed system.
CO4 - Students are able to recognize the shell script commands of Unix
UNIT-I: INTRODUCTION
Operating system concepts - System Calls - OS Structure - Process and Threads: Process -
Threads - Inter Process Communication - Scheduling - Classical IPC Problems.
UNIT-III: INPUT/OUTPUT
Principles of I/O hardware - Principles of I/O software - I/O Software Layers - Disks - Clocks
- User Interface - Thin Clients - Power Management. Deadlocks: Resources - Introduction -
The Ostrich Algorithm - Deadlock Avoidance - Deadlock Prevention - Other issues.
UNIT-V: SECURITY
Security Environment - Basics of Cryptography - Protection Mechanisms - Authentication -
Insider Attacks - Exploiting Code Bugs - Malware – Defenses - Case Study: LINUX.
TEXT
1. Andrew S. Tanenbaum - Modern Operating System - Prentice Hall of India Pvt Limited,
2001
4
REFERENCES
1. Pradeep K. Sinha. - Distributed Operating Systems Concepts and Design - Prentice Hall of
India Pvt Limited, 2008
2. Andrew S. Tanenbaum and Maarten Van Steen - Distributed Systems - Prentice Hall of
India Pvt Limited, 2002.
WEB REFERENCES
https://en.wikipedia.org/wiki/Distributed_operating_system
https://www.tutorialspoint.com/distributed-operating-system
https://lasr.cs.ucla.edu/classes/188_winter15/readings/distributed_os_notes.html
5
PAPER - 8
XML AND WEB SERVICES
COURSE OBJECTIVE
To examine fundamental XML technology
To understand the use of JSON
To gain an understanding about the role of web services in commercial applications
To learn the emerging standard protocols like SOAP, WSDL and UDDI.
To introduce the role of web services in CMS
COURSE OUTCOMES
CO1 - Students are able to understand the use of web services in B2C and B2B applications.
CO2 - Students are able to understand the design principles and application of SOAP and
REST based web services.
CO3 - Students are able to design collaborating web services according to a specification.
CO4 - Students are able to implement an application that uses multiple web services in a
realistic business scenario.
UNIT - IV: WEB SERVICE BUILDING BLOCKS: SOAP, WSDL AND UDDI
Introduction to SOAP – Basic SOAP syntax – Sending SOAP messages – Future of SOAP –
Introduction to WSDL – Basic WSDL syntax- SOAP binding – Introduction of UDDI –
UDDI API – Future of UDDI.
6
TEXTS
1. Ron Schmelzer et al. “XML and Web Services”, Pearson Education, 2002.
2. MichealDroettboom, “Understanding JSON Schema Release 1.0”, 2013.
REFERENCES
1. Ethan Cerami, “Web Services Essentials”, O’Reilly, Shroff Publishers & Distributors
Pvt.Ltd, Fourth Edition, 2002.
2. Sandeep Chatterjee and James Webber, “Developing Enterprise Web Services: An
Architect’s Guide”, Prentice Hall Edition, 2004.
WEB REFERENCES
www.w3schools.com/xml/
https://www.tutorialspoint.com/xml/
www.xmlmaster.org/en/article/d01/
www.quackit.com/xml/tutorial/
www.tutorialspoint.com/webservices/
www.javatpoint.com/web-services-tutorial
tutorials.jenkov.com/web-services/
7
PAPER - 9
PROGRAMMING USING PYTHON
COURSE OBJECTIVES
To know the basics of algorithmic problem solving
To read and write simple Python programs.
To develop Python programs with conditionals and loops.
To define Python functions and call them.
To use Python data structures – lists, tuples, dictionaries.
To do input/output with files in Python.
COURSE OUTCOMES
CO1 - Students are able to explore the fundamental concepts of Python
CO2 - Students are able to understand Basics of Python programming language
CO3 - Students are able to solve simple problems using Python
CO4 - Students are able to acquire fundamental knowledge and skills on Python
Programming
CO5 - Students are able to understand the nuances of this language.
CO6 - Students are able to know the usage of modules and packages in Python
CO7 - Students are able to familiarize with file concepts in Python
CO8 - Students are able to familiarize with web concepts using Python.
