CSE 5 Syllabus
CSE 5 Syllabus
Professional Elective -1
Sr. No. Subject Code Name of Subject
1. CS102521 Statistical Foundation for Data Science
2. CS102522 Biometrics
3. CS102523 Object Oriented Modeling and Design
4 CS102524 Cryptography and Network Security
Alphabet, String and Languages, Regular expression, Properties of Regular Expression, Finite
automata and Regular expressions, Arden’s Theorem, Regular Expression to DFA conversion &
vice versa. Pumping lemma for regular sets, Application of pumping lemma, Regular sets and
Regular grammar, Closure properties of regular sets. Decision algorithm for regular sets and regular
grammar. [7Hrs.]
Definition and types of grammar, Chomsky hierarchy of grammar, Relation between types of
grammars, Context free grammar, Left most & right most derivation trees, Ambiguity in grammar,
Simplification of context free grammar, Chomsky Normal From, Greibach Normal From, properties
of context free language, Pumping lemma for context free language, Decision algorithm for context
tree language. [7Hrs.]
Basic definitions, Deterministic push down automata and non-deterministic push down automata,
Acceptance of push down automata, Push down automata and context free language, Turing
machine model, Representation of Turing Machine, Construction of Turing Machine for simple
problem’s, Universal Turing machine and other modifications .Church’s Hypothesis, , Halting
problem of Turing Machine. [7Hrs.]
Introduction and Basic concepts, Recursive function, Partial recursive function, Initial functions,
Composition of functions, Ackerman’s function, Recursively Enumerable and Recursive languages,
Decidable and decidable problem, Post correspondence problem, Space and time complexity [7Hrs.]
Text Books:
Reference Books:
UNIT – II: Data link layer : Design issues, framing, error detection and correction techniques with
numerical, CRC, Elementary Protocol : stop and wait, Sliding Window, Slip, Data link layer in
HDLC, ATM. Multiple Access Protocols, Link Layer Addressing, ARP, DHCP, Ethernet devices –
Hubs, Bridges, and Switches.
Medium Access sub layer: ALOHA, MAC addresses, CSMA, CSMA/CD. IEEE 802.X Standard
Ethernet, wireless LAN.
UNIT – III: Network Layer : Forwarding and Routing, Network Service Models, Virtual Circuit
and Datagram Networks, Router, Routing Table, Internet Protocol (IP) – IPv4 and IPv6 , ICMP,
Link State Routing , Distance Vector Routing, Hierarchical Routing , RIP, OSPF, BGP, Broadcast
and Multicast Routing , MPLS, Mobile IP, IP sec. IPv4 : Classes, Classless, Subneting, Super
netting and its numerical
UNIT – IV: Transport Layer: Transport Layer Services – Multiplexing and Demultiplexing, UDP
UNIT – V: Presentation Layer protocols: AFP, ICA, LPP, NCP, NDR, Telnet
Session Layer protocols: PAP, PPTP, RPC, SCP
Application Layer: Principles of Network Applications , The Web and HTTP, HTTPS, FTP,
Electronic Mail, SMTP, IRC, Video Conferencing, MIME, DNS, Socket Programming with TCP
and UDP.
Network Security: Principles of Cryptography, Firewalls, Application Gateway, Attacks and
Countermeasures.
Text Books:
S.No. Title Author(s) Publisher
Data Communications and
1 Behrouz A. Forouzan Third Edition TMH
Networking
Computer Networking: A Top-Down James F. Kurose and Pearson Education, Third
2
Approach Featuring the Internet Keith W. Ross edition, 2006
Reference Books:
S. No. Title Author(s) Publisher
4th Edition. Pearson
1 Computer Networks Andrew S Tanenbaum
Education/PHI
An Engineering Approach to 2nd Edition, Pearson
2 S. Keshav
Computer Networks Education
UNIT-1: Introduction Introduction to data science, Evolution of Data science, Stages in Data science
project, Facets of data, Data Science Project’s Lifecycle, Web APIs, Open Data sources, Data APIs,
Web Scrapping, Relational Databases access to process/access data.
