ME Cse Regulation 2018
ME Cse Regulation 2018
SEMESTER - II
Course Hours/ Week Credit Maximum Marks
Sl.No. Course Name
Code L T P C CA ES Total
THEORY
1. CS18211 Advanced Algorithms 3 0 0 3 30 70 100
2. CS18212 Soft Computing 3 0 0 3 30 70 100
3. Professional Elective - III 3 0 0 3 30 70 100
4. Professional Elective - IV 3 0 0 3 30 70 100
PRACTICAL
5. CS18221 Advanced Algorithms Laboratory 0 0 3 2 50 50 100
6. CS18222 Big Data and Analytics Laboratory 0 0 3 2 50 50 100
7. CS18223 Technical Presentation 0 0 3 2 50 50 100
Total 12 0 9 18 700
SEMESTER - IV
Course Hours/ Week Credit Maximum Marks
Sl.No. Course Name
Code L T P C CA ES Total
PRACTICAL
1. CS18421 Project Phase – II 0 0 32 16 50 50 100
Total 0 0 32 16 100
Formation of LPP – Graphical method – Simplex method – Big M Method – Dual Simplex Method.
Trees: Binary Search Trees – AVL Trees – Red Black Trees – 2-3 Trees – B-Trees–Splay Trees.
SEMESTER – I
L T P C
CS18121 ADVANCED DATA STRUCTURES LABORATORY
0 0 3 2
Objectives:
• To acquire the knowledge of various hashing techniques.
• To learn the usage of advanced trees.
• To know the usage of pattern matching techniques
LIST OF EXPERIMENTS:
1. a) Installation of various hypervisors and instantiation of VMs with image file using open source hypervisors
such as Virtual Box, VMWare Player, Xen and KVM.
b) Client server communication between two virtual machine instances, execution of chat application.
2. Creation of simple network topology using open source network virtualization tools (like mini net and others).
3. Implementation of simple network protocols using open source network controllers (like Open Daylight).
4. Implementation of various scheduling mechanisms using open source cloud simulator.
5. Familiarization and usage of the following cloud services with open source cloud tools(like Eucalyptus, Open
stack, Open Nebula and others)
a) Scheduling mechanisms
b) Load balancing mechanisms
c) Hashing and encryption mechanisms
6. Familiarization and usage of collaborative applications (SaaS).
7. Implementing applications using Google App Engine (PaaS).
8. Develop MapReduce application (example-URL Pattern count and others) using Hadoop cluster set up (Single
node and multi node).
Total : 45 Periods
Course Outcomes: On Completion of this course , the student will be able to
• Install the various hypervisors and VMs
• Run their application on the instantiated VMs over different hypervisors.
• Simulate their sample proposed systems.
• Setup a private cloud with open source cloud tools and deploy simple cloud services.
• Develop MapReduceapplication using Hadoopsetup.
SEMESTER – II
L T P C
CS18221 ADVANCED ALGORITHMS LABORATORY
0 0 3 2
Objectives:
• To study various sorting and searching algorithms.
• To learn the different graph traversal methods.
• To study the various shortest path algorithms.
LIST OF EXPERIMENTS:
SEMESTER – II
L T P C
CS18222 BIG DATA AND ANALYTICS LABORATORY
0 0 3 2
Objectives:
• To learn setting up of Hadoop Cluster
• To solve Big Data problems using MapReduce Technique.
LIST OF EXPERIMENTS:
1. Set up a pseudo-distributed, single-node Hadoop cluster backed by the Hadoop Distributed File System,
running on Ubuntu Linux. After successful installation on one node, configuration of a multi-node Hadoop
cluster (one master and multiple slaves).
3. Unstructured data into NoSQL data and do all operations such as NoSQL query with API.
6. Mahout machine learning library to facilitate the knowledge build up in big data analysis.
7. Application of Recommendation Systems using Hadoop/mahout libraries
Total : 45 Periods
Course Outcomes: On Completion of this course , the student will be able to
• Set up multi-node hadoop clusters
• Apply MapReducealgorithms for various algorithms.
• Design a new algorithm that usesMapReduceto apply on unstructured and structured data.
• Demonstrate the page rank Computation.
• Facilitate the knowledge build up in big data analysis using Mahout Machine learning library.
SEMESTER – II
L T P C
CS18223 TECHNICAL PRESENTATION
0 0 3 2
Objectives:
• To prepare students to gain confidence in technical presentation and report preparation.
Guidelines:
1. The students have to refer the journals, conference proceedings which are published recently.
2. By mutual discussions with the faculty, the student can choose a topic in specific area.
3. The student has to submit a technical report having 30 - 50 pages to the corresponding faculty one week
before the final presentation.
