0% found this document useful (0 votes)
910 views

BE (Computer Science Technology) - Syyllabus

The document outlines the syllabus for the Bachelor of Engineering in Computer Science and Engineering program at Punyashlok Ahilyadevi Holkar Solapur University in Solapur, India. It provides details on the courses offered in semesters I and II, including course codes, titles, credit hours, and examination schemes. Some key elective courses include Internet of Things, Wireless Adhoc Networks, and Artificial Intelligence. The syllabus is implemented starting in June 2019 using the Choice Based Credit System.

Uploaded by

Rajan Jamgekar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
910 views

BE (Computer Science Technology) - Syyllabus

The document outlines the syllabus for the Bachelor of Engineering in Computer Science and Engineering program at Punyashlok Ahilyadevi Holkar Solapur University in Solapur, India. It provides details on the courses offered in semesters I and II, including course codes, titles, credit hours, and examination schemes. Some key elective courses include Internet of Things, Wireless Adhoc Networks, and Artificial Intelligence. The syllabus is implemented starting in June 2019 using the Choice Based Credit System.

Uploaded by

Rajan Jamgekar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

Punyashlok Ahilyadevi Holkar Solapur University, Solapur

NAAC Accredited-2015
‘B’ Grade (CGPA 2.62)

Name of the Faculty: Science & Technology


CHOICE BASED CREDIT SYSTEM

Syllabus: Computer Science & Engineering

Name of the Course: B.E.- IV (Sem. VII & VIII)


(Syllabus to be implemented from w.e.f. June 2019)

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 1 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

Faculty of Engineering & Technology


Structure of B.E.Computer Science and Engineering wef. 2019-2020
Choice Based Credit System Syllabus
Semester I
Course Theory Course Name Hrs./week Credits Examination Scheme
Code L T P ISE ESE ICA Total
CS411 Advanced Computer Architecture 3 1 -- 4 30 70 25 125
CS412 Distributed Systems 3 -- -- 3 30 70 -- 100
CS413 Modern Database Systems 4 -- -- 4 30 70 -- 100
CS 414A Elective –I 3 -- -- 3 30 70 -- 100
to
CS 414C
CS 415A Elective-II 3 1 -- 4 30 70 25 125
to
CS 415C
CS416 # Programming with Python 2 -- -- 2 -- -- 25 25
Sub Total 18 02 20 150 350 75 575
Laboratory POE OE
CS412 Distributed Systems -- -- 2 1 -- -- -- 25 25
CS413 Modern Database Systems -- -- 2 1 -- 50 -- 25 75
CS416 Programming with Python -- -- 2 1 -- 50 -- -- 50
CS417 Project Phase-I -- -- 4 2 -- 50 -- 25 75
CS418 Vocational Training -- -- -- -- -- 25 25
Sub Total 5 150 -- 100 250
Grand Total 18 02 10 25 150 500 175 825
Abbreviations: L‐ Lectures, P –Practical, T‐ Tutorial, ISE‐ In Semester Exam, ESE ‐ End Semester Exam,
ICA‐ Internal Continuous Assessment, ESE - University Examination (Theory &/ POE &/Oral examination)
Semester II
Course Theory Course Name Hrs./week Credits Examination Scheme
Code L T P ISE ESE ICA Total
CS421 Management Information System 3 1 -- 4 30 70 25 125
CS422 Information and Cyber Security 3 -- -- 3 30 70 -- 100
CS423A Elective-III 3 1 -- 4 30 70 25 125
to
CS423C
CS424A Elective-IV 3 -- -- 3 30 70 -- 100
to
CS424C
CS425 # Web Technology 2 -- -- 2 25 -- -- 25
Sub Total 14 02 -- 16 145 280 50 475
Laboratory POE OE
CS422 Information and Cyber Security -- -- 2 1 -- 50 -- 25 75
CS425 Web Technology -- -- 4 2 -- 50 -- 25 75
CS424 Elective-IV -- -- 2 1 -- -- 25 25
CS426 Project Phase-II -- -- 6 3 -- 100 -- 75 175
Sub Total -- 7 200 150 350
Grand Total 14 02 14 23 145 480 200 825

Abbreviations: L‐ Lectures, P –Practical, T‐ Tutorial, ISE‐ In Semester Exam, ESE ‐ End Semester Exam,
ICA‐ Internal Continuous Assessment, ESE - University Examination (Theory &/ POE &/Oral examination)

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 2 of 43
Elective I Elective II
CS414A : Internet of Things CS415A : Business Intelligence
CS414B : Wireless Adhoc Networks CS415B : Data Mining
CS414C : Artificial Intelligence CS415C : Object Oriented Modeling and Design
Elective III Elective IV
CS423A : Big data Analytics CS424A : Software Testing and Quality Assurance
CS423B : Human Computer Interaction CS424B : Cloud Computing
CS423C : Artificial Neural Network CS424C : Machine Learning

Note: Appropriate electives may be added or deleted as and when required.

Note :
• Batch size for the practical /tutorial shall be of 15 students. On forming the batches, if the strength of
remaining student exceeds 7, then a new batch shall be formed.
• Vocational Training (evaluated at B.E. Part-I) of minimum 15 days shall be completed in any vacation
after S.E. Part-II but before B.E. Part-I & the report shall be submitted and evaluated in B.E. Part-I
• Appropriate Elective I & II Subjects may be added when required.
• Curriculum for Humanities and Social Sciences Self Learning Modules is common for all under
graduate programmes of faculty of Engineering and Technology
• Project group for B.E.(CSE) Part I and Part II shall be of size 4 to 5 students
• Term work assessment shall be a continuous process based on student’s performance in – class tests,
assignments, homework, subject seminars, quizzes, laboratory books and their interaction and
attendance for theory and lab sessions as applicable

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 3 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER I
CS 411 : Advanced Computer Architecture
Teaching Scheme Examination Scheme
Lectures- 3 Hr/Week, 3 Credits ESE -70 Marks
Tutorial-1 Hr/Week, 1 Credit ISE - 30 Marks
ICA- 25 Marks
-------------------------------------------------------------------------------------------------------------------------
Introduction
This course introduces the concepts of Advanced Computer Architecture such as parallel computer
models, pipelining & superscalar techniques. It also focuses on multiprocessor, multicomputer, data
parallel architecture, parallel models, languages and compilers.
-------------------------------------------------------------------------------------------------------------------------
COURSE PREREQUISITE :
Students shall have the knowledge of Digital System, Microprocessor and Computer Organization.
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVE :
1. To distinguish multiprocessors and multicomputers.
2. To compare the performance of conventional linear and non linear pipelines.
3. To organize several interconnection models.
4. To classify parallel programming models.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME :
At the end of the course, student will be able to
1. Compare multiprocessors and multicomputer.
2. Elaborate the performance of conventional linear and non linear pipelines.
3. Identify several interconnection model.
4. Compare parallel programming models.
-------------------------------------------------------------------------------------------------------------------------
SECTION I

Unit 1: Parallel Computer Models (6)


The State of Computing: Evolution of Computer Architecture, System Attributes to Performance.
Multiprocessors and Multicomputers: Shared Memory Multiprocessors, Distributed Memory
Multicomputers. Multivector and SIMD Computers: Vector Supercomputers, SIMD Supercomputers.

Unit 2: Processor and Memory Hierarchy (10)


Advanced Processor Technology: Design Space of Processors, Instruction Set Architecture, CISC and
RISC Scalar Processors. Super scalar and Vector Processor: Superscalar Processors, The VLIW
Architecture, Vector and Symbolic Processors. Memory Hierarchy Technology, Inclusion, Coherence
and Locality, Memory Capacity Planning. Virtual Memory Models, TLB, Paging and Segmentation,
Memory Replacement Policies.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 4 of 43
Unit 3: Pipelining and Superscalar Techniques (7)
Linear Pipeline Processors: Asynchronous and Synchronous Models, Clocking and Timing Control,
Speedup, Efficiency and Throughput. Nonlinear Pipeline Processor: Reservation and Latency Analysis,
Collision-Free Scheduling, Pipeline Schedule Optimization. Superscalar and Super pipeline Design:
Superscalar Pipeline Design, Super pipelined Design, Super symmetry and Design Tradeoffs
SECTION II
Unit 4: Multiprocessors and Multicomputers (8)
Multiprocessor System Interconnects: Hierarchical bus systems, Crossbar switch and Multiport memory,
Multistage and Combining Networks. Cache Coherence and Synchronization Mechanisms: The cache
coherence problem, Snoopy bus protocol, Directory based protocols, Hardware synchronization
mechanisms. Three generation of computers: Design choices in the past, present and future development
Unit 5: Introduction to Data Parallel Architecture and SIMD Architecture (7)
Introduction, Connectivity: Near neighbors, Tree and graphs, The pyramid, The hypercube,
Reconfigurable networks. SIMD Architectures: Introduction, Design Space, Fine grained SIMD
architectures (Overview, Massively Parallel Processor, Programming and applications), Coarse grained
SIMD architecture(Overview,CM5,Programming and applications)
Unit 6: Parallel Models, Languages and Compilers (7)
Parallel Programming Models: Shared variable model, Message passing model, Data Parallel Model,
Object Oriented Model, Functional and Logic Models. Parallel Languages and Compilers:
Language Features for parallelism, Parallel Language Constructs, Optimizing Compilers for Parallelism.
Internal Continuous Assessment (ICA): In tutorial sessions, students of different batches should be
assigned exercise problems and should be guided for the solution.
ICA shall consist of minimum ten assignments from the below list.
1. Explain the architectural evolution from sequential scalar computers to vector processors and
parallel computers.
2. Explain Flynn’s classification of computer architecture and Bell’s taxonomy of MIMD computers.
3. Differentiate between CISC and RISC Scalar Processors.
4. Explain the following Page Replacement Policies:
Least recently used (LRU), Optimal (OPT), First-in-first-out(FIFO), Least frequently
used(LFU), Circular FIFO, Random replacement
5. Consider the following reservation table for a four stage pipeline with a clock cycle τ =20ns

1 2 3 4 5 6
S1 X X
S2 X X
S3 X
S4 X X
(a) What are the forbidden latencies and the initial collision vector ?
(b) Draw the state transition diagram for scheduling the pipeline.
(c) Determine the MAL associated with the shortest greedy cycle.
(d) Determine the pipeline throughput corresponding to the MAL and given τ.
(e) Determine the lower bound on the MAL for this pipeline. Have you obtained the optimal latency
from the above state diagram?

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 5 of 43
6. Consider the five stage pipelined processor specified by the following reservation table:

1 2 3 4 5 6
S1 X X
S2 X X
S3 X
S4 X
S5 X X

(a) List the set of forbidden latencies and collision vector.