UNIT-2 Introduction to Programming : Basic programming in python: list, string, dictionary, array
and tuples. Indexing, slicing, iterating and other basic operations. Data Science Toolkits using Python:
Matplotlib, NumPy, Scikit-learn, NLTK Numpy: creating arrays, arrays manipulation, reshape,
dimension, broadcasting, reading and writing array data on files. Pandas: Series and Data frames.
Reading files(.xlsx,.csv,.txt) in data frame. Row and index objects, function by elements, function by
rows and columns, statistical functions, sorting and ranking, correlation and covariance
UNIT-3: Data cleaning and preprocessing Data Collection strategies: web scrapping tools, handling
missing values; Data imputation techniques, data transformation techniques: Data Smoothing,
Attribution Construction, Data Generalization ,Data Aggregation, Data Discretization, Data
Normalization. Data Reduction techniques: Dimensionality reduction, Numerosity reduction, data
cube aggregation, data compression, discretization operation
UNIT-4: Exploratory data analysis Exploratory Analysis: Introduction to statistics used in data
science, Central tendencies and distributions, Variance Descriptive-Mean, Standard Deviation,
Skewness and Kurtosis, statistical summary of categorical and numerical data, data dispersion: range ,
interquartile range ,variance, standard deviation, coefficient of variation. data distribution: Continuous
and Normal distributions. Frequency table: two-way table with joint, conditional and marginal
probability. Pearson correlation.
UNIT-5 Data Visualization and model building: Introduction, Types of data visualization, A Simple
Interactive Chart, Set the Properties of the Plot, matplotlib, Bar chart, scatter chart histogram, pie chart
Text Books:
Reference Books:
Course Objectives
Course Outcomes
To understand Concepts, design and CO1. Students will familiar with the concepts of
characteristics of IoT. Internet of Things.
To understand Architecture of IoT. CO2. Students will familiar with IoT Architecture
To understand basic protocols of IoTs. CO3. Students will ready to Analyze basic
To understand challenges and protocols in wireless sensor network
applications of IoTs. CO4. Students will be capable to design IoT
To develop IoT applications using applications in different domain and be able
Tools. to analyze their performance
CO5. Capable to implement basic IoT
applications on embedded platform
Text Books:
Text Books:
To understand Concepts, design and CO1. Students will familiar with the concepts of
characteristics of IoT. Internet of Things.
To understand Architecture of IoT. CO2. Students will familiar with IoT Architecture
To understand basic protocols of IoTs. CO3. Students will ready to Analyze basic
To understand challenges and protocols in wireless sensor network
applications of IoTs. CO4. Students will be capable to design IoT
To develop IoT applications using applications in different domain and be able
Tools. to analyze their performance
CO5. Capable to implement basic IoT
applications on embedded platform
Note: Students need to perform at least 10 experiments. Use of sensors and actuators are not
restricted as provided. Student may use any other components also.