Total : 45 Periods
SEMESTER – I(ELECTIVE)
L T P C
CS18161 MACHINE LEARNING TECHNIQUES
3 0 0 3
Objectives:
• To learn the concepts of machine learning and aspects of computational learning theory
• To gain supervised and unsupervised learning and their applications.
• To study the theoretical and practical aspects of probabilistic graphical models.
UNIT–I BASICS OF MACHINE LEARNING [9]
Machine Learning – Machine Learning Foundations – Overview – Design of a Learning System – Types of Machine
learning – Applications Mathematical foundations of Machine Learning – Random Variables and Probabilities –
Probability Theory – Probability Distributions – Decision Theory – Bayes Decision Theory – Information Theory.
UNIT –II SUPERVISED LEARNING [9]
Linear Models for Regression – Linear Models for Classification – Naive Bayes – Discriminant Functions – Probabilistic
Generative Models – Probabilistic Discriminative Models – Bayesian Logistic Regression – Decision Trees –
Classification Trees – Regression Trees – Pruning – Neural Networks – Feed Forward Network Functions – Back-
Propagation – Support vector machines – Ensemble methods – Bagging – Boosting.
UNIT – III UNSUPERVISED LEARNING [9]
Clustering – K means – EM Algorithm – Mixtures of Gaussians–Curse of Dimensionality – Dimensionality Reduction –
Factor Analysis – Principal Component Analysis – Probabilistic PCA.
UNIT -–IV PROBABILISTIC GRAPHICAL MODELS [9]
Graphical Models – Undirected Graphical Models – Markov Random Fields – Directed Graphical Models – Bayesian
Networks – Conditional Independence Properties – Inference – Generalization – Hidden Markov Models.
UNIT – V ADVANCED LEARNING [9]
Sampling – Basic Sampling methods – Monte Carlo. Reinforcement Learning – K-Armed Bandit – Elements – Model-
Based Learning – Value Iteration – Policy Iteration –Temporal Difference Learning – Exploration Strategies.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Design a neural network for an application of your choice.
• Implement probabilistic discriminative and generative algorithms for an application of your choice and analyze
the results.
• Use a tool to implement typical clustering algorithms for different types of applications.
• Design and implement an HMM for a sequence model type of application.
• Identify applications suitable for different types of machine learning with suitable justification.
Reference Books :
1 EthemAlpaydin, “Introduction to Machine Learning”, MIT Press, Third Edition, 2014.
2 Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012
3 Trevor Hastie, Robert Tibshirani and Jerome Friedman, “The Elements of Statistical Learning”, Springer, Second
Edition, 2011.
4 Christopher Bishop, “Pattern Recognition and Machine Learning”, Springer, 2007.
SEMESTER – I(ELECTIVE)
L T P C
CS18162 WIRELESS SENSOR NETWORKS
3 0 0 3
Objectives:
• To architect sensor networks for various application setups.
• To devise appropriate data dissemination protocols and model links cost.
• To study the fundamental concepts of wireless sensor networksand have a basicknowledge of the various
protocols at various layers.
• To evaluate the performance of sensor networks and identify bottlenecks.
Security: Possible attacks – Countermeasures – SPINS – Static and dynamic key distribution.
SEMESTER – I(ELECTIVE)
L T P C
CS18163 INTELLIGENT SYSTEMS
3 0 0 3
Objectives:
• To introduce the field of Artificial Intelligence (AI) with emphasis on its use to solve real world problems for
which solutions are difficult to express using the traditional algorithmic approach.
• To explore the essential theory behind methodologies for developing systems that demonstrate intelligent
behavior including dealing with uncertainty,learning from experience and following problem solving strategies
found in nature.
SEMESTER – I(ELECTIVE)
L T P C
CS18164 DATA SCIENCE
3 0 0 3
Objectives:
• To provide the knowledge and expertise to become a proficient data scientist.
• To study statistics and machine learning concepts that is vital for data science.
• To evaluate data visualizations based on their design and use for communicating stories from data.
UNIT – I BASICS OF DATA SCIENCE [9]
Introduction to core concepts and technologies: Introduction –Terminology – Data science process –Data science toolkit
– Types of data –Example applications.
UNIT – II DATA COLLECTION AND MANAGEMENT [9]
Data collection and management: Introduction – Sources of data – Data collection and APIs – Exploring and fixing data –
Data storage and management – Using multiple data sources.
UNIT – III DATA ANALYSIS [9]
Data analysis: Introduction –Terminology and concepts – Introduction to statistics – Central tendencies and distributions
– Variance – Distribution properties and arithmetic – Samples/CLT – Basic machine learning algorithms – Linear
regression– SVM – Naive Bayes.
UNIT – IV DATA VISUALISATION [9]
Data Visualisation: Introduction – Types of data visualization – Data for Visualisation: Data types – Data encodings –
Retinal variables – Mapping variables to encodings –Visual encodings.
