Computer Engineering_08.02.18
Computer Engineering_08.02.18
Practical
Theory
Course
Subject
Subject
Credit
S. No.
CWS
MTE
ETE
PRE
PRS
Code
Area
Title
P
1 AM101 Mathematics - I BSC 4 3 1 0 3 0 25 - 25 50 -
2 CO101 Programming Fundamentals ESC 4 3 0 2 3 0 15 25 20 40 -
3 EC101 Basic Electronics & Communication ESC
4 3 0 2 3 0 15 25 20 40 -
Engineering
4 ME105 Computer Aided Engineering Graphics-II ESC 4 3 0 2 3 0 15 25 20 40 -
5 CS103 Web Designing SEC 2 1 0 2 0 3- 50 - - 50
25/15/ 0/25 25/2
6 AEC/VAC AEC/VAC AEC/VAC 2 2/1/0 0 0/2/4 3/3/0 0/2/3 50/40/0 0/0/50
0 /50 0/0
Total 20
I Year: Second Semester
1 AM102 Mathematics-II BSC 4 3 1 0 3 25
0 - 25 50 -
2 AP102 Physics BSC 4 3 0 2 3 15
0 25 20 40 -
3 CS102 Discrete Structure ESC 4 3 1 0 3 25
0 - 25 50 -
4 CS104 Data Structures DCC 4 3 0 2 3 15
0 25 20 40 -
5 CS106 Basics of Machine Learning & Application SEC 2 1 0 2 0 3- 50 - - 50
25/15/ 0/25 25/20/
6 AEC/VAC AEC/VAC AEC/VAC 2 2/1/0 0 0/2/4 3/3/0 0/2/3
0 0
50/40/0 0/0/50
/50
Total 20
B. Tech. Computer Science and Engineering
II Year: Third Semester
Contact Exam
Teaching Scheme Relative Weights (%)
Hours/Week Duration (h)
Practical
Theory
Subject
Subject
Course
Credit
S. No.
CWS
MTE
ETE
PRE
PRS
Code
Area
Title
P
1 CS201 Digital Logic Design ESC 4 3 1 0 3 0 25 - 25 50 -
2 CS203 Object Oriented Programming Concepts DCC 4 3 0 2 3 0 15 25 20 40 -
3 CS205 Design and Analysis of Algorithms DCC 4 3 1 0 3 0 25 - 25 50 -
4 CS207 Operating Systems Design DCC 4 3 0 2 3 0 15 25 20 40 -
5 CS209 Software Engineering DCC 4 3 1 0 3 0 25 - 25 50 -
25/ 0/25 25/20
6 AEC/VAC AEC/VAC AEC/VAC 2 2/1/0 0 0/2/4 3/3/0 0/2/3 50/40/0 0/0/50
15/0 /50 /0
Practical
Theory
Subject
Subject
Course
Credit
S. No.
MTE
CWS
ETE
PRE
PRS
Code
Area
Title
P
1 CS301 Compiler Design DCC 4 3 0 2 3 0 15 25 20 40 -
2 CS303 Machine Learning DCC 4 3 0 2 3 0 15 25 20 40 -
3 CS305 Parallel Computer Architecture DCC 4 3 1 0 3 0 25 - 25 50 -
4 HU301 Engineering Economics SEC 3 3 1 0 3 0 25 0 25 50 -
15/ 25/
5 CS3xx Department Elective Course -1 DEC 4 3 0/1 2/0 3 0 20/25 40/50 -
25 -
15/ 25/
6 Generic Elective Course-1 GEC 4 3 0/1 2/0 3 0 20/25 40/50 -
25 -
Total 23
III Year: Sixth Semester
1 CS302 Information and Network Security DCC 4 3 0 2 3 0 15 25 20 40 -
2 CS304 Data Warehousing and Data Mining DCC 4 3 0 2 3 0 15 25 20 40 -
3 MG301 Fundamentals of Management SEC 3 3 0 0 3 0 25 - 25 50 -
15/ 25/
4 CS3xx Department Elective Course -2 DEC 4 3 0/1 2/0 3 0 20/25 40/50 -
25 -
15/ 25/
5 CS3xx Department Elective Course -3 DEC 4 3 0/1 2/0 3 0 20/25 40/50 -
25 -
15/ 25/
6 Generic Elective Course-2 GEC 4 3 0/1 2/0 3 0 20/25 40/50 -
25 -
Total 23
B. Tech. Computer Science and Engineering
IV Year: Seventh Semester
Contact Exam
Teaching Scheme Relative Weights (%)
Hours/Week Duration (h)
Practical
Theory
Subject
Subject
Course
Credit
S. No.
MTE
CWS
ETE
PRE
PRS
Code
Area
Title
P
1 CS401 B.Tech Project-I DCC 4 - - - - - - - - - -
2 CS403 Internship DCC 2 - - - - - - - - - -
15/ 15/
5 CS4xx Department Elective Course -4 DEC 4 3 0/1 2/0 3 0 20/25 40/50 -
25 -
15/ 15/
6 CS4xx Department Elective Course -5 DEC 4 3 0/1 2/0 3 0 20/25 40/50 -
25 -
15/ 15/
7 Generic Elective Course-3 GEC 4 3 0/1 2/0 3 0 20/25 40/50 -
25 -
Non-
8 Indian Knowledge System VAC
Credit
Total 18
IV Year: Eighth Semester
1 CS402 B.Tech Project-II DCC 8 - - - - - - - - - -
15/ 25/
2 CS4xx Department Elective Course -6 DEC 4 3 0/1 2/0 3 0 20/25 40/50 -
25 -
3 Generic Elective Course-4 GEC 4 -
Total 16
Cumulative Total 164*
B. Tech. Computer Science and Engineering
III Year: Fifth Semester Department
Elective Course-1
Contact Exam
Teaching Scheme Relative Weights (%)
Hours/Week Duration (h)
Practical
Theory
Subject
Subject
Course
Credit
S. No.
CWS
MTE
ETE
PRE
PRS
Code
Area
Title
P
1 CS307 Modelling and Simulation DEC 4 3 1 0 3 0 25 - 25 50 -
2 CS309 Distributed System DEC 4 3 1 0 3 0 25 - 25 50 -
3 CS311 Information Theory and coding DEC 4 3 1 0 3 0 25 - 25 50 -
4 CS313 Quantum Computing DEC 4 3 1 0 3 0 25 - 25 50 -
5 CS315 Advanced Data Structures DEC 4 3 1 0 3 0 25 - 25 50 -
6 CS317 Microprocessors and Interfacing DEC 4 3 1 0 3 0 25 - 25 50 -
7 CS319 Computer Graphics DEC 4 3 0 2 3 0 15 25 20 40 -
III Year: Sixth Semester
Department Elective Course-2,3
1 CS306 Optimization Techniques DEC 4 3 1 0 3 0 25 - 25 50 -
2 CS308 Soft Computing DEC 4 3 0 2 3 0 15 25 20 40 -
3 CS310 Enterprise Java programming DEC 4 3 0 2 3 0 15 25 20 40 -
4 CS312 Embedded Systems DEC 4 3 1 0 3 0 25 - 25 50 -
5 CS314 Data Compression DEC 4 3 1 0 3 0 25 - 25 50 -
6 CS316 Parallel Algorithms DEC 4 3 1 0 3 0 25 - 25 50 -
7 CS318 Deep Learning DEC 4 3 0 2 3 0 15 25 20 40 -
8 CS320 Blockchain and Applications DEC 4 3 1 0 3 0 25 - 25 50 -
9 CS322 Optical Networks DEC 4 3 1 0 3 0 25 - 25 50 -
10 CS324 High Speed Networks DEC 4 3 1 0 3 0 25 - 25 50 -
11 CS326 Advanced Database Management Systems DEC 4 3 1 0 3 0 25 - 25 50 -
12 CS328 Multimedia System Design DEC 4 3 1 0 3 0 25 - 25 50 -
B. Tech. Computer Science and Engineering
IV Year: Seventh Semester
Department Elective Course-4,5
Contact Exam
Teaching Scheme Relative Weights (%)
Hours/Week Duration (h)
Practical
Theory
Subject
Subject
Course
Credit
S. No.
MTE
CWS
ETE
PRE
PRS
Code
Area
Title
P
1 CS405 Real Time System DEC 4 3 1 0 3 0 25 - 25 50 -
2 CS407 Pattern Recognition DEC 4 3 1 0 3 0 25 - 25 50 -
3 CS409 Reinforcement Learning DEC 4 3 1 0 3 0 25 - 25 50 -
4 CS411 Cyber vulnerability and Ethical hacking DEC 4 3 1 0 3 0 25 - 25 50 -
5 CS413 Computer Vision DEC 4 3 1 0 3 0 25 - 25 50 -
6 CS415 Data Visualization DEC 4 3 0 2 3 0 15 25 20 40 -
7 CS417 Wireless and Mobile Computing DEC 4 3 1 0 3 0 25 - 25 50 -
8 CS419 Business Analytics DEC 4 3 1 0 3 0 25 - 25 50 -
9 CS421 Advance Web Technology DEC 4 3 0 2 3 0 15 25 20 40 -
10 CS423 Big Data Analytics DEC 4 3 0 2 3 0 15 25 20 40 -
11 CS425 Cloud Computing DEC 4 3 1 0 3 0 25 - 25 50 -
12 CS427 Natural Language Processing DEC 4 3 0 2 3 0 15 25 20 40 -
IV Year: Eighth Semester
Department Elective Course-6
1 CS404 High Performance Computing DEC 4 3 1 0 3 0 25 - 25 50 -
2 CS406 Grid and Cluster Computing DEC 4 3 1 0 3 0 25 - 25 50 -
3 CS408 Swarm & Evolutionary Computing DEC 4 3 1 0 3 0 25 - 25 50 -
4 CS410 Digital Image Processing DEC 4 3 0 2 3 0 15 25 20 40 -
5 CS412 Intellectual Property Rights DEC 4 3 1 0 3 0 25 - 25 50 -
6 CS414 Cyber Forensics DEC 4 3 1 0 3 0 25 - 25 50 -
7 CS416 Semantic Web and Web Mining DEC 4 3 1 0 3 0 25 - 25 50 -
Delhi Technological University
Computer Science and Engineering Department
Syllabus
B.Tech. (Computer Science and Engineering) Program
(Effective from session 2023-24)
L T P
CS101: Programming
NIL
Fundamentals
3 0 2
Course Objective: To understand the basic principles of programming languages. To provide design &
development basic programming skills. To introduce problem solving methods and program development.