UNIT - I: OVERVIEW
Introduction to Python: Features of Python - How to Run Python – Identifiers - Reserved
Keywords - Variables - Comments in Python - Indentation in Python - Multi-Line Statements
- Multiple Statement Group (Suite) – Quotes in Python - Input, Output and Import Functions
- Operators. Data Types and Operations: Numbers-Strings-List-Tuple-Set-Dictionary-Data
type conversion.
8
UNIT - V: REGULAR EXPRESSIONS & WEB APPLICATIONS
Regular Expressions: The match() function - The search() function - Search and Replace -
Regular Expression Modifiers: Option Flags - Regular Expression Patterns - Character
Classes - Special Character Classes - Repetition Cases - findall() method - compile() method.
Web Application Framework- Django Architecture- Starting development- Case Study:
Blogging App.
TEXTS
1. Jeeva Jose and P. SojanLal, “Introduction to Computing and Problem Solving with
Python”, Khanna Book Publising Co. (P) Ltd., 2016.
2. ArshdeepBahga, Vijay Madisetti, “Cloud Computing: A Hands – On Approach”
Universities press (India) Pvt. limited 2016.
REFERENCES
1. Wesley J. Chun, “Core Python Programming”, Second Edition, Prentice Hall Publication,
2006.
2. Timothy A Budd, “Exploring Python”, Tata McGraw Hill, New Delhi, ISBN:
780071321228
WEB REFERENCES
www.learnpython.org/
https://www.codecademy.com/learn/python
https://www.Codementor.io
https://www.Python.org
9
PRACTICAL - 7
DISTRIBUTED OPERATING SYSTEM
1. Write a shell script to copy, rename and print multiple files using choice menus.
2. Write a shell script to display logged in users who are using high CPU percentage.
3. Write a shell script to list processes based on CPU percentage and memory un usage.
4. Write a shell script to display total used and free memory space.
5. Write a shell script that takes as command-line input a number n and a word. The program
should then print the word n times, one word per line.
6. Write a shell scripts using the following statements. a) While-loop b) For-loop c) If-then-
else d) Switch
7. Write a shell script using grep statement.
8. Write a shell script that can search all immediate sub-directories of the currentdirectory for
a given file and then quit if it finds one.
10
PRACTICAL-8
XML AND WEB SERVICES
11
PRACTICAL-9
PROGRAMMING USING PYTHON
12
CORE ELECTIVE
PAPER - 3
(to choose one out of 3)
A. BLOCKCHAIN TECHNOLOGY
COURSE OBJECTIVES
To understand the functions of Blockchain
To have clarity in the Concepts, challenges, solutions with respect to Blockchain
To understand the facts and myths related to cryptocurrencies.
To apply the concept of Blockchain for various applications.
To correlate current Indian scenario in governing cryptocurrencies in India with
Global standard.
COURSE OUTCOMES
CO1 - Students are able to understand the functions of Blockchains
CO2 - Students are able to have clarity in the Concepts, challenges, solutions with respect to
blockchain
CO3 - Students are able to understand the facts and myths related to cryptocurrencies.
CO4 - Students are able to apply the concept of Blockchain for various applications.
CO5 - Students are able to correlate Current Indian scenario in governing cryptocurrencies in
India with Global standard.
13
Publishing: Journalcoin, The Blockchain Is Not for Every Situation, Centralization-
Decentralization Tension and Equilibrium.
TEXT
1. Melanie. Swan. Blockchain: Blueprint for a new economy. " O'Reilly Media, Inc.", 2015.
REFERENCES
1. Colm Gordon, “Blockchain Simplified”, 2017.
2. Melanie Swan “Blockchain”, O’Reilly Media, Inc., 2015.
3. Imran basher, “Mastering Blockchain” Packt publication, 2nd Edition, 2018.
WEB REFERENCES
https://www.udemy.com/course/blockchain-and-bitcoin-fundamentals
https://www.tutorialspoint.com/blockchain/index.htm
14
CORE ELECTIVE
PAPER - 3
B. INTERNET OF THINGS
COURSE OBJECTIVES
To design and Develop IOT based solution for real world applications
To realize the evolution of Internet in Mobile Devices, Cloud & Sensor Networks
To understand the building blocks of Internet of Things and its characteristics.