(b) Draw the state transition diagram showing all possible initial sequences (cycles) without causing
a collision in the pipeline.
(c) List all the simple cycles from the state diagram.
(d) Identify the greedy cycles among the simple cycles.
(e) What is the minimum average latency (MAL) of this pipeline?

7. Explain broadcast capability of an Omega network built with 4x4 switches.


8. Explain the following terms:
Network stages, Blocking versus Non blocking Networks, Crossbar Network, Cross point Switch
Design, Crossbar limitations and Multiport Memory.
9. With neat diagram explain the different connectivity between the processing elements.
10. With neat diagram explain the Massively Parallel Processor (MPP) processing element and CM5
processing element.
11. With neat diagram explain the two basic mechanisms for inter process communication (IPC)
12. Explain the following three major phases of parallelizing compiler.
Flow analysis, Optimizations and Code generation.

Text Books
1. Advanced Computer Architecture - Parallelism, Scalability, Programmability-Kai Hwang-Tata
McGraw Hill (Unit 1,2,3,4,6)
2. Advanced Computer Architectures-A design Space Approach-Dezso Sima,Terence Fountain, Peter
Karsuk - PEARSON (Unit 5)

Reference Books
1. Computer Architecture and Parallel Processing, Hwang Briggs, McGraw-Hill
2. Computer Architecture - A Quantitative Approach, John L. Hennessy and David A.Patterson,
Elsevier

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 6 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEEING)


SEMESTER - I
CS 412 : DISTRIBUTED SYSTEMS

Teaching Scheme Examination Scheme


Lectures : 3 Hours /Week, 3 Credits ESE – 70 Marks
Practical – 2 Hours/week, 1 Credits ISE – 30 Marks
ICA - 25 Marks
-----------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES :
1. Provide the fundamental concepts of Distributed operating systems, its design issues and challenges
in modes of communication of distributed systems and their implementation.
2. Expose students to current technology for enhancement of distributed computing infrastructures with
various computing principles and paradigms.
3. Provide experience in analyzing a distributed computing model and implementing typical algorithms
related to Synchronization, deadlock detection and avoidance used in distributed systems.
4. Enhance students’ understanding of key issues related to principles of Distributed file systems and
provides case study of stand-alone general purpose distributed file system of Hadoop.
-----------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME :
At the end of the course, student will be able to
1. Describe the basics of distributed systems and middleware.
2. Design and simulate distributed system software modules using various methods, strategies, and
techniques presented in the course that fulfils requirements for desired properties.
3. Apply principles of distributed systems in a real world setting across multidisciplinary areas.
4. Apply knowledge of Hadoop Distributed File system, its architecture and working for active research
at the forefront of these areas.
-----------------------------------------------------------------------------------------------------------------------
SECTION – I
Unit 1 : Fundamentals (4)
Fundamentals of OS, What is Distributed System? Evolution of Distributed Computing System,
Distributed Computing System Models , Distributed Computing Gaining Popularity, Issues in Designing
Distributed System, Introduction to Distributed Computing Environment, Protocols for Distributed
Systems – FLIP and VMTP
Unit 2: Message Passing (6)
Introduction, Desirable features of Good Message-Passing System, Issues in IPC by Message Passing,
Synchronization, Buffering, Multidatagram Messages, Encoding and Decoding of Message Data, Process
Addressing, Failure Handling, Group communication, Case Study: RMI, CORBA
Unit 3 : Remote Procedure Calls (6)
Introduction, The RPC Model, Transparency of RPC, Implementing RPC mechanism, Stub Generation,
RPC Messages, Marshalling Arguments and Results, Server Management, Parameter-Passing Semantics,
Call Semantics, Communication Protocols for RPCs, Client-Server Binding, Exception Handling,
Security

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 7 of 43
Unit 4 : Synchronization in Distributed Systems (6)
Introduction, Process Migration, Threads, Clock Synchronization, Event Ordering, Mutual Exclusion,
Deadlock, Election Algorithms, Issues in Designing Distributed System and role of middleware in
Distributed System
SECTION – II
Unit 5 : Distributed Mutual Exclusion (5)
Introduction, Classification of Mutual Exclusion Algorithms, Preliminaries, A simple solution to
Distributed Mutual Exclusion, Non-Token-Based Algorithms, Lamport’s Algorithm, The Ricart-
Agrawala Algorithm, Token-Based Algorithms, Suzuki-Kasami’s Broadcast Algorithms

Unit 6 : Distributed Deadlock Detection (5)


Introduction, Preliminaries, Deadlock handling strategies in Distributed Systems, Issues in Deadlock
Detection and Resolution, Control organizations for distributed deadlock detection, Centralized deadlock
detection algorithms, Distributed deadlock detection algorithms, Avoidance and Prevention algorithms,
Hierarchical deadlock detection algorithms

Unit 7 : Distributed File Systems (6)


Distributed Resource Management, Concepts of File System, Distributed File Systems - Introduction,
Architecture, Mechanisms for building Distributed File System, Design issues, Log-Structured file
systems, Case studies - Google FS

Unit 8 : Distributed Shared Memory (6)


Introduction, Architecture and Motivation, Algorithms for implementing DSM, Memory
Coherence, Coherence Protocols, Design issues, Case studies-Linda

Internal Continuous Assessment (ICA) :


Minimum 10 assignments on above topics which will ensure assessment of Course outcomes listed.

Text books:
1. Distributed O.S Concepts and Design , P.K.Sinha, PHI ( Unit 1,2,3,4 )
2. Advanced concepts in Operating Systems , Mukesh Singhal & N.G.Shivaratri, TMH
( Unit 5,6,7,8 )
3. Distributed Computing , Sunita Mahajan, Seema Shah, OXFORD University Press
( Unit 1, Case studies 7,8 )

Reference Books:
1. Distributed System Principles and Paradigms , Andrew S. Tanenbaum, 2nd edition, PHI
2. Distributed Systems , Colouris, 3rd Edition

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 8 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEEING)


SEMESTER - I
CS 413 : MODERN DATABASE SYSTEMS
Teaching Scheme Examination Scheme
Lectures– 4 Hours/week, 4 Credits ESE – 70 Marks
Practical – 2 Hour/week, 1 Credit ISE – 30 Marks
ICA - 25 Marks
POE – 50 marks
-----------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES:
1) Introduce different databases like distributed, parallel & object oriented databases.
2) Acquaint with Query processing and its phases including query optimization.
3) Illustrate data mining & warehousing with OLAP implementations.
4) Demonstrate Bigdata with Hadoop & its components.
-----------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME:
At the end of the course, student will be able to
1) Differentiate between Distributed & Parallel databases.
2) Implement object oriented databases, mining concepts.
3) Implement different query processing algorithms.
4) Tabulate SQL, NoSQL & New SQL with its applications.
5) Articulate technologies like Hadoop, MongoDB, Cassandra, Pig , Hive
-----------------------------------------------------------------------------------------------------------------------
SECTION-I
Unit 1 : Database System architectures (8)
Centralized & C/S architectures, Server systems, Distributed systems, Distributed databases –
homogeneous & heterogeneous databases, Distributed data storage, Distributed transactions, Commit
protocols, Concurrency control in distributed databases, Availability, Distributed query processing,
Heterogeneous distributed databases

Unit 2 : Parallel Databases (7)


Introduction, I/O parallelism, Inter-query parallelism, Intra-query parallelism, Intra-operation
parallelism, Inter-operation parallelism

Unit 3 : Data Analysis and Mining (8)


Introduction to decision support, OLAP: Multidimensional Data Model, Multidimensional Aggregation
Queries, Window Queries in SQL: 1999, Implementation Techniques for OLAP, Data Warehousing,
Introduction to data mining, The knowledge Discovery Process, Counting co-occurrences, Mining for
rules, Clustering, Similarity search over sequences

SECTION-II
Unit 4 : Object Based Databases (6)
Overview, Complex Data Types, Structured Types and Inheritance in SQL, Table Inheritance, Array and
Multisets Types in SQL, Object Identity and Reference Types in SQL, Object Oriented DBMS versus
Object Relational DBMS

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 9 of 43
Unit 5 : Query Processing & Optimization (6)
Overview of query processing, Measure of query cost, Selection Operation, Sorting, Join Operation,
Other Operation, Evaluation of Expression, Overview of optimization, Transformation of Relational
Expressions, Estimating Statistics of Expression Results, Choice of Evaluation plans

Unit 6 : BIG data and HADOOP & No SQL (8)


Big data, characteristics of Big data, introduction to HADOOP, High level architecture of HADOOP,
HDFS file system architecture, special feature of HADOOP, working with HAD OOP commands,
working of MAP reduce with an example. Getting started with NoSQL, Key value stores, Document
databases, New SQL, Postgre SQL

Internal Continuous Assessment (ICA) :


Practical Assignments (minimum 10 to be implemented):
1. Implement 2 PC protocol.
2. Implement join operation on n relations using parallelism approach.
3. Implement the Round Robin partitioning for parallel database environment.
4. Implement the Hash partitioning for parallel database environment.
5. Implement the Range partitioning for parallel database environment.
6. Implement Interquery parallelism in parallel databases.
7. Implementation of intraquery parallelism using multithreading
8. Implement Range partitioning Sort algorithm using intraquery parallelism through
interoperation
9. Implementation of Asymmetric frag ment & replicate join
10. Write a program to join r1 r2 r3 r4 using Independent Parallelism for Inter-
operation parallelism.
11. Implement OLAP queries.
12. Implement algorithm for finding Frequent Itemsets for a given minimum support.
13. Implement algorithm for finding association rules for given minimum support and
confidence.
14. Implement queries in SQL: 1999 that work on Complex Data types, Arrray and Multisets.
15. Implement queries for type inheritance and table inheritance.