Contact
S. No Contents
Hours
Introduction: Concepts of algorithm, flow chart, Basics of Computer
Languages, Compilers, Interpreter, Programming Environments and
Debugging: types of errors and debugging techniques.
Program design techniques: Structured, modular, Bottom-up, top-down,
UNIT 1 10
procedural, OOP
Programming features: Data types, Expressions and Operators-Arithmetic,
unary, logical, bitwise, relational, assignment, comma operators. Data
conversions. Input/Output statements.
Total 42
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
C Programming Language (Ed 2) by Brian W. Kernighan and Dennis M.
1 -
Ritchie, Prentice Hall
L T P
CS102: Discrete
NIL
Structure
3 1 0
Course Objective:
To provide knowledge of combinatorial problems, algebraic structures and graph theory required for building
mathematical foundation of computer science.
Explore key concepts in graph theory, including isomorphic graphs, Euler’s formula, and
CO3
chromatic numbers.
Analyze tree structures and search algorithms like depth-first and breadth-first, with their
CO4
associated trees.
Apply Warshall’s algorithm, Euler paths, Hamiltonian circuits, and minimal spanning trees in
CO5
problem-solving.
Contact
S. No Contents
hours
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Course Objective:
1. Develop the skill & knowledge of Web page design.
2. Students will understand the knowhow and can function either as an entrepreneur or can take up jobs in the
multimedia and Web site development studio and other information technology sectors
Contact
S. No Contents
Hours
Introduction to Internet and HTML: WWW, Browser, URL, Web server, Web
site, Domain Name, Basic principles involved in developing a web site,
UNIT 1 designing a web page, Page Layout, HTML Documents, Basic structure of an 4
HTML document, Creating an HTML document, Mark up Tags, Heading-
Paragraphs, Line Breaks, HTML Tags.
Elements of HTML: Introduction, Working with Text, Working with Lists,
UNIT 2 Tables and Frames, Working with Hyperlinks, Images and Multimedia, 4
Working with Forms and controls.
Introduction to Cascading Style Sheets: Concept of CSS, Creating Style Sheet,
CSS Properties, CSS Styling, Working with block elements and objects,
UNIT 3 3
Working with Lists and Tables, CSS Id and Class, CSS Colour, Creating page
Layout and Site Designs.
Introduction to Web Publishing or Hosting: Creating the Web Site, Saving the
UNIT 4 site, working on the web site, creating web site structure, Creating Titles for 3
web pages, Themes-Publishing web sites.
Total 14
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
HTML 5 in simple steps, Kogent Learning Solutions Inc, Dreamtech
1 2010
Press
2 Beginner's Guide to HTML, Michael Gabriel -
Beginning HTML, XHTML, CSS, and JavaScript, John Duckett, Wiley
3 2009
India
Beginning CSS: Cascading Style Sheets for Web Design, Ian
4 2011
Pouncey, Richard York, Wiley India
5 HTML, XHTML, and CSS Bible, 5ed, Steven M. Schafer, Wiley India 2010
Course Objective: The objective of the course is to develop the skill & knowledge of Machine Learning and
understand the knowhow and can function either as an entrepreneur or can take up jobs in the data science.
Contact
S. No Contents
Hours
Introduction to Machine Learning: Machine Learning, Supervised vs
UNIT 1 4
Unsupervised Learning, Classification, Regression, Clustering.
Total 14
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Modern Digital Electronics by R. P. Jain (TMH) 2009
L T P
CS203: Object Oriented
C Programming
Programming Concepts
3 0 2
Describe the concept of function overloading, operator overloading, virtual functions and
CO2
polymorphism.
Contact
S. No Contents
Hours
Object oriented paradigm & C++ at a glance: Evolution of programming
paradigm, structured versus object-oriented development, elements of object-
oriented programming, Objects, classes, methods, popular OOP languages,
software reuse.
UNIT 1 Classes and objects: Introduction, Class revisited, constant objects and 8
constructor, static data members with constructors and destructors, constructor
overloading, nested classes, objects as arguments, returning objects , friend
functions and friend classes, constant parameters and member functions, static
data and member functions.
Dynamic objects: Introduction, pointers to objects, array of objects, pointers to
object members, this pointer, self-referential classes Operator overloading and
Inheritance: overloading of new and delete operators, conversion between
objects and basic types, conversion between objects of different classes,
overloading with friend functions, abstract classes, inheritance types, virtual
UNIT 2 8
base classes, virtual functions, pointer to derived class objects, and base class
objects, pure virtual functions, virtual destructors.
Generic programming with templates: Introduction, function templates,
overloaded function templates, class templates, inheritance of class template,
class template containership, class template with overloaded operators.
Applets and Java Swing: Applet design, AWT packages, Applet event
UNIT 6 handling, parameters to applets, AWT controls, layout manager, Frames, 6
container classes, Introduction to Java Beans, Swing and Servlets.
Total 42
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Patrick Naughton, Herbert Schildt: “The Complete Reference: Java 2”, TMH.
1 2017
ISBN 13 9780070495432
C Thomas Wu : “An Introduction to OO programming with Java”, TMH,ISBN-
2 2009
10: 0073523305
Balaguruswami, “Object oriented with C++”, TMH. SBN 0070669074,
3 2008
9780070669079
CO2 To analyze various divide and conquer algorithms and construct recurrence relations.
CO3 To design and analyze greedy algorithm to solve real life problems.
CO4 To analyze different algorithms to find minimum spanning tree and shortest path algorithm.
CO6 To design backtracking and branch and bound techniques for solving specific problems.
Contact
S. No Contents
Hours
Introduction: Concept of algorithmic efficiency, run time analysis of
UNIT 1
algorithms, Asymptotic Notations. Growth of Functions, Master’s Theorem
6
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
T .H . Cormen, C . E . Leiserson, R .L . Rivest “Introduction to Algorithms”,
1 2022
4th Ed.
CS207: Operating L T P
NIL
Systems Design 3 0 2
Course Objective: To familiar with the fundamental principles of the operating system, its services and
functionalities, the concepts of processes, synchronization and scheduling, memory management and need for
protection in computer systems
CO2 Analyze the basic concept of process and to analyze different CPU scheduling algorithms
Understand the basic concept of deadlock and characteristics, analyze various measures taken
CO3
to prevent deadlock and for its recovery.
Analyze various memory management schemes and its associated concepts like paging,
CO4
segmentation, virtual memory concept.
Understand and evaluate I/O management and File systems including basic concept of disk
CO5
scheduling and Implementation Issues.
CO6 Understand and analyze case studies of linux, unix and windows.
Contact
S. No Contents
Hours
Introduction: Operating system and function, Evolution of operating system,
Batch, Interactive, Time Sharing and Real Time System, System protection.
UNIT 1 6
Operating System Structure: System Components, System structure, Operating
System Services.
Concurrent Processes: Process concept, Principle of Concurrency, Producer
Consumer Problem, Critical Section problem, Semaphores, Classical problems
UNIT 2 in Concurrency, Inter Process Communication, Process Generation, Process 8
Scheduling. CPU Scheduling: Scheduling Concept, Performance Criteria of
Scheduling Algorithm, Evolution, Multiprocessor Scheduling.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Silbersachatz and Galvin, “Operating System Concepts”, Pearson, 10th Ed 2018
CS209: Software L T P
NIL
Engineering 3 1 0
CO4 To apply the knowledge, techniques, and skills in the development of a software product.
Contact
S. No Contents
Hours
Introduction: Introduction to software Engineering, Software characteristics,
Software components, Software applications, Software Engineering Principles,
UNIT 1 Software metrics and measurement, monitoring and control. Software 8
development life-cycle, Water fall model, prototyping model, Incremental
model, Iterative enhancement Model, Spiral model, Agile Model.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
R. S. Pressman, “Software Engineering – A practitioner’s approach”, 3rd ed.,
1 1992
McGraw Hill Int. Ed.
Course Objective: The aim of this course is to provide students with a detailed understanding of probability
and statistical methods. It focuses on enabling students to develop models, perform analyses, and deep
knowledge based on data in real-world contexts.
Analyze and characterize random variables using their distribution and density functions, and
CO2
apply key probability distributions to real-world scenarios.
Understand and apply the Central Limit Theorem in the context of sampling distributions, and
CO3
develop competency in descriptive statistics and estimation techniques to analyze data.
CO4 Visualize the drawing details of public buildings viz school, hostel, and hospital.
Design and execute hypothesis tests for different statistical models, interpret the results, and
CO5
understand their applications in testing theories and making predictions.
Contact
S. No Contents
Hours
Probability Theory and Foundations: Introduction to Probability Theory: Set
theory, experiments, sample spaces (discrete, continuous, and mixed), events,
and axioms of probability. Probability as Relative Frequency: Understanding
probability through the lens of relative frequency. Joint, Conditional
UNIT 1 10
Probability, and Bayes’ Theorem: Deep dive into joint probability, conditional
probability, total probability, Bayes’ theorem, and their applications.
Independent Events: Analysis of independence for two events, multiple events,
and properties of independent events.
Random Variables and Distribution Functions: Concept and Classification of
Random Variables: Definition, discrete, continuous, and mixed random
variables. Distribution and Density Functions: Exploration of existence,
UNIT 2 properties, Gaussian random variables, and examples including Binomial, 10
Poisson, Uniform, Exponential, Rayleigh.
Conditional Distributions and Densities: Conditional distribution, properties,
conditional density, and their implications.
Operations on Random Variables and Multiple Random Variables:
Expectation and Moments: Expected value, moments about the origin, central
moments, and understanding variance and skewness. Key Inequalities:
UNIT 3 10
Chebychev’s, Markov’s, Chernoff’s inequalities and their significance.
Introduction to Multiple and Vector Random Variables: Joint distribution,
properties, joint density functions, marginal distribution and density functions.
Sampling Distributions, Descriptive Statistics, and Estimation: The Central
Limit Theorem: Its importance and implications for sampling distributions.
