Syllabus Cse
Syllabus Cse
Digital Electronics
5 EC-211 3 1 0 4 5 CS-223 Theory of Computation 3 1 0 4
and Logic Design
Object Oriented
6 CS-214 0 0 2 1 6 CS-202 Data Structures Lab 0 0 2 1
Programming Lab
Microprocessor and Computer Organization
7 CS-215 0 0 2 1 7 CS-224 0 0 2 1
Interfacing Lab and Architecture Lab
Digital Electronics
8 EC-214 0 0 2 1 8 CS-225 Operating System Lab 0 0 2 1
and Logic Design Lab
Total Hours = 25 22 Total Hours = 25 22
Third Year
5thSemester 6thSemester
SN Code Subject L T P Credits SN Code Subject L T P Credits
Analysis and Design
1 CS-311 3 1 0 4 1 CS-321 Distributed Systems 3 1 0 4
of Algorithms
Data Base
2 CS-312 Management 3 1 0 4 2 CS-322 Software Engineering 3 1 0 4
Systems
3 CS-313 Compiler Design 3 1 0 4 3 CS-323 Digital Image Processing 3 1 0 4
Professional
3 DET 3 0 0 3 3 DET Professional Elective-III 3 0 0 3
Elective-I
Professional Professional Elective-
4 DET 3 0 0 3 4 DET 3 0 0 3
Elective-II IV
Industrial Training
5 CS-418 0 0 2 1 5 CS-428 General Proficiency 0 0 0 1
Presentation
Major Project
6 CS-419 0 0 12 6 6 CS-429 Major Project (Stage-II) 0 0 12 6
(Stage-I)
Total Hours = 26 19 Total Hours = 24 19
Credits 24 24 22 22 21 21 19 19 172
Hours/week 28 28 25 25 24 24 26 24 204
Open Elective-I
CS-306 Data Structures
CS-370 Operating System
Open Elective-II
CS-306 Data Structures
CS-380 Computer Networks
UNIT-04 Binary Trees: Introduction, complete and extended binary tree, traversing binary tree, binary 06L
search tree, Heaps, Huffman’s algorithm.
Basics of Structures: Mathematical induction, Algebraic structures properties, Semi group,
Monoid, Group and Sub group with examples and standard results, generators and evaluation of
powers, cosets and Langranges's theorem, rings, integral domains, fields.
UNIT-05 10L
Logic and Recursion: Propositional calculus-propositions, logical operators, truth tables,
Lattice, propositions generated by a set of recurrence relations – partial and total recursion -
problems.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Interpret statements presented in disjunctive normal form and determine their validity.
CO2: Reformulate statements from common language to formal logic.
CO3: Understand and apply the properties of relations in computer science and engineering problems.
CO4: Understand graph problems and implement effective solutions.
Books and References
1. Discrete Mathematical structures with applications to Computer Science by J. P. Tremblay and R Manohar, McGraw Hill.
2. Elements of Discrete Mathematics by C.L. Liu, McGraw Hill.
3. An Introduction to Discrete Mathematics by Steven Roman, Saunders Publisher.
4. Discrete Mathematics by Steven Barnett, Addison Wesley.
5. Discrete Mathematics by John A. Dossey, Albert D. Otto, Lawrence E. Spence and Vanden Eynden, Charles Addison-Wesley.
6. Discrete Mathematics and Its Applications by Kenneth H. Rosen, McGraw Hill.
UNIT-05 Introduction to Parallelism: Goals of parallelism, Instruction level parallelism, pipelining, 07L
superscaling, Processor level parallelism, Multiprocessor system overview.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Appreciate macro organization of any computing system.
CO2: Design instruction set architectures and develop their micro architectures.
CO3: Understand various digital arithmetic algorithms.
CO4: Analyze various caching and architecture memory system architectures.
CO5: Understand instruction level parallelism.
Books and References
1. Computer Organization and Architecture, Designing for Performance by William Stallings, Pearson Education.
2. Computer System Architecture by M. Morris Mano, Prentice Hall of India.
3. Computer Architecture: A quantitative Approach by David A. Patterson and John. L. Hennessy, Morgan Kaufmann.
4. Structured Computer Organization by Andrew S. Tanenbaum and Todd Austin, Prentice Hall of India.
UNIT-02 CPU Scheduling: Scheduling concepts, scheduling algorithms, algorithm evaluation, multiple 06L
processor scheduling, real time scheduling.
