BTech CS 4th Year Syllabus
BTech CS 4th Year Syllabus
FOR
AS PER
AICTE MODEL CURRICULUM
[Effective from the Session: 2021-22]
COMPUTER SCIENCE AND ENGINEERING/CS
B.TECH
SEMESTER- VII
End
Sl. Subject Periods Evaluation Scheme
Subject Semester Total Credit
No.
Codes L T P CT TA Total PS TE PE
Total 12 0 12 850 18
*The Mini Project or internship (4 - 6 weeks) conducted during summer break after VI semester and will be assessed during VII semester.
SEMESTER- VIII
End
Sl. Subject Periods Evaluation Scheme
Subject Semester Total Credit
No.
Codes L T P CT TA Total PS TE PE
# #
1 KHU801/KHU802 HSMC-2 /HSMC-1 3 0 0 30 20 50 100 150 3
COMPUTER SCIENCE AND ENGINEERING/CS
Departmental Elective-IV
Departmental Elective-V
COMPUTER SCIENCE AND ENGINEERING/CS
B.TECH. (CSE/CS)
SEVENT SEMESTER (DETAILED SYLLABUS)
Artificial Intelligence (KCS071)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
Understand the basics of the theory and practice of Artificial Intelligence as a discipline and K2
CO 1
about intelligent agents.
CO 2 Understand search techniques and gaming theory. K2, K3
The student will learn to apply knowledge representation techniques and problem solving K3 , K4
CO 3
strategies to common AI applications.
CO 4 Student should be aware of techniques used for classification and clustering. K2 , K3
CO 5 Student should aware of basics of pattern recognition and steps required for it. K2 , K4
DETAILED SYLLABUS 3‐0‐0
Proposed
Unit Topic
Lecture
INTRODUCTION :
I Introduction–Definition – Future of Artificial Intelligence – Characteristics of Intelligent Agents– 08
Typical Intelligent Agents – Problem Solving Approach to Typical AI problems.
PROBLEM SOLVING METHODS:
Problem solving Methods – Search Strategies- Uninformed – Informed – Heuristics – Local Search
II Algorithms and Optimization Problems – Searching with Partial Observations – Constraint 08
Satisfaction Problems – Constraint Propagation – Backtracking Search – Game Playing – Optimal
Decisions in Games – Alpha – Beta Pruning – Stochastic Games
KNOWLEDGE REPRESENTATION:
First Order Predicate Logic – Prolog Programming – Unification – Forward Chaining-Backward
III Chaining – Resolution – Knowledge Representation – Ontological Engineering-Categories and 08
Objects – Events – Mental Events and Mental Objects – Reasoning Systems for Categories –
Reasoning with Default Information
SOFTWARE AGENTS:
IV Architecture for Intelligent Agents – Agent communication – Negotiation and Bargaining – 08
Argumentation among Agents – Trust and Reputation in Multi-agent systems.
APPLICATIONS:
AI applications – Language Models – Information Retrieval- Information Extraction – Natural
V 08
Language Processing – Machine Translation – Speech Recognition – Robot – Hardware –
Perception – Planning – Moving
Text books:
1. S. Russell and P. Norvig, “Artificial Intelligence: A Modern Approach‖, Prentice Hall, Third Edition, 2009.
2. I. Bratko, “Prolog: Programming for Artificial Intelligence”, Fourth edition, Addison-Wesley Educational Publishers
Inc., 2011.
3. M. Tim Jones, ―Artificial Intelligence: A Systems Approach(Computer Science)‖, Jones and Bartlett Publishers,
Inc.First Edition, 2008
4. Nils J. Nilsson, ―The Quest for Artificial Intelligence‖, Cambridge University Press, 2009.
5. William F. Clocksin and Christopher S. Mellish,‖ Programming in Prolog: Using the ISO Standard‖, Fifth Edition,
Springer, 2003.
6. Gerhard Weiss, ―Multi Agent Systems‖, Second Edition, MIT Press, 2013.
7. David L. Poole and Alan K. Mackworth, ―Artificial Intelligence: Foundations of Computational Agents‖, Cambridge
University Press, 2010.
COMPUTER SCIENCE AND ENGINEERING/CS
Natural Language Processing (KC072)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
COMPUTER SCIENCE AND ENGINEERING/CS
Text books:
1. Daniel Jurafsky, James H. Martin―Speech and Language Processing: An Introduction to Natural Language
Processing, Computational Linguistics and Speech, Pearson Publication, 2014.