To understand the concepts of IOT and its application.
COURSE OUTCOMES
CO1 - Students are able to design and develop IOT based solution for real world applications
CO2 - Students are able to realize the evolution of Internet in Mobile Devices, Cloud &
Sensor Networks
CO3 - Students are able to understand the building blocks of Internet of Things and its
characteristics.
CO4 - Students are able to understand the concept of IOT and its application.
UNIT - I: INTRODUCTION
Introduction and Definition of Internet of Things, IoT Growth – A Statistical View,
Application Areas of IoT, Characteristics of IoT, Things in IoT, IoT Stack, Enabling
Technologies, IoT Challenges, IoT Levels, Is Cyber Physical System the same as IoT? Is
WSN the same as IoT?
15
UNIT - V: GETTING FAMILIARIZED WITH ARDUINO IDE
Architecture, Arduino Programming, A Simple Application, Arduino Playground. Getting
Familiarized with Raspberry Pi - Story behind Raspberry Pi, Architecture, Compatible
Peripherals, Add-Ons, and Accessories, Operating System for Raspberry Pi, Setting up
Raspberry Pi, Initial Configuration for Raspberry Pi, Linux Based Softwares in Raspberry Pi,
Application Development with Raspberry-Pi – A Quick Walk Through.
TEXT
1. Shriram K Vasudevan, Abhishek S Nagarajan, RMD Sundaram, Internet of Things, Wiley,
India, 2019.
REFERENCES
1. Vijay Madisetti and Arshdeep Bahga, “Internet of Things (A Hands-on
Approach)”, 1stEdition, VPT, 2014.
2. Francis daCosta, “Rethinking the Internet of Things: A Scalable Approach to Connecting
Everything”, 1st Edition, Apress Publications, 2013.
WEB REFERENCES
https://www.coursera.org/courses?query=iot
https://online.stanford.edu/courses/xee100-introduction-internet-things
https://www.tutorialspoint.com/internet_of_things/index.htm
16
CORE ELECTIVE
PAPER - 3
C. NETWORK SECURITY
COURSE OBJECTIVES
Identify some of the driving factors needed for network security
Identify and classify attacks and threats
Compare and contrast symmetric and asymmetric encryption systems.
Identify the web systems vulnerable to attack.
Use appropriate secure mail applications and security protocols
COURSE OUTCOMES
CO1 - Students are able to identify some of the driving factors needed for network security
CO2 - Students are able to Identify and classify attacks and threats
CO3 - Students are able tocompare and contrast symmetric and asymmetric encryption
systems.
CO4 - Students are able toidentify the web systems vulnerable to attack.
CO5 - Students are able touse appropriate secure mail applications and security protocols
17
UNIT-V: PROTECTION OF COMPUTING RESOURCES
Secure Programs - Non-malicious Program Errors - Viruses and Other Malicious Code -
Targeted Malicious Code - Methods of Control. Security Features in Operating System:
Objects to be Protected - Protection Methods of Operating Systems - Memory Protection -
File Protection - User Authentication.
TEXT
1. William Stallings. Cryptography and network security, 4/E. Pearson Education India,
2006.
REFERENCE
2. Singh,”Network Security and Management”, 2nd ed., PHI.
WEB REFERENCES
https://alison.com/course/introduction-to-computer-network-security
https://www.udemy.com/course/certified-secure-netizen/
18
OPEN ELECTIVE
PAPER - 3
(to choose one out of 3)
A. PROGRAMMING USING C
COURSE OBJECTIVES
To identifysituations where computational methods and computers would be useful.
To enhance their analyzing and problem-solving skills and use the same for writing
programs in C.
To develop logics and that will help them to create programs, applications in C.
To identify programming task involvedin a given computational problem.
To approachthe programming tasks using techniques learned and writepseudo-code.
To choosethe right data representation formats based on the requirements of the
problem.
To usethe comparisons and limitations of the various programming constructs and
choosethe right one for the task in hand.