Concurrent Programming and Deadlocks: Critical regions, Conditional critical regions,
UNIT-03 Monitors, Interprocess communication, Messages, Pipes, Semaphores, Modularization, 06L
Synchronization, Concurrent languages. Deadlocks: Characterization, Prevention, Avoidance,
Detection and Recovery, Combined approach to Deadlock Handling, precedence graphs.
Memory Management: Memory Management, Contiguous allocation, static-swapping, overlays,
UNIT-04 dynamic partitioned memory allocation, demand paging, page replacement, segmentation. Non- 07L
contiguous allocation, paging, Hardware support, Virtual Memory.
File Systems: A Simple file system, General model of a file system, Symbolic file system,
UNIT-05 Access control verification, Logical file system, Physical file system, Allocation strategy module, 06L
Device strategy module, I/O initiators, Device handlers, Disk scheduling.
Networks, Security and Design Principles: Network operating system, distributed operating
UNIT-06 system, external security, operational security, password protection, access control, security 06L
kernels, hardware security, layered approach, design principle.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Understand and analyze the concepts of operating system and its management.
CO2: Illustrate the scheduling of processes for a given problem instance.
CO3: Identify the dead lock situation and provide appropriate solution.
CO4: Analyze memory management techniques and implement replacement algorithms.
CO5: Understand and implement file systems.
Books and References
1. Operating System Concepts by J.L. Peterson and A. Silberchatz, Addison Wesley.
2. An Introduction to Operating System by Harvey M. Dietel, Addison Wesley.
3. Operating Systems - A Design Oriented Approach by C. Crowley, Irwin Publishing.
4. Operating systems by W. Stallings, Prentice Hall.
5. Modern Operating system by A.S. Tanenbaum, Prentice Hall of India.
Note: The concerned Course Coordinator will prepare the actual list of experiments/problems at the start of semester based on above
generic list.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Implement elementary UNIX system commands.
CO2: Devise programs to test synchronization problems.
CO3: Design and develop user level thread library.
CO4: Design and implement file system.
Graph Algorithms: Representation of graphs, BFS, DFS, Topological sort, strongly connected
UNIT-04 components; single source shortest paths: Bellmen-Ford algorithm, Dijkstra’s algorithm; All pairs 06L
shortest path: The Warshall’s algorithm.
Dynamic Programming: Overview, difference between dynamic programming and divide and
conquer, Matrix chain multiplication, Traveling salesman Problem, longest Common sequence,
UNIT-05 09L
0/1 knapsack.
Backtracking: 8-Queen Problem, Sum of subsets, graph coloring, Hamiltonian cycles.
Branch and Bound: LC searching Bounding, FIFO branch and bound, LC branch and bound
application: 0/1 Knapsack problem, Traveling Salesman Problem.
UNIT-06 08L
Computational Complexity: Complexity measures, Polynomial vs. nonpolynomial time
complexity; NP-hard and NP-complete classes, examples.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Understand asymptotic notations to analyze the performance of algorithms.
CO2: Understand and apply various problem solving techniques
CO3: Solve given problem by selecting the appropriate algorithm design technique and justify the selection.
CO4: Know the concepts of P, NP, NP-hard and NP-complete problems.
Books and References
1. Fundamentals of Computer Algorithms by E. Horowitz and S. Sahni, Galgotia.
2. Introduction to Algorithms by Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein, MIT Press,
Cambridge.
3. The Design and Analysis of Computer Algorithms by A.V. Aho, J.E. Hopcroft and J.D. Ullman, Addison Wesley.
UNIT-05 Current Trends: Introduction to Distributed and parallel databases, Deductive Databases, 05L
Multimedia Databases, Real-Time Databases.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Understand basic concepts and appreciate the applications of database systems.
CO2: Explain relational data model, entity-relationship model, relational database design, relational algebra and SQL.
CO3: Understand basic database storage structures and access techniques:
CO4: Improve the database design by normalization.
CO5: Understand concurrency and recovery strategies for DBMS.
Books and References
1. Database System Concepts by Abraham Silberschatz, Henry F. Korth and S. Sudarshan, McGraw-Hill.
2. Fundamental Database Systems by Ramez Elmasri and Shamkant B. Navathe, Pearson Education.
3. An Introduction to Database Systems by C.J.Date, Addison Wesley.
4. Fundamentals of Database Systems by Ramez Elmasri and Shamkant B. Navathe, Addison Wesley.
5. Database System Implementation by Hector Garcia–Molina, Jeffrey D.Ullman and Jennifer Widom, Pearson Education.
6. Database System, Design, Implementation and Management by Peter Rob and Corlos Coronel, Thompson Learning Course
Technology.
