M.C.a. (Master of Computer Application)
M.C.a. (Master of Computer Application)
SYLLABUS
PO 9 Multicultural competence
Possess knowledge of the values and beliefs of multiple cultures and
a global perspective.
PSO 2 - Entrepreneur
To create effective entrepreneurs by enhancing their critical thinking,
problem solving, decision making and leadership skill that will
facilitate startups and high potential organizations.
Semester–I Credit Hours Semester-II Credit Hours Semester-III Credit Hours Semester–IV Credi Hours
t
1.1. Core-I 5 7 2.1. Core-IV 5 6 3.1. Core-VII 5 6 4.1. Core-XI 5 6
1.3 Core – III 4 6 2.3 Core – VI 4 6 3.3 Core – IX 5 6 4.3 Project with 7 10
viva voce
1.4 Discipline 3 5 2.4 Discipline 3 4 3.4 Core – X 4 6 4.4Elective - VI 3 4
Centric Centric (Industry /
Elective -I Elective – III Entrepreneurship)
20% Theory
80% Practical
1.5 Generic 3 5 2.5 Generic 3 4 3.5 Discipline 3 3 4.5 Skill 2 4
Elective-II: Elective -IV: Centric Enhancement
Elective - V course /
Professional
Competency Skill
2.6 NME I 2 4 3.6 NME II 2 3 4.6 Extension 1
Activity
3.7 Internship/ 2 -
Industrial
Activity
20 30 22 30 26 30 23 30
Total Credit Points -91
Choice Based Credit System (CBCS), Learning Outcomes Based Curriculum
Framework (LOCF) Guideline Based Credits and Hours Distribution System
for all Post – Graduate Courses including Lab Hours
Semester - I
Core – I Theory
5 7 3 25 75 100
Discrete Mathematics
Core – II Theory
Linux and shell 5 7 3 25 75 100
programming
Core – III Theory
4 6 3 25 75 100
Python Programming
Elective – I Data
Engineering and
Management / Data
Engineering and
Management Lab/ 3 5 3 40 60 100
Architecture and
Frameworks / Architecture
and Frameworks Lab
Elective – II Software
Development Technologies
/Software Development
Technologies Lab / 3 5 3 40 60 100
Soft Computing /
Soft Computing Lab
20 30
Numbe Hour
Examinatio Marks
r s
n
Course of Per
Duration I. ES
Credit Wee Total
(hrs) A E
s k
Semester - II
Core - IV Theory
Data Structures and 5 6 3 25 75 100
Algorithms
Core – V Theory
5 6 3 25 75 100
Big Data Analytics
Core – VI Lab
Data Structures and 4 6 3 40 60 100
Algorithms Lab
Elective - III
Internet of Things /
Internet of Things Lab/
3 4 3 40 60 100
Computer Vision /
Computer Vision Lab
Elective – IV Cyber
Security/
Cyber Security Lab/
Block chain Technologies / 3 4 - 40 60 100
Block chain Technologies
Lab
NME Fundamentals of
2 4 3 25 75 100
Human Rights
22 30 1000
Numbe Hour Marks
Examinatio
r s
n
Course of Per I. ES
Duration
Credit Wee Total
(hrs) A E
s k
Semester - III
Core VII Theory
Advanced Java 5 6 3 25 75 100
Programming
Core VIII Theory
5 6 3 25 75 100
Web Technology
Core IX Theory
Advanced Machine Learning 5 6 3 25 75 100
(AML)
Core X Lab
Advanced Java 4 6 3 40 60 100
Programming lab
Elective –V Lab Web
3 3 3 40 60 100
Technology Lab
NME Lab
Integrated Technology
2 3 3 40 60 100
(AML) Lab
(Self-study course)
Internship Industrial
2 - - - 100 100
Activity
26 30 1100
Numbe Hour Marks
Examinatio
r s
n
Course of Per I. ES
Duration
Credit Wee Total
(hrs) A E
s k
Semester - IV
Core - XI
Industry Dynamics
5 6 - 25 75 100
Technology-Data
Visualisation
Core – XII
5 6 - 25 75 100
Big Data Analytics
Project with Viva voce 7 10
Elective – VI
Social Networks /
Social Networks Lab/
3 4 40 60 100
High Performance
Computing / High
Performance Computing
Skill Enhancement Professional
Competency Skill 2 4
Extension Activity 1
Total 23 30
Total Credits 91
Discrete Mathematics
Course Objective
To know the concepts of relations and functions
To distinguish among different normal forms and quantifiers
To solve recurrence relations and permutations & combinations
To know and solve matrices , rank of matrix & characteristic equations
To study the graphs and its types
Unit-I
Unit-V
Graphs -Connected Graphs -Euler Graphs- Euler line-Hamiltonian circuits
and paths –planar graphs – Complete graph-Bipartite graph-Hyper cube
graph-Matrix representation of graphs
Text book
1. N.Chandrasekaran and M.Umaparvathi, Discrete mathematics, PHI
Learning Private Limited, New Delhi, 2010.
Reference Book
1. Kimmo Eriksson &Hillevi Gavel, Discrete Mathematics & Discrete
Models, Studentlitteratur AB, 2015.
2. Kenneth H. Rosen Discrete Mathematics and applications, Mc Graw Hill,
2012
Course Outcomes
Course Objective
Unit-I
Basic bash Shell Commands: Interacting with the shell-Traversing the file
system-Listing files and directories-Managing files and directories-Viewing
file contents. Basic Script Building:Using multiple commands-Creating a
script file-Displaying messages-Using variables-Redirecting input and output-
Pipes-Performing math-Exiting the script. Using Structured
Commands:Working with the if-then statement-Nesting ifs-Understanding
the test command-Testing compound conditions-Using double brackets and
parentheses-Looking at case.
Unit-II
Unit-III
Unit-IV
Unit-V
Text book:
Reference Books:
Course Outcomes
Unit I
Unit II
Strings and Text Files: Accessing Characters and substrings in strings - Data
encryption-Strings and Number systems- String methods – Text - Lists and
Dictionaries: Lists – Dictionaries – Design with Functions: A Quick review -
Problem Solving with top-Down Design - Design with recursive Functions -
Managing a Program’s namespace - Higher-Order Functions
Unit III
Unit IV
Unit V
Django: Installing Django – Building an Application – Project Creation –
Designing the Data Schema - Creating an administration site for models -
Working with QuerySets and Managers – Retrieving Objects – Building List
and Detail Views
Text Book:
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M S M S S S S M S S
CO2 S S S M S S S S S S M S
CO5 S S S S S S S S S M M S
S- Strong; M-Medium; L-Low
● To develop and implement the shell script for IPC and Networking.
● To demonstrate PostgreSQL.
List of Programs
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M S S S S S S M S S
CO2 S S S S S S S S S S M S
CO3 S S S S S S M S S M L S
CO4 S S S S S S S M S S S S
CO5 S S S S L S M S S M M S
Course Objectives
List of Programs
Note: Use the following Dataset
http://www.tableau.com/sites/default/files/training/global_superstore.zip
Implement the following using Excel
CO3: Comprehend, create and deploy labels and heat map. K1-K6
CO5: Illustrate and apply data visualization tool for any data set K1-K6
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M L M S - - - - - -
CO2 S M S S S M - - - - - -
CO3 S S S S S S - - - - - -
CO4 S M M S M L - - - - - -
CO5 M S M L S M - - - - - -
Exercises
1. Characteristics of Technical Writing
2. Development of Employability Skills
3. Vocabulary Development
4. Sentence Completion
5. Error Spotting
6. Interpretation of Verbal Analogy
7. Interpretation of Reading (Comprehension -Conception)
8. Interpretation of Reading (Comprehension -Reasoning)
9. Practice for writing E-mails/Technical Blogs/Forums
10. PPT Preparation / Demonstration of Technical Presentation
11. Preparation of Resume
12. Preparation for Job Interviews / Mock Interview Section
13. Group Discussion Skills
14. Developing Listening Skill(Comprehension)
15. Practice for Short Speeches / Situational Conversation
16. English through Mass Media
17. Essential Grammar
18. Communicating and collaborating with peer members
19. Team Empowerment
20. Persuasive Communication
Text Books
1. Uma Narula, “Development Communication: Theory and Practice”,
Revised Edition, Har-Aanad Publication, 2019.