Descriptive Statistics: Graphical representation, measures of location and
UNIT 4 variability. 10
Estimation Methods: Unbiasedness, consistency, method of moments,
maximum likelihood estimation. Confidence Intervals: Construction for
parameters in one and two sample problems, including proportions.
Hypothesis Testing and Advanced Topics: Testing of Hypotheses: Null and
alternative hypotheses, types of error, power of the test, Neyman-Pearson
Lemma. Tests for Normal Populations: One and two sample problems, tests for
UNIT 5 proportions. Chi-Square Goodness of Fit Test: Applications and problems. 8
Introduction to Advanced Statistical Methods: Brief overview of regression
analysis, ANOVA, and non-parametric tests to bridge students to further
studies in statistics.
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Jay L. Devore, “Probability and Statistics for Engineering and the Sciences,”
1 2020
10th ed, Cengage Learning.
Course Objective: To provide knowledge and skills in theoretical foundations of computing that are needed to
study and practice computer science.
CO2 Design, analyze and interpret Context Free languages, Expression and Grammars
CO3 Design and analyze different types of Push down Automata (PDA) as Simple Parser.
Design different types of Turing Machines as Acceptor, Verifier, Translator and Basic
CO4
computing machines and Apply to propose computation solutions.
Compare and analyze different languages, grammars, automata and machines and appreciate
CO5
their power and convert automata to programs and functions
Contact
S. No Contents
Hours
Grammars, Deterministic finite Automata (DFA)-Formal Definition,
Simplified notation: State transition graph, Transition table, Language of DFA,
UNIT 1 Nondeterministic finite Automata (NFA), NFA with epsilon transition, 10
Language of NFA, Equivalence of NFA and DFA, Minimization of Finite
Automata, Distinguishing one string from other, Myhill-Nerode Theorem.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Hopcroft, Ullman, “Introduction to Automata Theory, Languages and
1 2006
Computation”, Pearson Education.ISBN-13: 978-0321455369
Course Objective: To provide in depth knowledge of Computer system architecture and organization covering
design of processor, memory and I/O systems.
CO4 To understand concept of main memory and its interaction with cache memory
To understand architecture of Input and Output, and various data transfer modes and
CO5
techniques.
Contact
S. No Contents
Hours
Introduction: REGISTER TRANSFER LANGUAGE: Data movement around
registers. Data movement from/to memory, arithmetic and logic micro
UNIT 1 operations. Concept of bus and timing in register transfer. Functional units and 6
their interconnections, bus architecture, types of buses and bus arbitration.
Register, bus and memory transfer.
Modes of Data Transfer: Programmed I/O, interrupt initiated I/O and Direct
Memory Access. I/O channels and processors. Serial Communication:
UNIT 6 8
Synchronous & asynchronous communication, standard communication
interfaces.
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Patterson, Computer Organisation and Design, Elsevier Pub. 2009
Course Objective: The course aims to provide students with a thorough understanding of computer network
principles, architectures, protocols, and technologies, enabling them to design, implement, and manage
efficient, secure, and scalable computer networks.
Understand the foundational aspects of computer networks, including network topologies, OSI
CO1
and TCP/IP models, to design and analyze network structures effectively.
Master error detection and correction, data link control, and IP addressing, enabling efficient
CO2
data communication across networks.
Learn advanced routing protocols, Quality of Service (QoS) principles, and basic network
CO3
security to manage high-performance, secure networks.
Acquire a deep understanding of transport protocols like UDP and TCP, focusing on reliable
CO4
data transfer and congestion control.
Develop expertise in application layer protocols and network management, preparing for
CO5
effective management of networked applications.
Contact
S. No Contents
Hours
Foundations of Computer Networks: Evolution of computer networks, Basic
principles of network design, Network topologies: Star, Mesh, Bus, Ring,
UNIT 1 Hybrid, OSI and TCP/IP models, and Physical layer fundamentals: Data and 8
signals, bandwidth utilization, transmission techniques and media, signal
encoding, multiplexing.
Data Link and Network Layer Protocols: Error detection and correction
mechanisms, Data link control protocols, Multiple access protocols and LAN
UNIT 2 technologies, Network layer functions and services, Routing algorithms: Link- 10
State, Dijkstra's algorithm; IP addressing, subnetting, super netting (CIDR),
IPv4, IPv6, and Address resolution protocols: ARP, RARP, BOOTP, DHCP.
Course Objective: To provide knowledge about the principles, concepts and applications of Database
Management System.
CO3 Formulate SQL, relational algebra and TRC query for broad range of query problems.
CO4 Able to use a DBMS software to create, populate, maintain, and query a database.
CO6 Describe normalization theory and apply such knowledge to the normalization of a database.
List basic database storage structures and access techniques: file and page organizations,
CO7
including B-tree and hashing.
Pursue advance courses and acquire knowledge of new technologies, skills in the field of
CO8
DBMS.
CO9 Generate and integrate databases for real life projects.
Contact
S. No Contents
Hours
Introduction: Database system concepts and its architecture, Data models
schema and instances, Data independence and database language and interface,
Data definition languages, DML. Overall database structure.
UNIT 1 Data modeling using Entity Relationship Model: E.R. model 10
concept, notation for ER diagrams mapping constraints, Keys, Concept of
super key, candidate key, primary key generalizations, Aggregation, reducing
ER diagrams to tables, extended ER model.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 “Data base concepts” by Korth, Silbertz, Sudarshan, McGraw-Hill. 2010
Implement lexical analyzers using tools like Lex and apply formal grammar techniques such as
CO2 BNF, CFG, and various parsing methods like LR, SLR, and LALR parsers, utilizing parser
generators like YACC.
Design and implement syntax-directed translation schemes for generating intermediate code,
CO3 including three-address code, quadruples, and triples, and handle translations of complex
constructs like arrays, control statements, and procedure calls.
Construct and manage symbol tables, implement runtime administration using stack allocation,
CO4
and handle scope information in block-structured languages.
Perform code optimization using techniques like loop optimization, DAG representation, and
CO5 algebraic laws, and understand error detection and recovery strategies for handling lexical,
syntax, and semantic errors.
Contact
S. No Contents
Hours
Introduction: Definition, Phases and Passes, FSM & RE’s and their application
UNIT 1 to Lexical Analysis, Implementation of Lexical Analyzers, Lexical- Analyzer 6
Generator, Lex – Compiler.
Error detection and Recovery: Lexical phase errors, syntax phase errors,
UNIT 4 4
semantic errors and Error recovery techniques.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Aho,Ullman & Sethi, “Compiler Design”, Addison Wesley 2004
D.M.Dhamdhere, “Compiler Construction – Principles & Practice” Macmillan
2 2000
India
Course Objective: The student should be able to understand the different supervised, unsupervised and
reinforcement learning algorithms and choose the appropriate machine learning tool for different real world
examples.
Develop and train neural network models, including convolutional neural networks (CNNs)
CO3
and recurrent neural networks (RNNs), for complex pattern recognition tasks.
Apply reinforcement learning algorithms, such as Q-learning and policy gradient methods, to
CO4
create agents capable of solving decision-making problems in simulated environments.
Contact
S. No Contents
Hours
Review of Probability Theory: Definitions, independent events, joint
probability, marginal probability, conditional probability, sum rule, product
rule, Bayes’ theorem, concept of probability distribution, likelihood. Random
process and random variable: Definitions, continuous and discrete random
variables, expectation, variance, covariance. Classification and Regression:
UNIT 1 curve fitting, model selection, curse of dimensionality, loss function. 8
Evaluation of ML models: The train/test/validation split, under-fitting,
overfitting, generalization, Bias vs Variance, validation curves. Metrics:
Confusion matrix, Accuracy, Precision, Recall, Specificity, F1 score Precision-
Recall or PR curve, ROC (Receiver Operating Characteristics) curve, PR vs
ROC curve.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Bishop, C. M. (2006). Pattern Recognition and Machine Learning (1st ed.).
1 2006
Springer.
Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep Learning (1st ed.).
2 2016
MIT Press.
Géron, A. (2022). Hands-On Machine Learning with Scikit-Learn, Keras, and
3 2022
TensorFlow (3rd ed.). O'Reilly Media.
Contact
S. No Contents
Hours
Introduction: Introduction to parallel computing, need for parallel computing,
parallel architectural classification schemes, Flynn’s , Fang’s classification,
performance of parallel processors, distributed processing, processor and
UNIT 1 6
memory hierarchy, bus, cache & shared memory, introduction to super scalar
architectures, quantitative evaluation of performance gain using memory,
cache miss/hits.
Multi-core Architectures: Introduction to multi-core architectures, issues
involved into writing code for multi-core architectures, development of
UNIT 2 programs for these architectures, program optimizations techniques, building 6
of some of these techniques in compilers, Open MP and other message passing
libraries, threads, mutex etc.
Multi-threaded Architectures: Parallel computers, Instruction level parallelism
(ILP) vs. thread level parallelism (TLP), Performance issues: Brief
introduction to cache hierarchy and communication latency, Shared memory
multiprocessors, General architectures and the problem of cache coherence,
Synchronization primitives: Atomic primitives; locks: TTS, ticket, array;
barriers: central and tree; performance implications in shared memory
UNIT 3 10
programs; Chip multiprocessors: Why CMP (Moore’s law, wire delay); shared
L2 vs. tiled CMP; core complexity; power/ performance; Snoopy coherence:
invalidate vs. update, MSI, MESI, MOESI, MOSI; performance trade-offs;
pipelined snoopy bus design; Memory consistency models: SC, PC, TSO,
PSO, WO/WC, RC; Chip multiprocessor case studies: Intel Montecito and
dual-core, Pentium4, IBM Power4, Sun Niagara
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Kai Hwang, “Advanced computer architecture”; TMH, 2000 2000
2 J .P.Hayes, “computer Architecture and organization”, MGH, 1998 1998
M.J Flynn, “Computer Architecture, Pipelined and Parallel Processor Design”,
3 1998
Narosa Publishing, 1998
D.A.Patterson, J.L.Hennessy, “Computer Architecture :A quantitative
4 2002
approach”, Morgan Kauffmann, 2002
Hwang and Briggs, "Computer Architecture and Parallel Processing", MGH,
5 2000
2000
Course Objective: To study concepts of information and network security using cryptographic algorithms and
network security protocols.