To enter the program on a computer, edit, compile, debug, correct, recompile and run
it.
To identify tasks in which the numerical techniques learned are applicable and apply
them to write programs.
COURSE OUTCOMES
CO1 - Students are able to understand a functional hierarchical code organization.
CO2 - Students are able to define and manage data structures based on problem subject
domain.
CO3 - Students are able to work with textual information, characters and strings.
CO4 - Students are able to work with arrays, structures, pointers and files.
19
Pointer Expressions – Pointers and Arrays – Pointers and Character Strings – Array of
Pointers – Pointers as Function Arguments – Functions returning Pointers – Pointers to
Functions.
TEXT
1. E.Balagurusamy, “Programming in ANSI C”, Seventh Edition, McGraw Hill Education
Private Limited, NewDelhi: 2017.
REFERENCES
1. YashavantKanetkar, “Let us C”, BPB Publications, Tenth Edition - New Delhi: 2010
2. Ashok N.Kamthane, “Programming in C”, Second Impression, Pearson: 2012.
WEB REFERENCES
http://www.c4learn.com/?gclid=COK1y6nHk7wCFcUA4godmlgAKA/
http://www.cprogramming.com/tutorial/c-tutorial.html/
http://www.tutorialspoint.com/cprogramming/
20
OPEN ELECTIVE
PAPER - 3
B. PROGRAMMING USING C++
COURSE OBJECTIVES
COURSE OUTCOMES
CO1 - Students are able to understand object oriented programming and advanced C++
concepts.
CO2 - Students are able to understand the various functions and arguments in object oriented
programming.
CO3 - Students are able to understand the classes and objects in C++.
CO4 - Students are able to familiarize with inheritance and polymorphisms.
CO5 - Students are able to understand the concepts files and exception handling.
21
TEXT
1. E Balagurusamy, “Object Oriented Programming with C++”, 5th Edition, McGraw Hill
Education India Pvt Ltd. 2012.
REFERENCES
1. Andrew C. Staugaard JR, “Structured and Object-Oriented Problem Solving Using C++”,
3rd Edition, Prentice Hall, 2002.
2. Herbert Schildt, “C++: The Complete Reference”, 3rd Edition, Tata McGraw Hill, 1999.
WEB REFERENCES
http://www.doc.ic.ac.uk/~wjk/C++Intro/
http://www.ideone.com/
http://www.compilr.com/c-compiler
22
OPEN ELECTIVE
PAPER - 3
C. PROGRAMMING USING PYTHON
COURSE OBJECTIVES
To know the basics of algorithmic problem solving
To read and write simple Python programs.
To develop Python programs with conditionals and loops.
To define Python functions and call them.
To use Python data structures – lists, tuples, dictionaries.
To do input/output with files in Python.
COURSE OUTCOMES
CO1 - Students are able to explore the fundamental concepts of Python
CO2 - Students are able to understand Basics of Python programming language
CO3 - Students are able to solve simple problems using Python
CO4- Students are able to acquire fundamental knowledge and skills on Python
Programming
CO5 - Students are able to understand the nuances of this language.
CO6 - Students are able to know the usage of modules and packages in Python
CO7 - Students are able to familiarize with file concepts in Python
CO8 - Students are able to familiarize with web concepts using Python.
UNIT - I: OVERVIEW
Introduction to Python: Features of Python - How to Run Python – Identifiers - Reserved
Keywords - Variables - Comments in Python - Indentation in Python - Multi-Line Statements
- Multiple Statement Group (Suite) – Quotes in Python - Input, Output and Import Functions
- Operators. Data Types and Operations: Numbers-Strings-List-Tuple-Set-Dictionary-Data
type conversion.
23
UNIT - V: REGULAR EXPRESSIONS & WEB APPLICATIONS
Regular Expressions: The match() function - The search() function - Search and Replace -
Regular Expression Modifiers: Option Flags - Regular Expression Patterns - Character
Classes - Special Character Classes - Repetition Cases - findall() method - compile() method.
Web Application Framework- Django Architecture- Starting development- Case Study:
Blogging App.