UNIT – V APPLICATIONS [9]
Applications of Data Science – Technologies for visualization – Recent trends in various data collection and analysis
techniques – Various visualization techniques.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Summarize the core concepts and technologies of data science.
• Explain how data is collected, managed and stored for data science.
• Analyzethe data and some basic machine learning algorithms.
• Outline the key concepts in data science, including their real-world applications and the toolkit used by data
scientists
• Implement data collection and management scripts using MongoDB
Reference Books :
1 Cathy O’Neil and Rachel Schutt, “Doing Data Science”, Straight Talk from The Frontline. O’Reilly, 2013.
2 Jure Leskovek, AnandRajaraman and Jeffrey Ullman, “Mining of Massive Datasets v2.1”, Cambridge University
Press, 2nd Edition, 2014.
3 Field Cady, “The Data Science Handbook”, John Wiley & Sons, 2017.
SEMESTER – I(ELECTIVE)
L T P C
CS18165 DISTRIBUTED SYSTEMS
3 0 0 3
Objective:
• To introduce the fundamental concepts and issues of managing large volume of shared data in a parallel and
distributed environment, and to provide insight into related research problems.
Parallel Database Systems: Parallel architectures – Parallel query processing and optimization – Load balancing. Mobile
Databases – Distributed Object Management –Multi-databases.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Design trends in distributed systems.
• Utilize network virtualization concepts.
• Apply remote method invocation techniques.
• Outline the concepts of concurrency control in centralized database systems and reliability
• Analyze the concepts of parallel database systems and mobile database.
Reference Books :
1 M.T. Ozsu and P. Valduriez, “Principles of Distributed Database Systems”, Prentice-Hall, 2011.
2 D. Bell and J. Grimson, “Distributed Database Systems”, Addison-Wesley, 1992.
3 George Colouris, Jean Dollimore and Tim Kinberg, “Distributed system concept and Design” Pearson Education,
4th Edition, 2012.
4 SunitaMahajan and Seema Shah, “Distributed Computing”, Oxford Higher Education, 2010.
SEMESTER – I(ELECTIVE)
L T P C
CS18166 DIGITAL IMAGE PROCESSING AND PATTERN RECOGNITION
3 0 0 3
Objectives:
• To study the basic concepts and algorithms of digital image processing.
• To familiarize with the image processing environments like MATLAB and its equivalent open source
Image processing environments.
• To expose the students to a broad range of image processing techniques and issues and their applications
and to provide the student with practical experiences using them.
• To learn the usage of image processing in current technologies.
[9]
UNIT – I FUNDAMENTALS OF IMAGE PROCESSING
Introduction – Elements of Visual Perception, Steps in Image Processing Systems – Digital Imaging System – Image
Acquisition – Sampling and Quantization – Pixel Relationships – File Formats – Colour Images and Models – Image
Operations – Arithmetic, Logical, Statistical and Spatial Operations.
UNIT – II IMAGE ENHANCEMENT AND RESTORATION [9]
Image Transforms – Discrete and Fast Fourier Transform and Discrete Cosine Transform – Spatial Domain – Gray level
Transformations – Histogram Processing – Spatial Filtering: Smoothing and Sharpening – Frequency Domain: Filtering in
Frequency Domain – Smoothing and Sharpening Filters – Homomorphic Filtering – Noise models – Constrained and
Unconstrained Restoration Models.
UNIT – III IMAGE SEGMENTATION AND MORPHOLOGY [9]
Detection of Discontinuities – Edge Operators – Edge Linking and Boundary Detection – Thresholding – Region Based
Segmentation – Motion Segmentation – Image Morphology: Binary and Gray level Morphology Operations – Erosion,
Dilation, Opening and Closing Operations – Distance Transforms – Basic Morphological Algorithms.
UNIT – IV PATTERN RECOGNITION [9]
Component Labeling – Image Features – Textures – Boundary Representations and Descriptions – Regional Descriptors
– Feature Selection and Feature Dimensionality Reduction – Image Classification and Recognition –Statistical Classifiers
– Clustering Algorithms – Hierarchical and Partitional Clustering.
UNIT – V IMAGE PATTERN RECOGNITION CASE STUDIES [9]
Image Understanding – Case Studies in Biometrics – Video Processing – Image Fusion – Image Security –
Steganography and Watermarking.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Implement basic image processing algorithms using MATLAB tool.
• Design an application that incorporates different concepts of Image processing.
• Apply and explore new techniques in the areas of image enhancement, restoration, segmentation,
compression and wavelet processing and image morphology.
• Critically analyze different approaches to implement mini projects.
• Explore the possibility of Applying image processing concepts in various domains.
Reference Books :
1 S.Sridhar, “Digital Image Processing”, Oxford University Press, New Delhi, 2011.
2 Rafael C.Gonzalez and Richard E.Woods, “Digital Image Processing”, Third Edition, Pearson Education, New
Delhi, 2008.