Text Book :
1) Data base System Concepts sixth Edition, by Abra ham Silberschatz, Hen ry F. Korth, S.
Sudarshan, Sixth Edition, M cGraw Hill Publication.
2) Data base Management Systems Third Edition, by Raghu Ramakrishan and Johannes Gehrke,
McGrawhill Education
3) Mon goDB, The Definitive Guide, Kristina Cho dorow, Oreilly, Shroff Publishers and Distributors
Pvt. Ltd., ISBN : 978-93-5110-269-4

Refernce Books:

1. Hadoop in Action, Chuck Lam, Dreamtech Press, ISBN : 97 8-81-7722-813-7.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 10 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - II
CS414 A: ELECTIVE – I : Internet of Things

Teaching Scheme Examination Scheme


Lectures : 3 Hours /week, 3 credits ESE : 70 Marks
ISE : 30 Marks
-------------------------------------------------------------------------------------------------------------------------
PREREQUISITES :
1. Fundamentals of Communication and computer network
2. Micro controller, Network Security and Web programming
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES:
1) To acquaint with Internet of Things.
2) To identify the Architecture and various elements of an IoT System
3) To understand the IoT standards and connectivity protocols
4) To make students aware of security concerns and challenges while implementing IoT solutions
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME:
At the end of this course, students will be able to
1) Explain what Internet of Things is
2) Describe components of IoT Architecture and platforms of IoT ecosystem
3) Describe and choose Sensors and Actuators
-------------------------------------------------------------------------------------------------------------------------
SECTION – I

Unit 1: Introduction to IoT (6)


Definition, Applications and characteristics of IoT, Physical Design of IoT, Logical Design of IoT, IoT
Enabling Technologies, IoT Levels

Unit 2: IoT Architecture and Communication Technologies (7)


IoT Architecture by Oracle, Sources of IoT, M2M Communication, IoT/M2M systems, layers and design
standards, Communication Technologies

Unit 3: Elements of IoT (8)


Sensor Technology, Participatory Sensing – Industrial IoT and Automotive IoT, Actuator, Sensor Data
Communication Protocols, RFID, WSN Technology

SECTION – II

Unit 4: IoT Standards and Connectivity (8)


Constrained Application Protocols (CoAP), Representational State Transfer (REST), Zigbee / IEEE
802.15.4, Bluetooth and its low energy profile, IEEE 802.15 WPAN, 6LoWPAN

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 11 of 43
Unit 5: IoT Security and Business model (7)
Introduction to IoT Privacy, Security and Vulnerabilities, Use case and Misuse cases, IoT Security
Tomography and Layered attacker model, Business model and business model innovation for IoT, Value
Creation in the IoT, Business model scenarios for IoT

Unit 6: Case Studies (6)


Domain Specific IoTs: Home Automation, Smart Cities, Environments, Energy, Agriculture, Industry,
Health and Lifestyle

Text Book :
1. Internet of Things: A Hands-on approach, Arshdeep Bahga, Vijay Madisetti, Universities Press (Unit
1 and 6)
2. IoT Architecture and Design Principles, Raj Kamal, McGraw Hill Education (Unit 2, 3 & 5)
3. Building the IoT with IPv6 and MIPv6, Daniel Minoli, Wiley Publication ( Unit 4)

Reference Books:
1. The Internet of Things: Applications and Protocols, Wiley publications. Author(s): Oliver Hersent,
David Boswarthick, Omar Elloumi

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 12 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER I
CS 414 B : Elective-I : Wireless Ad-hoc Network
Teaching Scheme Examination Scheme
Lectures– 3 Hours/week, 3 Credits ESE – 70 Marks
ISE – 30 Marks
-------------------------------------------------------------------------------------------------------------------------
Introduction:
This course introduces Fundamentals and basic knowledge of Wireless networks. It also covers the details
MAC protocol, Routing protocol, Multicast routing, TLP, QOS, Energy management of ad-hoc network.
-------------------------------------------------------------------------------------------------------------------------
COURSE PREREQUISITE: Students should have knowledge of Data Communication and Computer
Network
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES:
1. To introduce fundamentals of wireless ad-hoc networks.
2. To learn design constraints of MAC and routing protocol for wireless ad-hoc networks.
3. To learn security challenges at transport layer of wireless ad-hoc networks.
4. To learn Quality and energy management parameters in wireless ad-hoc networks.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME :
At the end of this course, students will be able to
1. Explain the concept of ad-hoc and sensor networks, their applications and typical node and network
architectures.
2. Explain routing protocol design issues (especially energy-efficiency) and protocol designs for
wireless ad-hoc networks
3. Identify the issues in designing Security Protocols for Ad-hoc networks focusing on the working
performance of various security protocols.
4. Differentiate protocol designs in terms of their energy-efficiency and Quality of service.
-------------------------------------------------------------------------------------------------------------------------
SECTION-I
Unit 1: Introduction (6)
Fundamentals of wireless technology, Electromagnetic spectrum, Radio propagation Mechanisms,
Characteristics of the Wireless Channel, Applications, and Issues in Ad hoc wireless networks. Cellular
an Ad Hoc wireless networks

Unit 2 : MAC for wireless ad-hoc network (6)


Introduction, Issues in designing MAC protocol, Design goals of MAC protocol, Classification of MAC
protocols, Contention based protocols.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 13 of 43
Unit 3 : Routing protocols (6)
Introduction, Issues in designing a routing protocol for ad hoc wireless networks, Classification of routing
protocols,
• Table driven protocols :- Destination Sequenced Distance Vector (DSDV) , Wireless Routing
Protocol (WRP)
• On-demand routing protocol :- Dynamic Source Routing (DSR),Ad Hoc On-Demand Distance
Vector Routing (AODV),
• Hybrid routing protocol :-Zone Routing Protocol (ZRP)
SECTION-II
Unit 4 : Multicast Routing in Ad hoc wireless networks (5)
Introduction, Issues in designing a multicast routing protocol, Operation of multicast routing protocols,
An architecture reference model for multicast routing protocols, Classification of multicast routing
protocols, Tree-based, Mesh-based multicast routing protocols.

Unit 5 : Transport Layer and Security Protocols (7)


Introduction, Issues in Designing a Transport Layer Protocol for Ad Hoc Wireless Networks, Design Goals
of a Transport Layer Protocol for Ad Hoc Wireless Networks,. Classification of Transport Layer Solutions,
TCP Over Ad Hoc Wireless Networks, Security in Ad Hoc Wireless Networks, Network Security
Requirements, Issues and challenges in Security Provisioning, Network Security Attacks, Key
Management, Secure Routing in Ad Hoc Wireless Networks.

Unit 6 : Quality of service and Energy management (6)


Introduction, Issues and challenges, Classification of QoS solutions, MAC layer solutions, Network layer
solutions, QoS framework. Introduction, Need, Classification of energy management schemes,
Battery Management, Transmission Power Management, System Power Management schemes.

Text Books:
1. C. Siva Ram Murthy and B.S. Manoj ―Ad Hoc Wireless Networks: Architectures and Protocolsǁ,
Prentice Hall PTR,2004

Reference Books:
1. AdHoc Networking by Charles E. Perkins (Pearson Education)
2. Ad Hoc Wireless Networks – A communication Theoretic perspective by O.K.Tonguz &
G.Ferrari, Wiley India.
3. Ad Hoc Mobile Wireless Networks – Protocols and Systems by C. K. Toh (Pearson Education)
4. AIntroduction to Wireless and Mobile Systems, 2nd Edition, by Dharma Prakash Agrawal &
Qing-An Zeng (CENGAGE Learning)

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 14 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - I
CS 414 C : ELECTIVE – I : ARTIFICIAL INTELLIGENCE

Teaching Scheme Examination Scheme


Lectures : 3 Hours /week, 3 credits ESE : 70 Marks
ISE : 30 Marks
-------------------------------------------------------------------------------------------------------------------------
Introduction: This course presents a basic introduction to the techniques used in developing Artificial
Intelligent systems. It is a walkthrough to problem spaces and search algorithms, Knowledge
representation, reasoning, logic programming and applications of Artificial Intelligence
-------------------------------------------------------------------------------------------------------------------------
Course Prerequisite: Student shall have some exposure to algorithms and programming
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES :
1. To introduce students to identify artificial intelligent systems.
2. To enable students to analyze search algorithms for solving problems that is candidates for AI
techniques.
3. To enable students to represent real world problems using various Knowledge representation methods
4. To enable students to use techniques to reason under uncertainty and having statistical data.
5. To enable students to use AI techniques to develop applications like games, plans and expert systems.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOMES:
At the end of this course, students will be able to
1. Demonstrate the knowledge about Artificial Intelligence systems.
2. Solve real world problems using appropriate searching algorithms.
3. To represent problems using an appropriate knowledge representation method.
4. Reason under uncertainty.
5. To develop applications that is candidates for AI.
-------------------------------------------------------------------------------------------------------------------------
SECTION- I
Unit 1: Introduction to Artificial Intelligence (6)
Definition of AI, The AI problems, the understanding Assumption, AI Technique, the level of the model,
criteria for success.

Unit 2: Problem spaces and Search (10)


Definition of a problem as a state space search, Problem characteristics, Issues in the design of search
programs State Space Search: Depth First Search, Breadth First Search, DFID. Heuristic Search: Best
First Search, Hill Climbing, Beam Search, Tabu Search.
Randomized Search: Simulated Annealing, Genetic Algorithms, Ant Colony Optimization.
Finding Optimal Paths: Branch and Bound, A*, IDA*, Divide and Conquer approaches, Beam Stack
search

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 15 of 43
Unit 3: Knowledge Representation (6)
Representation and Mappings, Approaches to Knowledge representation, Issues in knowledge
representation, The frame problem. Representing simple facts in predicate logic, Representing instances
and Isa Relationships, computable functions & Predicates, Resolution, Natural deduction, Procedural
versus declarative knowledge, logic programming, Forward versus backward reasoning, matching,
control knowledge.
SECTION-II
Unit 4: Symbolic Reasoning under uncertainty and Statistical Reasoning (8)
Introduction to non monotonic reasoning, logic for non monotonic reasoning, implementation issues,
probability and Baye’s Theorem in certainty factor and Rule – Based systems, Bayesian Networks,
Demster Shafer Theory, Fuzzy logic.

Unit 5: Logic Programming with Prolog (8)


Backward Chaining, Logic Programming, Prolog, Search in Prolog, Controlling Search, The Cut
Operator in Prolog.

Unit 6: Applications of AI (7)


Planning and Constraint Satisfaction: Domains, Forward and Backward Search, Goal Stack Planning,
Plan Space Planning, Graph plan, Constraint Propagation.
Natural Language Understanding: Natural Language Semantics, CD Theory, English to CD Theory
Game Playing: Min-max Algorithm, Alpha-Beta Algorithm, SSS*.
Expert System: Introduction, Rule Based System Architectures, Knowledge Acquisition and validation,
Knowledge system building tools.

Text Books:
1. Deepak Khemani. A First Course in Artificial Intelligence, McGraw Hill Education (India), 2013.
2. Artificial Intelligence - Elaine Rich, Kevin Knight, Shivashankar B. Nair (Third Edition), Tata
McGraw Hill, 2009.