TEXTS
1. Jeeva Jose and P. SojanLal, “Introduction to Computing and Problem Solving with
Python”, Khanna Book Publising Co. (P) Ltd., 2016.
2. ArshdeepBahga, Vijay Madisetti, “Cloud Computing: A Hands – On Approach”
Universities press (India) Pvt. limited 2016.
REFERENCES
1. Wesley J. Chun, “Core Python Programming”, Second Edition, Prentice Hall Publication,
2006.
2. Timothy A Budd, “Exploring Python”, Tata McGraw Hill, New Delhi, ISBN:
780071321228
WEB REFERENCES
www.learnpython.org/
https://www.codecademy.com/learn/python
https://www.Codementor.io
https://www.Python.org
24
SEMESTER IV
PAPER - 10
MOBILE APPLICATION DEVELOPMENT
COURSE OBJECTIVES
To know the basis of Android application and development environment
To able to develop simple and professional application
To get ready for the job opportunity in mobile application development
COURSE OUTCOMES
CO1 - Students are able to know about the mobile application development environment
CO2 - Students are able to develop interface and design
CO3 - Students are able to use the techniques in Mobile Applications
UNIT - IV: HANDLING PICTURES AND MENUS WITH VIEWS AND STROING
THE DATA
Working with Image Views – Displaying Images in the Gallery View – Displaying Images in
the Grid View – Using the Image Switcher View- Designing Context Menu for Image View-
Using the Analog-Clock and Digital Clock Views – Embedding Web Browser in an Activity
- Notifying the User Creating the Toast Notification - Creating the Status Bar Notification-
25
Creating the Dialog Notification - Introducing the Data Storage Options - Using Preferences -
Using the SQLite Database Creating the Database - Executing the Database Operations.
TEXTS
1. Pradeep Kothari, “Android Application Development (with kitkat support) Black Book”,
Kogent Learning Solution Inc., Dreamtech Press India Pvt. Ltd, Wiley Publications.
2. Sayed Y. Hashimi, SatyaKomatineni, Dave MacLean, “Pro Android 2”, 2010 Edition,
Wiley publications.
REFERENCES
1. Reto Meier ,”Professional Android Application Development”,2009 Edition, Willy
Publication.
2. ZigurdMednieks, Laird Dornin, G. Blake Meike,and Masumi Nakamura, “Programming
Android”, OReilly publications.
WEB REFERENCES
www.tutorialspoint.com
www.javatpoint.net
www.mkyong.com
www.java2s.com
26
PAPER - 11
SOFTWARE PROJECT MANAGEMENT
COURSE OBJECTIVES
To provide sound knowledge in Project Management.
To understand the importance of requirement gathering
To explore different models in Software Development
To know the workflow of a Project
To identify various actors in the activity
COURSE OUTCOMES
CO1 - Students are able to understand the activities during the project scheduling of any
software application.
CO2 - Students are able tolearn the risk management activities and the resource allocation for
the projects.
CO3 - Students are able toapply the software estimation and recent quality standards for
evaluation of the software Projects.
CO4 - Students are able toacquire knowledge and skills needed for the construction of highly
reliable software project.
CO5 - Students are able to able to create reliable, replicable cost estimation that links to the
requirements of project planning and managing.
27
UNIT IV: RISK MANAGEMENT, RESOURCE ALLOCATION AND MONITORING
Risk Management –Risk – Categories of Risk – A Framework for Dealing with Risk – Risk
Identification – Risk Assessment – Risk Planning – Risk Management. Resource Allocation –
Introduction – The Nature of Resources – Identifying Resource Requirements – Scheduling
Resources. Monitoring –Creating the Framework – Collecting the Data – Review and Project
Termination Review – Visualizing Progress – Cost Monitoring and Earned Value Analysis –
Getting the Project Back to Target – Change Control – SCM.
TEXT
1. BOB Huges, Mike Cotterell, Rajib Mall “Software Project Management”, McGraw Hill,
Fifth Edition,2011.