Contact
S. No Contents
Hours
Introduction: Need for security, Introduction to security attacks, services and
mechanism, introduction to cryptography, Conventional Encryption:
UNIT 1 Conventional encryption model, classical encryption techniques- substitution 8
ciphers and transposition ciphers, cryptanalysis, stereography, stream and
block ciphers, Intruders, Viruses and related threads.
Modern Block Ciphers: Block ciphers principals, Shannon’s theory of
confusion and diffusion, Fiestal structure, data encryption standard(DES),
UNIT 2 strength of DES, crypt analysis of DES, block cipher modes of operations, 6
triple DES, IDEA encryption and decryption, strength of IDEA, key
distribution.
Introduction to graph, ring and field, prime and relative prime numbers,
modular arithmetic, Fermat’s and Euler’s theorem, primarily testing, Euclid’s
Algorithm, Chinese Remainder theorem, discrete logarithms, Principals of
UNIT 3 10
public key crypto systems, RSA algorithm, security of RSA, key management,
Diffle-Hellman key exchange algorithm, introductory idea of Elliptic curve
cryptography, Elgamal encryption.
Message Authentication and Hash Function: Authentication requirements,
authentication functions, message authentication code (MAC), hash functions,
security of hash functions and MACS, MD5 message digest algorithm, Secure
UNIT 4 hash algorithm(SHA), Public Key Infrastructure(PKI): Digital Certificate, 6
private key management, Digital Signatures: Digital Signatures, authentication
protocols, digital signature standards (DSS), proof of digital signature
algorithm.
Authentication Applications: Kerberos and X.509, directory authentication
UNIT 5 service, password, challenge-response, biometric authentication, electronic 6
mail security-pretty good privacy (PGP), S/ MIME.
IP Security: Architecture, Authentication header, Encapsulating security
payloads, combining security associations, key management.
UNIT 6 Web Security: Secure Socket Layer(SSL) and transport layer security, TSP, 6
Secure Electronic Transaction (SET), Electronic money, WAP security,
firewall design principals, Virtual Private Network (VPN) security.
Total 42
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
William Stallings, “Cryptography and Network Security: Principals and
1 2017
Practice”, Prentice Hall, New Jersy.
2 Atul Kahate, “Cryptography and Network Security”, TMH. 2017
3 Behrouz A. Forouzan, “Cryptography and Network Security”, TMH. 2007
4 Johannes A. Buchmann, “Introduction to Cryptography”, Springer-Verlag. 2001
5 BruceSchiener, “Applied Cryptography”. 1995
Course Objective: To introduce the concept of Data Warehousing and Data Mining, respective techniques
and applications in real world scenario.
S. No. Course Outcomes (CO)
Understand the concepts and architecture of data warehousing, including OLAP and web
CO1
integration.
CO2 Comprehend the principles of data mining, its query languages, and system architectures.
CO3 Apply association rule mining techniques to large transactional and relational databases.
CO4 Utilize classification and prediction models to analyze and predict data patterns effectively.
Implement clustering methods and mine complex data types like spatial, multimedia, and time-
CO5
series data.
Contact
S. No Contents
Hours
Data Warehousing: - Basic concepts in data warehousing, Collecting the
requirements of data warehouse, Data Warehouse Architecture, Design,
UNIT 1 8
Implementation & Maintenance, OLAP in data warehouse, Data warehousing
and the web, Data Cube Technology, From Data Warehousing to Data Mining.
Data Mining Concepts: Data mining primitives, Basics of data mining, Query
UNIT 2 6
language, Architectures of data mining systems.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
4 The Data Warehouse Lifecycle Tool Kit, Ralph Kimball, John Wiley 2007
5 Master in Data Mining, M. Berry , G. Linoff, John Wiley 2008
6 Building the Data Ware houses, W.H. Inmon, Wiley Dreamtech 2005
Course code: Course
Course Structure Pre-Requisite
Title
CS307: Modelling and L T P
Nil
Simulation 3 1 0
Course Objective: To introduce different types of Simulation models, discrete event simulation modeling
with example, uses of different simulation modeling software like GPSS, SIMSCRIPT, SLAM, GASP, and
SIMULA and different evaluation methods for the simulation software output.
Contact
S. No Contents
Hours
Definition of System, types of system: continuous and discrete, modelling
UNIT 1 process and definition of a model.The nature of simulation: simulation model - 12
static, dynamic, deterministic stochastic continuous, discrete models.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Simulation Modeling and Analysis, Kelton W.D. and Law A.M, II Edition,
1 1982
McGraw Hill.
2 Interactive Dynamic System Simulation, G. A. Korn, McGraw Hill. 1988
Theory of Modeling and Simulation: Integrating Discrete Event and
3 Continuous Complex Dynamic Systems, Bernard P. Zeigler, Herbert 2000
Praehofer, Tag Gon Kim, Academic Press.
Modelling and simulation : Exploring dynamic system behavior, Birta,
4 2013
publisher : Yesdee.
Course Objective: The objective of the course is to help students understand the fundamental goals of
Distributed Systems and concepts communication, synchronization, resource allocation, file systems, fault
tolerance and security.
S. No. Course Outcomes (CO)
Apply knowledge of computer networks and operating system to perform of various (DS)
CO1 algorithms and techniques related to communication, synchronization, resource allocation, file
systems, fault tolerance and security.
CO2 Demonstrate limitations and applicability of various DS concepts in real life problems.
CO3 Investigate real life problems and formulate as computer engineering (DS) problems.
CO4 Design, select and apply appropriate DS concepts to solve computer engineering problems.
Compose and provide solution through computer program for DS concepts using modern
CO5
computer languages such as C, Java and Python.
Contact
S. No Contents
Hours
Introduction to Distributed Systems, Design Goals, Types of Distributed
UNIT 1 systems, system architectures and fundamental models, middleware, Threads, 8
virtualization, client-Server Model, Code migration.
Communication fundamentals, Remote Procedure Call, message oriented
UNIT 2 communication, and stream oriented communication, multicast 8
communication.
Synchronization: clock synchronization, logical clocks, mutual exclusion
UNIT 3 algorithms: centralized, decentralized, distributed and token ring algorithms, 8
election algorithms.
Replication management: need for replication, consistency models: data centric
and client centric consistency models, replica management, consistency
UNIT 4 8
protocols: continuous, primary-based, replicated-write and cache-coherence
protocols.
Fault tolerance: basic concepts and failure models, process resilience, reliable
UNIT 5 client-server and group communication, distributed commit recovery 8
mechanisms.
Security in distributed systems, secure channels, authentication,
integrity and confidentiality, access control, security management. Naming:
UNIT 6 Flat naming approaches, structured naming, name space and resolution, 8
attribute- based naming, directory services, LDAP, decentralized
implementations.
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Distributed Systems, Principles and Paradigms, 2nd edition by Andrew S.
1 2013
Tanenbaum and Maarteen Van Steen, Pearson Education.
Course Objective: To introduce fundamentals of Information theory and various coding techniques.
Contact
S. No Contents
Hours
Introduction to Probability, Sample space and events, The axioms of
probability Elementary theorems -Conditional Probability and Independence,
UNIT 1 Baye’s theorem. Random variables, discrete probability distribution, discrete 6
functions for random and discrete random variables, continuous random
variables.
UNIT 3 Discrete memory less channel, channel capacity BSC and other channels 8
Information measure for continuous ensembles capacity of AWGN channel.
Error control coding. The channel coding Theorem, Application to BSC ,
Source Coding with fidelity criteria. Types of codes, error and error control
UNIT 4 10
strategies, Linear block codes, syndrome and error detection, Minimum
distance, Error detecting and correcting capabilities of a block code, Syndrome
decoding , Hamming codes.
Cyclic codes, Generator and parity – check matrices, encoding, syndrome
computation, error detection and decoding.BCH codes, decoding, of the BCH
UNIT 5 8
codes Introduction to RS codes. Convolution codes, Maximum likelihood
decoding The Viterbi algorithm. Introduction to Turbo codes.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Information Theory by R Ash, Dover Science Publications 1990
2 Element of Information Theory by Cover and Thomas, John Wiley & Sons 2006
Error Control coding: Fundamental & Application by Shulin & Daniel J.
3 2004
Costello Jr, Prentice Hall
4 A Mathematical Theory of Communication. By C. E. SHANNON 1948
CO2 Design and analyze quantum circuits using various quantum gates and architectures.
Contact
S. No Contents
Hours
Introduction to Quantum Computing : Qubits and their representation, multiple
UNIT 1 10
qubits, entanglement, Bloch sphere representation of a qubit.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers
Publication
Introduction to Quantum Computing, Philip Kaye etal., Oxford University
1 2006
Press.
2 Introduction to Quantum Computers, Gennady Berman, World Scientific. 1998
Quantum Computation and Quantum Information, M. Nielsen and I. Chuang,
3 2010
Cambridge University Press, Cambridge.
Classical and Quantum Computation, A. Yu. Kitaev, A.H. Shen, and M.N.
4 2002
Vyalyi, American Mathematical Society, Providence.
Problems & Solutions in Quantum Computing & Information, W.H. Steeb and
5 2017
Y. Hardy World Scientific, River Edge, NJ, 2004.
Course Objective: To study concepts of some advanced data structures like advanced trees and heaps.
Contact
S. No Contents
Hours
Review of Elementary data structures- Binary Trees, Binary Heap, Sorting &
Searching Technique
UNIT 1 Sparse matrices- Properties of Sparse Matrices, Linked List representation of 6
Sparse Matrices, Analysing Algorithm ,Hashing ,Universal Hashing ,Perfect
Hashing
Advanced Data Structures: data structures for combinatorial Optimization –
Binomial Heap, Fibonacci Heaps, Red -Black Trees, Augmenting Red – Black
UNIT 2 Trees to Dynamic order Statics and Interval Applications. Operations on 8
Disjoint Sets –find union problem , Implementing Sets, Dictionaries, Self-
Adjusting Trees, Skip lists.
Divide and Conquer approach- Application of Divide and Conquer- Finding
UNIT 3 Maximum and Minimum, Finding K-th Smallest element order statistics, 8
Finding K-th Smallest element, Merge Sort, Randomized Quick Sort.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
NarsinghDeo-Graph Theory with Application to Engineering and Computer
1 2004
Science, Prentice Hall of India.