Reference Books:
1. Stefan Edelkamp and Stefan Schroedl. Heuristic Search: Theory and Applications, Morgan
Kaufmann, 2011.
2. John Haugeland, Artificial Intelligence: The Very Idea, A Bradford Book, The MIT Press, 1985.
3. Pamela McCorduck, Machines Who Think: A Personal Inquiry into the History and Prospects of
Artificial Intelligence, A K Peters/CRC Press; 2 edition, 2004.
4. Zbigniew Michalewicz and David B. Fogel. How to Solve It: Modern Heuristics. Springer; 2nd
edition, 2004.
5. Judea Pearl. Heuristics: Intelligent Search Strategies for Computer Problem Solving, Addison-
Wesley, 1984.
6. Elaine Rich and Kevin Knight. Artificial Intelligence, Tata McGraw Hill, 1991.
7. Stuart Russell and Peter Norvig. Artificial Intelligence: A Modern Approach, 3rd Edition,Prentice
Hall, 2009.
8. Eugene Charniak, Drew McDermott. Introduction to Artificial Intelligence, Addison-Wesley, 1985.
9. Patrick Henry Winston. Artificial Intelligence, Addison-Wesley, 1992.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 16 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - I
CS 415 A : ELECTIVE – II : BUSINESS INTELLIGENCE
Teaching Scheme Examination Scheme
Lectures : 3 Hours /week, 3 credits ESE : 70 Marks
Tutorial : 1 Hour/Week, 1 credit ISE : 30 Marks
ICA : 25 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVE:
1. To acquaint the students with advanced database techniques.
2. To develop skills to build business intelligence using data mining
3. To optimize decision making in business.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME:
At the end of the course, student will be able to
1. Demonstrate concepts of business intelligence and data mining.
2. Apply theoretical and practical skills to address different data types.
3. Apply data mining techniques in business context.
4. Design a data model and use relevant techniques for data analysis.
5. Implement conventional data mining software, and evaluate its strength and limitations.
----------------------------------------------------------------------------------------------------------
SECTION – I
Unit 1 : Introduction to Business Intelligence: (08)
Effective and timely decisions, role of mathematical models, BI architectures, ethics on BI. Introduction
to data warehouse, architecture, OLAP

Unit 2 : Decision Support System: (07)


Representation of decision making system, evolution of information system, definition and development
of decision support system, mathematical models for decision making,

Unit 3 : Analysis of Data Mining: (10)


Definition and applications of data mining, data mining process, analysis methodologies, data
preparation, data validation, data transformation, data reduction, data exploration, Univariate analysis,
Bivariate analysis, Multivariate analysis.

SECTION – II
Unit 4 : Machine learning and Data analysis (06)
Regression, simple and multiple regression, validation of regression models, time series, evaluating and
analysis of time series, exponential smoothing models, autoregressive models

Unit 5 : Data mining Techniques for BI: (10)


Classification and its problems, evaluating classification models, classification trees, Bayesian methods,
neural networks, structure of association rules, Apriori algorithm, general association rules, clustering
methods, partition methods and hierarchical methods

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 17 of 43
Unit 6 : Business Intelligence Applications: (10)
Marketing models: Relational marketing, Salesforce management, Business case studies, supply chain
optimization, optimization models for logistics planning, revenue management system, Logistics
business case studies
Text Book:
1. Business Intelligence Data mining and optimization for Decision making by Carlo Vercellis,
ISBN:978-81-265-4188-1, Wiley Publication
2. Data Mining and Business Intelligence by S.K. Shinde and Uddagiri Chandrashekhar

Reference Books:
1. Data Warehousing in the Real World – Anahory & Murray, Pearson Edt.
2. Data Warehousing Fundamentals – Ponniah [Wiley Publication]

Term work assessment shall be a continuous process based on student’s performance in – class tests,
assignments, homework, subject seminars, quizzes, laboratory books and their interaction during
theory

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 18 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - I
CS 415 B : ELECTIVE – II : DATA MINING

Teaching Scheme Examination Scheme


Lectures : 3 Hours /week, 3 credits ESE : 70 Marks
Tutorial : 1 Hour/Week, 1 credit ISE : 30 Marks
ICA : 25 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES:
1. To acquire the basic concepts and techniques of Data Mining
2. To Understand the usage of Data Mining
3. To Learn Different data Pre processing techniques.
4. To Learn and Analyze different data mining algorithms.
5. To apply the data mining algorithms for problem solving.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOMES:
At the end of this course, students will be able to
1. Examine the types of the data to be mined for a particular application.
2. Apply preprocessing statistical methods for any given raw data.
3. Select and apply proper data mining algorithms to build analytical applications
4. Comprehend the roles that data mining plays in various fields and manipulate different data
mining techniques.
5. Demonstrate and apply a wide range of Clustering, Classification and association rule mining
algorithms
-------------------------------------------------------------------------------------------------------------------------
SECTION- I
UNIT 1: Introduction (4)
Why data Mining, What is Data Mining?, Basic data mining tasks,What kind of Data can be mined, What
kinds of Patterns can be mined?, technological support for data mining, target applications of data mining,
major issues in data mining, KDD process ,Data mining Vs Knowledge Discovery in Databases.

UNIT 2: Data Preprocessing (4)


Need to Preprocess the data, major tasks in Data Preprocessing, Data Cleaning , Data integration, Data
Reduction, Data Transformation and Data Dicretization.

UNIT 3: Classification (8)


Issues in Classification, Statistical-Based Algorithms: Regression, Bayesian Classifiers. Distance Based
Algorithms: K -Nearest Neighbors Classifiers, Decision Tree Based Algorithms, Neural Network-Based
Algorithms, Rule Based Algorithms.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 19 of 43
SECTION II

UNIT 4: Cluster Analysis- Basic Concept and Methods (8)


Cluster Analysis : What is Cluster Analysis?, Requirements for Cluster Analysis, Overview of Basic
Clustering Methods,
Partitioning Methods: k-Means: A Centroid-Based Technique, k-Medoids: A Presentative Object-
Based Technique,
Hierarchical Methods : Agglomerative Algorithms and Divisive Clustering, BIRCH: Multiphase
Herarchical Clustering Using Clustering Feature Trees, Evaluation of Clustering.

UNIT 5: Association Rules (8)


Introduction, Large Item sets, Basic Algorithms: Apriori Algorithm, Sampling Algorithm, Partitioning
Algorithm, Parallel and Distributed Algorithms, Comparing Approaches, Incremental Rules, Advanced
association rule-Techniques, Measuring the quality of rules.

UNIT 6: Web Mining (4)


Introduction, Web Content Mining: Crawlers, Harvest System, Virtual Web View, personalization.
Web Structure Mining: PageRank, Clever. Web Usage Mining: Preprocessing, Data Structures, Pattern
Discovery Pattern Analysis.

Internal Continuous Assessment (ICA) :


Minimum 8 to 10 assignment based on above topics.

Text Books:
1. Margaret H. Dunham, “DATA MINING Introductory and Advanced Topics”, PEARSON (Units
3,5,6)
2. Han, Kamber, Pei, “DATA MINING Concept and Techniques”, 3rd Edition, ELSEVIER
(Units 1,2,4)
3. Tan, Vipin Kumar, Steinbach , “Introduction to Data Mining” , PEARSON (Unit 3)

Reference Books:
1. Galit Shmueli, Nitin Patel, Peter Bruce, “Data mining For Business intelligence” Wiley Student
Edition.
2. M.Berry and G. Linoff, “Mastering Data Mining”, Wiley Student Edition

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 20 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - I
CS 415 C : ELECTIVE – II : OBJECT ORIENTED MODELING & DESIGN

Teaching Scheme Examination Scheme


Lectures - 3 Hours/Week, 3 Credits ESE -70 Marks
Tutorial - 1 Hours/Week, 1 Credit ISE - 30 Marks
ICA- 25 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVE :
1. Model and design real world problems.
2. Analyze the risk factor for software development project.
3. Develop the skills to determine which process of object oriented Analysis and design technique
should be applied to a given project.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME:
At the end of this course, students will be able to
1. List the objects of Unified Modeling Language for a given problem statement.
2. Explain the working understanding of the object oriented analysis and design.
3. Apply the knowledge of object oriented modeling and design to the given software development
project.
4. Devise the real world problem using object oriented modeling technique.
-------------------------------------------------------------------------------------------------------------------------
SECTION-I
Unit 1 : Introduction (4)
Object Oriented development and themes, evidence for usefulness, modeling as a Design Technique.

Unit 2 : Object Modeling (6)


Objects, classes, links and associations, generalization and inheritance, grouping constructs, aggregation,
abstract classes, generalization as extension and restriction, multiple inheritance, metadata, candidate
keys and inheritance.

Unit 3 : Dynamic and Functional Modeling (6)


Events, states, operations, concurrency, nested state diagrams, advanced dynamic modeling concepts,
relation of object and dynamic models, DFD, relation of functional to object and dynamic models

Unit 4 : Methodology preview and Analysis (4)


OMT as a Software Engineering Methodology, The OMT Methodology, Impact of an Object-Oriented
Approach, Overview of Analysis, Problem Statement, Automated Teller Machine Example, Object
Modeling, Dynamic Modeling, Functional Modeling, Adding Operations, Iterating the Analysis

SECTION-II
Unit 5 : Behavioral Modeling using UML (6)
Interactions, Use cases, Use case diagram, Interaction Diagrams and Activity diagrams, Events and
signals, State Machines, Processes and Threads, Time and space, State chart diagrams.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 21 of 43
Unit 6 : Architectural Modeling using UML (6)
Components, Deployment, Collaboration, Patterns and Frame works, Component diagrams and
Deployment Diagrams
Unit 7 : Implementation of OMT (6)
Use of programming language and database system, Object oriented style, feature of object oriented
languages, Applications of OMT like object diagram compiler, Computer animation, Case study of Hotel
management system, course management system
Unit 8 : Design Patterns – 1 (4)
What is a pattern and what makes a pattern? Pattern categories; Relationships between patterns; Pattern
description Communication Patterns: Forwarder-Receiver; Client-Dispatcher-Server;
ICA :
1. Describe object oriented methodology and themes.
2. Prepare a list of objects that you would expect each of the following system to handle also draw the
class and object diagram for the same.
a. Arithmetic expression b. Air transportation system.
3. Dynamic and Functional Modelling
a. Draw the state diagram for telephone answering machine. The machine should answer
after five rings. If the telephone is answered before five rings, the machine should do
nothing.
b. Design functional model for flight simulator.
4. Draw Object Model with attributes and inheritance for Automated Teller Machine (ATM).
5. Draw Use case Diagram for Student Registration System.
6. Draw Sequence and collaboration diagram for buying online product.
7. Draw Deployment diagram for Home Network. (Hint: Modern homes usually have a network of
interconnected devices of different kinds and with various types of connections and communication
protocols. It contains cable modem, wireless router, various computers and devices.)
8. Draw Component diagram for online examination system.
9. What is a Design pattern and what makes a pattern? Describe Pattern categories and Relationships
between patterns.