REFERENCES
1. Futrell, “Quality software Project management”, Pearson Education India.
2. Royce, “Software Project Management”, Pearson Education India.
WEB REFERENCES
https://www.lynda.com/Project-Management-training-tutorials/39-0.html
www.rspa.com/spi/project-mgmt.html
28
PRACTICAL - 10
MOBILE APPLICATION DEVELOPMENT
29
CORE ELECTIVE
PAPER - 4
(to choose one out of 3)
A. BIG DATA ANALYTSIS
COURSE OBJECTIVES
To understand the needs for Big Data and its environments.
To learn the basic requirements of Big Data Technologies.
To expose the knowledge of MapReduce programming framework(Hadoop).
To be familiar with with NoSQL DB’s Cassandra and MongoDB
To understand Hive and Pig technologies for analyzing the Big Data.
COURSE OUTCOMES
CO1 - Students are able to learn about types of digital data and big data
CO2 - Students are able to gain knowledge of various Big data analtics and its Technologies
CO3 - Students are able to study about various NoSQL databases and management
techniques
CO4 - Students are able to work with NoSQL databases such as MongoDB and Cassendra
CO5 - Students are able to design Big data queries using Hive and Pig.
History, Needs, Features, Key advantage and Versions of Hadoop, Essential of Hadoop
ecosystems, RDBMS versus Hadoop, Key aspects and Components of Hadoop, Hadoop
architectures
30
TEXT
1. Seema Acharya and Subhashini Chellappan, “Big Data and Analytics”, Wiley India Pvt.
Ltd., 2016
REFERENCE BOOKS
1. “Big Data” by Judith Hurwitz, Alan Nugent, Dr. Fern Halper and Marcia Kaufman, Wiley
Publications, 2014.
2.“Big Data Imperatives : Enterprise Big Data Warehouse, BI Implementations and
Analytics” by Soumendra Mohanty, Madhu Jagadeesh and Harsha Srivatsa, Apress Media,
Springer Science + Business Media New York, 2013
3. “Mining of Massive Datasets”, Anand Rajaraman, Jure Leskovec, Jeffery D. Ullman,
Springer, July 2013.
4. “Hadoop: The definitive Guide”, Tom White, O'Reilly Media, 2010.
WEB REFERENCES
http://strata.oreilly.com/2010/09/the-smaq-stack-for-big-data.html
http://blogs.computerworld.com/18840/big_data_smaq_down_storage_mapreduce_and_query
31
CORE ELECTIVE
PAPER - 4
B. ARTIFICIAL INTELLIGENCE
COURSE OBJECTIVES
To provide a strong foundation of fundamental concepts in Artificial Intelligence
To provide a basic exposition to the goals and methods of Artificial Intelligence
To enable the student to apply these techniques in applications which involve
perception, reasoning and learning
COURSE OUTCOMES
CO1 - Students are able to understand the various searching techniques, constraint
satisfaction problem and example problems- game playing techniques.
CO2 - Students are able toapply these techniques in applications which involve perception,
reasoning and learning.
CO3 - Students are able toexplain the role of agents and how it is related to environment and
the way of evaluating it and how agents can act by establishing goals.
CO4 - Students are able toacquire the knowledge of real world Knowledge representation.
CO5 - Students are able toanalyze and design a real world problem for implementation and
understand the dynamic behavior of a system.
CO6 - Students are able touse different machine learning techniques to design AI machine
and enveloping applications for real world problems
UNIT – I: INTRODUCTION
AI Problems - Al techniques - Criteria for success. Problems, Problem Spaces, Search: State
space search - Production Systems
TEXT
1. Elaine Rich and Kevin Knight," Artificial Intelligence", Tata McGraw Hill Publishers
company Pvt Ltd, Second Edition, 1991.
32
REFERENCES
1. Nils J. Nilsson, “Artificial Intelligence: A new Synthesis”, Harcourt Asia Pvt. Ltd., 2000.
2. Elaine Rich and Kevin Knight, “Artificial Intelligence”, 2nd Edition, Tata McGraw-Hill,
2003.
3. George F. Luger, “Artificial Intelligence-Structures and Strategies For Complex Problem
Solving”, Pearson Education / PHI, 2002.