2. Steven Bird, Ewan Klein and Edward Loper, ―Natural Language Processing with Python, First Edition, OReilly
Media, 2009.
3. Lawrence Rabiner And Biing-Hwang Juang, “Fundamentals Of Speech Recognition”, Pearson Education, 2003.
4. Daniel Jurafsky And James H Martin, “Speech And Language Processing – An Introduction To Natural Language
Processing, Computational Linguistics, And Speech Recognition”, Pearson Education, 2002.
5. Frederick Jelinek, “Statistical Methods Of Speech Recognition”, MIT Press, 1997.
6. Breck Baldwin, ―Language Processing with Java and LingPipe Cookbook, Atlantic Publisher, 2015
7. Richard M Reese, ―Natural Language Processing with Java, OReilly Media, 2015.
8. Nitin Indurkhya and Fred J. Damerau, ―Handbook of Natural Language Processing, Second Edition, Chapman
and Hall/CRC Press, 2010.
9. Tanveer Siddiqui, U.S. Tiwary, ―Natural Language Processing and Information Retrieval, Oxford University
Press, 2008.
COMPUTER SCIENCE AND ENGINEERING/CS
High Performance Computing (KCS073)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
CO 1 Able to understand the basic concept of Computer architecture and Modern Processor K2
COMPUTER SCIENCE AND ENGINEERING/CS
Cryptography & Network Security ( KCS074)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
Classify the symmetric encryption techniques and Illustrate various Public key cryptographic K2 , K3
CO 1
techniques.
Understand security protocols for protecting data on networks and be able to digitally sign K1 , K2
CO 2 emails and files.
DETAILED SYLLABUS 3‐0‐0
Unit Proposed
Topic
Lecture
Introduction to security attacks, services and mechanism, Classical encryption techniques-
substitution ciphers and transposition ciphers, cryptanalysis, steganography, Stream and block
I 08
ciphers. Modern Block Ciphers: Block ciphers principles, Shannon’s theory of confusion and
diffusion, fiestal structure, Data encryption standard(DES), Strength of DES, Idea of differential
cryptanalysis, block cipher modes of operations, Triple DES
Introduction to group, field, finite field of the form GF(p), modular arithmetic, prime and relative
prime numbers, Extended Euclidean Algorithm, Advanced Encryption Standard (AES) encryption
II 08
and decryptionFermat’s and Euler’s theorem, Primarily testing, Chinese Remainder theorem,
Discrete Logarithmic Problem,Principals of public key crypto systems, RSA algorithm, security of
RSA
Message Authentication Codes: Authentication requirements, authentication functions, message
authentication code, hash functions, birthday attacks, security of hash functions, Secure hash
III 08
algorithm (SHA) Digital Signatures: Digital Signatures, Elgamal Digital Signature Techniques,
Digital signature standards (DSS), proof of digital signature algorithm,
Key Management and distribution: Symmetric key distribution, Diffie-Hellman Key Exchange,
IV 08
Public key distribution, X.509 Certificates, Public key Infrastructure. Authentication Applications:
Kerberos, Electronic mail security: pretty good privacy (PGP), S/MIME.
IP Security: Architecture, Authentication header, Encapsulating security payloads, combining
V security associations, key management. Introduction to Secure Socket Layer, Secure electronic, 08
transaction (SET) System Security: Introductory idea of Intrusion, Intrusion detection, Viruses and
related threats, firewalls
Text books:
1. William Stallings, “Cryptography and Network Security: Principals and Practice”, Pearson Education.
2. Behrouz A. Frouzan: Cryptography and Network Security, McGraw Hill .
3. C K Shyamala, N Harini, Dr. T.R.Padmnabhan Cryptography and Security ,Wiley
4. Bruce Schiener, “Applied Cryptography”. John Wiley & Sons
5. Bernard Menezes,” Network Security and Cryptography”, Cengage Learning.
6. AtulKahate, “Cryptography and Network Security”, McGraw Hill
COMPUTER SCIENCE AND ENGINEERING/CS
Proposed
Unit Topic
Lecture
INTRODUCTION: Introduction to mobile applications – Embedded systems - Market and
I business drivers for mobile applications – Publishing and delivery of mobile applications – 08
Requirements gathering and validation for mobile applications
BASIC DESIGN: Introduction – Basics of embedded systems design – Embedded OS - Design
constraints for mobile applications, both hardware and software related – Architecting mobile
II 08
applications – User interfaces for mobile applications – touch events and gestures – Achieving
quality constraints – performance, usability, security, availability and modifiability
ADVANCED DESIGN: Designing applications with multimedia and web access capabilities –
III Integration with GPS and social media networking applications – Accessing applications hosted in a 08
cloud computing environment – Design patterns for mobile applications.