Text Books:
UNIT I [CO1]
Probability Theory: Sample Spaces-Events-Axioms–Counting–Conditional Probability and Bayes’
Theorem, The Binomial Theorem – Random variable and distributions : Mean and Variance of a
Random variable, Binomial-Poisson-Exponential and Normal distributions. Curve Fitting and
Principles of Least Squares Regression and correlation. (7Hrs)
UNIT II [CO2]
Sampling Distributions & Descriptive Statistics: The Central Limit Theorem, distributions of the
sample mean and the sample variance for a normal population, Sampling distributions (Chi Square, t,
F, z).Test of Hypothesis-Testing for Attributes. (7Hr)
UNIT IV [CO4]
Density Estimation: Recursive Partitioning- Smoothers and Generalized Additive Models- Survivals
Analysis Analyzing Longitudinal Data- Simultaneous Inference and Multiple Comparisons Meta-
Analysis- Principal Component Analysis-Multi dimensional Scaling-Cluster Analysis. (7Hrs)
UNIT V [CO5]
Introduction to R: Packages- Scientific Calculator- Inspecting Variables- Vectors-Matrices and
Arrays- Lists and Data Frames- Functions- Strings and Factors- Flow Control and Loops- Advanced
Text Books:
S.No. Title Author(s) Publisher
Introduction to Probability and
Academic Press
1 Statistics for Engineers and Sheldon M. Ross
Scientists
Springer Media Science
2 Introductory statistics with R Dalgaard, Peter
& Business
A Handbook of Statistical Analysis Apple Academic Press
3 Brain S.Everitt
Using R
4 Mastering Python for Data Science Samir Madhavan Packt
Reference Books:
S. No. Title Author(s) Publisher
Unit I: Introduction of Biometrics Biometrics: definition, history, basic working architecture, types;
Performance measures of biometrics; applications and benefits of biometrics; design of biometrics; biometric
identification versus verification.
Unit II: Face and Iris Biometrics Background of face and iris recognition; Face recognition methods: Eigen
face methods, contractive transformation method; Challenges of face biometrics; Design of iris biometrics:
image segmentation, image preprocessing, determination of iris region; Advantages and disadvantages of face
and iris biometrics.
Unit III: Fingerprint and Sign Language BiometricsFingerprint matching: image acquisition, image
enhancement and segmentation, image binarization, minutiaeextraction and matching; Sign language
biometrics: Indian sign language (ISL) biometrics, SIFT algorithm, advantages and disadvantages of ISL and
fingerprint biometrics.
Unit IV: Biometric Cryptography and Privacy Enhancement Introduction to biometric cryptography;
general purpose cryptosystems; Cryptographic algorithms: DES and RSA; Privacy concerns and issues related
to biometrics; biometrics with privacy enhancement; soft biometrics; comparison of various biometrics; Identity
Unit V: Scope of Biometrics and Biometric Standards Multimodal biometrics: basic architecture and fusion
scheme, application, example of AADHAAR; scope and future market of biometrics; role of biometrics in
enterprise and border security; DNA biometrics; biometric standards; biometric APIs.
Text Books:
S.No. Title Author(s) Publisher
Dr G R Sinha and
1 Biometrics: concepts and applications Wiley India Publications
Sandeep B. Patil
Anil K Jain, Arun Ross
2 Introduction to biometrics Springer
and Karthik Nandakumar
Samir nanawati, Michael
Biometrics Identity verification in a
3 Thieme and Raj US edition of Wiley India
networked world
Nanawati
UNIT – I Security Concepts: Introduction, The need for security, Security approaches, Principles of
security, Types of Security attacks, Security services, Security Mechanisms.
Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution
techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key
cryptography, possible types of attacks.
UNIT – II Symmetric key Ciphers: Block Cipher principles, DES, AES, Blowfish, RC5, IDEA,
Block cipher operation, Stream ciphers, RC4.
Asymmetric key Ciphers: Principles of public key cryptosystems, RSA algorithm, Diffie-Hellman
Key Exchange, Knapsack Algorithm.
UNIT – III Cryptographic Hash Functions: Message Authentication, Secure Hash Algorithm
(SHA-512).
Message authentication codes: Authentication requirements, HMAC, CMAC, Digital signatures.
Key Management and Distribution: Symmetric Key Distribution Using Symmetric & Asymmetric
Encryption, Distribution of Public Keys, Kerberos, Public – Key Infrastructure.
UNIT – IV Transport-level Security: Web security considerations, Secure Socket Layer and
Transport Layer Security, HTTPS, Secure Shell (SSH).
Wireless Network Security: Wireless Security, Mobile Device Security, IEEE 802.11 Wireless LAN,
Text Books:
Reference Books:
C K Shyamala, N
1 Cryptography and Network Security Harini, Dr T R Wiley India, 1st Edition.
Padmanabhan