WEB REFERENCES
https://www.tutorialspoint.com/artificial_intelligence/
https://learn.saylor.org/course/view.php?id=96
https://in.udacity.com/course/intro-to-artificial-intelligence--cs271
33
CORE ELECTIVE
PAPER - 4
C. MACHINE LEARNING
COURSE OBJECTIVES
To introduce the concepts like
conceptualization and summarization of big data and machine learning
Introduction to the course, recap of linear algebra and probability theory basics.
Bayesian Classification: Naive Bayes, Parameter Estimation (ML, MAP), Sequential
Pattern Classification.
Non-parametric Methods: k-Nearest Neighbours Discriminative Learning models:
Logistic Regression, Perceptrons, Artificial Neural Networks, Support Vector Machines
COURSE OUTCOMES
CO1 - Students are able to design and implement machine learning solutions to classification,
regression, and clustering problems;
CO2 - Students are able to evaluate and interpret the results of the algorithms.
CO3 - Students are able to select and implement machine learning techniques and computing
environment that are suitable for the applications under consideration.
CO4 - Students are able to solve problems associated with batch learning and online learning,
and the big data characteristics such as high dimensionality, dynamically growing data and in
particular scalability issues.
CO5 - Students are able to understand and apply scaling up machine learning techniques and
associated computing techniques and technologies.
CO6 - Students are able to recognize and implement various ways of selecting suitable model
parameters for different machine learning techniques.
34
UNIT – IV: UNSUPERVISED AND LEARNING ALGORITHMS
Clustering- K-means Clustering- EM algorithm- Mixture of Gaussians- Factor Analysis-
Principal and Independent Component Analysis- latent Semantic Indexing- Spectral or sub-
space clustering.
TEXTS
1. Rajiv Chopra, ”Machine Learning”, Khanna Publications, New Delhi, 2018.
2. V.K. Jain, ”Machine Learning”, Khanna Publications, New Delhi, 2018.
REFERENCES
1. Introduction to Statistical Learning, Gareth James, Daniela Witten, Trevor Hastie, Robert
Tibshirani, Springer, 2013.
2. Pattern Classification, 2nd Ed., Richard Duda, Peter Hart, David Stork, John Wiley &
Sons, 2001.
3. Pattern Recognition and Machine Learning, Christopher Bishop, Springer 2006.
WEB REFERENCES
https://www.datacamp.com/courses/introduction-to-machine-learning-with-r
https://elitedatascience.com/learn-machine-learning
https://www.analyticsvidhya.com/learning-path-learn-machine-learning/
35
OPEN ELECTIVE
PAPER - 4
(to choose one out of 3)
A. CYBER SECURITY
COURSE OBJECTIVES
To understand the cyber threats and their Impact
To have an awareness towards cybercrimes and legal impact against them
To avoid becoming a Victim to cyber threats
To assess risks and weakness in security policies
To respond to security alerts and identify flaws in systems and networks
COURSE OUTCOMES
CO1 - Students are able to understand the cyber threats and their Impact
CO2 - Students are able to have an awareness towards cybercrimes and legal impact against
them
CO3 - Students are able to avoid becoming a Victim to cyber threats
CO4 - Students are able to assess risks and weakness in security policies
CO5 - Students are able to respond to security alerts and identify flaws in systems and
networks
36
UNIT - IV: CYBERSECURITY
Organizational Implications – Introduction - Cost of Cybercrimes and IPR Issues: Lessons for
Organizations - Web Threats for Organizations: The Evils and Perils - Security and Privacy
Implications from Cloud Computing - Social Media Marketing: Security Risks and Perils for
Organizations - Social Computing and the Associated Challenges for Organizations -
Protecting People's Privacy in the Organization - Organizational Guidelines for Internet
Usage - Safe Computing Guidelines and Computer Usage Policy - Incident Handling: An
Essential Component of Cybersecurity - Forensics Best Practices for Organizations - Media
and Asset Protection: Best Practices for Organizations - Importance of Endpoint Security in
Organizations.
TEXT
1. Jennifer L, Bayuk J, Heale P, Rohmeyer, Marcus Sachs, Jeffrey Schmidt and Joseph Weiss
“Cyber Security Policy Guidebook”, John Wiley & Sons ,2012.