3 Alasdair McAndrew, “Introduction to Digital Image Processing with Matlab”, Cengage Learning, India, 2011.
4 Anil J Jain, “Fundamentals of Digital Image Processing”, PHI, 2011.
5 Wilhelm Burger and Mark J Berge, “Digital Image Processing: An algorithmic Introduction using Java”, Springer
International Edition, 2008.
SEMESTER – I(ELECTIVE)
L T P C
CS18167 CLOUD COMPUTING
3 0 0 3
Objectives:
• To learn how to apply trust-based security model to real-world security problems.
• To study the concepts, processes and best practices needed to successfully secure information within Cloud
infrastructures.
• To know the basic Cloud types and delivery models and develop an understanding of the risk and compliance
responsibilities and challenges for each Cloud type and service delivery model.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Identify security aspects of each cloud model.
• Develop a risk-management strategy for moving to the cloud.
• Implement a public cloud instance using a public cloud service provider.
• Apply trust based security model to different layer.
• Examine the concept of audit and compliance.
Reference Books :
1 John Rhoton, “Cloud Computing Explained: Implementation Handbook for Enterprises”, 2009.
2 Tim Mather, “Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance (Theory in
Practice)”, O’Reilly Media, 2009.
3 RajkumarBuyya, Christian Vecchiola, and ThamaraiSelvi, “Mastering Cloud Computing”, Tata McGraw Hill, 2013
4 Tom White, "Hadoop: The Definitive Guide", Yahoo Press, 2012
SEMESTER – I(ELECTIVE)
L T P C
CS18168 MULTI CORE ARCHITECTURES
3 0 0 3
Objectives:
• To introduce the recent trends in the field of computer architecture and identify performance related
parameters.
• To study the different multiprocessor issues.
• To expose the different types of multicore architectures.
• To learn the design of the memory hierarchy.
UNIT – I FUNDAMENTALS OF COMPUTER DESIGN AND ILP [9]
Fundamentals of Computer Design – Measuring and Reporting Performance – Instruction Level Parallelism and its
Exploitation – Concepts and Challenges – Limitations of ILP – Multithreading – SMT and CMP Architectures – The
Multicore era.
Introduction – Optimizations of Cache Performance – Memory Technology and Optimizations – Protection: Virtual
Memory and Virtual Machines – Design of Memory Hierarchies – Case Studies.
SEMESTER – I(ELECTIVE)
L T P C
CS18169 ADVANCED DATABASE TECHNOLOGY
3 0 0 3
Objectives:
• To know the underlying principles of relational database management system.
• To learn and implement the advanced features of DBMS.
• To develop database models using distributed databases.
• To implement and maintain an efficient database system using emerging trends.
UNIT– I RELATIONAL MODEL [9]
Data Model – Types of Data Models: Entity Relationship Model – Relational Data Model – Mapping Entity Relationship
Model to Relational Model – Structured Query Language – Database Normalization – Transaction Management.
Multidimensional Data Structures – Image Databases – Text / Document Databases – Video Databases – Audio
Databases – Multimedia Database Design.
Active Databases – Deductive Databases – Data Warehousing – Data Mining – Database Tuning – Database Security.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Design relational databases.
• Implement parallel and distributed databases.
• Analyzethe concept of XML databases and multimedia databases.
• Demonstrate the concept of database connectivity with the applications.
• Summarize the concepts of current issues.
Reference Books :
1 R. Elmasri and S.B. Navathe, “Fundamentals of Database Systems”, Addison-Wesley, 2011.
2 Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical Approach to Design, Implementation and
Management”, Third Edition, Pearson Education, 2007.
3 Henry F Korth, Abraham Silberschatz and S. Sudharshan, “Database System Concepts”, 5th Edition, McGraw Hill,
2006.
4 C.J.Date, A.Kannan and S.Swamynathan, “An Introduction to Database Systems”, Pearson Education, 8th Edition
2006.
5 V.S.Subramanian, “Principles of Multimedia Database Systems”, Harcourt India Pvt. Ltd., 2001.
Wireless Cellular Networks: 1G and 2G – 2.5G – 3G and 4G – Mobile IPv4 – Mobile IPv6 – TCP over Wireless Networks
–Cellular architecture – Frequency reuse – Channel assignment strategies – Handoff strategies – Interference and
system capacity – Improving coverage and capacity in cellular systems – Spread spectrum Technologies.
UNIT – III WIRELESS SENSOR NETWORKS [9]
WiMAX (Physical layer, Media access control, Mobility and Networking) – IEEE 802.22Wireless Regional Area Networks
– IEEE 802.21 Media Independent Handover Overview. Wireless Sensor Networks: Introduction – Application – Physical
– MAC layer and Network Layer – Power Management – Tiny OS Overview.