UNIT-02 Software Requirements Analysis and Specification: Software requirements, problem 04L
analysis, requirements specification, functional specification with use cases, validation, matrices.
Software Architecture: Role of software architect, architecture views, component and
connector view, architecture style for C & C view, discussion and evaluating architectures.
UNIT-03 Planning a software project: Effort estimation, project scheduling and staffing, software 06L
configuration management plan, quality assurance plan, risk management, project monitoring
plan.
Function Oriented Design: Design principles, module level concepts, design notation and
UNIT-04 specification, structured design methodology, verification, metrics. Object oriented design: OO 05L
concepts, design concept, Unified Modeling Language, design methodology, metrics.
Detailed Design, Software Measurements, Metrics and Models: Detailed design and PDL,
UNIT-05 verification, Metrics and their scope, Qualities of a good Software metrics, classification of 06L
metrics, Cost estimation models COCOMO, Quality attributes, SQA, Quality Standards, ISO
9000 and CMM.
Coding: Programming principles and guidelines, coding process, refactoring, verification,
UNIT-06 metrics. Testing: Testing fundamentals, black-box testing, white-box testing, testing process, 06L
defect analysis and prevention, metrics - reliability estimation. CASE Tools: Types of CASE
tools, advantages and components of CASE tools, Unified Modeling Language (UML).
IPR and Copyright: Introduction and the need for intellectual property right (IPR), IPR in India –
UNIT-07 Genesis and Development, Patents: Searching, Drafting, Filling and Granting of Patents; 05L
Copyrights: Coverage and Need; Trademarks: Types, Rights, Kinds of signs of Trademarks;
Geographical Indications.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Understand and analyze the concept of software development and software engineering.
CO2: Compare and comprehend different software engineering process models.
CO3: Design of software projects and do the cost estimation.
CO4: Apply different software testing techniques.
Books and References
1. An Integrated Approach to Software Engineering by Pankaj Jalote, Narosa Publishing.
2. Software Engineering: A Practitioner’s Approach by Roger. S. Pressman, Tata McGraw Hill.
3. Fundamentals of Software Engineering by Rajib Mall, Prentice Hall of India.
4. UML Bible by Tom Pender, Wiley Dreamtech.
5. Software Engineering by Ian Sommerville, Addison-Wesley
Architecture: Data warehouse process & architecture, OLTP vs OLAP, ROLAP vs MOLAP,
UNIT-02 types of OLAP, servers, 3-Tier Data warehouse architecture, distributed and virtual Data 05L
warehouses, Data warehouse manager.
Implementation: Data warehouse implementation, computation of data cubes, modeling OLAP
UNIT-03 data, OLAP queries manager, Data warehouse back end tools, complex aggregation at multiple 06L
granularities, tuning and testing of Data warehouse.
Data Mining, Association rules and Classification: Types of Data, Data Mining
Functionalities, Interestingness of Patterns, Classification of Data Mining Systems, Data Mining
Task Primitives, Integration of a Data Mining System with a Data warehouse. Issues with Data
UNIT-04 Preprocessing, Mining Frequent Patterns, Associations and Correlations, Constraint Based 10L
Association Mining, Classification and Prediction: Decision Tree Induction, Bayesian
Classification, Rule Based Classification, Classification by Back propagation, Support Vector
Machines, Associative Classification, Lazy Learners, Prediction.
Cluster Analysis: Cluster Analysis, Types of Data, Categorization of Major Clustering Methods,
UNIT-05 K-means, Partitioning Methods, Hierarchical Methods, Density-Based Methods, Grid Based 06L
Methods, Model-Based Clustering Methods, Clustering High Dimensional Data, Constraint
Based Cluster Analysis, outlier Analysis.
Other Trends in Data Mining: Decision tree knowledge discovery through Neural Networks &
UNIT-06 05L
Genetic Algorithm, Rough Sets and Fuzzy techniques.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Describe fundamental data warehousing theory and its architecture.
CO2: Be able to approach data mining as a process, by demonstrating competency in the use of CRISP-DM, the Cross-Industry
Standard Process for Data Mining.
CO3: Understand and apply a wide range of clustering, estimation, prediction, and classification algorithms.