REFERENCES
1. Rick Howard, “Cyber Security Essentials”, Auerbach Publications, 2011.
2. Richard A, Clarke, Robert Knake, “Cyber war: The Ne xt Threat to National Security &
What to Do About It”, Ecco, 2010. 3. Dan Shoemaker, “Cyber security The Essential Body
of Knowledge”, Cengage Learning, 2011.
WEB REFERENCES
https://www.javatpoint.com/cyber-security-tutorial
https://www.pewresearch.org/internet/quiz/cybersecurity-knowledge/
37
OPEN ELECTIVE
PAPER - 4
B. DECISION SUPPORT SYSTEM
COURSE OBJECTIVES
To introduce the decision making system, models and support
To appraise the general nature and range of decision support and group support
systems
To impart about knowledge based system and advanced intelligent systems
COURSE OUTCOMES
CO1 - Students are able to recognize the relationship between business information needs
and decision making
CO2 - Students are able to appraise the general nature and range of decision support systems
CO3 - Students are able to appraise issues related to the development of DSS
CO4 - Students are able to select appropriate modeling techniques
CO5 - Students are able to analyze, design and implement a DSS
38
UNIT- IV: KNOWLEDGE ACQUISITION, REPRESENTATION, AND REASONING
Concepts of Knowledge Engineering, Scope and Types of Knowledge, Methods of
Knowledge Acquisition from Experts, Knowledge Acquisition from Multiple Experts,
Automated Knowledge Acquisition from Data and Documents, Knowledge Verification and
Validation, Representation of Knowledge, Reasoning in Rule-Based Systems, Explanation
and Meta knowledge, Inferencing with Uncertainty, Expert Systems Development,
Knowledge Acquisition and the Internet.
TEXT
1. Efraim Turban and Jay E. Aronson, Decision Support System and Intelligent Systems,
Prentice Hall International, 7th Edition 2007.
REFERENCES
1. Janakiraman V. S and Sarukesi K, Decision Support Systems, Prentice Hall of India, 6th
Printing 2006.
2. Lofti, Decision Support System and Management, McGraw Hill Inc, International Edition,
New Delhi 1996.
3. Marakas, Decision Support System, Prentice Hall International, Paperback Edition, New
Delhi, 2003
WEB REFERENCES
ndwrcdp.werf.org/documents/WU-HT-03-35/DSS%20Tutorial.pdf
www.slideshare.net/sursayantan92/decision-support-systemdss
www.uky.edu/BusinessEconomics/dssakba/instmat.htm
https://ceit.aut.ac.ir/~shiry/lecture/DSS/Introduction.ppt
39
OPEN ELECTIVE
PAPER - 4
C. RESEARCH METHODS AND ETHICS
COURSE OBJECTIVES
To demonstrate the knowledge of research processes (reading, evaluating, and
developing);
To perform literature reviews using print and online databases;
To identify, explain, compare, and prepare the key elements of a
researchproposal/report;
To compare and contrast quantitative and qualitative research
COURSE OUTCOMES
CO1 - Students are able to demonstrate knowledge of research processes (reading,
evaluating, and developing);
CO2 - Students are able to perform literature reviews using print and online databases;
CO3 - Students are able to identify, explain, compare, and prepare the key elements of a
research proposal/report;
CO4 - Students are able to compare and contrast quantitative and qualitative research
UNIT V: MEASUREMENT
Concept of measurement–what is measured? Problems in measurement in research –Validity
and Reliability. Levels of measurement –Nominal, Ordinal, Interval, Ratio.
40
TEXT BOOK
1. C. R. Kothari: Research Methodology: Methods & Technology, New Age Int. Publ.
REFERENCES
1. Gupta Gupta : Research Methodology: Texts and cases with SPSS Application (2011
edn.), International Book House, New Delhi.
2. A.K.P.C.Swain : A Text Book of Research Methodology, Kalyani Publishers.
WEB REFERENCES
https://libguides.wits.ac.za/c.php?g=693518&p=4914913
https://www.scribbr.com/dissertation/methodology/
https://www.intechopen.com/online-first/research-design-and-methodology
*****************
41