2. Annette Capel and Wendy Sharp, “Cambridge English: Objective First”,
Fourth Edition, Cambridge University Press, 2013.
3. Emma Sue-Prince, “The Advantage: The 7 Soft Skills You Need to Stay
One Step Ahead”, First Edition, FT Press, 2013.
4. Guy Brook-Hart, “Cambridge English: Business Benchmark”,Second
Edition, Cambridge University Press, 2014.
5. Norman Lewis, “How to Read Better & Faster”, Binny Publishing House,
NewDelhi, 1978.
Reference Books
Course Objectives:
● To get a clear understanding of various ADT structures.
Unit-I
Abstract Data Types: Introduction-Date Abstract Data Type-Bags-Iterators.
Arrays: Array Structure-Python List-Two Dimensional Arrays-Matrix Abstract
Data Type. Sets, Maps: Sets-Maps- Multi-Dimensional Arrays.
Unit-II
Algorithm Analysis: Experimental Studies-Seven Functions-Asymptotic
Analysis. Recursion: Illustrative Examples-Analyzing Recursive Algorithms-
Linear Recursion- Binary Recursion-Multiple Recursion.
Unit-III
Stacks, Queues, and Deques: Stacks- Queues- Double-Ended Queues
Linked. Lists: Singly Linked Lists-Circularly Linked Lists-Doubly Linked Lists.
Trees: General Trees-Binary Trees-Implementing Trees-Tree Traversal
Algorithms.
Unit-IV
Priority Queues: Priority Queue Abstract Data Type- Implementing a
Priority Queue- Heaps-Sorting with a Priority Queue. Maps, Hash Tables,
and Skip Lists: Maps and Dictionaries-Hash Tables- Sorted Maps-Skip Lists-
Sets, Multisets, and Multimaps.
Unit-V
Search Trees: Binary Search Trees-Balanced Search Trees-AVL Trees-Splay
Trees. Sorting and Selection: Merge sort-Quick sort-Sorting through an
Algorithmic Lens- Comparing Sorting Algorithms-Selection. Graph
Algorithms: Graphs-Data Structures for Graphs-Graph Traversals-Shortest
Paths-Minimum Spanning Trees.
Text book:
1. Rance D. Necaise, “Data Structures and Algorithms Using Python”,
John Wiley & Sons, 2011. (Unit – 1)Chapters: 1, 2, 3.
2. Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser, “Data
Structures and Algorithms in Python”, John Wiley & Sons, 2013. (Unit –
2, 3, 4, and 5)Chapters: 3 to 12, and 14.
Reference books:
1. Dr. Basant Agarwal; Benjamin Baka, “Hands-On Data Structures and
Algorithms with Python: Write complex and powerful code using the
latest features of Python 3.7”, Packt Publishing, 2018.
2. Magnus Lie Hetland, “Python Algorithms: Mastering Basic Algorithms in
the Python Language”, Apress, 2014.
Course Outcome:
On the successful completion of the course, students will be able to,
CO1 Understand various ADT concepts
Familiar with implementation of ADT models with Python
CO2 language and understand how to develop ADT for the various
real-time problems
K1-K6
CO3 Apply with proper ADT models with problem understanding
CO4 Apply and Analyze right models based on the problem domain
● To explore the big data tools such as Hive, HBase and Pig.
UNIT I
Big Data and Analytics: Classification of Digital Data: Structured Data-
Semi Structured Data and Unstructured Data.
Introduction to Big Data: Characteristics – Evolution – Definition - Challenges
with Big Data - Other Characteristics of Data - Big Data - Traditional
Business Intelligence versus Big Data - Data Warehouse and Hadoop.
Environment Big Data Analytics: Classification of Analytics – Challenges - Big
Data Analytics important - Data Science - Data Scientist - Terminologies
used in Big Data Environments – Basically Available Soft State Eventual
Consistency - Top Analytics Tools
UNIT II
Technology Landscape:NoSQL, Comparison of SQL and NoSQL, Hadoop -
RDBMS Versus Hadoop - Distributed Computing Challenges – Hadoop
Overview - Hadoop Distributed File System - Processing Data with Hadoop -
Managing Resources and Applications with Hadoop YARN - Interacting with
Hadoop Ecosystem
UNIT III
Mongodb and Mapreduce Programming:MongoDB: Mongo DB - Terms
used in RDBMS and Mongo DB - Data Types - MongoDB Query Language.
UNIT IV
Hive: Introduction – Architecture - Data Types - File Formats - Hive Query
Language Statements – Partitions – Bucketing – Views - Sub- Query – Joins
– Aggregations - Group by and Having – RCFile - Implementation - Hive User
Defined Function - Serialization and Deserialization.
UNIT V
Pig: Introduction - Anatomy – Features – Philosophy - Use Case for Pig - Pig
Latin Overview - Pig Primitive Data Types - Running Pig - Execution Modes of
Pig - HDFS Commands - Relational Operators - Eval Function - Complex Data
Types - Piggy Bank - User-Defined Functions - Parameter Substitution –
Diagnostic Operator - Word Count Example using Pig - Pig at Yahoo! - Pig
Versus Hive
Text Book:
1. Seema Acharya, Subhashini Chellappan, “Big Data and Analytics”,
Wiley Publications, First Edition,2015
Reference Book:
1. Judith Huruwitz, Alan Nugent, Fern Halper, Marcia Kaufman, “Big data
for dummies”, John Wiley & Sons, Inc. (2013)
2. Tom White, “Hadoop The Definitive Guide”, O’Reilly Publications, Fourth
Edition, 2015
3. Dirk Deroos, Paul C.Zikopoulos, Roman B.Melnky, Bruce Brown, Rafael
Coss, “Hadoop For Dummies”, Wiley Publications, 2014
4. Robert D.Schneider, “Hadoop For Dummies”, John Wiley & Sons, Inc.
(2012)
5. Paul Zikopoulos, “Understanding Big Data: Analytics for Enterprise
Class Hadoop and Streaming Data, McGraw Hill, 2012 Chuck Lam,
“Hadoop In Action”, Dreamtech Publications, 2010
Course Outcomes
Course Objectives:
● To understand Stack , Queue and Doubly Linked ADT structures.
1. Recursion concepts.
i) Linear recursion
ii) Binary recursion.
2. Stack ADT.
3. Queue ADT.
4. Doubly Linked List ADT.
5. Heaps using Priority Queues.
6. Merge sort.
7. Quick sort.
8. Binary Search Tree.
9. Minimum Spanning Tree.
10. Depth First Search Tree traversal.
Course Outcome:
CO5 Learn how to develop ADT for the various real-time problems
K1- Remember, K2 - Understand, K3 - Apply , K4 - Analyze, K5 -
Evaluate, K6 -Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S M L L L L S S M M S S
CO2 S M S M M L S M S L M M
CO3 S S S L L L M M M M S L
CO4 S S S M M S M M S S S L
CO5 S S S S L M S M M M M L
L - Low, M- Medium, S - Strong
Big Data Analytics Lab
Course Objectives
● To teach the fundamental techniques for handling the big data tools.
● To enable students to have skills that will help them to solve complex.
List of Programs
1. Implement File System Shell Commands for HDFS in Hadoop
Environment
2. Write a Mapreduce program using single reduce function for finding
Maximum and Minimum Number
3. Write a Mapreduce program using multiple reduce function for Word
Count in an given Text document
4. Implement the following using Pig Latin Input and Output Operations
Relational Operations
5. Implement the following using Pig Latin User Defined Functions
Advanced Relational Operations
6. Write a Word Count program using Pig Latin Script
7. Write a program to find a maximum temperature using Pig Latin Script
8. Implement the following using Hive commands Handling the Database
Creating and Manipulating table
9. Implement Simple Queries for database using Mongo
10. Implement Simple Queries for collections using Mongo
Course Outcomes
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M M S - - - - - -
CO2 S M S S S M - - - - - -
CO3 S S S S S S - - - - - -
CO4 S M S S S M - - - - - -
CO5 S S S S S S - - - - - -
Unit I: Introduction:
Meaning and Definitions of Human Rights – Characteristics and Importance
of Human Rights – Evolution of Human Rights – Formation, Structure and
Functions of the UNO - Universal Declaration of Human Rights – International
Covenants – Violations of Human Rights in the Contemporary Era.