CO4: Understand and apply the most current data mining techniques and applications, such as text mining, mining genomics data,
and other current issues.
Books and References
1. Data Warehousing in the Real World by Sam Anahory and Dennis Murray, Pearson.
2. Data Mining-Concepts & Techniques by Jiawei Han and Micheline Kamber, Morgan Kaufmann.
3. Data Mining by Pieter Adriaans and Dolf Zantinge, Pearson
4. Data Warehousing, Data Mining and OLTP by Alex Berson, McGraw Hill.
5. Developing the Data Warehouses by W. H Inmon and C. Klelly, John Wiley & Sons.
6. Managing the Data Warehouses by W. H. Inmon and C.L. Gassey, John Wiley & Sons.
UNIT-02 Descriptive Statistics: Measures of central tendency, Measures of location of dispersions, 06L
Practice and analysis with R.
Basic Analysis Techniques: Basic analysis techniques, Statistical hypothesis generation and
UNIT-03 testing, Chi-Square test, t-Test, Analysis of variance, Correlation analysis, Maximum likelihood 07L
test, Practice and analysis with R.
UNIT-04 Data Analysis Techniques: Regression analysis, Classification techniques, Clustering, 07L
Association rules analysis.
Case Studies and Projects: Understanding business scenarios, Feature engineering and
UNIT-05 visualization, Scalable and parallel computing with Hadoop and Map-Reduce, Sensitivity 10L
Analysis.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Find a meaningful pattern in data and graphically interpret data
CO2: Implement the analytic algorithms
CO3: Handle large scale analytics projects from various domains
CO4: Develop intelligent decision support systems
Books and References
1. Probability and Statistics for Engineers & Scientists By Ronald E. Walpole, Raymond H. Myers, Sharon L. Myers and Keying Ye,
Prentice Hall.
2. The Elements of Statistical Learning, Data Mining, Inference, and Prediction by Trevor Hastie, Robert Tibshirani and Jerome
Friedman, Springer.
3. An Introduction to Statistical Learning: with Applications in R by G James, D. Witten, T Hastie, and R. Tibshirani, Springer.
4. Mining Massive Data Sets by Jure Leskovec, Anand Rajaraman and Jeff Ullman, Cambridge University Press.
UNIT-03 Host Forensics: Memory Forensics, Malware Analysis, Reverse Engineering Tools, Encryption, 06L
Password Cracking, Rainbow tables, Recovery of deleted files, File carving
Network Forensics: Introduction to network protocols, Network packet analysis, Collecting
UNIT-04 Network Based Evidence, Network Intrusion detection, Investigating Routers, Email Tracing, 06L
Internet Fraud. Dark Web, TOR network, Application of Big Data techniques for Log Analysis.
Multimedia Forensics and Case Studies: Image Forensics, Video Forensics, Audio Forensics,
UNIT-05 Steganography, Social Media Forensics, Identity theft, Corporate espionage, Online Defamation, 10L
Online harassment, mobile forensics, memory forensics.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Understand concepts of forensic analysis.
CO2: Perform image, video and audio forensics.
CO3: Identify possibility of tampering with the forensic evidences.
Books and References
1. Digital Evidence and Computer Crime by Eoghan Casey, Academic Press.
2. Real Digital Forensics: Computer Security and Incident Response by Keith J. Jones, Richard Bejtlich and Curtis Wayne Rose,
Addison-Wesley.
3. File system forensic analysis by Brian Carrier, Addison-Wesley Professional.
4. Digital Forensics by André Årnes, Wiley.
5. A Practical Guide to Computer Forensics Investigations by Darren R. Hayes, Pearson IT Certification.
UNIT-01 Sensor networks overview: Introduction, applications, design issues, requirements. Sensor node 07L
architecture, Architecture and factors influencing the sensor network design.
Network architecture: Optimization goals, evaluation metrics, network design principles. Sensor
UNIT-02 07L
network operating systems and brief introduction to sensor network programming.
Network protocols:
UNIT-03 07L
MAC protocols and energy efficiency.
UNIT-04 Routing protocols: Data centric, hierarchical, location-based, energy efficient routing etc. Sensor 07L
deployment, scheduling and coverage issues, self configuration and topology control.
Querying, data collection and processing, collaborative information processing and group
UNIT-05 connectivity, Target tracking, localization and identity management. Power management. Security 08L
and privacy.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Have an understanding of the principles and characteristics of wireless sensor networks.
CO2: Apply knowledge of wireless sensor networks to various application areas.