Textbook:
1. Object oriented Modeling and Design: Rambaugh, Premerlani, Eddy, Lorenson (PHI )
2. The Unified Modeling Language User Guide: Grady Booch, Jeams Rambaugh, Ivar Jacotson
(Addison Wesley)
Reference Books:
1. Brahma Dathan, Sarnath Ramnath: Object-Oriented Analysis, Design, and Implementation,
Universities Press, 2009.
2. Hans-Erik Eriksson, Magnus Penker, Brian Lyons, David Fado: UML 2 Toolkit, Wiley-Dreamtech
India, 2004
3. Simon Bennett, Steve McRobb and Ray Farmer: Object-Oriented Systems Analysis and Design
Using UML, 2nd Edition, Tata McGraw-Hill, 200
4. Frank Buschmann, Regine Meunier, Hans Rohnert, Peter Sommerlad, Michael Stal:Pattern-Oriented
Software Architecture, A System of Patterns, Volume 1, John Wiley and Sons, 2007.
5. Object Oriented Analysis and design using UML, D. Jeya Mala, S. Geetha, McGraw Hill Publication,
ISBN : 978-1-25-900674-6

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 22 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


Semester I
CS 416 : PROGRAMMING WITH PYTHON
Teaching Scheme Examination Scheme
Lectures: 2 Hours/Week, 2 Credit POE : 50 Marks
Practical : 2 Hours/Week, 1 Credit ICA : 25 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES :
1. Introduce procedural and object-oriented style for writing Python scripts.
2. Introduce standard library packages and modules in Python.
3. To teach debugging and profiling of Python scripts.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME:
At the end of this course, students will be able to
1. Use Python standard library modules in writing Python scripts for problem solving.
2. Write Python scripts in procedural and object-oriented style.
3. Write Python scripts to perform database, network and web related operations.
4. Debug and profile Python scripts.
-------------------------------------------------------------------------------------------------------------------------
SECTION - I
Unit 1 : Introduction to Python (03)
Introducing the Python Interpreter, Program Execution, Execution Model Variations, The
Interactive Prompt, System Command Lines and Files. Syntactic and semantic differences between
Python 2.x and Python 3.x.

Unit 2 : Introduction to procedural programming in Python (04)


Data types, Collection data types, Control structures and functions, Exception Handling, Custom
Functions

Unit 3 : Modules and packages (06)


String handling, command line programming, time and dates, JSON handling, File and directory
handling, Create, read, write delete, and rename files, Traverse directories, Concurrent Execution,
Internationalization, PyPI: Python Package
Index, pypi.python.org/pypi, Using pip to install python packages from PyPI

SECTION - II
Unit 4 : Object oriented programming (04)
Classes, Instance Objects, Method Objects, Class and Instance Variables, Attributes and methods,
Inheritance and polymorphism

Unit 5 : Database connectivity in Python (04)


DBM databases, Executing Queries, SQL databases

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 23 of 43
Unit 6 : Network and Web Programming (04)
Networking and Interprocess Communication, Interacting with HTTP services as a client, Creating TCP,
UDP Server, Creating Simple REST based interface, Authenticating Clients, Understanding Event-
Driven I/O.

Unit 7: Testing, Debugging and exceptions (05)


Testing output, Unit tests in Python, Handling Multiple exceptions, creating custom exceptions,
Debugging programs, Unit testing and profiling

ISE Evaluation :
ISE Evaluation for the course will consists of three programming tests based on above topics.

ICA :
Minimum 20 assignments based on above topics.
• Students should undertake minimum of 20 practical assignments based on each above topic.
• The assignments should test and develop student’s practical proficiency and ability to use Python
standard library modules and packages efficiently in writing effective code for varied applications
scenarios & requirements, use cases.
• Use of IDEs like PyCharm, Eclipse with PyDev, Jupyter Notebook for Interactive development
and debugging of Python applications is highly recommend to enhance hands on skills in Python
Programming of Students.
• Every assignment shall be performed under Python 2.x or 3.x runtime environment configured
using any of the following tools 1) pyenv 2) virtualenv 3) Anaconda

Text Book:
1. e-Resource : Python 2.7.16 documentation https://docs.python.org/2/
2. e-Resource : Python 3.7.3 documentation https://docs.python.org/3/
3. Programming in Python 3, Second Edition, Mark Summerfield

Reference Books:
1. Python Cookbook, Third Edition, David Beazley and Brian K. Jones, Shroff Publishers &
Distributors Pvt. Ltd., ISBN : 978-93-5110-140-6
2. Learning Python FIFTH EDITION Mark Lutz
3. Programming Python (English) 4Th Edition Mark Lutz
4. Testing Python, David Sale, Wiley India (P) Ltd., ISBN : 978-81-265-5277-1

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 24 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


Semester II
CS 421 - MANAGEMENT INFORMATION SYSTEMS
Teaching Scheme Examination Scheme
Lectures: 3 Hours/Week ESE : 70 Marks
Tutorial : 1 Hour/Week ISE: 30 Marks
ICA : 25 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES:
1. To understand basic infrastructure and strategy for information systems.
2. To make student learn professional ethical codes of conduct as appropriate to industry and
organizational environments
3. To introduce the Communication Technology required for IT
4. To make student learn to develop secure information system.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME:
At the end of this course, students will be able to
1. Elaborate basic infrastructure and strategies used in information systems.
2. Apply professional ethical codes of conduct as appropriate to industry and organizational
environments
3. Design information systems using principles of Communication Technologies
4. Develop secure information systems.
-------------------------------------------------------------------------------------------------------------------------
SECTION-I

Unit 1: Information Systems in Global Business Today (08)


The Role of Information Systems in Business Today, How information systems are transforming
business, What is new in information system. Business Processes and Information systems, Systems for
collaboration and social business, Tools and technologies for collaboration and social business

Unit 2:Information Systems, Organizations, and Strategy (06)


Organizations and it’s features, How Information Systems Impact on Organizations, Competitive
strategies using information systems ,Challenges posed by strategic information systems

Unit 3 : Ethical and Social Issues in Information Systems (06)


Understanding Ethical, Social, political issues raised by information systems, principles for conduct in
ethical decisions, Contemporary information systems technology. Challenges to the protection individual
privacy and intellectual property.

SECTION-II

Unit 4: IT Infrastructure and Emerging Technologies (05)


IT Infrastructure, Infrastructure Components, Contemporary Hardware Platform Trends, Contemporary
Software Platform Trends, Management Issues

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 25 of 43
Unit 5 : Foundations of Business Intelligence: Databases and Information Management (08)
Organizing Data in a Traditional File Environment, Major Capabilities of Database Management
Systems, Using Databases to Improve Business Performance and Decision Making, Managing Data
Resources, Telecommunications, the internet, and Wireless Technology: Principles Components of
Telecommunications Network & Ket Networking Technologies, Different types of networks, principle
technologies and standards for wireless networking, communication , internet access.

Unit 6: Securing Information Systems (06)


System Vulnerability and Abuse, Business Value of Security and Control, Organizational Framework for
Security and Control, Technologies and Tools for safeguarding Information Resources

Unit 7: E-commerce: Digital Markets, Digital Goods (06)


Features of e-commerce. Digital Markets, Digital Goods, principles ecommerce business and revenue
models, e-commerce transformed marketing, e-commerce business-to-business transaction, Role of M-
commerce in business & its applications, issues related building e-commerce.

Internal Continuous Assessment (ICA) :


Teacher should prepare a group of 4-5 students (or based on their project group) assign them any case
study based on the above chapters and tell them to collect and present that case study in the form of
seminar. Evaluation will be done by teacher by considering different factors.
These are few topics for case study, teacher can suggest any other topic for case study
1. IT application in Management: BSNL CDR project (Call-Data-Record)
2. Information System Software: Case study on DSS for ITC, Big Bazaar, Raymond Clothing’s
3. Application of MIS in different Functional Area: AADHAR Based Biometric Attendance System
implemented in all government organizations. www.attendance.gov.in
4. Information system resource management: IRCTC next Generation Ticketing System
5. Ecommerce: A comprehensive case study on FLIPKART, SNAPDEAL, MYNTRA etc
6. ERP: One Case study on each module of ERP
7. Mc Donald’s supply chain management (SCM)
8. Cognizant implementation of People soft (Human Resource Management System)
9. Tata Motors CRM DMS Project (CRM)
10. AICTE, New Delhi (SAP CRM Project)
11. VRL Implementation of SCM (Logistics & Supply Chain Management)

Text Book:
1. Management Information Systems : Managing the Digital Firm, 15th Edition by Kenneth C.Laudon
and Jane Laudon, Pearson Education
2. Management Information Systems: Sashikala Parimi, Kogent Learning Solutions Inc.

Reference Books:
1. Information Technology for Management: Transforming Organizations in the Digital Economy,
Efraim Turban,6th Edition, Wiley Edition
2. Management Information Systems: Shubhalakshmi Joshi, SmitaVaze, Biztantra

Note: Teacher can make a group of 4-5 students (or based on their project group) & assign Case
Study given in the textbook (Sr.No.1) Evaluation will be done by teacher by considering different factors.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 26 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


Semester II
CS 422 – INFORMATION and CYBER SECURITY
Teaching Scheme Examination Scheme
Lectures: 3 Hours/Week, 3 credits ESE : 70 Marks
Practical : 2 Hour/Week, 1 credit ISE: 30 Marks
ICA : 25 Marks
POE : 50 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES:
1. Provide an understanding of principal concepts, major issues, technologies, and basic approaches in
information security.
2. Provide concept-level hands-on experience in specific topic area.
3. Provide the ability to examine and analyze real-life security cases.
----------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME:
At the end of this course, students will be able to
1. Explain different security technology and policies
2. Identify & evaluate Information security threats &vulnerabilities in information system and apply
security measures to real time scenario
3. Demonstrate the use of standards and cyber laws to enhance information security in the development
process and infrastructure protection
4. Demonstrate application of block chain technology
----------------------------------------------------------------------------------------------------------------------
SECTION – I
Unit 1: Symmetric Ciphers (5)
Overview – Services, Mechanism and Attacks, OSI Security Architecture, A model for Network security,
Classical Encryption techniques – Symmetric Cipher model, Substitution. Techniques, Transposition
techniques, Rotor Machines.

Unit 2: Block Cipher and Data Encryption Standard (6)


Simplified DES, Block Cipher principles, The Data Encryption Standard, The strength of DES,
Differential and Linear Cryptanalysis, Block Cipher design principles, Block Cipher Mode of Operation.

Unit 3 : Public Key Cryptography (5)


Public Key Cryptography and RSA – Principles of Public Key Cryptosystems, The RSA Algorithm,
Key management - Other public key cryptosystems – Key Management, Diffie- Hellman Key Exchange.