UNIT – IV WIRELESS PANs AND SECURITY [9]
Wireless PANs: Bluetooth and Zigbee – Introduction to Wireless Sensors. Security: Security in wireless Networks
Vulnerabilities – Security techniques – Wi-Fi Security – DoS in wireless communication.
UNIT – V ADVANCED TOPICS [9]
IEEE 802.11x and IEEE 802.11i standards – Introduction to Vehicular Adhoc Networks.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Demonstrate advanced knowledge of networking and wireless networking.
• Design WLAN, WPAN, WWAN and cellular based upon underlying propagation and performance analysis.
• Analyze protocols used in wireless networks and learn simulating wireless networks.
• Constructwireless networks exploring trade-offs between wire line and wireless links.
• Develop mobile applications to solve some of the real world problems.
Reference Books :
1 Schiller J., “Mobile Communications”, Addison Wesley 2008.
2 Stallings W., “Wireless Communications and Networks”, Pearson Education 2009.
3 Stojmenic Ivan, “Handbook of Wireless Networks and Mobile Computing”, John Wiley and SonsInc 2002.
4 Yi Bing Lin and ImrichChlamtac, “Wireless and Mobile Network Architectures”, John Wiley andSonsInc 2000.
5 Pandya Raj, “Mobile and Personal Communications Systems and Services”, PHI 2004.
Consistency checking – Heterogeneous and missing data – Data Transformation and segmentation.
Designing visualizations – Time series – Geo located data – Correlations and connections – Hierarchies and networks –
interactivity
UNIT– V STATISTICS [9]
Descriptive statistics – Inferential statistics – Comparative statistics
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Outline the basics of data gathering and preparation.
• Examine how the data cleaning is used in the data processing.
• Extract the data for performing the Analysis.
• Designing visualisation and Hierarchies and networks.
• Summarizethe different statistics techniques for problem solving.
Reference Books :
1 Glenn J. Myatt, “Making sense of Data: A practical Guide to Exploratory Data Analysis and Data Mining”, John
Wiley & Sons, Inc, 2nd Edition 2014.
2 Donald J. Wheeler, “Making Sense of Data”, SPC Press, 2003.
3 Dorian Pyle, “Data Preparation for Data Mining”, Morgan Kaufmann, 1999
4 Gerhard Svolba, “Data Preparation for Analytics Using SAS”, SAS Institute, 2006.
Overview – Computer imaging systems – Lenses – Image formation and sensing – Image analysis – pre-processing
and Binary image analysis.
Feature extraction – Shape – Histogram – Color – Spectral – Texture – CVIP tools – Feature analysis – Feature vectors
– Distance /similarity measures – Data preprocessing.
SEMESTER – II(ELECTIVE)
L T P C
CS18264 HUMAN AND COMPUTER INTERACTION
3 0 0 3
Objectives:
• To learn the foundations of Human Computer Interaction.
• To be familiar with the design technologies for individuals and persons with disabilities.
• To be aware of mobile Human Computer interaction.
• To appreciate the emergence of cloud as the next generation computing paradigm.
• To learn the guidelines for user interface.
UNIT – I BASICS OF HUMAN AND COMPUTER [9]
Human: I/O channels – Memory – Reasoning and problem solving; computer: Devices – Memory – Processing and
networks. Interaction: Models– Frameworks – Ergonomics – Styles – Elements – Interactivity-Paradigms
UNIT – II INTERACTIVE DESIGN BASICS AND RULES [9]
Interactive Design basics – Process – Scenarios – Navigation – Screen design – Iteration and prototyping. HCI in
software process – Software life cycle – Usability Engineering – Prototyping in practice – Design rationale. Design rules–
Principles, Standards, Guidelines and Rules. Evaluation Techniques – Universal Design
UNIT –III COGNITIVE MODELS [9]
Cognitive models – Socio-Organizational issues and stake holder requirements – Communication and collaboration
models–Hypertext – Multimedia and WWW.
UNIT – IV MOBILE ECOSYSTEM AND APPLICATIONS [9]
Mobile Ecosystem: Platforms– Application frameworks – Types of Mobile Applications: Widgets – Applications – Games-
Mobile Information Architecture – Mobile 2.0. Mobile Design: Elements of Mobile Design – Tools.
Designing Web Interfaces – Drag and Drop – Direct Selection – Contextual Tools – Overlays – Inlays and Virtual Pages
– Process Flow.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Summarize the structure of models, human computer interaction and vision.
• Know the interactive design basics and rules.
• Outline the communication and collaboration models.
• Analysis the platforms and application frameworks for mobile eco systems.
• Design an interactive web interface on the basis of models studied.