CO3: Analyze WSN protocols in terms of their energy efficiency and design new energy efficient protocols.
Books and References
1. Wireless Sensor Networks-An Information Processing Approach by Feng Zhao and Leonidas Guibas, Morgan Kauffman.
2. Wireless Sensor Networks: From Theory to Applications by Ibrahiem M. M. El Emary and S. Ramakrishnan, CRC Press.
3. Wireless sensor networks by Edgar H. Callaway, AUERBACH Publications.
4. Wireless Sensor Networks: Principles and Practice by Fei Hu and Xiaojun Cao, CRC Press.
5. Protocols and Architectures for Wireless Sensor Networks by Andreas Willig and Holger Karl, Wiley Publications.
UNIT-03 Trees: Basic terminology, General Trees, Binary Trees, Tree Traversing: in-order, pre-order and 07L
post-order traversal, building a binary search tree, Operations on Binary Trees.
Graphs: Basic definitions, representations of directed and undirected graphs, the single-source
UNIT-04 shortest path problem, the all-pair shortest path problem, traversals of directed and undirected 06L
graphs, directed acyclic graphs, strong components, minimum cost spanning tress, articulation
points and biconnected components, graph matching.
Sorting and Searching Techniques: Bubble sorting, Insertion sort, Selection sort, Shell sort,
UNIT-05 Merge sort, Heap and Heap sort, Quick sort, Sequential searching, Binary Searching, Index 06L
searching, Hash table methods.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Interpret and compute asymptotic notations of an algorithm to analyze the time complexity.
CO2: Use of linear and non-linear data structures as the foundational base for computer solutions to problems.
CO3: Demonstrate the ability to implement various types of static and dynamic lists.
CO4: Implement binary trees, binary tree traversals, and binary search trees and perform related analysis to solve problems.
CO5: Implement various types of sorting algorithms.
Books and References
1. An Introduction to Data Structures with applications by J.P. Tremblay and P.G. Sorenson, Tata McGraw Hill.
2. Data structures, Algorithms ad Applications in C++ by Sartaj Sahni, WCB/McGraw Hill.
3. Data Structures and Algorithms by Alfred V. Aho, Jeffrey D. Ullman and John E. Hopcroft, Addison Wesley.
4. Data Structures using C by Y. Langsam, M. J. Augenstein and A. M. Tenenbaum, Pearson Education.
5. Data Structures – A Pseudocode Approach with C by Richard F. Gilberg and Behrouz A. Forouzan, Thomson Brooks /COLE.
UNIT-02 CPU Scheduling: Scheduling concepts, scheduling algorithms, algorithm evaluation, multiple 06L
processor scheduling, real time scheduling.
Concurrent Programming and Deadlocks: Critical regions, Conditional critical regions,
UNIT-03 Monitors, Interprocess communication, Messages, Pipes, Semaphores, Modularization, 06L
Synchronization, Concurrent languages. Deadlocks: Characterization, Prevention, Avoidance,
Detection and Recovery, Combined approach to Deadlock Handling, precedence graphs.
Memory Management: Memory Management, Contiguous allocation, static-swapping, overlays,
UNIT-04 dynamic partitioned memory allocation, demand paging, page replacement, segmentation. Non- 07L
contiguous allocation, paging, Hardware support, Virtual Memory.
File Systems: A Simple file system, General model of a file system, Symbolic file system,
UNIT-05 Access control verification, Logical file system, Physical file system, Allocation strategy module, 06L
Device strategy module, I/O initiators, Device handlers, Disk scheduling.
UNIT-06 Networks, Security and Design Principles: Network operating system, distributed operating 06L
system, external security, operational security.
Course Outcomes
Upon successful completion of the course, the students will be able to
CO1: Understand and analyze the concepts of operating system and its management.
CO2: Illustrate the scheduling of processes for a given problem instance.
CO3: Identify the dead lock situation and provide appropriate solution.
CO4: Analyze memory management techniques and implement replacement algorithms.
CO5: Understand and implement file systems.
Books and References
1. Operating System Concepts by J.L. Peterson and A. Silberchatz, Addison Wesley.
2. An Introduction to Operating System by Harvey M. Dietel, Addison Wesley.
3. Operating Systems - A Design Oriented Approach by C. Crowley, Irwin Publishing.
4. Operating systems by W. Stallings, Prentice Hall.
5. Modern Operating system by A.S. Tanenbaum, Prentice Hall of India.