Unit 4 : Message Authentication and HASH Functions: (5)


Authentication requirements, Authentication Functions, Message Authentication Codes, Hash
Functions, security of Hash Functions and MACS Digital Signatures. Authentication Protocols– Digital
Signatures, Authentication Protocols, Digital Signature Standard.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 27 of 43
SECTION – II

Unit 5: IP Security and E-Mail Security (7)


IP Security Overview, IP Security Architecture, Authentication Header, Encapsulating Security payload,
Combining Security Associations, Key Management, Secure Socket Layer and Transport Layer Security.
Electronic Mail Security – Secure Electronic Transaction, Pretty Good Privacy, S/MIME

Unit 6: Introduction to block chain (7)


Overview of block chain, public ledgers, bit coin, smart contracts, block in a block chain, transactions,
DISTRIBUTED CONSENSUS, public vs private clock chain, understanding cyrptocurrency in block
chain, permissioned model of block chain, overview of security aspect of block chain

Unit 7: Cyber law and forensic (7)


Introduction, Cyber security regulation, role of International law, the state and private sector in
cyberspace, cyber security standards, the Indian cyberspace
Introduction to forensic, cyber evidence, web attack investigation, internet crime investigation, internet
forensics

Internal Continuous Assessment (ICA) :


It should consist of the 08-10 practical based on following guidelines
1) Implementation of Substitution Cipher
2) Implementation of Poly alphabetic Cipher (Vigenere Cipher and Vernam Cipher)
3) Implementation of Transposition Cipher
4) Implementation of Play fair Cipher
5) Implementation of Secure file transfer in Client/Server environment (use any one of above
method for encryption and decryption).
6) Write a program to simulate RSA algorithm.
7) Install and understand docker container
8) Create and deploy a block chain network
9) Study different cybercrimes and implement a system to detect any one cyber crime

Text Book:
1. Williams Stallings–Cryptography and Network security principles and practices. Pearson
Education (LPE) ( Unit I to V)
2. Melanie Swan :Blockchain: Blueprint for a New Economy :2015
3. Neena godbole “information system security”

Reference Books:
1. Behroz A. Forozan, Debdeep Mukhopadhyay, “Cyber and Network Security” McGraw Hill
Education, 2nd Edition.
2. Atul Kahate, “Cyptography and Network Security” McGraw Hill Education 3rd Edition
3. Schneir, Bruce, “Applied Cryptography: Protocols and Algorithms”

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 28 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - II
CS 423 A : ELECTIVE – III : BIG DATA ANALYTICS
Teaching Scheme Examination Scheme
Lectures : 3 Hours /week Theory: 70 Marks
Tutorial : 1 Hour/Week ISE: 30 marks
ICA : 25 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES :
1) Explain need for Big Data Analytics
2) Develop ability to analyze and process Big Data.
3) Build necessary skills to write Map Reduce programs for analyzing Big Data problems.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME :
At the end of this course, students will be able to
1) Identify need for Big Data analysis
2) Analyze and identify Big data processing technology for analyzing the Big data.
3) Write Map Reduce programs to process Big Data by identifying the use case.
-------------------------------------------------------------------------------------------------------------------------
SECTION – I

Unit 1: Introduction to Types of Digital Data (4)


Classification of Digital Data, Structured Data, Sources of structured data, Ease with Structured data,
Semi-Structured data, sources of semi-structured data, Unstructured data, sources of unstructured data,
Issues with terminology, Dealing with unstructured data, Place me in the basket.

Unit 2: Introduction to Big Data (4)


Big data, What is big data? Why big data?, Other characteristics of data which are not definitional traits
of big data, Challenges with big data, Big data stack, Exercises - Puzzle, Fill in the blanks.

Unit 3: Big Data Analytics (6)


Big Data Anayltics, Analytics 1.0, Analytics 2.0, Analytics 3.0, Traditional BI vs. Big Data Envirnoment,
Terminologies used in Big Data Environment, Big Data Technology Landscape, NoSQL Databases,
NoSQL Vs. RDBMS, NewSQL, Hadoop, Hadoop 1.0 vs. Hadoop 2.0, Exercises, Data Science is
multidisciplinary, Data Scientist - Your new best friend.

Unit 4: Introduction to Hadoop (10)


Introducing Hadoop, Why not RDBMS, Distributed Computing Challenges, A Brief History of Hadoop,
Hadoop Overview, Hadoop Components, High Level Architecture of Hadoop, Hadoop Distributed File
System, HDFS Architecture, Daemons Related to HDFS, Working with HDFS Command, Special
Features of Hadoop, Processing Data With Hadoop, Introduction How Map Reduce Works, Map Reduce
Example, Word Count Example using Java Managing Resources and Applications with YARN
Introduction, Limitation of Hadoop 1.0, Hadoop 2: HDFS, Hadoop 2: YARN, Interacting with Hadoop
EcoSystem Hive, Pig, HBase, Sqoop.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 29 of 43
SECTION – II

Unit 5: Introduction to MongoDB (4)


Recap of NoSQL databases, MongoDB – CRUD, MongoDB- Arrays, Java Scripts, Cursors, Map Reduce
Programming, Aggregations.

Unit 6: Introduction to Cassandra (4)


Features of Cassandra, CQLSH - CRUD, Collections, Counter, List, Set, Map, Tracing.

Unit 7: Introduction to Hive (8)


What is Hive? History of Hive and Recent Releases of Hive, Hive Features, Hive Integration and Work
Flow, Hive Data Units, Hive Architecture, Hive Primitive and Collection Data Types, Hive File Format,
Hive Query Language(HQL)–Statements – DDL,DML. Hive Partitions – Bucketing, Views, Sub Query,
Joins, Hive User Defined Function, Aggregations in Hive, Group by and Having, Serialization and
Deserialization, Hive Analytic Functions.

Unit 8: Introduction to Pig (4)


Introducing Pig, History and Anatomy of Pig, Pig on Hadoop, Pig Philosophy, ETL Processing, Pig Latin
Overview, Word count example using Pig.

Internal Continuous Assessment (ICA) :


1. Objective of assignments should be to test students understanding and assess their ability to put into
practice the concepts and terminologies learned.
2. Assignments must be of nature, which require students to identify the use case scenarios for using
technologies mentioned in syllabus.

Text Book :
1. Big Data and Analytics, Seema Acharya, Subhashini Chellappan, - Wiley India Pvt. Ltd.
2. Hadoop: The Definitive Guide, 3rd Edition, Tom White , - O'reilly Media.
3. Programming Hive, Edward Rutherglen, Dean Wampler, Jason Rutherglen, Edward Capriolo. -
O'reilly Media.
4. The Definitive Guide to MongoDB: A Complete Guide to Dealing with Big Data Using MongoDB
(Definitive Guide Apress) 2e by David Hows, Eelco Plugge, Peter Membrey, Tim Hawkins.
5. Programming Pig, by Alan Gates - O'reilly Media.
6. Cassandra: The Definitive Guide, Eben Hewitt - O'reilly Media.

Reference Book :
1. Big Data For Dummies, Judith Hurwitz, Alan Nugent , Dr. Fern Halper, Marcia Kaufman, by Wiley
Brand.
2. Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today's Businesses
(Wiley CIO), Michael Minelli, Michele Chambers, Ambiga Dhiraj : John Wiley & Sons.
3. Mining of Massive Datasets, Anand Rajaraman, Jure Leskovec, Jeff rey D. Ullman, Cambridge
University Press.
4. Hadoop in Action, Chuck Lam, Dreamtech Press, ISBN : 978-81-7722-813-7.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 30 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - II
CS 423 B : ELECTIVE – III : HUMAN COMPUTER INTERACTION
Teaching Scheme Examination Scheme
Lectures : 3 Hours /week Theory: 70 Marks
Tutorial : 1 Hour/Week ISE: 30 marks
ICA : 25 Marks
------------------------------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES:
1) Know how to analyze and consider user’s need in the interaction system 2) Understand various
interaction design techniques and models 3) Understand the theory and framework of HCI 4)
Understand and analyze the cognitive aspects of human – machine interaction
------------------------------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME :
At the end of this course, students will be able to
1) To develop good design for human machine interaction system
2) Analyze the user’s need in interaction system
3) To design new interaction model to satisfy all types of customers
4) Evaluate the usability and effectiveness of various products
5) To know how to apply interaction techniques for systems
------------------------------------------------------------------------------------------------------------------------------------------------
SECTION-I
Unit 1 (5)
Introduction, The human, The computer, The interaction, Paradigms, Usability of Interactive Systems,
Guidelines, Principles, and Theories.

Unit 2 (5)
Design Process - Interaction design basics, HCI in the software process, Design rules, Implementation
support, Evaluation techniques, Universal design, User support

Unit 3 (5)
Models and Theories0 Cognitive models, Socio-organizational issues and stakeholder requirements,
Communication and collaboration models, Task analysis, Dialogue notations and design, Models of the
system, Modelling rich interaction

Unit 4 (6)
Interaction Styles- Direct Manipulation and Virtual Environments, Menu Selection, Form Filling and
Dialog Boxes, Command and Natural Languages, Interaction Devices, Collaboration and Social Media
Participation

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 31 of 43
SECTION-II

Unit 5 (5)
Design Issues- Quality of Service, Balancing Function and Fashion, User Documentation and Online
Help, Information Search, Information Visualization

Unit 6 (5)
Outside the Box- Group ware, Ubiquitous computing and augmented realities, Hypertext, multimedia,
and the world wide web Text

Unit 7 (6)
Information Search and visualization - Introduction, Search in Textual Documents and Database
Querying, Multimedia Document Searches, Advanced Filtering and Search Interfaces, Information
Visualization, OAI Model for Website Design.

Unit 8 (5)
Hypertext, Multimedia and the world wide web, Introduction, Understanding hypertext, Web technology
and issues, Static web content, dynamic web content

Internal Continuous Assessment (ICA) :


Minimum 10 to 12 assignments based on above topics.

Text Books :
1. Human Computer Interaction, Alan Dix, Janet Finlay, Gregory Abowd and Russel Beale, Prentice
Hall Publication
2. Designing the User Interface, Ben Shneiderman, 4th Edition, Pearson Education, 2008, ISBN 81-
7808-262-4

Reference Book :
1. Human Computer Interaction, Dan R. Olsen, Cengage Learning, India Edition, ISBN No.978-81-
315-1137-4
2. The Essential Guide to User Interface Design, Second Edition, An Introduction to GUI Design
Principles and Techniques, Wilbert O. Galitz, Wiley India (P) Ltd., ISBN : 81- 265-0280-0
3. The Essential of Interaction Design, Alan Copper, Robert Reimann, David Cronin, Wiley India (P)
Ltd., ISBN : 978-81-265-1305-5

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 32 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - II
CS 423 C : ELECTIVE – III : ARTIFICIAL NEURAL NETWORKS
Teaching Scheme Examination Scheme
Lecture : 3 Hours /week Theory: 70 Marks
Tutorial : 1 Hour/Week ISE: 30 marks
ICA : 25 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES:
1. To study different learning rules and compare them.
2. To calculate the performance of neutral networks.
3. To apply different optimization techniques to improve learning.
4. To create prototype applications of real world using artificial neural networks.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOMES :
At the end of this course, students will be able to
1. Demonstrate different learning rules and compare them.
2. Calculate the performance of neural networks using defined parameters.
3. Apply different optimization techniques to achieve better results of learning.
4. Create prototype applications of real world with the use of artificial neural networks.
-------------------------------------------------------------------------------------------------------------------------
SECTION – I
Unit 1 Introduction (4)
Biological neuron, Models of artificial neural networks, neural processing, neural network learning rules

Unit 2 Learning & adaptation (5)


Classification Neural learning rules-Hebbian, perceptron, Delta, Widrow Hoof, Winner take all outstar
learning rule.

Unit 3 Perceptron (4)


Discrete perception as a classifier, Decision and discrimenant functions, Linearly non separable patterns.
Perceptron training for two class and multiclass dichotomizer.

Unit 4 Multilayer networks (4)


Delta learning rule for multiperceptron layer, Generalized Delta learning rule, Feed forward recall and
error back-propagation, Training algorithm.

Unit 5 Performance (4)


Madeline, Network pruning, Marchands, Neural tree and filing algorithm, Prediction network

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 33 of 43
SECTION – II

Unit 6 Unsupervised learning (5)


Winner take all networks, Hamming networks, Max net, competitive learning K-means clustering and
LVQ algorithms, Adaptive resonance theory, ARTI, ALGORITHM, SELF ORGANIZING Kohanens
map, Naocognitron.

Unit 7 Associative memories (5)


Non iterative procedures for association hop field networks, Discrete Hop field Networks storage capacity
of Hop field networks. Continuous Hop field networks. Brain state in a box (B B networks Boltzmann
machines Hetero associations.

Unit 8 Optimization techniques (5)


Optimization using Hop field networks. Travelling salesperson problem, Iterated gradient descent
techniques. Simulated annealing technique, Random search technique genetic algorithm for optimization
problems.

Unit 9 Application of ANN (4)


Character recognition, Speech recognition, Signature verification application, Human face recognition

Internal Continuous Assessment (ICA) :


Minimum 8 to 10 assignments on the above topics.

Text Books : -
1 Introduction to Artificial Neural Systems – Zurada (JAICO)
2 Elements of Artificial Neural Networks – Mehrotra, Hohan, Ranka (PENRAM)
3 Introduction to Artificial Neural Networks – B. Yegnanarayana (PHI)

Ref. Books :
1. An introduction to ANN by Anderson (PHI)
2. Neural Networks a comprehensive foundation by Haykin (PHI)
3. Elements of ANN by Mohan Ranka (Pearam Internatiional)

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 34 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - II
CS 424 A : Elective-IV : 1. SOFTWARE TESTING & QUALITY ASSURANCE

Teaching Scheme Examination Scheme


Lectures :3 Hours /Week, 3 Credits ESE – 70 Marks
Practical : 2 Hours/ Week, 1 Credit ISE – 30 Marks
ICA – 25 Marks
------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES :
1. To learn the principles, techniques and tools of software testing in order to improve the quality of
software product.
2. To gain knowledge of the software testing process, various methods of testing, different levels of
testing, software quality concepts, assurance & standards
3. To learn generation and execution of test plan, cases & scripts.
4. To learn manual and automatic software testing & various kinds of testing tools.
5. To discover correctness, completeness and quality of software.
6. To recognize the importance of software testing in Software Development Life Cycle.
------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME :
At the end of this course, students will be able to
1. Identify what a software bug is, how serious they can be, and why they occur.
2. Test software to meet quality objectives & requirements
3. Apply testing skills to common testing tasks
4. Perform the planning and documentation of test efforts
5. Describe software quality concepts, assurance & standards
6. Use testing tools to test software in order to improve test efficiency with automation.
------------------------------------------------------------------------------------------------------------------
SECTION – I
Unit-1: Fundamentals of Software Testing (8)
Introduction, Basics of Software Testing, Approaches to Testing, Testing During Development Life
Cycle, Essential of Software Testing, Features of Testing, Misconceptions About Testing, Principles of
Software Testing, Test Policy, Defect Classification, Defect, Error, Mistake in Software, Defect Life
Cycle, Defect Management Process, Developing Test Strategy, Developing Testing Methodologies

Unit-2: Methods of Testing (6)


Software Verification and Validation, Black-Box and White-Box Testing, Static and Dynamic Testing,
Black-Box Testing Techniques-Equivalence Partitioning, Data Testing, State Testing, Other Black Box
Test Techniques. White-Box Testing Techniques-Data Coverage, Code Coverage, Other White Box Test
Techniques.
Unit-3: Levels of Testing (6)
Levels of Testing, Proposal Testing, Requirement Testing, Design Testing, Code Review, Unit Testing,
Module Testing, Integration Testing, Big-Bang Testing, Sandwich Testing,

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 35 of 43
Unit-4: System Testing (6)
GUI Testing, Compatibility Testing, Security Testing, Performance Testing, Volume Testing, Stress
Testing, Load Testing, Installation Testing, Regression Testing, Smoke Testing, Sanity Testing, Ad hoc
Testing, Usability Testing,Acceptance Testing-Alpha Testing, Beta Testing, Gamma Testing.

SECTION – II

Unit 5: Test Planning & Documentation (8)


Test Planning-The goal of Test Planning, Test Planning Topics, Writing and Tracking Test Cases-The
Goal of Test Case Planning, Test Case Planning Overview, Test Case Organization and Tracking,
Reporting Bugs- Getting Your Bugs Fixed, Isolating and Reproducing Bugs
Unit 6: Quality Concepts & Software Quality Assurance (6)
Quality Concepts-What is Quality?, Software Quality, The Software Quality Dilemma, Achieving
Software Quality, Software Quality Assurance-Background Issues, Elements of Software Quality
Assurance, SQA Processes and Product Characteristics, SQA Tasks, Goals and Metrics
Unit-7 Formal Approaches to SQA (6)
Statistical SQA, Software Reliability, The ISO 9000 Quality Standards, CMM, The SQA Plan.
Unit 8: Automated Testing and Testing Tools (8)
Introduction, The Benefits of Automation and Tools, Test Tools, Software Test Automation, Random
Testing, Realities of Using Test Tools and Automation Case Studies on Testing Tools-Selenium.

Reference tutorials:
1. Spoken Tutorials on Selenium Software Testing Framework at http://spoken-tutorial.org/tutorial-
search/?search_foss=Selenium&search_language=English

Internal Continuous Assessment (ICA) :


Minimum 8 assignments based on each topic of above syllabus.
Additionally two assignments on use of Selenium for software testing.

Text books:
1. Software Testing Principles, Techniques and Tools By M G Limaye, Published by Tata McGraw-Hill
Education Private Limited, Published 2009, ISBN (13): 978-0-07-013990-9,
ISBN (10): 0-07-013990-3 (Chapter 1 & 3)
2. Software Testing, Second Edition By: Ron Patton, Published by SAMS, ISBN-13: 978-0672327988
ISBN-10: 0672327988 (Chapter 2, 4 & 6)
3. Software Engineering: A Practitioner's Approach by Roger S Pressman, 8 th Edition, Publisher
McGraw Hill (Chapter 5)

Reference books:
1. Software Testing Principle and Practices By Ramesh Desikan, Gopalaswamy Ramesh, Pearson
Education, ISBN 978-81-7758-121-8
2. Software Testing Principles and Practices By Naresh Chauhan, Publisher OXFORD UNIVERSITY
PRESS-NEW DELHI, ISBN 0-19-806184-6
3. Beautiful Testing: Leading Professionals Reveal How They Improve Software By Adam Goucher,
Tim Riley, Publisher O’reilly

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 36 of 43
4. Foundations of Software Testing By Rex Black, Dorothy Graham, Erik Van Veenendaal, Isabel
Evans, Published by Cengage Learning India Pvt Ltd.
5. Lessons Learned in Software Testing by Cem Kaner , James Bach , Bret Pettichord, Publisher Wiley
6. Testing Computer Software Cem Kaner, Jack Falk, Hung Q. Nguyen, Publisher Wiley
7. Selenium Testing Tools Cookbook By Unmesh Gundecha Published by Packt, ISBN: 978-1-84951-
574-0
8. Dr. K.V.K.K. Prasad, “Software Testing Tools: Covering Win Runner, Silk Test, Load Runner,
JMeter and Test Director With Case Studies”, Dreamtech Publications ISBN:10:81-7722-532-4

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 37 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - II
CS 424 B : Elective-IV : CLOUD COMPUTING

Teaching Scheme Examination Scheme


Lectures :3 Hours /Week, 3 Credits ESE – 70 Marks
Practical : 2 Hours/Week, 1 Credit ISE – 30 Marks
ICA – 25 Marks
------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES :
1. Develop knowledge about Cloud computing model and associated concepts, terminologies.
2. Develop skills necessary to identify cloud deployment types and deploy them for various
3. use cases.
4. Build necessary cognizance to identify benefits and challenges of cloud Computing for an
5. IT Organizations in building IT solutions.
------------------------------------------------------------------------------------------------------------------
COURSE OUTCOME :
At the end of this course, students will be able to
1. Explain the concepts , benefits and challenges of Cloud Computing and the various deployment and
service models of Cloud Computing
2. Explain about Virtualization and its types
3. Describe Private & public Cloud and its deployment models
4. Describe the Security concerns and future trends of Cloud Computing
------------------------------------------------------------------------------------------------------------------
SECTION I
Unit 1 : Overview of Cloud Computing (10)
Brief history and evolution – History of Cloud Computing, Evolution of Cloud Computing, Traditional
vs. Cloud Computing. Why Cloud Computing, Cloud service models (IaaS, PaaS & SaaS). Cloud
deployment models (Public, Private, Hybrid and Community Cloud), Benefits and Challenges of Cloud
Computing

Unit 2 : Virtualization (8)


Basics of virtualization, Server virtualization, VM migration techniques, Role of virtualization in Cloud
Computing.

Unit 3 : Working with Private Cloud (8)


Private Cloud Definition, Characteristics of Private Cloud, Private Cloud deployment models, Private
Cloud Vendors – CloudStack, OpenStack, Benefits and Challenges. Implementation of Private Cloud
using any one of OpenStack/CloudStack.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 38 of 43
SECTION II

Unit 4 : Working with Public Clouds (12)


What is Public Cloud, Why Public Cloud, When to opt for Public Cloud, Public Cloud Service Models,
and Public Cloud Vendors and offerings ( IaaS, PaaS, SaaS). Basic compute, storage, networking and
IAM services of anyone of AWS/Microsoft Azure/Google Cloud platform

Unit 5 : Overview of Cloud Security (8)


Explain the security concerns in Traditional IT, Introduce challenges in Cloud Computing in terms of
Application Security, Server Security, and Network Security. Security reference model, Abuse and
Nefarious Use of Cloud Computing, Insecure Interfaces and APIs, Malicious Insiders, Shared
Technology Issues, Data Loss or Leakage, Account or Service Hijacking, Unknown Risk Profile, Shared
security model between vendor and customer in IAAS/PAAS/SAAS, Implementing security in AWS.