Reference Books :
1 Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human Computer Interaction”, 3 rdEdition, Pearson
Education, 2004 (UNIT I , II & III)
2 Brian Fling, “Mobile Design and Development”, 1stEdition , O’Reilly Media Inc., 2009 (UNIT –IV)
3 Bill Scott and Theresa Neil, “Designing Web Interfaces”, 1stEdition, O’Reilly, 2009.(UNIT-V)
SEMESTER – II(ELECTIVE)
L T P C
CS18265 DIGITAL FORENSICS
3 0 0 3
Objectives:
• To provides an in-depth study of the rapidly changing and fascinating field of computer forensics.
• To combines both the technical expertise and the knowledge required to investigate, detect and prevent digital
crimes.
• To knowledge on digital forensics legislations, digital crime, forensics processes and procedures, data
acquisition and validation, e-discovery tools
• To E-evidence collection and preservation, investigating operating systems and file systems, network
forensics, art of steganography and mobile device forensics.
UNIT – I BASICS OF DIGITAL FORENSICS [9]
Digital Forensics Science: Forensics science – Computer forensics and digital forensics. Computer Crime: Criminalistics
as it relates to the investigative process – Analysis of cyber-criminalistics area – Holistic approach to cyber-forensics.
UNIT – II CYBER CRIME SCENE ANALYSIS [9]
Cyber Crime Scene Analysis: Court orders and methods to search and seizure electronic evidence – Retrieved and un-
retrieved communications – Discuss the importance of understanding what court documents would be required for a
criminal investigation.
UNIT – III EVIDENCE MANAGEMENT AND PRESENTATION [9]
Evidence Management and Presentation: Create and manage shared folders using operating system – Importance of the
forensic mindset – Define the workload of law enforcement – Explain what the normal case would look like – Define who
should be notified of a crime – Parts of gathering evidence – Define and apply probable cause.
UNIT – IV COMPUTER AND NETWORK FORENSICS [9]
Computer Forensics: Prepare a case – Begin an investigation – Understand computer forensics workstations and
software – Conduct an investigation –Complete a case – Critique a case – Network Forensics: Open-source security
tools for network forensic analysis – Requirements for preservation of network data.
UNIT – V MOBILE FORENSICS [9]
Mobile Forensics: Mobile forensics techniques – Mobile forensics tools. Legal Aspects of Digital Forensics: IT Act 2000 –
Amendment of IT Act 2008.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Identify relevant legislation and codes of ethics
• Computer forensics and digital detective and various processes, policies and procedures
• E-discovery, guidelines and standards, E-evidence, tools and environment.
• Email and web forensics and network forensics Identify applications suitable for different types of machine
learning with suitable justification.
• Analyze the concepts of mobile forensics.
Reference Books :
1 John Sammons, “The Basics of Digital Forensics”, Elsevier, John Sammons, 2014.
2 John Vacca, “Computer Forensics: Computer Crime Scene Investigation”, Laxmi Publications, 3 rd Edition, 2010.
3 Eoghan Casey, “Handbook of Digital Forensics and Investigation”, Academic Press, 2009.
4 Eoghan Casey, “Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet”, Academic
Press, 2011.
SEMESTER – II (ELECTIVE)
L T P C
CS18266 ADVANCED OPERATING SYSTEMS
3 0 0 3
Objectives:
• To understand the concepts of distributed systems.
• To get an insight into the various issues and solutions in distributed operating systems.
• To learn about mobile and real-time operating systems.
• To gain knowledge on the design concepts of mainframe operating systems
SEMESTER – II(ELECTIVE)
L T P C
CS18267 FAULT TOLERANT SYSTEMS
3 0 0 3
Objectives:
• To provide and appreciate a comprehensive view of fault tolerant systems.
• To expose the students to the methods of hardware fault tolerance.
• To study the different ways of providing information redundancy and the ways of providing software fault
tolerance.
• To expose the students to concept of check pointing and their role in providing fault tolerance.
• To learn how to handle security attacks.
UNIT – I BASICS OF FAULT TOLERANCE [9]
Fault Classification – Types of Redundancy – Basic Measures of Fault Tolerance – Hardware Fault Tolerance – The
Rate of Hardware Failures – Failure Rate – Reliability and Mean Time to Failure – Canonical and Resilient Structures –
Other Reliability Evaluation Techniques – Processor Level Techniques
UNIT – II INFORMATION REDUNDANCY [9]
Information Redundancy – Coding – Resilient Disk Systems – Data Replication – Voting: Hierarchical Organization –
Primary-Backup Approach – Algorithm-Based Fault Tolerance, Fault Tolerant Networks: Measures of Resilience –
Common Network Topologies and Their Resilience – Fault Tolerant Routing
UNIT – III SOFTWARE FAULT TOLERANCE [9]
Acceptance Tests – Single Version Fault Tolerance – N Version Programming – Recovery Block Approach –
Preconditions – Post Conditions and Assertions – Exception Handling, Software Reliability Models – Fault Tolerant
Remote Procedure Calls.