TECHNOLOGY I – ANDROID: Introduction – Establishing the development environment –
Android architecture – Activities and views – Interacting with UI – Persisting data using SQLite –
IV 08
Packaging and deployment – Interaction with server side applications – Using Google Maps, GPS
and Wi-Fi – Integration with social media applications.
TECHNOLOGY II –iOS: Introduction to Objective C – iOS features – UI implementation – Touch
frameworks – Data persistence using Core Data and SQLite – Location aware applications using
V 08
Core Location and Map Kit – Integrating calendar and address book with social media application –
Using Wi-Fi - iPhone marketplace. Swift: Introduction to Swift, features of swift
Text books:
1. Charlie Collins, Michael Galpin and Matthias Kappler, “Android in Practice”, DreamTech, 2012
2. AnubhavPradhan , Anil V Despande Composing Mobile Apps,Learn ,explore,apply
3. James Dovey and Ash Furrow, “Beginning Objective C”, Apress, 2012
4. Jeff McWherter and Scott Gowell, "Professional Mobile Application Development", Wrox, 2012
5. David Mark, Jack Nutting, Jeff LaMarche and Frederic Olsson, “Beginning iOS
6. Development: Exploring the iOS SDK”, Apress, 2013.
COMPUTER SCIENCE AND ENGINEERING/CS
CO 2 Have an ability to design and conduct a software test process for a software testing project. K3, K4
Have an ability to identify the needs of software test automation, and define and develop a test
CO 3 K1 , K2
tool to support test automation.
Have an ability understand and identify various software testing problems, and solve these
CO 4 K1 , K2
problems by designing and selecting software test models, criteria, strategies, and methods.
Have basic understanding and knowledge of contemporary issues in software testing, such as
CO 5 K2
component-based software testing problems.
DETAILED SYLLABUS 3-0-0
Proposed
Unit Topic
Lecture
Review of Software Engineering: Overview of Software Evolution, SDLC, Testing Process,
Terminologies in Testing: Error, Fault, Failure, Verification, Validation, Difference Between
Verification and Validation, Test Cases, Testing Suite, Test ,Oracles, Impracticality of Testing
I All Data; Impracticality of Testing AllPaths. Verification: Verification Methods, SRS 08
Verification, Source Code Reviews, User Documentation Verification, Software, Project Audit,
Tailoring Software Quality Assurance Program by Reviews, Walkthrough, Inspection and
Configuration Audits
Functional Testing: Boundary Value Analysis, Equivalence Class Testing, Decision Table
Based Testing, Cause Effect Graphing Technique. Structural Testing: Control Flow Testing,
II 08
Path Testing, Independent Paths, Generation of Graph from Program, Identification of
Independent Paths, Cyclomatic Complexity, Data Flow Testing, Mutation Testing
Regression Testing: What is Regression Testing? Regression Test cases selection, Reducing the
III number of test cases, Code coverage prioritization technique. Reducing the number of test 08
cases: Prioritization guidelines, Priority category, Scheme, Risk Analysis
Software Testing Activities: Levels of Testing, Debugging, Testing techniques and their
applicability, Exploratory Testing Automated Test Data Generation: Test Data, Approaches to
IV 08
test data generation, test data generation using genetic algorithm, Test Data Generation Tools,
Software Testing Tools, and Software test Plan.
Object Oriented Testing: Definition, Issues, Class Testing, Object Oriented Integration and
V System Testing. Testing Web Applications: Web Testing, User Interface Testing, Usability 08
Testing, Security Testing, Performance Testing, Database testing, Post Deployment Testing
Text books:
1. Yogesh Singh, “Software Testing”, Cambridge University Press, New York, 2012
2. K..K. Aggarwal & Yogesh Singh, “Software Engineering”, New Age International Publishers, New Delhi, 2003.
3. Roger S. Pressman, “Software Engineering – A Practitioner’s Approach”, Fifth Edition, McGraw-Hill International Edition,
New Delhi,2001.
4. Marc Roper, “Software Testing”, McGraw-Hill Book Co., London, 1994.
5. M.C. Trivedi, Software Testing & Audit, Khanna Publishing House 6. Boris Beizer, “Software System Testing and Quality
Assurance”, Van Nostrand Reinhold, New York, 1984
COMPUTER SCIENCE AND ENGINEERING/CS
CO 4 To know about Shared Memory Techniques and have Sufficient knowledge about file access K1
COMPUTER SCIENCE AND ENGINEERING/CS
Deep Learning (KCS078)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able :
To present the mathematical, statistical and computational challenges of building neural K1 , K2
CO 1
networks
CO 2 To study the concepts of deep learning K1 , K2
CO 3 To introduce dimensionality reduction techniques K2
CO 4 To enable the students to know deep learning techniques to support real-time applications K2 , K3
CO 5 To examine the case studies of deep learning techniques K3, K6
DETAILED SYLLABUS 3-0-0
Proposed
Topic
Unit Lecture
INTRODUCTION : Introduction to machine learning- Linear models (SVMs and Perceptrons,
logistic regression)- Intro to Neural Nets: What a shallow network computes- Training a network:
I 08
loss functions, back propagation and stochastic gradient descent- Neural networks as universal
function approximates
DEEP NETWORKS : History of Deep Learning- A Probabilistic Theory of Deep Learning-
Backpropagation and regularization, batch normalization- VC Dimension and Neural Nets-Deep Vs
II 08
Shallow Networks-Convolutional Networks- Generative Adversarial Networks (GAN), Semi-
supervised Learning
DIMENTIONALITY REDUCTION 9 Linear (PCA, LDA) and manifolds, metric learning - Auto
encoders and dimensionality reduction in networks - Introduction to Convnet - Architectures –
III 08
AlexNet, VGG, Inception, ResNet - Training a Convnet: weights initialization, batch
normalization, hyper parameter optimization
OPTIMIZATION AND GENERALIZATION : Optimization in deep learning– Non-convex
optimization for deep networks- Stochastic Optimization Generalization in neural networks- Spatial
IV Transformer Networks- Recurrent networks, LSTM - Recurrent Neural Network Language 08
Models- Word-Level RNNs & Deep Reinforcement Learning - Computational & Artificial
Neuroscience
CASE STUDY AND APPLICATIONS : Image net- Detection-Audio Wave Net-Natural Language
V Processing Word2Vec - Joint Detection-Bioinformatics- Face Recognition- Scene Understanding- 08
Gathering Image Captions
Text books:
1. Cosma Rohilla Shalizi, Advanced Data Analysis from an Elementary Point of View, 2015.
2. Deng & Yu, Deep Learning: Methods and Applications, Now Publishers, 2013.
3. Ian Goodfellow, Yoshua Bengio, Aaron Courville, Deep Learning, MIT Press, 2016.
4. Michael Nielsen, Neural Networks and Deep Learning, Determination Press, 2015.
Mapping with MOOCS: https://onlinecourses.nptel.ac.in/noc18_cs41/preview
COMPUTER SCIENCE AND ENGINEERING/CS
Service Oriented Architecture (KCS079)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able :
CO 1 Comprehend the need for SOA and its systematic evolution. K1 , K2
COMPUTER SCIENCE AND ENGINEERING/CS
Quantum Computing (KCS710)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
Distinguish problems of different computational complexity and explain why certain problems K1 , K2
CO 1 are rendered tractable by quantum computation with reference to the relevant concepts in
quantum theory.
Demonstrate an understanding of a quantum computing algorithm by simulating it on a K2 , K3
CO 2
classical computer, and state some of the practical challenges in building a quantum computer.
Contribute to a medium-scale application program as part of a co-operative team, making use K2 , K3
CO 3
of appropriate collaborative development tools (such as version control systems).
Produce code and documentation that is comprehensible to a group of different programmers K3 , K4
CO 4
and present the theoretical background and results of a project in written and verbal form.
Apply knowledge, skills, and understanding in executing a defined project of research, K3, K6
CO 5
development, or investigation and in identifying and implementing relevant outcomes.
DETAILED SYLLABUS 3-0-0
Proposed
Unit Topic
Lecture
I Fundamental Concepts: Global Perspectives, Quantum Bits, Quantum Computation, Quantum 08
Algorithms, Quantum Information, Postulates of Quantum Mechanisms.
Quantum Computation: Quantum Circuits – Quantum algorithms, Single Orbit operations,
Control Operations, Measurement, Universal Quantum Gates, Simulation of Quantum Systems,
II Quantum Fourier transform, Phase estimation, Applications, Quantum search algorithms – 08
Quantum counting – Speeding up the solution of NP – complete problems – Quantum Search for an
unstructured database.
Quantum Computers: Guiding Principles, Conditions for Quantum Computation, Harmonic
III Oscillator Quantum Computer, Optical Photon Quantum Computer – Optical cavity Quantum 08
electrodynamics, Ion traps, Nuclear Magnetic resonance
Quantum Information: Quantum noise and Quantum Operations – Classical Noise and Markov
IV Processes, Quantum Operations, Examples of Quantum noise and Quantum Operations – 08
Applications of Quantum operations, Limitations of the Quantum operations formalism, Distance
Measures for Quantum information.
Quantum Error Correction: Introduction, Shor code, Theory of Quantum Error –Correction,
V Constructing Quantum Codes, Stabilizer codes, Fault – Tolerant Quantum Computation, Entropy 08
and information – Shannon Entropy, Basic properties of Entropy, Von Neumann, Strong Sub
Additivity, Data Compression, Entanglement as a physical resource .
Text books:
1. Micheal A. Nielsen. &Issac L. Chiang, “Quantum Computation and Quantum Information”, Cambridge
University Press, Fint South Asian edition, 2002.
2. Eleanor G. Rieffel, Wolfgang H. Polak , “Quantum Computing - A Gentle Introduction” (Scientific and
Engineering Computation) Paperback – Import, Oct 2014
3. Computing since Democritus by Scott Aaronson, Computer Science: An Introduction by N. DavidMermin 5.
Yanofsky's and Mannucci, Quantum Computing for Computer Scientists.
COMPUTER SCIENCE AND ENGINEERING/CS
Mobile Computing (KCS711)
Course Outcome (CO) Bloom’s Knowledge Level (KL)
At the end of course, the student will be able to understand
Explain and discuss issues in mobile computing and illustrate overview of wireless telephony and K1, K4
CO 1
channel allocation in cellular systems.
CO 2 Explore the concept of Wireless Networking and Wireless LAN. K1
Analyse and comprehend Data management issues like data replication for mobile computers, K4
CO 3
adaptive clustering for mobile wireless networks and Disconnected operations.
Identify Mobile computing Agents and state the issues pertaining to security and fault tolerance in K1, K2
CO 4
mobile computing environment.
Compare and contrast various routing protocols and will identify and interpret the performance of K2
CO 5
network systems using Adhoc networks.
DETAILED SYLLABUS 3-1-0
Proposed
Unit Topic
Lecture
Introduction, issues in mobile computing, overview of wireless telephony: cellular concept, GSM:
I air-interface, channel structure, location management: HLR-VLR, hierarchical, handoffs, channel 08
allocation in cellular systems, CDMA, GPRS.
Wireless Networking, Wireless LAN Overview: MAC issues, IEEE 802.11, Blue Tooth, Wireless
II multiple access protocols, TCP over wireless, Wireless applications, data broadcasting, Mobile IP, 08
WAP: Architecture, protocol stack, application environment, applications.
Data management issues, data replication for mobile computers, adaptive clustering for mobile
III 08
wireless networks, File system, Disconnected operations.
Mobile Agents computing, security and fault tolerance, transaction processing in mobile computing
IV 08
environment.
Ad Hoc networks, localization, MAC issues, Routing protocols, global state routing (GSR),
Destination sequenced distance vector routing (DSDV), Dynamic source routing (DSR), Ad Hoc on
V 08
demand distance vector routing (AODV), Temporary ordered routing algorithm (TORA), QoS in
Ad Hoc Networks, applications.
Text books:
1. J. Schiller, Mobile Communications, Addison Wesley.
2. A. Mehrotra, GSM System Engineering.
3. M. V. D. Heijden, M. Taylor, Understanding WAP, Artech House.
4. Charles Perkins, Mobile IP, Addison Wesley.
5. Charles Perkins, Ad hoc Networks, Addison Wesley.
COMPUTER SCIENCE AND ENGINEERING/CS
Internet of Things (KCS712)
Course Outcome (CO) Bloom’s Knowledge Level (KL)
At the end of course, the student will be able to understand
CO 1 Demonstrate basic concepts, principles and challenges in IoT. K1,K2
CO 2 Illustrate functioning of hardware devices and sensors used for IoT. K2
CO 3 Analyze network communication aspects and protocols used in IoT. K4
CO 4 Apply IoT for developing real life applications using Ardunio programming. K3
COMPUTER SCIENCE AND ENGINEERING/CS
Cloud Computing (KCS713)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
CO 1 Describe architecture and underlying principles of cloud computing. K3
Explain Inter cloud resources management cloud storage services and their providers Assess K2, K4
CO 4
security services and standards for cloud computing.
CO 5 Analyze advanced cloud technologies. K3, K6
DETAILED SYLLABUS 3‐1‐0
Proposed
Unit Topic
Lecture
Introduction To Cloud Computing: Definition of Cloud – Evolution of Cloud Computing –
I Underlying Principles of Parallel and Distributed Computing – Cloud Characteristics – Elasticity in 08
Cloud – On‐demand Provisioning.
Cloud Enabling Technologies Service Oriented Architecture: REST and Systems of Systems – Web
Services – Publish, Subscribe Model – Basics of Virtualization – Types of Virtualization –
II Implementation Levels of Virtualization – Virtualization Structures – Tools and Mechanisms – 08
Virtualization of CPU – Memory – I/O Devices –Virtualization Support and Disaster Recovery.
Cloud Architecture, Services And Storage: Layered Cloud Architecture Design – NIST Cloud
Computing Reference Architecture – Public, Private and Hybrid Clouds – laaS – PaaS – SaaS –
III Architectural Design Challenges – Cloud Storage – Storage‐as‐a‐Service – Advantages of Cloud 08
Storage – Cloud Storage Providers – S3.
Resource Management And Security In Cloud: Inter Cloud Resource Management – Resource
Provisioning and Resource Provisioning Methods – Global Exchange of Cloud Resources – Security
IV Overview – Cloud Security Challenges – Software‐as‐a‐Service Security – Security Governance – 08
Virtual Machine Security – IAM – Security Standards.
Cloud Technologies And Advancements Hadoop: MapReduce – Virtual Box — Google App
V Engine – Programming Environment for Google App Engine –– Open Stack – Federation in the 08
Cloud – Four Levels of Federation – Federated Services and Applications – Future of Federation.
Text books:
1. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, “Distributed and Cloud Computing, From Parallel Processing to the
Internet of Things”, Morgan Kaufmann Publishers, 2012.
2. Rittinghouse, John W., and James F. Ransome, ―Cloud Computing: Implementation, Management and Security, CRC
Press, 2017.
3. Rajkumar Buyya, Christian Vecchiola, S. ThamaraiSelvi, ―Mastering Cloud Computing, Tata Mcgraw Hill, 2013.
4. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing – A Practical Approach, Tata Mcgraw Hill, 2009.
5. George Reese, “Cloud Application Architectures: Building Applications and Infrastructure in the Cloud: Transactional
Systems for EC2 and Beyond (Theory in Practice), O’Reilly, 2009.
COMPUTER SCIENCE AND ENGINEERING/CS
Block chain Architecture Design (KCS714)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
CO 1 Describe the basic understanding of Blockchain architecture along with its primitive. K1, K2
CO 2 Explain the requirements for basic protocol along with scalability aspects. K2, K3
CO 3 Design and deploy the consensus process using frontend and backend. K3, K4
Apply Blockchain techniques for different use cases like Finance, Trade/Supply and
CO 4 Government activities. K4, K5
COMPUTER SCIENCE AND ENGINEERING/CS
Mini Project or Internship Assessment (KCS 354 , KCS 554 , KCS 752)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
Learning professional skills like exercising leadership, behaving professionally, behaving K2, K4
CO 5 ethically, listening effectively, participating as a member of a team, developing appropriate
workplace attitudes.
Project (KCS 753 , KCS 851)
Course Outcome ( CO) Bloom’s Knowledge Level (KL)
At the end of course , the student will be able to understand
Analyze and understand the real life problem and apply their knowledge to get programming K4 , K5
CO 1
solution.
Engage in the creative design process through the integration and application of diverse K4 , K5
CO 2
technical knowledge and expertise to meet customer needs and address social issues.
Use the various tools and techniques, coding practices for developing real life solution to the K5 , K6
CO 3
problem.
Find out the errors in software solutions and establishing the process to design maintainable K4 , K5
CO 4
software applications
CO 5 Write the report about what they are doing in project and learning the team working skills K5, K6