Unit II: Human Rights in India:
Development of Human Rights in India – Constituent Assembly and Indian
Constitution – Fundamental Rights and its Classification – Directive Principles
of State Policy – Fundamental Duties.
Unit III:
Rights of Marginalized and other Disadvantaged People: Rights of
Women – Rights of Children – Rights of Differently Abled – Rights of Elderly -
Rights of Scheduled Castes – Rights of Scheduled Tribes – Rights of
Minorities – – Rights of Prisoners – Rights of Persons Living with HIVAIDS –
Rights of LGBT.
Unit IV:
Human Rights Movements: Peasant Movements (Tebhaga and Telangana)
– Scheduled Caste Movements (Mahar and Ad-Dharmi) – Scheduled Tribes
Movements (Santhal and Munda) – Environmental Movements ( Chipko and
Narmada BachaoAndolan) – Social Reform Movements (Vaikom and Self
Respect).
Unit V:
Redressal Mechanisms: Protection of Human Rights Act, 1993
(Amendment 2019) – Structure and Functions of National and State Human
Rights Commissions – National Commission for SCs – National Commission
for STs – National Commission for Women – National Commission for
Minorities – Characteristics and Objectives of Human Rights Education.
References
1. SudarshanamGankidi, Human Rights in India: Prospective and
Retrospective, Rawat Publications, Jaipur, 2019.
2. SatvinderJuss, Human Rights in India, Routledge, New Delhi, 2020.
3. Namita Gupta, Social Justice and Human Rights in India, Rawat
Publications, Jaipur, 2021.
4. Mark Frezo, The Sociology of Human Rights, John Willy & Sons, U.K.
2014.
5. Chiranjivi J. Nirmal, Human Rights in India: Historical, Social and
Political Perspectives, Oxford University Press, New York, 2000.
6. Dr. S. Mehartaj Begum, Human Rights in India: Issues and
perspectives, APH Publishing Corporation, New Delhi, 2010.
7. Asha Kiran, The History of Human Rights, Mangalam Publications,
Delhi, 2011.
8. Bani Borgohain, Human Rights, Kanishka Publishers & Distributors,
New Delhi-2, 2007.
9. Jayant Chudhary, A Textbook of Human Rights, Wisdom Press, New
Delhi, 2011.
Advanced Java Programming
Course Objectives
Unit – I
Unit – II
Unit – III
Unit- IV
Unit – V
Reference books :
Course Outcomes
On the successful completion of the course, students will be
able
K1-K6
CO1: Understand the Object Oriented Program including
classes and methods; inheritance and exception handling
Complete comprehension of String functions and I/O
CO2: K1-K6
Streams
K1-K6
CO3: Creation of graphical representation using Applet
Application of Servlets for designing Web based K1- K6
CO4:
applications
Usage of JDBC connectivity and implementation of the K1-K6
CO5:
concept to get desired results from database
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5-
Evaluate, K6- Create
CO1 S S S - M S - - - S M -
CO2 S S S - M S - - - L M -
CO3 S S M - L S - - - M M -
CO4 M S M - S S - - - M S -
CO5 S M M - M L - - - M M -
S- Strong; M-Medium; L-Low
Web Technologies
COURSE OBJECTIVES:
UNIT -I
UNIT – II
UNIT - III
UNIT- IV
UNIT - V
TEXT BOOKS:
1. Robert W. Sebesta: Programming the World Wide Web, Eighth Edition,
Pearson education, 2015. UNITS: 1,2,3,4
2. Dayley Brad, Dayley Brendan ,”AngularJS, JavaScript, and jQuery All in
One”, Sams Teach Yourself 1st Edition, Kindle Edition, 2015.UNIT: 5
REFERENCE BOOKS:
1. M. Srinivasan: Web Programming Building Internet Applications,
3rdEdition, Wiley India, 2009.
2. Jeffrey C. Jackson: Web Technologies-A Computer Science Perspective,
Pearson Education, 7thImpression,2012.
3. Chris Bates: Web Technology Theory and Practice, Pearson Education,
2012.
4. Raj Kamal: Internet and Web Technologies, McGraw Hill Education.
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 M S S S S M M S M M S S
CO2 S S M S S S M S S S S S
CO3 S S S M S S M M S M M S
CO4 S S S M S M M S S M S M
CO5 S S S M S S M S M S S M
Course Objectives
To understand the concepts of Machine Learning.
● To understand the theoretical and practical aspects of types of machine
learning
● To teach and get familiarized with supervised learning and their
applications.
● To teach and get familiarized with the concepts and algorithms of
unsupervised learning.
● To appreciate the concepts and algorithms of deep learning.
Unit I:
Unit II:
Lazy Learning – Classification Using Nearest Neighbors:The kNN
Algorithm- Diagnosing Breast Cancer with the kNN Algorithm- Probabilistic
Learning – Classification Using Naive Bayes: Basic concepts of Bayesian
Methods- The Naïve Bayes Algorithm- Example – filtering Mobile Phone Spam
with the Naive Bayes Algorithm.
Unit III:
Unit IV:
Unit V:
Introduction to Deep Learning: Introduction to Deep Learning, Single
Layer Perceptron Model (SLP), Multilayer Perceptron Model (MLP),
Convolutional Neural Networks (CNNs), Recurrent Neural Networks
(RNNs),Restricted Boltzmann Machines (RBMs).
Text Books:
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S - - S L - S - - - -
CO2 S S M - S L - S - - - -
CO3 S S S - S L - S - S S S
CO4 S S M - S L - - - -
CO5 S S S - S L - S - S S S
S- Strong; M-Medium; L-Low
Advanced Java Programming Lab
COURSE OBJECTIVES:
List of Experiments:
Course Outcomes
CO3: Develop Servlets and JSP for creating Web based K4, K5 HO
applications using JDBC
CO1
CO2
CO3
S- Strong; M-Medium; L-Low
Web Technologies Lab
COURSE OBJECTIVES:
● Learn how to create web pages using HTML, CSS and Javascript.
● Implement dynamic web pages using Javascript, Jquery and Angular
Java script
● To create web applications using PHP and MySQL
● Create web pages using XML and Cascading Style Sheets
● Create XML documents and Schemas.
PROGRAM LIST
1. Develop a web page to display your education details in a tabular format.
2. Develop a web page to display your CV on a web page.
3. Design a Homepage having three links: About Us, Our Services and
Contact Us. Create separate web pages for the three links.
4. Design a web page to demonstrate the usage of inline CSS, internal CSS
and external CSS.
5. Design an XML document and create a style sheet in CSS & display the
document in the browser.
6.Develop a web page to Create image maps.
7. Design a web page to perform input validation using Angular Javascript.
8. Develop a web page in PHP to fetch details from the database.
9. Design a web page to hide paragraph using JQuery
10. Create a web page and add Javascript to handle mouse events and form
events
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 M S S S S M M S M M S M
CO2 S S M S S S M S S S M S
CO3 S S S M M S M M S M M S
CO4 S M S M S M M S S M S M
CO5 M M S M S S M S M M S M
Course Objectives
List of Programs
Course Outcomes
On the successful completion of the course, students will be able to
To understand and implement the mathematical and K1-K6
CO1 statistical prospective of machine learning algorithms
through python programming
To recognize and develop the machine learning models K1-K6
CO2
through python in built functions
To understand, impart and develop the machine learning K1-K6
CO3
models for real-time dataset
To comprehend , impart and implement the deep learning K1-K6
CO4
models for real-time applications
To identify and evaluate the performance machine learning K1-K6
CO5
models for real-time dataset
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
- -
CO1 S S S - S - - M - -
- -
CO2 S S S - S - - M - -
- S
CO3 S S S - S - - M S S
- -
CO4 S S S - S - - M - -
- S
CO5 S S S - S - - M S S
Course Objectives:
Unit-I
Unit-II
Unit-III:
CRM: Three main pillars of CRM. GETTING TO KNOW YOUR CUSTOMER: 360-
degree client view. UTILIZING ARTIFICIAL INTELLIGENCE AND MACHINE
LEARNING IN YOUR CRM STRATEGY: Evolution of AI-Current state of AI-
Teaming up AI with people-Applying AI to your CRM solution-ethical aspects
of AI-An example of AI in CRM processes.
Unit-V:
Text Books:
Reference Books:
Course Outcome:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M S M S S S S M S S
CO2 S S S M S S S S S S M S
CO3 S M S S M S M S S M S S
CO4 S S S S S S S M S S M S
CO5 S S S S S S S S S M M S
Course Objectives:
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S S S S M S S S M S S
CO2 S S S S S S S S S S L S
CO3 S M S S M S M S S S S S
CO4 S S S M S S S L S S M S
CO5 S S S S M S S S S S S S
architecture
software development
architecture
Unit – I
Unit – II
Unit – III
Unit – V
Course Outcomes
On the successful completion of the course, students will be able to
PO1 PO P P P P P P P PO PO PO
2 O O O O O O O 10 11 12
3 4 5 6 7 8 9
CO M S - L M S M M L S - -
1
CO M S - M M L S S M M S -
2
CO S M - S S M S M M S M -
3
CO S M L S M L S L S M S M
4
CO M S M L S L M S L S - M
5
S- Strong; M-Medium; L-Low
Architecture and Frameworks - Lab
Course Objectives
● To understand and implement the basic concepts of Software
architecture and its functions.
● To acquire programming skills to develop Implement various
technologies and services associated with network protocols along
with the challenges of data transfer.
● Implement the importance and functioning of Routing Protocols over
communication service.
● To acquire skills to connect two routers and any two switches.
Note: Use the solid servers and client specification for implementation
https://github.com/solid/specification/.
1. Find the WebID profile document and display the necessary attributes
2. Set and access the primary authentications with account recovery
mechanisms
3. Set and access the secondary authentications with account recovery
mechanisms
4. Design authorization and web access control
5. Find the content representation
6. Reading resources from HTTP REST API and WebSockets API
7. Writing resources from HTTP REST API and WebSockets API
8. Data notification using Social Web App protocol
9. Managing subscriptions and friends list using Social Web App protocol
10. Managing list of followers and following list using Social Web App
protocol
Course Outcomes
Unit I
Transmission Control Protocol/Internet Protocol : Fundamental Architecture -
Internet Protocol Basics - Routing - Transport-Layer Protocols :
Transmission Control Protocol - User Datagram Protocol - Stream Control
Transmission Protocol - Real-Time Transport Protocol.
Unit II
Internet Architecture: Internet Exchange Point - History of Internet Exchange
Points - Internet Service Provider Interconnection Relationships - Peering and
Transit - IP Routing Protocols: Overview of Routing Protocols - Routing
Information Protocol - Open Shortest Path First - Border Gateway Protocol -
Multiprotocol Label Switching.
Unit III
IP Quality Of Service : Introduction - Quality of Servicein IP Version 4 -
Integrated Services - Differentiated Services - Quality of Service with Nested
Differentiated Services Levels - IP Multicast and Anycast: Addressing -
Multicast Routing - Routing Protocols –Anycasting- IPv6 Anycast Routing
Protocol: ProtocolIndependent Anycast—Sparse Mode - Transport over
Packet: Draft-Martini Signaling and Encapsulation - Layer-2 Tunneling
Protocol.
Unit IV
Virtual Private Wired Service - Types of Private Wire Services - Generic Routing
Encapsulation - Layer-2 Tunneling Protocol - Layer-3 Virtual Private Network
2547bis, Virtual Router - IP and Optical Networking: IP/Optical Network Evolution -
Challenges in Legacy Traditional IP/Optical Networks - Automated Provisioning in
IP/Optical Networks - Control Plane Models for IP/Optical Networking - Next-
Generation MultiLayer Network Design Requirements - Benefits and Challenges in
IP/Optical Networking - IP Version 6: Addresses in IP Version 6 - IP Packet Headers
- IP Address Resolution - IP Version 6 Deployment: Drivers and Impediments.
Unit V
IP Traffic Engineering: Models of Traffic Demands - Optimal Routing with
Multiprotocol Label Switching - Link-Weight Optimization with Open Shortest
Path First - Extended Shortest-Path-Based Routing Schemes - IP Network
Security: Introduction - Detection of Denial-of-Service Attack - IP Trace
back- Edge Sampling Scheme - Advanced Marking Scheme - Mobility
Support for IP: Mobility Management Approaches - Security Threats Related
to IP Mobility - Mobility Support in IPv6 - Reactive Versus Proactive Mobility
Support - Relation to Multihoming - Protocols Supplementing.
Text Book :
1. “Advanced Internet Protocols, Services and Applications”, Eiji Oki,
Roberto Rojas-Cessa, MallikarjunTatipamula, Christian Vogt, Copyright
© 2012 by John Wiley & Sons, Inc.
Reference Books :
1. “TCP/IP Protocol Suite”, BehrouzA.Forouzan, Fourth Edition, Tata
Mcgraw-Hill Edition 2010.
2. “Computer Communications and Networking Technologies” - Michael A.
Gallo & William M. Hancock- BROOKS&COLE
3. “Computer Networks and Internets” -Douglas E. Comer- PEARSON.
4. Data and Computer Communications- Eighth Edition- William Stallings-
Pearson Education.
5. Network Security Bible, 2nd edition, Eric Cole, Wiley Publishers.
6. Data communication and networks –James Irvine and David Harley-
Publishers: Wiley India
Course Outcomes:
On the successful completion of the course, students will be able to
Understand, analyse and examine the concepts of K1- K6
CO1 Communication Protocols with its architecture and functions
P P P P P P P
PO PO PO PO PO
O O O O O O O
2 5 10 11 12
1 3 4 6 7 8 9
CO1 M S - L M S M M - S - -
CO2 S M - S M L M S - M - -
CO3 S S - M S S S M - S - -
CO4 S M L S M L S L - M L -
CO5 M S M L S L M S - S L
S- Strong; M-Medium; L-Low
Network Protocols Lab
Course Objectives
● To understand and implement the basic concepts of Transmission
Control Protocol/Internet Protocol and associated functions.
● To acquire programming skills in Implement various technologies and
services associated with network protocols along with the challenges
of data transfer.
● Implement the importance and functioning of Routing Protocols over
communication service.
● To acquire skills to connect two routers and any two switches.
a. ipconfig
b. ping
c. traceroute
d. netsat
e. nslookup
a. ifconfig
b. ip
c. tracepath
d. ss
e. tcpdum
Course Outcomes
Unit-I
Unit-II
Unit-III
Defining Classes: Class Definitions in C# - System.Object - Constructors and
Destructors - OOP Tools in Visual Studio - Class Library Projects - Interfaces
Versus Abstract Classes - Struct Types - Shallow Copying Versus Deep
Copying - Defining Class Members: Member Definitions - Additional Class
Member Topics - Interface Implementation - Partial Class Definitions - Partial
Method Definitions - The Call Hierarchy Window - Basic Cloud Programming:
Cloud, Cloud Computing, and the Cloud Optimized Stack - Cloud Patterns
and Best Practices - Using Microsoft Azure C# Libraries to Create a Storage
Container - Creating an ASP.NET 4.7 Web Site That Uses the Storage
Container - Advanced Cloud Programming and Deployment: Creating an
ASP.NET Web API - Deploying and Consuming an ASP.NET Web API on
Microsoft Azure - Scaling an ASP.NET Web API on Microsoft Azure.
Unit-IV
.NET Standard and .NET Core: Cross-Platform Basics and Must Know Terms –
Need of .NET - Referencing and Targeting Frameworks - .NET Core - Building
and Packaging a.NET Standard Library - Building a .NET Core Application
with Visual Studio - Porting from .NET Framework to .NET Core - ASP.NET
and ASP.NET Core: Overview of Web Applications – Use of ASP.NET -
ASP.NET Web Forms - Creating ASP.NET Core Web Applications – Files: File
Classes for Input and Output – Streams - Monitoring the File System - XML
and JSON: XML Basics - JSON Basics - XML Schemas - XML Document Object
Model - Converting XML to JSON - Searching XML with XPath.
Unit-V
LINQ: LINQ to XML - LINQ Providers - LINQ Query Syntax - LINQ Method
Syntax - Ordering Query Results - Understanding the orderby Clause -
Querying a Large Data Set -Using Aggregate Operators - Using the Select
Distinct Query - Ordering by Multiple Levels -Using Group Queries - Using
Joins – Databases: Using Databases - Installing SQL Server - Express -
Entity Framework - Code First Database - Finding the Database - Navigating
Database Relationships - Handling Migrations - Creating and Querying XML
from an Existing Database - Universal Apps: Windows Universal Apps - App
Concepts and Design - App Development - Common Elements of Windows
Store Apps - Windows Store.
Text book:
Reference books:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S L M L L L - - - - - L
CO2 S M L M M L - L - L - L
CO3 S S S M M L - L - L - L
Course Objectives:
Course Outcome:
Course Objectives
● To learn and anlyse .NET DevOps for Azure and its applications
Unit -I
Implementing Microservices: Client to microservices communication,
Interservice communication, data considerations, security, monitoring,
microservices hosting platform options. Azure Service Fabric: Introduction,
core concepts, supported programming models, service fabric clusters,
develop and deploy applications of service fabric. Monitoring Azure Service
Fabric Clusters: Azure application, resource manager template, Adding
Application Monitoring to a Stateless Service Using Application Insights,
Cluster monitoring, Infrastructure monitoring.
Unit-II
Azure Kubernetes Service (AKS): Introduction to kubernetes and AKS,
AKS development tools, Deploy applications on AKS. Monitoring AKS:
Monitoring, Azure monitor and analytics, monitoring AKS clusters, native
kubernetes dashboard, Prometheus and Grafana. Securing Microservices:
Authentication in microservices, Implenting security using API gateway
pattern, Creating application using Ocrlot and securing APIs with Azure AD.
Database Design for Microservices: Data stores, monolithic approach,
Microservices approach, harnessing cloud computing, database options on
MS Azure, overcoming application development challenges. Building
Microservices on Azure Stack: Azure stack, Offering IaaS, PaaS on-premises
simplified, SaaS on Azure stack.
Unit-III
.NET DevOps for Azure: DevOps introduction, Problem and solution.
Professional Grade DevOps Environment: The state of DevOps, professional
grade DevOps vision, DevOps architecture, tools for professional DevOps
environment, DevOps centered application. Tracking work: Process template,
Types of work items, Customizing the process, Working with the process.
Tracking code: Number of repositories, Git repository, structure, branching
pattern, Azure repos configuration, Git and Azure.
Unit-IV
Building the code: Structure of build, using builds with .NET core and Azure
pipelines, Validating the code: Strategy for defect detection, Implementing
defect detection. Release candidate creation: Designing release candidate
architecture, Azure artifacts workflow for release candidates, Deploying the
release: Designing deployment pipeline, Implementing deployment in Azure
pipelines. Operating and monitoring release: Principles, Architectures for
observability, Jumpstarting observability.
Unit-V
Introduction to APIs: Introduction, API economy, APIs in public sector. API
Strategy and Architecture: API Strategy, API value chain, API architecture,
API management. API Development: Considerations, Standards, kick-start
API development, team orientation. API Gateways: API Gateways in public
cloud, Azure API management, AWS API gateway. API Security: Request-
based security, Authentication and authorization.
Text Book
1. Harsh Chawla and Hemant Kathuria, Building Microservices
Applications on Microsoft Azure- Designing, Developing, Deploying, and
Monitoring, Apress, 2019.
2. Jeffrey Palermo , NET DevOps for Azure A Developer’s Guide to DevOps
Architecture the Right Way, Apress, 2019.
3. Thurupathan and Vijayakumar, Practical API Architecture and
Development with Azure and AWS - Design and Implementation of
APIs for the Cloud, Apress, 2018.
Reference Books
1. Karl Matthias and Sean P. Kane, Docker: Up and Running, O'Reilly
Publication, Second Edition 2018.
2. Len Bass,IngoWeber,LimingZhu,”DevOps, A Software Architects
Perspective”, AddisonWesley-Pearson Publication, First Ediiton 2015.
3. John Ferguson Smart,”Jenkins, The Definitive Guide”, O'Reilly
Publication, First Ediiton 2011.
Course Outcomes
CO2 S S M - M - - - S - - -
CO3 S S S - S - - - S S S S
CO4 S S M - M - - - S - - -
CO5 S S M - M - - - S - - -
S- Strong; M-Medium; L-Low
Software Development Technologies Lab
Course Objectives
● To understand the concept of DevOps with associated
technologies and methodologies.
● To be familiarized with Jenkins, which is used to build & test
software Applications
● To understand Continuous integration in Devops environment.
● To understand Docker to build, ship and run containerized
images
● To use Docker to deploy and manage Software applications
running on Container.
List of Programs
1. Deploy Version Control System / Source Code Management, install git
and create a GitHub account.
2. Perform various GIT operations on local and Remote repositories using
GIT Cheat-Sheet
3. Continuous Integration: install and configure Jenkins with
Maven/Ant/Gradle to setup a build Job.
4. Build the pipeline of jobs using Maven / Gradle / Ant in Jenkins, create
a pipeline script to Test and deploy an application over the tomcat
server.
5. Implement Jenkins Master-Slave Architecture and scale your Jenkins
standalone implementation by implementing slave nodes.
6. Setup and Run Selenium Tests in Jenkins Using Maven.
7. Implement Docker Architecture and Container Life Cycle, install Docker
and execute docker commands to manage images and interact with
containers.
8. Implement Dockerfile instructions, build an image for a sample web
application using Dockerfile.
9. Install and Configure Pull based Software Configuration Management
and provisioning tools using Puppet.
10. Implement LAMP/MEAN Stack using Puppet Manifest.
Course Outcomes
CO2 S S M - M - - - S S S S
CO3 S S M - M - - - S S S S
CO2 S S M - M - - - S S S S
CO3 S S M - M - - - S S S S
S- Strong; M-Medium; L-Low
Soft Computing
COURSE OBJECTIVES:
UNIT-I
INTRODUCTION TO SOFT COMPUTING: Artificial Neural Networks-
Biological Neurons- Basic Models of Artificial Neural Networks-Connections-
Learning-Activation Functions- Important Terminologies of ANNs- Muculloch
and Pitts Neuron-Linear Separability- Hebb Network-Flowchart of Training
Process-Training Algorithm.
UNIT - II
SUPERVISED LEARNING NETWORK : Perceptron Networks–Perceptron
Learning Rule-Architecture-Flowchart for Training Process-Perceptron
Training Algorithms for Single Output Classes-Perceptron Training Algorithm
for Multiple Output Classes-Perceptron Network Testing Algorithm - Adaptive
Linear Neuron-Delta Rule for Single Output Unit-Flowchart for training
algorithm-Training Algorithm – Testing Algorithm - Multiple Adaptive Linear
Neurons-Architecture-Flowchart of Training Process-Training Algorithm-Back
Propagation Network-Architecture-Flowchart for Training Process-Training
Algorithm-Learning Factors of Back-Propagation Network-Radial Basis
Function Network- Architecture-Flowchart for Training Process-Training
Algorithm.
UNIT-III
UNSUPERVISED LEARNING NETWORK: Associative Memory Networks -
Auto Associative Memory Network-Architecture-Flowchart for Training
Process-Training Algorithm-Testing Algorithm- Bidirectional Associative
Memory- Architecture-Discrete Bidirectional Associative Memory-Iterative
Auto Associative Memory Networks - Linear AutoAssociative Memory-
Kohonen Self-Organizing Feature Map- Architecture-Flowchart for Training
Process-Training Algorithm.
UNIT-IV
INTRODUCTION TO FUZZY LOGIC: Classical Sets –Operations on Classical
Sets-Fuzzy sets - Fuzzy Sets- Properties of Fuzzy Sets- Fuzzy Relations –
Membership Functions: Fuzzification- Methods of Membership Value
Assignments – Defuzzification – Lambda-Cuts for Fuzzy sets and Fuzzy
Relations – Defuzzification Methods–Max-Membership Principle-Centroid
Method-Weighted Average Method-Mean Max Membership-Center of Sums-
Center of Largest Area-First of Maxima - Fuzzy Set Theory - Fuzzy Arithmetic
And Fuzzy Measures: Fuzzy Measures – Belief and Plausibility Measures-
Probability Measures-Possibility and Necessity Measures- Formation of Rules
–Fuzzy Inference Systems (FIS) – Fuzzy Decision Making – Fuzzy Logic
Control Systems.
UNIT-V
GENETIC ALGORITHM: Introduction - Biological Background - Traditional
Optimization and Search Techniques -Gradient Based Local Optimization
Method-Random Search-Stochastic Hill Climbing-Simulated Annealing-
Symbolic Artificial Intelligence-Operators in Genetic Algorithm -Encoding-
Selection-Crossover-Mutation - Stopping Conditions for Genetic Algorithm
Flow-Genetic Programming-Working of Genetic Programming-Characteristics
of Genetic Programming-Data Representation.
TEXT BOOKS
1. Principles of Soft Computing, S.N. Sivanandam, S.N.Deepa, Wiley, Third
Edition, 2019.
COURSE OUTCOMES:
Program List
1. Implementation of Logic gates using Artificial Neural Network.
2. Implementation of Perception Algorithm.
3. Implementation of Back Propagation Algorithm.
4. Implementation of Self Organizing Maps.
5. Implementation of Radial Basis Function Network.
6. Implementation of De-Morgan’s Law.
7. Implementation of McCulloch Pits Artificial Neuron model
8. Implementation of Simple genetic algorithm
9. Implementation of fuzzy based Logical operations
10. Implementation of fuzzy based arithmetic operations
COURSE OUTCOMES:
Syllabus
UNIT I: Introduction: Social Media Strategy-Important First Decisions -
Websites, Blogs - RSS Feeds Mapping -Preparation - Multimedia Items
Gathering Content for Blog Posts RSS Feeds & Blogs-RSS Feeds-The Feed
Reader-The Feed-Options for Creating an RSS Feed-Planning Feed-Blogs-
Options for Starting. Blog and RSS Feed-Feed or Blog Content-Search Engine
Optimization (SEO)-Feed Burner-RSS Feed and Blog Directories-An
Optimization Plan for Blog or RSS Feed
UNIT II: Building a Word Press Powered Website: Word Press as A CMS -
Diversity of Word Press Sites-The Anatomy of a Word Press Site -a Brief Look
at the Word Press Dashboard Planning - Site Themes Plug-ins setting up
Sidebars Building Pages- Posting Blog Entries. Podcasting, Vidcasting, &
Webcasting- Publishing Options for Podcast- Creating and Uploading Podcast
Episodes-Publishing Podcast Optimizing Podcast- Webcasting
UNIT III: Social Networking & Micro-Blogging: Facebook-The Facebook
Profile -Myspace LinkedIn-Twitter-Niche Social Networking Sites-Creating
Own Social Network-Promoting Social Networking Presence- Social
Bookmarking & Crowd-Sourcing - Social Bookmarking-A Social Bookmarking
Strategy- Crowd-Sourced News Sites- Preparation And Tracking Progress
Media Communities-Image Sharing Sites-Image Sharing Strategy-Video
Sharing Sites-Video Sharing Strategy-Searching And Search Engine
Placement-Connecting With Others.
UNIT IV: Widgets & Badges: Highlighting Social Web Presence-Sharing And
Syndicating Content Making Site More Interactive-Promoting Products And
Making Money-Using Widgets In Word Press-Widget Communities And
Directories- Working Widgets Into Strategy Social Media Newsrooms-Building
Social Media Newsroom - Populating The Newsroom-Social Media News
Releases-Social Media Newsroom Examples. More Social Tools-Social
Calendars-Social Pages Wikis-Social Search Portals-Virtual Worlds.
Unit V: Website optimization: A Website Optimization Plan-Streamlining Web
Presence-An Integration Plan- Looking to the Future-Life streaming: The
Future of Blogging-Distributed Social Networking-Social Ranking, Relevancy,
and ―Defriending-Web 3.0 or The Semantic Web-Mobile Technology-
Measuring Your Success-A Qualitative Framework-A Quantitative Framework-
Tools to Help You Measure-Come To Your Own Conclusions
Text Book:
1. Deltina hay ―A Survival Guide To social Media and Web 2.0
Optimization‖, Dalton Publishing, 2009
Reference Books:
1. Miriam Salpeter ―Social Networking for Career Success‖ Learning
Express, 2011.
2. Miles, Peggy, ―Internet world guide to webcasting‖ Wiley, 2008
Professionals”, Wiley Publication,2015.
Course Outcomes
CO3 S S S - S L - S - S S S
CO4 S S S - S L - S - S S S
CO5 S S S - S L - S - S S S
S- Strong; M-Medium; L-Low
Social Networking Lab
Course Objectives
networking environment.
● To enable students to have skills that will help them to solve real time
applications.
List of Programs
COs PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M M S - - - S - -
CO2 S M S S S M - - - S - -
CO3 S S S S S S - - - S S S
CO4 S M S S S M - - - S - -
CO5 S S S S S S - - - S S S
S- Strong; M-Medium; L-Low
High Performance Computing
Course Objectives:
Unit-I
Modern processors: Stored-program computer architecture-General
purpose cache based microprocessor architecture-Memory hierarchies-
Multicore processors-Multithreaded processors-Vector processors. Basic
optimization techniques for serial code: Scalar profiling-Common sense
optimizations-Simple measures, large impact-The role of compilers-C++
optimizations.
Unit-II
Data access optimization: Balance analysis and light speed estimates-
Storage order-Algorithm classification and access optimizations-The Jacobi
algorithm-Algorithm classification and access optimizations-Sparse matrix-
vector multiply. Parallel computers: Taxonomy of parallel computing
paradigms-Shared-memory computers-Distributed memory computers-
Hierarchical systems-Networks.
Unit-III
Unit-IV
Unit-V
Reference books:
Course Outcome:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S L M L L L S S S S M L
CO2 S M L M M L S L S L S L
CO3 S S S M M L M L M L S L
CO4 S S S M S L M L M S S S
CO5 S S S M M L M M M M S L
Course Objectives:
Course Outcome:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S L M L L L S S S S M L
CO2 S M L M M L S L S L S L
CO3 S S S M M L M L M L S L
CO4 S S S M S L M L M S S S
CO5 S S S M M L M M M M S L
L - Low, M- Medium, S - Strong
Internet of Things
Course Objectives:
● To get familiar with the evolution of IOT with its design principles
● To outline the functionalities and protocols of internet communication
IOT applications
embedded code
IOT Access Technologies: Physical and MAC layers, topology and Security of
IEEE 802.15.4, 802.15.4g, 802.15.4e, 1901.2a, 802.11ah and LoRaWAN –
Network Layer: IP versions, Constrained Nodes and Constrained Networks –
Optimizing IP for IOT: From 6LoWPAN to 6Lo, Routing over Low Power and
Lossy Networks – Application Transport Methods: Supervisory Control and
Data Acquisition – Application Layer Protocols: CoAP and MQTT.
UNIT – IV
Prototyping Online Components: Getting started with an API - Writing a New
API - Real-Time Reactions - Other Protocols. Techniques for Writing
Embedded Code: Memory Management - Performance and Battery Life –
Libraries - Debugging.
UNIT – V
Text Books:
Reference Books:
1. Ovidiu Vermesan and Peter Friess, “Internet of Things – From Research
and Innovation to Market Deployement” , River Publishers, 2014.
2. Peter Waher, “Learning Internet of Things” ,Packt Publishing, 2015.
3. Donald Norris, “The Internet of Things: Do-It-Yourself at Home
Projects for Arduino, Raspberry Pi and BeagleBoneBlack”,McGraw Hill,
2015.
Course Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M S S S S S S S S S
CO2 S S S S S S S M S S M S
CO3 S M S S S S M S S M S S
CO4 S S S S S S S S S S M S
CO5 S S S S M S S S S M M S
S- Strong; M-Medium; L-Low
Internet of Things Lab
Course Objectives:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S M S S S M S S S S S
CO2 S S S S S S S M S S M S
CO3 S M S S S S M S S M S S
CO4 S S S S S S S S S L M S
CO5 S S S S M S L S S M M S
S- Strong; M-Medium; L-Low
Computer Vision
Course Objectives:
● To get understanding about Computer vision techniques behind a wide
variety of real- world applications.
● To get familiar with various Computer Vision fundamental algorithms
and how to implement and apply.
● To get an idea of how to build a computer vision application with
Python language.
● To understand various machine learning techniques that are used in
computer vision tasks.
● To incorporate machine learning techniques with computer vision
systems.
Unit-I
Basic Image Handling and Processing: PIL – the Python Imaging Library-
Matplotlib-NumPy-SciPy-Advanced example: Image de-noising. Local
Image Descriptors: Harris corner detector-SIFT - Scale-Invariant Feature
Transform-Matching Geotagged Images.
Unit-II
Image to Image Mappings:Homographies-Warping images-Creating
Panoramas. Camera Models and Augmented Reality: The Pin-hole
Camera Model-Camera Calibration-Pose Estimation from Planes and Markers-
Augmented Reality.
Unit-III
Multiple View Geometry:Epipolar Geometry-Computing with Cameras and
3D Structure-Multiple View Reconstruction-Stereo Images. Clustering
Images: K-means Clustering-Hierarchical Clustering-Spectral Clustering.
Unit-IV
Searching Images: Content based Image Retrieval-Visual Words-Indexing
Images- Searching the Database for Images-Ranking Results using
Geometry-Building Demos and Web Applications. Classifying Image
Content: K-Nearest Neighbors-Bayes Classifier-Support Vector Machines-
Optical Character Recognition.
Unit-V
Image Segmentation: Graph Cuts-Segmentation using Clustering-
Variational Methods. OpenCV: Python Interface-OpenCV Basics-Processing
Video-Tracking.
Course Outcome:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S L M L L L M M M S S L
CO2 S M L M M L S L S L S L
CO3 S S S M M L M L M L M L
CO4 S S S M M L M L M L S L
CO5 S S S M M L S L S L S L
L - Low, M- Medium, S - Strong
Computer Vision Lab
Course Objectives:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S L M L L L M M M S S L
CO2 S M L M M L S L S L S L
CO3 S S S M M L M L M L M L
CO4 S S S M M L M L M L S L
CO5 S S S M M L S L S L S L
Unit-V
Digital Signatures – Elgamal Digital Signature Scheme – Schnorr Digital
Signature Scheme – NIST Digital Signature Algorithm – Elliptic Curve Digital
Signature Algorithm – RSA-PSS Digital Signature Algorithm – Key
Management and Distribution: Symmetric Key Distribution Using Symmetric
Encryption – Symmetric Key Distribution Using Asymmetric Encryption –
Distribution of Public Keys – X.509 Certificates – Public-Key Infrastructure.
Text Books
1. William Stallings, “Cryptography and Network Security – Principles and
Practices”, Pearson Education / PHI, 7th Edition.
2. Behrouz A Forouzan, DebdeepMukhopadhyay, “Cryptography And
Network Security”, McGraw Hill Education, 3rd Edition.
Reference Books
Course Outcomes :
On the successful completion of the course, students will be able to:
Comprehend and analyze the security concepts to apply
CO1: K1-K6
and evaluate the encryption techniques in various models
Understand and examine the various data encryption
CO2: standards and number theory. Illustrate and evaluate the K1-K6
various techniques in different applications
Grasp the knowledge of AES techniques and apply to
CO3: K1-K6
evaluate the performance with different key types
Comprehend and analyse the basics of hash function and
CO4: MAC that helps to develop the encryption models in various K1-K6
application
Understand and illustrate the need of digital signature to
CO5: examine the method of providing good security to the K1-K6
document. And also learn the concept of key management
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5-
evaluate and K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 M S - L M S M M - S - -
CO2 M S - M M L M S - M - -
CO3 S S - M S M S M - S - -
CO4 S M L S M L S M - M - -
CO5 M S M L S L M S - S - -
Course Objective
1. Write a program that contains a string (char pointer) with a value ‘Hello
world’. The program should XOR each character in the string with 0 and
display the result
2. Write a program to perform encryption and decryption using the Ceaser
Cipher
3. Write a program to perform encryption and decryption using the Hill
Cipher
4. Write a program to perform encryption and decryption using the
Substitution Cipher
5. Write a program to perform encryption and decryption using the DES
algorithm
6. Connect to switch with a computer and enable the port security
7. Defeating malware using Building Trojans and Rootkit hunter
8. Implement signature scheme – Digital Signature Standard
9. Identify and capture the user name and password in a same network
using wireshark
10. Implement Man-in-the-middle attack and Session hijacking
Course Outcomes
Unit-I
Introduction – Applications – History of wireless communication – A
Simplified reference model - Wireless transmission – Frequencies for radio
transmission – Regulations – Signals –Antennas - Signal propagation:
Path loss of radio signals - Additional signal propagation effects - Multi-
path propagation – Multiplexing –Modulation Chapters: 1, 2.1 to 2.6
Unit-II
Spread spectrum – Direct sequence spread spectrum – Frequency hopping
spread spectrum – Cellular systems. Medium access control: Hidden and
exposed terminals – Near and far terminals – SDMA, FDMA, TDMA, Fixed
TDM, Classical Aloha, slotted Aloha, Carrier sense multiple access –
Reservation TDMA – Multiple access with collision avoidance – Polling –
CDMA – Spread Aloha multiple access. Chapters: 3.1 to 3.3, 3.4.1 to 3.4.4,
3.4.7 to 3.4.9, 3.5.1
Unit-III
GSM - Mobile services – System architecture – Radio interface – Protocols –
Localization and calling – Handover – Security – New Data services. UMTS
and IMT-2000 - Satellite Systems: Applications – Basics – Routing –
Localization – Handover.Chapters: 3.6, 4.1.1 to 4.1.8, 4.4, 5.2 to 5.6
Unit-IV
Wireless LAN: Infra red vs. radio transmission – Infrastructure and ad-hoc
network – IEEE 802.11 – System architecture – Protocol architecture –
Physics layer – Medium access control layer – MAC management – Blue
tooth. Mobile network layer: Mobile IP: Goals, assumptions and
requirements – entities and terminology – packet delivery – Agent discovery
– Registration – Tunneling and encapsulation Recent technologies Chapters:
7.1 to 7.3.5, 7.5, 8.1.1 to 8.1.6
Unit-V
WAP: Architecture – wireless datagram Protocol, Wireless transport layer
security, Wireless transaction protocol, Wireless session protocol, Wireless
application environment, Mobile ad-hoc networks – MANET Characteristics –
Classification of MANETs, Routing of MANETs, Proactive Routing Protocol -
DSDV, Reactive Routing Protocols – DSR, AODV.Chapter10.3.1 to 10.3.6
(Text Book 2- 6.1, 6.2, 6.4, 6.5, 6.6)
Course Outcomes:
Text Book:
1. Jochen Schiller, “Mobile Communications”, Second Edition,
PearsonEducation, 2013.
2. KumKumGarg, “Mobile Computing Theory and Practice”,
Pearson Education, 2014.
Reference Books:
1. Rifaat A. Dayen, “Mobile Data & Wireless LAN Technologies”,
Prentice Hall,1997.
2. Steve Mann and Scoot Schibli, “The Wireless Application Protocol”,
John Wiley & Inc., 2000.
Course Outcomes:
On the successful completion of the course, students will be able to
L - - - - - - - - - - -
CO1
S M M M M - M - - - - -
CO2
S M M M M - M - - L - M
CO3
CO4 S M M M M - M - - L - M
CO5 S M M M M - M - - L - M
3. S- Strong; M-Medium; L-Low
Mobile Computing Application Development Lab
Course Objective
List of programs
1. Implement the WML tags and Image using WML/J2ME.
2. Design of simple Calculator having +, -, * and / using WML/J2ME.
3. Design of Calendar for any given month and year using WML/J2ME.
4. Design a Timer to System Time using WML/J2ME.
5. Design of a simple game using WML/J2ME.
6. Animate an image using WML/J2ME.
7. Design a personal phone book containing the name, phone no.,
address, e-mail, etc
8. Browsing the Internet using a Mobile phone simulator.
9. Develop a Mobile application to view the live streaming using video
view.
10. Develop a mobile application that makes use of any database.
Course Outcomes
On the successful completion of the course, students will be able to
Apply the knowledge of mobile application development
CO1: with WML/J2ME. K1-K6
Course Objectives:
● To understand the basics of Cybercrime and Computer forensics with
protecting mechanism
Unit – I
Text books:
1. Dr.JeetendraPande, “Introduction to Cyber Security” Published by
Uttarakhand Open University, 2017.(Chapter: 1.2-6.4,9.3-12.2)
2. Anthony reyes, Kevin o’shea, Jim steele, Jon R. Hansen, Captain
Benjamin R. Jean Thomas Ralph, “Cyber-crime investigations” -
bridging the gaps between security professionals, law enforcement,
and prosecutors, 2007.(Chapter: 4, 5, 6, 7, 8, 9,10)
Reference Books:
1. Sebastian Klipper, “Cyber Security”
EinEinblickfurWirtschaftswissenschaftlerFachmedien Wiesbaden,2015
2. John G.Voller Black and Veatch, “Cyber Security” Published by John
Wiley & Sons, Inc., Hoboken, New Jersey Published simultaneously in
Canada ©2014.
Course Outcomes
On the successful completion of the course, students will be able to
Understand, describe, analyze and examine the basics
CO1 K1- K6
of Cyber security concepts and its implementation in
:
India
Comprehend and demonstrate the security tips in
K1- K6
browsers, WLAN, social networks, Email security and
CO2
Smart phone. Apply the investigations in post mortem
:
andForensics
CO3 Understand, apply and evaluate the various
: investigation roles and Wi Fi protecting mechanisms. K1- K6
CO4 Understand, illustrate and evaluate the method of seize
: the digital information and evidences forensics data K1- K6
and
evaluate the forensics reports
CO5 Comprehend, apply and appraise the methods digital
: forensics with cybercrime prevention techniques K1- K6
PO P P P P P P P P PO PO PO
1 O O O O O O O O 10 11 12
2 3 4 5 6 7 8 9
CO S L - L M L M M - M - -
1
CO M S - L M L M M - M - -
2
CO M S L L M L M M - M M L
3
CO4 S M L S M L S M - M - -
CO5 M S M L S L M S - S - -
S- Strong; M-Medium; L-Low
Cyber Security Lab
COURSE OBJECTIVES
To learn and implement to Change the wireless device mode as
monitor mode
To develop in multiple vulnerabilities webserver
To understand and implement the open ports in the network
To acquire programming skills in Implement various wireless device
modes
To comprehend related to find the sub domains of webpage
Course Outcomes
On the successful completion of the course, students will be able to
TEXT BOOKS
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven
Goldfeder. Bitcoin and Cryptocurrency Technologies. Princeton University Press,
2016. ISBN 978-0691171692
REFERENCES
Andreas Antonopoulos. Mastering Bitcoin: Programming the open block
chain. Oreilly Publishers, 2017. ISBN 978-9352135745
Course Outcomes
On the successful completion of the course, students will be able to
Understand, apply and examine the characteristics of
CO blockchain,bitcoin and consensus algorithm in centralized and
decentralized methods. K1-K6
1:
Comprehend and demonstrate the application of hashing and
CO public key cryptography in protecting the blockchain. K1-K6
2: Understand and analyse the elements of trust in a Blockchain:
CO validation, verification, and consensus. K1-K6
3: Comprehend and evaluate the alternate coin, Ethereum and smart
CO4 contract. K1-K6
Grasp and apply the knowledge of Tools and languages for
CO5 applications K1-K6
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5-Evaluate, K6-
Create
Course Outcomes
On the successful completion of the course, students will be able to:
Course Objectives
Transportation Model: North West corner Method, Least cost method, and
Vogel’s Approximation Method. Assignment Model : Hungarian assignment
model – Travelling Sales Man Problem.
Text Book
1. KantiSwarup, P. K. Gupta and Man Mohan, Operations Research, Sultan
Chand and Sons, New Delhi, 2014. (Unit 1, 2, and 3)
Course outcome:
CO
S S M S S S M S S S S S
1
CO
S S S S S L S M S S M S
2
CO
S M S S M S M S S L S M
3
CO
S S S S S S S S S S M S
4
CO
S S S S M L S S S M M S
5
Exercises
1. Simplex algorithm
2. North-West Corner algorithm
3. Least Cost algorithm
4. Vogel’s Approximation Algorithm
5. Modi algorithm
6. Hungarian assignment Algorithm
7. Travelling Sales man algorithm
8. Steepest Descent algorithm
9. Conjugate gradient algorithm
10.Ant Colony algorithm
Solution Architecture
Course Objectives:
UNIT I
Evolution of solution architecture - The benefits of solution architecture -
Solution architecture in the public cloud - Solution Architects in an
Organization - Types of solution architect role - Understanding a solution
architect's responsibilities - Attributes of the Solution Architecture -
Scalability and elasticity - Security and compliance - Cost optimization and
budget
UNIT II
Principles of Solution Architecture Design - Scaling workload - Building
resilient architecture - Design for performance - Using replaceable resources
- Cloud Migration and Hybrid Cloud Architecture Design - Benefits of cloud-
native architecture - Creating a cloud migration strategy - Steps for cloud
migration - Creating a hybrid cloud architecture - Designing a cloud-native
architecture
UNIT III
Solution Architecture Design Patterns - Building an n-tier layered architecture
- Creating multi-tenant SaaS-based architecture - Building stateless and
stateful architecture designs - Understanding SOA - Performance
Considerations - Design principles for architecture performance - Technology
selection for performance optimization - Managing performance monitoring
UNIT IV
Architectural Reliability Considerations - Design principles for architectural
reliability - Technology selection for architecture reliability - Improving
reliability with the cloud - Operational Excellence Considerations - Designing
principles for operational excellence - Selecting technologies for operational
excellence - Achieving operational excellence in the public cloud
UNIT V
Cost Considerations - Design principles for cost optimization - Techniques for
cost optimization - Cost optimization in the public cloud - Architecting Legacy
Systems - Learning the challenges of legacy systems - Defining a strategy
for system modernization - Looking at legacy system modernization
techniques - Defining a cloud migration strategy for legacy systems
Text Books:
CO5 Optimize the cost in cloud and assess the legacy system
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5-
Evaluate, K6- Create
Mapping with Programme Outcomes
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S S S S S S S S M S S
CO2 S S S S S S S S S S M S
CO3 S M S S S S M S S S S S
CO4 S S S M S S S S S S M S
CO5 S S S S M S S S S M M S
Course Objectives:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 S S S S S S S S S M S S
CO2 S S S S S S S S S S M S
CO3 S M S S S S M S S S S S
CO4 S S S M S S S S S S M S
CO5 S S S S M S S S S M M S