UNIT – IV CHECKPOINTING [9]
Introduction – Checkpoint Level – Optimal Check Pointing – An Analytical Model – Cache-Aided Rollback Error Recovery
– Check Pointing in Distributed Systems – Check Pointing in Shared – Memory Systems – Check Pointing in Real –
Time Systems – Case Studies: Non Stop Systems – Stratus Systems – Cassini Command and Data Subsystem.
UNIT – V FAULT DETECTION IN CRYPTOGRAPHIC SYSTEMS [9]
Security Attacks Through Fault Injection – Fault Attacks on Symmetric Key Ciphers – Fault Attacks on Asymmetric Key
Ciphers – Counter Measures – Spatial and Temporal Duplication – Error Detecting Codes
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Define the traditional measures of fault tolerance.
• Point out the processor level fault tolerance techniques.
• Critically analyze the different types of RAID levels.
• Discuss techniques like recovery blocks and N-version programming.
• Identify techniques for check pointing in distributed and shared memory systems.
Reference Books :
1 Israel Koren and Mani Krishna, “Fault Tolerant Systems”, Morgan Kaufmann, 2010
2 Martin L Shooman, “Reliability of Computer Systems and Networks: Fault Tolerance, Analysis and Design”, Willey,
2002.
3 LL Pullam, “Software Fault Tolerance Techniques and Implementation”, Artech House Computer Security Series,
2002.
4 Parag K. Lala, “Fault Tolerant and Fault Testable Hardware Design”, Prentice-Hall International, 1984.
Packaging and Deploying – Performance Best Practices – Android Field Service App – Location Mobility and Location
Based Services Android. Multimedia: Mobile Agents and Peer-to-Peer Architecture – Android Multimedia
Optimization Algorithms like Genetic Optimization – Particle Swarm Optimization – Ant Colony Optimization.
Recent trends: Applications of ant colony optimization – Applications for Particle Swarm Optimization– Genetics, linear
and quadratic programming in real world applications.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Formulate optimization problems.
• Apply the concept of optimality criteria for various types of optimization problems.
• Solve various constrained and unconstrained problems in Single variable as well as multivariable.
• Analyzethe methods of optimization in real life situation.
• Be familiar with recent trends for optimization techniques.
Reference Books :
1 Edwin K., P. Chong & Stanislaw h. Zak, “An Introduction to Optimization”, John Wiley & Sons,2013.
2 Andreas Antoniou, Wu-Sheng Lu, “Practical Optimization Algorithms and Engineering Applications”, Springer
Science & Business Media,2007.
3 Dimitris Bertsimas; Robert Weismantel, “Optimization over integers”,Dynamic Ideas, 2005.
4 John K. Karlof, “Integer programming: theory and practice”, CRC Press, 2006.
5 H. Paul Williams, “Logic and Integer Programming”,Springer,2009.
6 Der-San Chen; Robert G. Batson; Yu Dang, “Applied Integer Programming: Modeling and Solution”, John Wiley and
Sons, 2010.
Programming Fundamentals – C language – HTML – Perl – Windows OS Vulnerabilities – Tools for Identifying
Vulnerabilities – Countermeasures – Linux OS Vulnerabilities – Tools for Identifying Vulnerabilities – Countermeasures.
Introduction – Security Assessments – Types of Penetration testing – Phases of Penetration Testing – Tools –Test Tools
– Penetration Testing Tools.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Defend hacking attacks and protect data assets.
• Defend a computer against a variety of security attacks using various tools.
• Practice and use safe techniques on the World Wide Web.
• Write the programming for security professionals.
• Know the different testing tools.
Reference Books :
1 Patrick Engebretson, “The Basics of Hacking and Penetration Testing – Ethical Hacking and Penetration Testing
Made Easy”, Syngress Media, Second Revised Edition, 2013.
2 Michael T. Simpson, Kent Backman and James E. Corley, “Hands-On Ethical Hacking and Network Defense”,
Cengage Learning, 2012
3 Jon Erickson, Hacking: “The Art of Exploitation”, No Starch Press, Second Edition, 2008.
4 Ec-Council, “Ethical Hacking and Countermeasures: Attack Phases”, Delmar Cengage Learning, 2009
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Summarize the web concepts for designing a simple web site.
• Demonstrate client side programming using scripts
• Demonstrate server side programming using ASP and JSP.
• Represent the web data using XML.
• Build web applications using open source environment.
Reference Books :
1 Jeffrey C Jackson, “Web Technologies – A Computer Science Perspective”, Pearson Education,2012.
2 Chris Bates, “Web Programming – Building Internet Applications, “Wiley India, 2007
3 Paul J. Deital, Harvey M. Deital, “Internet and World Wide Web – How to Program” Pearson
Education, 4th Edition, 2011.