Contact
S. No Contents
Hours
Introduction: Microprocessor evolution and types, microprocessor architecture
and operation of its components, addressing modes, interrupts, and data
UNIT 1 8
transfer schemes, instruction and data flow, timer and timing diagram.
Interfacing devices. Architectural advancement of microprocessor
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Gaonkar Ramesh S, “Microprocessor Architecture, Programming and
1 2020
Applications with 8085”, Penram International Publishing.
Ray A K , Bhurchandi K M , “Advanced Microprocessors and Peripherals,
2 2023
TMH
3 Hall D V, “Microprocessor Interfacing”, TMH. 2016
4 Liu and Gibson G A , Microcomputer System: The 8086/8088 family,PHI 2006
5 Aditya P Mathur, Introduction to Microprocessor, TMH 2019
6 Brey, Barry B, INTEL Microprocessors, PHI 2018
7 Renu Sigh & B.P.Sigh, Microprocessor, Interfacing and Application 2018
CO2 Implement and analyze output primitive algorithms for rendering lines, shapes, and fills.
Contact
S. No Contents
Hours
Overview of Computer Graphics: Usage of Graphics and their applications,
Over view of Graphics systems: Refreshing display devices, Random and
UNIT 1 6
raster scan display devices, Colour Models: RGB, HSV etc., Tablets, Joysticks,
Track balls, Mouse and light pens, plotters, printers, digitizers.
Total 42
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
D. Hearn , P. Baker& W. Carithers, “Computer Graphics with OpenGL”,
1 2015
Pearson.
2 Z. Xiang & R. Plastock “Computer Graphics”, Schaum’s Series, McGraw Hill. 2007
David F. Rogers, “Procedural Elements for Computer Graphics”, Tata
3 2002
McGraw Hill Book Company.
D. Rogers and J. Adams, “Mathematical Elements for Computer Graphics”,
4 2002
MacGraw- Hill International Edition.
5 Foley et al., “Computer Graphics Principles & practice”, Addison Wesley. 1999
Course Objective: To familiarize with various optimization techniques and their applications.
Contact
S. No Contents
Hours
Linear Programming Models, Prototype, Examples, Assumptions of Linear
Programming, Additional Examples, Some Classic Case Studies. Graphical
method, The Simplex Method: The Essence of the Simplex Method, Setting up
UNIT 1 8
the Simplex Method, The Algebra of the Simplex Method, The Simplex
Method in Tabular Form, Tie Breaking in the Simplex Method, Adapting to
Other Model Forms, Post optimality Analysis.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 H.A.Taha – Operations Research, Pearson Education , New Delhi 2017
2 J.K. Sharma – Operations Research, Mcmillan , India Ltd 2020
3 S. Hiller & G.J. Lieberman – Operations Research, TMH, New Delhi 2017
4 Kanti Swarup, Gupta Pk, Man Mohan, Operations Research, Sultan Chand & 2017
Course Objective: The course integrates the concepts of fuzzy logic, neural networks and optimization
techniques for understanding the complex nature of decisions taken by human beings which incorporates
partial understanding of the truth with past experience. At the end of this course the student should be able to
understand the basic techniques used in soft computing and apply them to solve real world problems.
Contact
S. No Contents
Hours
Soft Computing & Artificial Intelligence: Soft Computing Introduction, Hard
Computing, Types of Soft Computing Techniques, Applications of Soft
UNIT 1 8
Computing, Al Search Algorithm, Predicate Calculus, Rules of Interference,
Semantic Networks, Frames, Objects, Hybrid Models Artificial.
CO2 Understand and apply relational data models and SQL for database design and querying.
CO3 Use JDBC to connect to databases, execute queries, and manage data types and result sets.
Develop and manage servlets for handling HTTP requests and responses, including state and
CO4
session management.
Create and use Java Beans, applying concepts like reflection, introspection, and customizers
CO5
for component-based development.
Design and develop enterprise JavaBeans, including session, entity, and message-driven beans,
CO6
for distributed multitiered applications.
Contact
S. No Contents
Hours
Collections : Collection Interfaces, Concrete Collections, Collections
Framework. Multithreading : Creating and running thread, Multiple thread
UNIT 1 5
synchronization, Thread communication, Thread group, Thread priorities,
Daemon Thread, Life Cycle of Thread.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Java2 Programming Black Book - Steven Holzner 2006
2 JavaBeans Programming from the GroundUp - Joseph O’Neil, TMGH, New 1998
3 Head first EJB-O’Reilly 2005
4 “Beginning Java EE 6 Platform with GlassFish 3 From Novice to 2010
Course Objective: To introduce fundamentals of embedded systems and programming fundamentals and
microcontroller, concepts of program development and object Oriented Programming and Field programmable
gate array (FPGA) using digital circuits and systems.
Contact
S. No Contents
Hours
Introduction Evolution of embedded systems &their applications, architectural
UNIT 1 6
diversity for embedded system development.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Advanced FPGA Design: Architecture, Implementation, and Optimization by
1 2007
Steve Kilts, Wiley
2 Practical FPGA Programming in C by David Pellerin, Prentice Hall. 2005
Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems, by
3 2008
Jean- Pierre Deschamps, Gery J.A. Bioul, Gustavo D. Sutter, Wiley.
Rapid Prototyping of Digital Systems Hamblen, James O., Hall, Tyson S.,
4 2012
Furman, Michael D. Springer.
Embedded Software Development with eCos (Bruce Perens’ Open Source
5 2004
Series), Anthony J. Massa.
Embedded systems Architecture programming and design-Rajkamal,
6 2022
TataMcGrewHill
7 Computer Architecture: A Quantitative Approach - Wayne Wolf, Elsevier 2022
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Khalid Sayood, Introduction to Data Compression, Morgan Kaufmann 2017
2 Data Compression The Complete Reference, David Salomon. 2007
Course Objective: To introduce parallel algorithms and compare it with its sequential equivalent.
Contact
S. No Contents
Hours
Introduction: Need for parallel computers ,Models of computation,Analyzing
UNIT 1 4
parallel algorithms, Expressing parallel algorithms
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar “Introduction to
1 2003
Parallel Computing”, Addison Wesley
Course Objective: Become an expert in neural networks, and learn to implement them in Keras and Tensor
flow.
Contact
S. No Contents
Hours
Machine Learning Basics: Learning Algorithms, Capacity, Overfitting and
Underfitting, Hyperparameters and Validation Sets, Estimators, Bias and
UNIT 1 Variance, Maximum Likelihood Estimation, Bayesian Statistics, Supervised 7
Learning Algorithms, Unsupervised Learning Algorithms, Stochastic Gradient
Descent
Architecture of Neural Network, Hidden Units, Gradient-Based Learning,
UNIT 2 6
Back-Propagation
Regularization for Deep Learning, Train / Dev / Test sets, Bias / Variance,
Regularization, Dropout Regularization, Understanding Dropout, Other
UNIT 3 6
regularization methods, Normalizing inputs, Vanishing / Exploding gradients,
Weight Initialization for Deep Networks
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Deep Learning by Ian Goodfellow, Yoshua Begio, and Aron Courville 2016
2 Deep Learning with Python. By Francois Chollet, Google AI 2017
Explain the advantages of blockchain over conventional distributed databases and identify
CO2
blockchain networks' key components and mechanisms.[Understanding]
Apply cryptographic techniques such as hash functions and digital signatures to secure
CO3
transactions within a blockchain network.[Applying]
Analyze various consensus algorithms and evaluate their effectiveness in maintaining the
CO4
security and integrity of blockchain networks.[Analysing]
Develop a simple blockchain application and design smart contracts using Ethereum,
CO5
addressing potential vulnerabilities and ensuring secure transactions.[Creating]
Contact
S. No Contents
Hours
Need for Distributed Record Keeping and Consensus algorithms: Modeling
faults and adversaries, Byzantine Generals problem, Consensus algorithms and
UNIT 1 10
their scalability problems, Why Nakamoto Came up with Blockchain based
cryptocurrency.
Blockchain Technologies: Technologies Borrowed in Blockchain — hash
UNIT 2 pointers, consensus, byzantine fault-tolerant distributed computing, digital 8
cash, Atomic Broadcast, Consensus, Byzantine Models of fault tolerance.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 “Blockchain: Blueprint for a New Economy”, by Melanie Swan 2015
2 Blockchain: The blockchain for beginners guide to blockchain technology and 2017
3 Draft version of “S. Shukla, M. Dhawan, S. Sharma, S. Venkatesan, 2019
4 Josh Thompson, ‘Blockchain: The Blockchain for Beginnings, Guild to 2017
Course Objective: To introduce the concepts of digital logic, functioning and design of digital devices, logic
families, electronic memory and related devices.
Contact
S. No Contents
Hours
Introduction to Optical Networking: Introduction to SONET/SDH,
UNIT 1 SONET/SDH, Dense Wavelength-Division Multiplexing,The Future of 8
SONET/SDH and DWDM.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Optical Network Design and Implementation, Vivek Alwayn 2005
Course Objective: To highlight the features of different technologies involved in high speed networking and
their performance
Contact
S. No Contents
Hours
High Speed networks: Asynchronous transfer mode – ATM Protocol
Architecture,ATM logical Connection, ATM Cell – ATM Service Categories –
UNIT 1 8
AAL, High Speed LANs:Fast Ethernet, Gigabit Ethernet, Fiber Channel –
Wireless LANs: applications,requirements – Architecture of 802.11
Congestion And Traffic Management: Queuing Analysis- Queuing Models –
UNIT 2 Single Server Queues – Effects of Congestion – Congestion Control – Traffic 8
Management – Congestion Control in Packet Switching Networks
TCP And ATM Congestion Control: TCP Flow control – TCP Congestion
Control – Retransmission – Timer Management – Exponential RTO backoff –
KARN’s Algorithm – Window management - Performance ofTCP over ATM.
UNIT 3 Traffic and Congestion control in ATM – Requirements – Attributes –Traffic 8
Management Frame work, Traffic Control – ABR traffic Management – ABR
ratecontrol, RM cell formats, ABR Capacity allocations – GFR traffic
management
INTEGRATED AND DIFFERENTIAL SERVICES
Integrated Services Architecture - Approach, Components, Services- Queuing
UNIT 4 8
Discipline, FQ, PS, BRFQ, GPS, WFQ - Random Early Detection, Differentiated
Services
PROTOCOLS FOR QOS SUPPORT
RSVP - Goals & Characteristics, Data Flow, RSVP operations, Protocol
UNIT 5 8
Mechanisms - Multiprotocol Label Switching - Operations, Label Stacking,
Protocol details - RTP - Protocol Architecture, Data Transfer Protocol, RTCP.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 HIGH SPEED NETWORKS AND INTERNET, William Stallings, Pearson 2002
2 HIGH PERFORMANCE COMMUNICATION NETWORKS, Warland & 2001
3 MPLS and VPN architecture by Irvan Pepelnjk, Jin Guichard and Jeff Apcar, 2003
4 Behrouz A. Forouzan, Data Communications and Networking, Tata McGraw 2017
Course Objective: To highlight the features of advanced SQL, parallel and distributed databases and
architecture of modern database systems.
Contact
S. No Contents
Hours
This course covers topics of Relational Databases Integrity Constraints,
Extended ER diagram, Relational Algebra & Calculus, Functional,
UNIT 1 8
Multivalued and Join Dependency, Normal Forms, Rules about functional
dependencies.
Advanced Transaction Processing; Nested and multilevel transaction,
Compensating Transaction & Saga, Long Duration Transaction ,Weak Level
UNIT 2 8
of Consistency, Transaction Work flows, Transaction Processing Monitors,
Schedules, Serializability- Conflict & View
Active Database and Real Time Databases: Triggers in SQL, Event Constraint
UNIT 6 and Action-ECA rules ,Query Processing & Concurrency Control 8
,Compensation & Databases Recovery
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Elmarsi, Navathe, Somayajulu, Gupta, “Fundamentals of Database Systems”,
1 2007
Pearson Education
2 Garcia, Ullman, Widom, “Database Systems, The complete book”, Pearson 2008
Date, Kannan, Swaminathan, “An Introduction to Database Systems”, Pearson
3 2007
Education,
4 Silberscatz, Korth, Sudarshan, “Database System Concepts”, Mcgraw Hill 2006
Course Objective: To study the concepts of multimedia data, algorithms and compression.
Contact
S. No Contents
Hours
Introduction to Multimedia, Multimedia Information, Multimedia Objects,
Multimedia inbusiness and work. Convergence of Computer, Communication
and EntertainmentProducts ,Stages of Multimedia Projects:Multimedia
UNIT 1 10
hardware, Memory & storage devices, Communication devices, Multimedia
softwares, presentation tools, tools for object generations, video, sound, image
capturing,authoring tools, card and page based authoring tools.
Multimedia Building Blocks: Text, Sound MIDI, Digital Audio, audio file
UNIT 2 8
formats, MIDI under windows environment, Audio & Video Capture.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Tay Vaughan “Multimedia, Making IT Work” Osborne McGraw Hill. 2010
2 Buford “Multimedia Systems” Addison Wesley 2000
3 Agarwal & Tiwari “Multimedia Systems” Excel 2002
4 Mark Nelson “Data Compression Book” BPB 2013
David Hillman “Multimedia technology and Applications” Galgotia
5 2008
Publication
Course Objective: The course addresses basic concepts of real-time systems, presents examples of real-time
systems, covers real-time systems analysis and design, and gives an in-depth treatment of timing analysis and
scheduling
Contact
S. No Contents
Hours
Introduction : Definition, Typical Real Time Applications; Digital Control,
High Level Controls, Signal Processing etc., Release Times, Deadlines, and
Timing Constraints. Hard Real Time Systems and Soft Real Time Systems,
UNIT 1 10
Reference Models for Real Time. Systems: Processors and Resources,
Temporal Parameters of Real Time Workload. Periodic Task Model,
Precedence Constraints and Data Dependency.
Real Time Scheduling: Common Approaches to Real Time Scheduling: Clock
Driven Approach, Weighted Round Robin Approach, Priority Driven
Approach, Dynamic Versus Static Systems, Optimality of Effective-Deadline-
UNIT 2 10
First (EDF) and Least-Slack-Time-First(LST) Algorithms, Offline Versus
Online Scheduling, Scheduling A periodic and Sporadic jobs in Priority
Driven and Clock Driven Systems.
Resources Access Control: Effect of Resource Contention and Resource
Access Control (RAC), Non preemptive Critical Sections, Basic Priority-
Inheritance and Priority-Ceiling Protocols,mStack Based Priority-Ceiling
UNIT 3 10
Protocol, Use of Priority-Ceiling Protocol in Dynamic Priority Systems, Pre-
emption Ceiling Protocol, Access Control in Multiple-Unit Resources,
Controlling Concurrent Accesses to Data Objects
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Real Time Systems by Jane W. S. Liu, Pearson Education Publication 2000
H. Kopetz, Real time systems for distributed embedded applications, Kluwer
2 2011
Academic
Douglass, Real Time UML: Advances in the UML for Real-Time Systems,
3 2013
Addison-Wesley
Course Objective: To equip with basic mathematical and statistical techniques commonly used in pattern
recognition. Also provide with an adequate background on probability theory, statistics, and optimization
theory to tackle a wide spectrum of engineering problems.
Contact
S. No Contents
Hours
Pattern recognition fundamentals: Basic concepts of pattern recognition,
fundamental problems in pattern recognition system, design concepts and
UNIT 1 8
methodologies, example of automatic pattern recognition systems, a simple
automatic pattern recognition model.
Bayesian decision theory: Minimum-error-rate classification, Classifiers,
UNIT 2 Discriminant functions, Decision surfaces, Normal density and Discriminant 8
functions, Discrete features, Missing and noisy features.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 R. O. Duda, P. Hart, D. Stork, Pattern Classification, Wiley 2000
2 Bishop, C. M., Pattern Recognition and Machine Learning. Springer 2007
3 Bishop, C. M., Neural Networks for Pattern Recognition, Oxford University 1995
4 Theodoridis, S. and Koutroumbas, K., Pattern Recognition 2008
5 Hastie, T., Tibshirani, R. and Friedman, J., The Elements of Statistical 2009
Course Objective: To develop a robust understanding of reinforcement learning principles with emphasis on
real-world application.
Contact
S. No Contents
Hours
Introduction: Elements of Reinforcement Learning, Episodic vs Continuous
Tasks, The Rewards Hypothesis, Cumulative Reward, Multi-armed Bandits: A
UNIT 1 10
k -armed Bandit Problem, Action-value Methods, The 10-armed Testbed,
Optimistic Initial Values, Gradient Bandit Algorithms
Markov Decision Process: The Agent–Environment Interface, Returns and
Episodes, Episodic vs Continuous Tasks, Policies and Value Functions,
Optimal Policies and Optimal Value Functions
UNIT 2 10
Dynamic Programming: Policy Evaluation, Policy Improvement, Policy
Iteration, Value Iteration, Asynchronous, Dynamic Programming, Generalized
Policy Iteration
Temporal-Difference Methods, TD Prediction, Advantages of TD Prediction
Methods, TD control – Sarsa, TD control- Q-Learning, TD control- Expected
UNIT 3 Sarsa, Maximization Bias and Double Learning 8
N-step Bootstrapping, N-step TD prediction, N-step Sarsa, N-step Off-policy
Learning
RL in Continuous Space, Discrete vs Continuous space, Discretization,
UNIT 4 Functions Approximation, Linear Function Approximation- kernel, Non- 10
Linear Function Approximation
Value-Based Network, Deep Q networks, From RL to Deep RL, Deep Q
Networks Architectures(DQN), Experience Replay, Fixed Q-Targets, Other
UNIT 5 10
Networks- Double DQN, Prioritized Experience Replay, Dueling
DQN(Introduction)
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Reinforcement Learning by Richard S. Sultton and Andrew G. Barto, MIT
1 2018
Press
Reinforcement Learning: State-of-the-Art. By Wiering, M. and van Otterlo,
2 2012
M., Springer
3 Algorithms for Reinforcement Learning by Morgan & Claypool 2010
Course Objective: To provide comprehensive knowledge and practical skills in ethical hacking, including
methodologies for system, web server, and wireless network penetration testing, and to understand the legal
and technical aspects of cybersecurity.
Explain various system hacking techniques, such as password hacking, rootkits, trojans, and
CO2
denial of service attacks, and understand their impact on system security. [Understanding]
Apply techniques for hacking web servers, identifying web application vulnerabilities, and
CO3
exploiting security weaknesses in wireless networks. [Applying]
Analyze penetration testing methodologies, cryptographic principles, and legal frameworks for
CO4
ethical hacking and evaluate their effectiveness in maintaining security. [Analyzing]
Develop and implement penetration testing tools, understand firewall types, and address
CO5
physical security factors and honeypots to enhance overall cybersecurity measures. [Creating]
Contact
S. No Contents
Hours
Introduction to Ethical Hacking: Introduction to Ethical Hacking, Ethical
UNIT 1 Hacking Terminology, Types of Hacking Technologies, Phases of Ethical
Hacking, Footprinting, Social Engineering, Scanning and Enumeration
10
System Hacking : Understanding the Password Hacking Techniques, Rootkits,
UNIT 2 Trojans, Backdoors, Viruses and Worms, Sniffers, Denial of Service, Session 10
Hijacking
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Patrick Engebretson, The Basics of Hacking and Penetration Testing, Elsevier,
1 2013
2013.
2 Network Security and Ethical Hacking, Rajat Khare, Luniver Press, 2006. 2006
3 Hands‐On Ethical Hacking and Network Defense – By Michael T. Simpson, 2010
Course Objective: To introduce fundamentals of computer vision so that students will understand to program
a computer for understanding a scene or features in an image development.
Contact
S. No Contents
Hours
Introduction to Computer Vision: Role of Artificial Intelligence and Image
UNIT 1 processing in Computer Vision, Industrial Machine Vision Applications, 8
System Architecture, Stages of Computer Vision, State of the art.
Motion and Tracking: Detection and tracking of point features, Optical flow,
Tracking-Lucas Kanade & Tomasi method (LK Tracker),
UNIT 6 8
Motion Analysis: Background Subtraction and Modeling, Optical Flow, KLT,
Spatio-Temporal Analysis, Dynamic Stereo; Motion parameter estimation.
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Pearson 2003
Milan Sonka, VaclavHlavac, Roger Boyle, "Image Processing, Analysis, and
2 2008
Machine Vision" Cengage Learning.
3 Richard Hartley and Andrew Zisserman, Multiple View Geometry in 2004
4 Richard Szeliski, Computer Vision: Algorithms and Applications, Springer- 2011
5 K. Fukunaga; Introduction to Statistical Pattern Recognition, Second Edition, 1990
Course Objective: The objective of this course is to introduce the principles and techniques of data
visualization. It covers effective methods for visual data representation, understanding the impact of visual
perception on data interpretation, and applying various visualization techniques to analyze and evaluate data.
Contact
S. No Contents
Hours
Introduction to Data Science and Data Visualization: Concepts, lifecycle,
applications of Data Science; Role of Data Visualization in Analysis and
UNIT 1 8
Decision Making; Basics of R Programming including variables, data types,
operators; Fundamentals of Data Visualization covering principles and types.
Data Preprocessing and EDA with R: Data Collection and Sources such as
structured, unstructured, and web scraping; Data Cleaning techniques like
handling missing data and outliers; Data Transformation Techniques including
UNIT 2 normalization, standardization, encoding; Exploratory Data Analysis (EDA) 9
covering univariate, bivariate, and multivariate analysis; Advanced EDA
Plotting using ggplot2 for customized visualizations, faceting, and
distributions.
Advanced Data Analysis and Visualization with R: Statistical Analysis
including descriptive stats and hypothesis testing; Data Visualization Libraries
UNIT 3 8
in R, specifically ggplot2; Machine Learning Concepts introducing ML and
basic models in R; R Shiny for building interactive web applications.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Ward, Grinstein, Keim, Interactive Data Visualization: Foundations,
1 2015
Techniques, and Applications. Natick, 2nd edition,A K Peters, Ltd 2015.
Tamara Munzner,Visualization Analysis & Design ,1st edition,AK Peters
2 2014
Visualization Series 2014
3 Scott Murray,Interactive Data Visualization for the Web ,2nd Edition, 2017 2017
Wickham, H., Çetinkaya-Rundel, M., & Grolemund, G. (2023). R for data
4 2023
science. " O'Reilly Media, Inc.".
Course Objective: To understand the concept of wireless communication, mobile computing paradigm, its
novel applications and limitations.
Contact
S. No Contents
Hours
Introduction, issues in mobile computing, overview of wireless telephony:
cellular concept, GSM: air-interface, channel structure, location management:
UNIT 1 HLR, VLR, hierarchical, handoffs, channel allocation in cellular systems, 6
Cellular telephone, Digital Cellular Standards, Call Routing in GSM, Satellite
Technology, FDMA, TDMA, CDMA and GPRS.
Wireless Networking, Wireless LAN Overview: MAC issues, PCF, DCF ,
Frame types, addressing, IEEE 802.11 standards, Blue Tooth: Architecture ,
Layers and protocols, Wireless multiple access protocols, TCP over wireless,
UNIT 2 10
Wireless applications, data broadcasting, Mobile IP, WAP: Architecture,
protocol stack, application environment, applications, WAP application
environment(WAE), WML, WSP, WTP and WTLS
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Jochen Schiller, “Mobile Communications”, Addison-Wesley 2004
Dharma Prakash Agarwal & Zeng, “Introduction to Wireless and Mobile
2 2006
Systems”, Cengage Learning India Private Limited.
Raj Pandya, “Mobile and Personal Communication systems and services”,
3 2001
Prentice Hall of India.
4 A.K.Talukder and R.R.Yavagal, Mobile Computing, TMH. 2006
5 Raj Kamal, “Mobile Computing”, Oxford University Press. 2007
Course Objective: To provide an understanding of Business Intelligence (BI) principles, techniques, and
models that enable effective and timely decision-making. The course explores the development and application
of BI systems, ethical considerations, and emerging trends, including machine learning and advanced
visualization.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Efraim Turban, Ramesh Sharda, Dursun Delen, “Decision Support And
1 2013
Business Intelligence Systems”, 9th Edition, Pearson 2013.
Course Objective: To understand the Internet & the Web phenomena. Comprehend the evolution,
development and research in the area of Web.
Describe markup languages for processing, identifying, and presenting of information in web
CO5
pages using markup languages such as: HTML, XHTML and XML language.
Contact
S. No Contents
Hours
Inter-Networking: Internet, Growth of Internet, Owners of the Internet,
Anatomy of Internet, APRANET and Internet history of the World Web, Basic
UNIT 1 Internet Terminology, Net etiquette. Working of Internet: Packet switching 6
technology, Internet Protocols: TCP/IP, Router. Internet Addressing Scheme:
Machine Addressing (IP address), E-mail Address, Resource Addresses.
Internet Applications: E-mail, file transfer (FTP), telnet, usenet, Internet chat,
UNIT 2 4
Web.
Evolution of Web:Web 1.0: Hypertext & linking documents, HTTP, Client-
Server, peer-to-peer; Web Browser (Lynx, Mosiac, Netscape, Internet
Explorer, Firefox, and Safari, the mobile web); Impact: Opportunities &
Challenges.
Web 2.0: From 1.0 to 2.0; Framework; Technologies: Client-side & server-
UNIT 3 10
side; Web 2.0 development technologies; Examples: social networking sites,
blogs, wikis, video sharing sites, hosted services(web services, location-based
services), web applications, mashups & folksonomies; Practical Usage.
Web 3.0: From 2.0 to 3.0; Semantic Web: What, How, Why; From Web
3.0 to Web 4.0
Web Development: Phases; Web Page, Website, and Web Application:
Example, Technology Framework for development.cClient-side technology:
HTML (HTML5). Client-side scripting: JavaScript.
Server-side technology: PHP.Server-side scripting: Server-side
UNIT 4 14
JavaScript.Web application development frameworks: Django& Ruby on
Rails.
Web Database: Database Connectivity: JDBC, ODBC; Database-to- web
connectivity.
Total 42
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Internet and Web Technologies by Raj Kamal, Tata McGraw Hill. 2002
An Introduction to Search Engines and Web Navigation, Mark Levene,
2 2010
Pearson Education.
Modeling the Internet and the Web,PierreBaldi,PaoloFrasconi, Padhraic
3 2003
Smyth, John Wiley and Sons Ltd.
4 HTML: A Beginner’s Guide by Wendy Willard, Tata McGraw-Hill 2009
5 PHP and MySQL for Dynamic Web Sites, Ullman, Larry, Peachpit Press. 2012
Course code: Course
Course Structure Pre-Requisite
Title
CS423: Big Data L T P
Mathematics, aptitude.
Analytics 3 0 2
Course Objective: Be Exposed With the Basic Rudiments of Business Intelligence System. Understand The
Modeling Aspects Behind Business Intelligence. Understand Of the Business Intelligence Life Cycle and the
Techniques Used In It.
Contact
S. No Contents
Hours
Introduction to Big Data: Evolution of Big data, Best Practices for Big data
Analytics – Big data characteristics, Validating, The Promotion of the Value
of Big Data, Big Data Use Cases- Characteristics of Big Data Applications,
UNIT 1 8
Perception and Quantification of Value, Understanding Big Data Storage, A
General Overview of High-Performance Architecture, HDFS – MapReduce
and YARN, Map Reduce Programming Model.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Chris Eaton, Dirk deroos et al., “Understanding Big data ”, McGraw Hill,
1 2012
2012.
Anand Rajaraman and Jeffrey David Ullman, “Mining of Massive Datasets”,
2 2012
Cambridge University Press, 2012.
Boris lublinsky, Kevin t. Smith, Alexey Yakubovich, “Professional Hadoop
3 2015
Solutions”, Wiley, 2015.
4 Tom White, “HADOOP: The definitive Guide” , O Reilly 2012 2012
Course Objective: To study the concepts, architecture, models of a cloud and its security issues and service
management parameters.
CO5 Analyze cloud service management, SLAs, scaling economics, and data management.
Evaluate cloud security issues, including network, host, and data security, and identity
CO6
management.
Contact
S. No Contents
Hours
Overview of Computing Paradigm and introduction to cloud computing:
Recent trends in Computing (Grid Computing, Cluster Computing, Distributed
Computing, Utility Computing, Cloud Computing), Evolution of cloud
UNIT 1 computing(Business driver for adopting cloud computing), Cloud Computing 8
(NIST Model) , Cloud service providers, Properties, Characteristics &
Disadvantages, Cloud computing vs. Cluster computing vs. Grid
computing,Role of Open Standards
Cloud Computing Architecture: Cloud computing stack: Comparison with
traditional computing architecture (client/server), Services provided at various
levels, How Cloud Computing Works, Role of Networks in Cloud computing,
UNIT 2 protocols used, Role of Web services, Service Models (XaaS) :Infrastructure as 8
a Service(IaaS), Platform as a Service(PaaS), Software as a Service(SaaS),
Deployment Models(Public cloud, Private cloud, Hybrid cloud, Community
cloud)
Infrastructure as a Service(IaaS):Introduction to IaaS ,IaaS definition,
Introduction to virtualization, Different approaches to virtualization,
Hypervisors, Machine Image, Virtual Machine(VM),Resource
UNIT 3 8
Virtualization(Server, Storage, Network), Virtual Machine(resource)
provisioning and manageability, storage as a service, Data storage in cloud
computing(storage as a service).
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Cloud Computing Bible, Barrie Sosinsky, Wiley-India 2010
Cloud Computing: Principles and Paradigms, Editors: Rajkumar Buyya, James
2 2011
Broberg, Andrzej M. Goscinski, Wile
Cloud Computing: Principles, Systems and Applications, Editors: Nikos
3 2012
Antonopoulos, Lee Gillam, Springer
Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Ronald
4 2010
L. Krutz, Russell Dean Vines, Wiley-India
Course Objective: The goal of natural language processing (NLP) is to design and build computer systems
that are able to analyze natural languages like German or English, and that generate their outputs in a natural
language.
Contact
S. No Contents
Hours
Introduction:The study of Language, Introduction to NLP, Regular Expression,
Finite State Automata, Evaluating Language Understanding Systems, Different
UNIT 1 6
levels of Language Analysis, Representations and Understanding, Linguistic
Background.
Total 42
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 James Allen, Natural Language Understanding, Pearson Education 2003
2 Foundation of Statistical Natural Language Processing, Manning and Schutze 1998
3 D. Jurafsky, J. H. Martin, Speech and Language Processing, Pearson 2008
4 Bharati, Chaitanya and Sangal: Natural Language Processing- a Paninian 1995
Course Objective: To introduce the concept of advanced computer architectures with Parallel algorithms and
Parallel programming with high end computer systems and methods for achieving high performance.
Contact
S. No Contents
Hours
Introduction to advanced computer architectures, parallel algorithms, parallel
UNIT 1 languages, and performance oriented computing, discussing about the key 6
characteristics of highend computing architectures .
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
Introduction to Parallel Computing, Ananth Grama, Anshul Gupta, George
1 2003
Karypis, and Vipin Kumar, AddisonWelsey
Petascale Computing: Algorithms and Applications, David A. Bader (Ed.),
2 2007
Chapman & Hall/CRC Computational Science Series
Grama, A. Gupta, G. Karypis, V. Kumar, An Introduction to Parallel
3 2003
Computing, Design and Analysis of Algorithms, AddisonWesley
G.E. Karniadakis, R.M. Kirby II, Parallel Scientific Computing in C++ and
4 MPI: A Seamless Approach to Parallel Algorithms and their Implementation, 2003
Cambridge University Press
Course Objective: The course will provide an insight for achieving cost efficient high performance system
and how to deal with design and architecture of grid and cluster computing.
Implement and analyze standard MPI variants, derived data types, and communicators for
CO2
parallel programming.
Demonstrate skills in resource management, distributed task scheduling, and system
CO3
administration using tools like Condor, Maui, and PBS.
Set up and deploy grid computing environments, apply programming models, and ensure grid
CO4
security.
Use performance evaluation tools and apply data management techniques to case studies such
CO5
as molecular modeling and brain activity analysis.
Contact
S. No Contents
Hours
Cluster Computing Introduction to concepts in Cluster based distributed
UNIT 1 computing Hardware technologies for cluster computing and software for 6
cluster computing, and different Software Architecture for Cluster Computing.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Grid and Cluster Computing by C.S.R. Prabhu, PHI 2008
2 Introduction to grid computing - Bart Jacob, Michael Brown 2005
3 B. Wilkinson, Grid Computing: Techniques and Applications, CRC Press 2009
4 R. Buyya, High Performance Cluster Computing: Architectures and Systems 2008
5 D. Janakiram, Grid Computing, Tata McGraw-Hill 2005
Contact
S. No Contents
Hours
Introduction to Evolutionary Computing: Global Optimization, Components of
UNIT 1 an evolutionary algorithm, Evolution strategies, Fitness Functions, Learning 8
Classifier systems, Parameter Control, Multi-modal Problems
Swarm Intelligence: Introduction to Swarm Intelligence and its application to
UNIT 2 optimization problems, Particle Swarm Optimization algorithm, position and 8
velocity updation
Genetic Algorithm: Population and generation of chromosomes, Fitness
UNIT 3 function, survival of the fittest, reproduction, cross-over and mutation, Genetic 10
algorithm convergence, Genetic programming
Hybrid Methods and Multi-objective Evolutionary Algorithms: Variants of
Particle Swarm optimization and Genetic Algorithm, Hybridization of Particle
UNIT 4 8
Swarm and Genetic based optimizations, Hybrid Multi-objective Optimization
algorithms
Recent nature-inspired evolutionary algorithms: Cockoo search algorithm,
UNIT 5 Artificial Bee Colony Optimization, Ant Colony Optimization, Fire-fly 8
algorithm, Bacterial Foraging, Application to the travelling salesman problem
UNIT 6 Application to real world optimization problems 6
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Computational Intelligence, Andries P. Engelbrech, John Wiley & Sons 2008
2 An Introduction to Genetic Algorithm, Melanie Mitchell, MIT Press 1996
Genetic Algorithms in Search, Optimization, and Machine Learning, David
3 1989
Goldberg
4 Introduction to Evolutionary Computing”, A.E Eiben and J.E. Smith, Springer 2007
5 Evolutionary Computation, A “Unified Approach, K. DeJong. MIT Press 2006
Course Objective: To introduce to the concepts of digital image processing. The students will learn image
transforms, image enhancement, restoration, morphological operations, edge detection,and segmentation
algorithms.
Contact
S. No Contents
Hours
Introduction And Digital Image Fundamentals: Digital Image Representation,
Fundamental Steps in Image Processing, Elements of Digital image processing
UNIT 1 6
systems, Sampling and quantization, some basic relationships like neighbours,
connectivity, Distance measure between pixels, Imaging Geometry.
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Rafael C. Gonzalez, Richard E. Woods, Digital Image Processing, Pearson 2008
2 Anil K. Jain, Fundamentals of Digital Image Processing, Pearson 2002
3 William K. Pratt, Digital Image Processing, John Wiley 2002
Rafael C. Gonzalez, Richard E. Woods, Steven Eddins, Digital Image
4 2004
Processing using MATLAB
Course Objective: To familiarize the students with basic concepts in each type of IPR together with historical
developments in the subject & its importance in modern times.
Analyze patent, design, copyright and trademark laws, encompassing filing procedures,
CO2
prosecution steps, and infringement actions, with reference to relevant case laws.
To apply the concepts of patentability, including conditions and subject matter, to hypothetical
CO3
scenarios.
Examine case laws such as Alice Corp. v. CLS Bank and understand their impact on patent
CO4
law and practices.
To conduct Prior-art, validity/invalidity, state-of-the-art, freedom to operate, and landscape
CO5
analysis searches.
Contact
S. No Contents
Hours
Introduction: Concept of IPR, Historical development , kinds of IPR, brief
UNIT 1 description of patent, trademark, copyright ,industrial design, importance of 6
IPR, IPR authorities.
International IPR & case laws: World intellectual property organization, WCT,
UNIT 6 WPPT, TRIPS, Copyright societies, international IPR dispute resolution 10
mechanism. Case laws.
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 Law Relating to Intellectual property, B.L.Wadehra 2007
Intellectual property: Patents, copyright ,trademarks and allied rights, W.R.
2 2003
Cornish. Sweet & Maxwell publisher
3 Law and practice of intellectual property in India by Vikas Vashishth 2006
4 Patents ,copyrights, trade marks and design by B L Wadhera 2014
Dr. B. L. Wadhera, “Intellectual Property Law Handbook”. Universal Law
5 2002
Publishing
Contact
S. No Contents
Hours
Introduction : Review of TCP/IP and TCP, IP Header analysis , Introduction to
Cyber World, Cyber attacks and cyber security , Information warfare and
cyber terrorism, Types of cyber attacks, Cyber Crime and Digital Fraud ,
UNIT 1 12
Overview of Types of computer forensics
i.e. Media Forensics, Network forensics (internet forensics), Machine forensic,
Email forensic (e-mail tracing and investigations)
Live Data collection and investigating windows environment : windows
Registry analysis , Gathering Tools to create a response toolkit ( Built in tools
like netstat , cmd.exe , nbtstat , arp , md5sum, regdmpetc and tools available as
UNIT 2 freeware like Fport , Pslistetc) , Obtaining volatile Data ( tools like coffee , 12
Helix can be used ) Computer forensics in windows environment, Log analysis
and event viewer, File auditing, identifying rogue machines, hidden files and
unauthorized access points
Live Data collection and investigating Unix/Linux environment : / Proc file
system overview , Gathering Tools to create a response toolkit ( Built in tools
like losetup , Vnode , netstat , df , md5sum , straceetc and tools available as
UNIT 3 freeware like Encase , Carboniteetc ) Handling Investigations in Unix/Linux 12
Environment: Log Analysis (Network, host, user logging details), Recording
incident time/date stamps, Identifying rogue processes, unauthorized access
points, unauthorized user/group accounts
Forensic tools and report generation: Recovery of Deleted files in windows and
Unix, Analyzing network traffic, sniffers, Ethical Hacking, Hardware forensic
tools like Port scanning and vulnerability assessment tools like Nmap, Netscan
UNIT 4 12
etc. Password recovery (tools like John the ripper, L0phtcrack, and THC-
Hydra), Mobile forensic tools and analysis of called data record Template for
computer forensic reports
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
“Incident Response & Computer Forensics”, Mandia, k., Prosise, c., Pepe, m.,
1 2003
TMH.
“Guide to Computer Forensics and Investigations”, Bill Nelson, Amelia
2 2009
Phillips, Frank Enfinger, and Chris Steuart , Thomson Learning.
3 “Digital Evidence and Computer Crime”, Eoghan Casey, Academic Press 2011
4 “File System Forensic Analysis”, Brian Carrier , addition Wesley 2005
5 “Windows Forensic Analysis DVD Toolkit”, Harlan Carvey, Syngress 2009
“EnCE: The Official EnCase Certified Examiner Study Guide”, Steve
6 2012
Bunting, Sybex Publication
Course Objective: To introduce concepts of semantic web and various techniques of web mining.
Contact
S. No Contents
Hours
Introduction: The Semantic Web Roadmap, evolution of Web Documents,
UNIT 1 12
Semantic Search Techniques.
XML Languages: Detailed study of XML language & application to Web
UNIT 2 12
based developments.
Describing Web Resources: Resource Description Framework (RDF),
UNIT 3 Taxonomies, Ontologies, Web Ontology Language (OWL), Design process of 12
ontology, Annotation.
Advanced Topics: Semantic Applications & Power, Latest on Semantic Web,
UNIT 4 12
Future Directions, W3C Consortium, Case studies in different application.
Total 48
REFERENCES
Year of
S.No. Name of Books/Authors/Publishers Publication
/ Reprint
1 “A Semantic Web Primer”, Grigoris Antoniou and Frank van Harmelen, MIT 2012
2 “Spinning the Semantic Web - Bringing the World Wide Web to Its Full 2005
3 “The Semantic Web: A guide to the future of XML, Web Services and 2003
4 “Principles of Semantic Networks: Explorations in the representation of 1991
5 Russell and Norvig, “Artificial Intelligence: A Modern Approach”, Prentice 2020
6 Han Reichgelt, “Knowledge Representation: An AI Perspective”, Ablex 1991