Unit 6: Future directions in Cloud Computing (4)


When and not to migrate to Cloud, Migration paths for cloud, Selection criteria for cloud deployment,
Issues/risks in cloud computing, Future technology trends in Cloud Computing.

Internal Continuous Assessment (ICA) :


Minimum 10 assignments must be of nature, which require students to identify and implement the use
case scenarios for Cloud and Cloud enabled technologies mentioned above.

Text Book :
1. Cloud Computing: Principles and paradigms By Raj Kumar Buyya, James Broberg, Andrezei
M.Goscinski, 2011 Cloud Computing, By Michael Miller, 2008.
2. Cloud Computing for dummies, By Judith Hurwitz, Robin Bllor, Marcia Kaufman, Fern Halper, 2009.
3. Cloud Computing: A Practical Approach, By Anthony T. Velte, Toby J. Velte, and Robert Elsenpeter,
McGraw Hill, 2010.
4. Handbook of Cloud Computing, By Borko Furht, Armando Escalante (Editors), Springer, 2010.

Reference Book :
1. Cloud Security, A comprehensive Guide to Secure Cloud Computing by Krutz, Ronald L.; Vines,
Russell Dean
2. Cloud computing: Implementation, management and security By Rittinghouse, John, W.
3. Mastering Cloud Computing, Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi, McGraw
Hill, 2013

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 39 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - II
CS 424 C : Elective-IV : MACHINE LEARNING

Teaching Scheme Examination Scheme


Lectures :3 Hours /Week, 3 Credits ESE – 70 Marks
Practical : 2 Hours/Week, 1 Credit ISE – 30 Marks
ICA – 25 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES :
1. To teach necessary fundamental concepts and terminologies used in Machine Learning
2. To develop sound understanding of mathematical fundamentals required to build, evaluate and
analyze Machine learning models.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOMES :
At the end of this course, students will be able to
1. Interpret the need of machine learning and applications of machine learning.
2. Build machine learning models and validate them.
3. Analyze machine learning models to improve their accuracy.
-------------------------------------------------------------------------------------------------------------------------
Unit 1: Introduction to Machine learning (4)
• Understanding Machine Learning: What Is Machine Learning?, Leveraging the Power of
Machine Learning, The Roles of Statistics and Data Mining with Machine Learning, Putting
Machine Learning in Context.
• Applying Machine Learning: Getting Started with a Strategy, Applying Machine Learning to
Business Needs, Understanding Machine Learning Techniques, Tying Machine Learning
Methods to Outcomes

Unit 2: Offerings of Machine learning (4)


• Looking Inside Machine Learning: The Impact of Machine Learning on Applications,Data
Preparation, The Machine Learning Cycle.
• Getting Started with Machine Learning: Understanding How Machine Learning Can Help,
Focus on the Business Problem, Requirement of Collaboration in Machine Learning, Executing a
Pilot Project, Determining the Best Learning Model.

Unit 3: Basic mathematics for Machine Learning (10)


• Getting Started With The Math Basics: Working with Data, Exploring the World of
Probabilities, Describing the Use of Statistics, Interpreting Learning As Optimization, Exploring
Cost Functions, Descending the Error Curve,
Updating by Mini-Batch and Online.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 40 of 43
Unit 4: Validating Machine Learning Models (12)
• Validating Machine Learning: Checking Out-of-Sample Errors, Getting to Know the Limits of
Bias, Keeping Model Complexity in Mind and Solutions Balanced, Training, Validating, and
Testing, Resorting to Cross-Validation. Looking for Alternatives in Validation., Optimizing
Cross-Validation Choices, Avoiding Sample Bias and Leakage Traps, Discovering the Incredible
Perceptron
• Simplest learning strategies to learn from Data: Discovering the Incredible Perceptron,
Growing Greedy Classification Trees, Taking a Probabilistic Turn

Unit 5: Improving Machine Learning Models (10)


• Improving Machine Learning Models: Studying Learning Curves , Using Cross-Validation
Correctly , Choosing the Right Error or Score Metric , Searching for the Best Hyper-Parameters ,
Testing Multiple Models , Averaging Models , Stacking Models, Applying Feature Engineering ,
Selecting Features and Examples , Looking for More Data

Unit 6: Applications of Machine Learning (5)


• Applying Learning to Real Problems: Classifying Images, Scoring Opinions and Sentiments,
Recommending Products and Movies, Using Machine Learning to Provide Solutions to
Business Problems. Future of Machine Learning.

Internal Continuous Assessment (ICA) :


Minimum 15 assignments requiring students to design implement and validate machine learning models
using either R or Python scripts or any other machine learning toolkits and frameworks like MATLAB,
Octave.

Text Books:
1. Machine Learning For Dummies, IBM Limited Edition by Judith Hurwitz, Daniel Kirsch (Published
by Wiley, First edition)
2. Machine Learning For Dummies by John Paul Mueller , Luca Massaron (Published by For Dummies;
First edition)

Reference Books:
1. Machine Learning by Tom M. Mitchell (Publisher: McGraw Hill Education; First edition + New
Chapters from Second edition)

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 41 of 43
PUNYASHLOK AHILYADEVI HOLKAR SOLAPUR UNIVERSITY, SOLAPUR

B.E. (COMPUTER SCIENCE & ENGINEERING)


SEMESTER - II
CS 425 : WEB TECHNOLOGY
Teaching Scheme Examination Scheme
Lectures : 2 Hours /week, 2 credits POE: 50 Marks
Practical: 4 Hours/ week, 2 credit ICA: 25 Marks
ISE : 25 Marks
-------------------------------------------------------------------------------------------------------------------------
COURSE OBJECTIVES :
1. Inculcate skills necessary to design, develop and style a web based user interfaces.
2. Develop ability to identify use cases for applying client and server side scripting web technologies.
3. Develop skills necessary to develop efficient, scalable, web based APIs and applications
4. Develop skills required to create light weight browser based web applications using client side
scripting.
-------------------------------------------------------------------------------------------------------------------------
COURSE OUTCOMES :
At the end of course, students will be able to
1. Design, develop and apply styling to a web based applications.
2. Analyze requirements of developing web applications and choose client or server side scripting
technology.
3. Build efficient and scalable web APIs and applications.
4. Develop light weight browser based functionalities leveraging client side scripting frameworks.
-------------------------------------------------------------------------------------------------------------------------
SECTION – I
Unit 1: UI Design: (3)
HTML5: What is HTML5 - Features of HTML5 – Semantic Tags – New Input Elements and tags - Media
tags (audio and video tags) – Designing Graphics using Canvas API - Drag and Drop features –
Geolocation API - Web storage (Session and local storage).
CSS3: What is CSS3 –Features of CSS3 – Implementation of border radius, box shadow, image border,
custom web font, backgrounds - Advanced text effects(shadow) - 2D and 3D Transformations -
Transitions to elements - Animations to text and elements

Unit 2: Responsive Web Design (RWD): (4)


Responsive Design: What is RWD – Introduction to RWD Techniques – Fluid Layout, Fluid Images
and Media queries- Introduction to RWD Framework
Twitter Bootstrap – Bootstrap Background and Features - Getting Started with Bootstrap-Demystifying
Grids – Off Canvas - Bootstrap Components - JS Plugins – Customization

Unit 3: Introduction to JavaScript (4)


Introduction - Core features - Data types and Variables - Operators, Expressions and Statements -
Functions & Scope - Objects - Array, Date and Math related Objects - Document Object Model - Event
Handling –Browser Object Model - Windows and Documents - Form handling and validations.
Object-Oriented Techniques in JavaScript - Classes – Constructors and Prototyping (Sub classes and
Super classes) – JSON –Introduction to AJAX.

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 42 of 43
Unit 4: RESTful Web Services (4)
REST and the Rebirth of HTTP, RESTful Architectural Principles, The Object Model, Model the URIs,
Defining the Data Format, Assigning HTTP Methods, JAX-RS.

SECTION – II

Unit 5: Introduction to Server-side JS Framework – Node.js (3)


Introduction - What is Node JS – Architecture – Feature of Node JS - Installation and setup - Creating
web servers with HTTP (Request & Response) – Event Handling - GET & POST implementation -
Connect to NoSQL Database using Node JS – Implementation of CRUD operations.

Unit 6: Introduction to Client-side JS Framework – Basics of Angular 4.0 (5)


Introduction to Angular 4.0 - Needs & Evolution – Features – Setup and Configuration – Components
and Modules – Templates – Change Detection – Directives – Data Binding - Pipes – Nested Components

Unit 7: Introduction to Client-side JS Framework – Forms and Routing in Angular 4.0 (3)
Template Driven Forms - Model Driven Forms or Reactive Forms - Custom Validators - Dependency
Injection - Services - RxJS Observables - HTTP - Routing

Unit 8: PHP and MySQL (4)


Introduction to PHP 5 and PHP 6, variables and constants, program flow, functions, arrays and files and
directories, Forms and Databases, integration with MySQL applications on PHP
Internal Continuous Assessment (ICA) :
1. Objective of assignments should be to test students understanding and assess their ability to put into
practice the concepts and terminologies learned.
2. Assignments must be of nature, which require students to identify the use case scenarios for using
technologies mentioned in syllabus.

Text Books /Reference Books:


1. Harvey & Paul Deitel& Associates, Harvey Deitel and Abbey Deitel, “Internet and World Wide Web
- How To Program”, Fifth Edition, Pearson Education, 2011.
2. Achyut S Godbole and Atul Kahate, “Web Technologies”, Second Edition, Tata McGraw Hill, 2012.
3. Thomas A Powell, Fritz Schneider, “JavaScript: The Complete Reference”, Third Edition, Tata
McGraw Hill, 2013.
4. David Flanagan, “JavaScript: The Definitive Guide, Sixth Edition”, O'Reilly Media, 2011
5. Bear Bibeault and Yehuda Katz, “jQuery in Action”, January 2008
6. Web link for Responsive Web Design - https://bradfrost.github.io/this-is-responsive/
7. Ebook link for JavaScript - https://github.com/jasonzhuang/tech_books/tree/master/js
8. Nathan Rozentals, “Mastering TypeScript”, April 2015
9. Nate Murray, Felipe Coury, Ari Lerner and Carlos Taborda, “ng-book, The Complete Book on
Angular 4” September 2016
10. AmolNayak, “MongoDB Cookbook Paperback” , November 2014
11. KrasimirTsonev, “Node.js by Example Paperback”, May 2015
12. Web link for TypeScript: https://www.typescriptlang.org/
13. Web link for Angular4.0: https://angular.io/
14. Web link for Node.js : https://nodejs.org/en/
15. Web link for MongoDB: https://www.mongodb.com/

-------------------------------------------------------------------------------------------------------------------------
P.A.H. Solapur University, Solapur B.E.(Computer Science and Engineering) w.e.f. 2019-2020 Page 43 of 43

You might also like