4 Heather Williamson, “The Complete Reference XML” Tata McGraw Hill, 2009.
Quantitative techniques for cost management – Linear Programming – PERT/CPM – Transportation problems –
Assignment problems– Simulation –Learning Curve Theory.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Summarize the overview of the strategic cost management process.
• Analyze the various stages of project execution and commissioning.
• Outline the cost behavior and profit planning marginal costing.
• Analyze the variousplanning techniques and budgetary control
• Discuss about Quantitative techniques for cost management.
Reference Books :
1 harles T. Horngren, “Cost Accounting A Managerial Emphasis”, Pearson Education India, 13th Edition, 2009.
2 Ahmed Riahi-Belkaoui, “Advanced Management Accounting”, Greenwood Publishing Group, 2001
3 Robert S. Kaplan, Anthony A. Atkinson , “Advanced Management Accounting”, Prentice Hall, 1998.
4 Ashish K. Bhattacharya, “Principles & Practices of Cost Accounting”, 3rdEdition, PHI Learning Pvt. Ltd,2004.
Systems: System Design Principles – Representing Identity – Access Control Mechanisms –Introduction to assurance.
Malicious Logic: Trojan Horses – Viruses – Worms – Other forms – Defenses – Vulnerability Analysis: Introduction –
Penetration Studies – Classification – Framework – Auditing and Intrusion Detection.
Network Security: Policy Development – Network Organization – Availability and Network Flooding – Anticipating attacks
– System Security – User Security and Program Security.
Total = 45 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Summarize the overview of the computer security.
• Analyze the key management techniques.
• Outline the system design principles and access control mechanisms.
• Discuss about malicious logic and intrusion detection
• Describeabout network security and anticipating attacks
Reference Books :
1 Matt Bishop, SathyanarayanaS.Venkatramanayya “Introduction to Computer Security”, 2ndEdition, Pearson
Education, 2009
2 Mark Merkow, James Breithaupt “ Information Security : Principles and Practices” 1st Edition, Pearson Education,
2007
3 Whitman, “Principles of Information Security”, 2nd Edition, Pearson Education, 2011
4 William Stallings, “Cryptography and Network Security: Principles and Practices”, 5th Edition, Pearson Education,
2011.
Key skills are needed when writing a Title – Key skills are needed when writing an Abstract – Key skills are needed when
writing an Introduction – Skills needed when writing a Review of the Literature.
Skills are needed when writing the Methods – Skills needed when writing the Results – Skills are needed when writing
the Discussion – Skills are needed when writing the Conclusions.
Total = 25 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Be familiar with planning and preparation for paper writing.
• Recognize how to avoid the plagiarism.
• Know how to prepare for literature survey.
• Get skills for writing title, abstract and introduction.
• Summarizeskills for writing methodsresults and discussion.
Reference Books :
1 Adrian Wallwork, “English for Writing Research Papers”, Springer New York DordrechtHeidelberg London, 2016.
2 Day R, “How to Write and Publish a Scientific Paper”, Cambridge University Press, 2011.
3 Highman N, “Handbook of Writing for the Mathematical Sciences”, SIAM. Highman’s book, 2011
4 GoldbortR, “Writing for Science”, Yale University Press, 2006.
Meaning, Concept and Strategies of Disaster Mitigation – Emerging Trends in Mitigation – Structural Mitigation and Non-
Structural Mitigation – Programs of Disaster Mitigation In India.
Total = 25 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Know the types and magnitude of disasters and hazards.
• Get the idea of various disaster prone areas in India.
• Summarize the idea of preparedness and management of disaster.
• Analyze the various risk assessment techniques.
• Be familiar withthe concept of strategies of disaster mitigation.
Reference Books :
1 R. Nishith, Singh AK, “Disaster Management in India: Perspectives, issues and strategies”, New Royal
book Company, 2012.
2 Sahni, PardeepEt.Al (Eds.), “Disaster Mitigation Experiences And Reflections”, Prentice Hall of India,
New Delhi, 2011.
3 Goel S. L.,“Disaster Administration,Management Text, Case Studies”,Deep &DeepPublication Pvt. Ltd.,
New Delhi, 2011.
Universal brotherhood and religious tolerance – True friendship – Happiness Vs suffering – Love for truth – Aware of
self-destructive habits – Association and Cooperation – Doing best for saving nature.
Total = 25 Periods
Course Outcomes: On Completion of this course, the student will be able to
• Get the knowledge of self-development
• Analyze the importance of human values
• Develop the overall personality
• Infer the importance of behavior development.
• Know the self-management and good health
Reference Books :
1 Y.K. Singh, "Value Education", APH Publishing,New Delhi, 2008.
2 R. P. Shukla, "Value education and human rights", Sarup& Sons, New Delhi, 1st edition, 2004.
Chakroborty, S.K. “Values and Ethics for organizations Theory and practice”, Oxford UniversityPress,
3
New Delhi, 1998.
GUIDELINES:
GUIDELINES: