24 Mca
24 Mca
NAAC A++ Grade - State University - NIRF Rank 59, NIRF Innovation Band of 11 - 50
SALEM – 636 011
TANSCHE Based
OBE REGULATIONS AND SYLLABUS
(Effective from the academic year 2023-2024 and thereafter)
1
CONTENTS
i. PO and PSO Description
ii. PG – Template
iii. Methods of Evaluation & Methods of Assessment
iv. Semester Index.
v. Subjects – Core, Elective, Non Major, Skill Enhanced, Ability Enhanced,
Extension Activity, Environment, Professional Competency
2
TANSCHE REGULATIONS ON LEARNING OUTCOMES-BASED CURRICULUM
FRAMEWORK FOR POSTGRADUATE EDUCATION
Programme M.C.A.,
Programme Code CSC01
Duration PG - Two Years
Programme PO1: Problem Solving Skill
Outcomes (Pos) Apply knowledge of Management theories and Human Resource practices
to solve business problems through research in Global context.
PO 9 Multicultural competence
Possess knowledge of the values and beliefs of multiple cultures and
a global perspective.
3
Programme PSO1 – Placement
Specific Outcomes To prepare the students who will demonstrate respectful engagement with
(PSOs) others‟ ideas, behaviors, beliefs and apply diverse frames of reference to
decisions and actions.
PSO2 - Entrepreneur
To create effective entrepreneurs by enhancing their critical thinking,
problem solving, decision making and leadership skill that will facilitate
startups and high potential organizations.
4
CURRICULUM STRUCTURE FOR EACH SEMESTER -M.C.A
2023-2024
SEMESTER - I
Course Code Category Course Name Number of Hours per
Credits Week
23UPCSC1C01 Core I Linux and Shell Programming 4 4
SEMESTER - II
SEMESTER - III
SEMESTER - IV
6
LIST OF ELECTIVE SUBJECTS
ELECTIVE – I
23UPCSC1E01 - Data Engineering and Management
23UPCSC1E02 - Data Engineering and Management Lab
23UPCSC1E03 - Architecture and Frameworks
23UPCSC1E04 - Architecture and Frameworks lab
23UPCSC1E05 - Network Protocols
23UPCSC1E06 - Network Protocols Lab
23UPCSC1E07 - Dot Net Technologies
23UPCSC1E08 - Dot Net Technologies lab
23UPCSC1E09 - Software Development Technologies
23UPCSC1E10 - Software Development Technologies Lab
ELECTIVE - II
23UPCSC1E11 - Internet of Things
23UPCSC1E12 - Internet of Things Lab
23UPCSC1E13 - Cryptography and Network Security
23UPCSC1E14 - Cryptography and Network Security Lab
23UPCSC1E15 - Computer Vision
23UPCSC1E16 - Computer Vision Lab
23UPCSC1E17 - Social Networks
23UPCSC1E18 - Social Networks Lab
ELECTIVE – III
23UPCSC1E19 - Cyber Security
23UPCSC1E20 - Cyber Security Lab
23UPCSC1E21 - Block chain Technologies
23UPCSC1E22 - Block chain Technologies Lab
7
23UPCSC1E23 - Optimization Techniques
23UPCSC1E24 - Optimization Techniques Lab
23UPCSC1E25 - Solution Architecture
23UPCSC1E26 - Solution Architecture Lab
23UPCSC1E27 - High Performance Computing
23UPCSC1E28 - High Performance Computing Lab
8
Choice Based Credit System (CBCS), Learning Outcomes Based Curriculum
Framework (LOCF) Guideline Based Credits and Hours Distribution System
for all Post – Graduate Courses including Lab Hours
SEMESTER - I
METHODS OF EVALUATION
Internal Continuous Internal Assessment Test
Evaluation Assignments / Snap Test / Quiz
25 Marks
Seminars
Attendance and Class Participation
External End Semester Examination 75 Marks
Evaluation
9
Total 100 Marks
METHODS OF ASSESSMENT
Remembering The lowest level of questions require students to recall
(K1) information from the course content
Knowledge questions usually require students to identify
information in the text book.
Understanding Understanding off acts and ideas by comprehending
(K2) organizing, comparing, translating, interpolating and
interpreting in their own words.
The questions go beyond simple recall and require
students to combined at a together.
Application Students have to solve problems by using/applying a
(K3) concept learned in the class room.
Students must use their knowledge to determine a exact
response.
Analyze (K4) Analyzing the question is one that asks the students to
break down something in to its component parts.
Analyzing requires students to identify reasons causes
or motives and reach conclusions or generalizations.
Evaluate (K5) Evaluation requires an individual to make judgment
ton something.
Questions to be asked to judge the value of an idea, a
character, a work of art, or a solution to a problem.
Students are engaged in decision-making and problem–
solving.
Evaluation questions do not have single right answers.
Create (K6) The questions of this category challenge students to get
engaged in creative and original thinking.
Developing original ideas and problem solving skills
10
PROGRAMME OUTCOMES (PO) – PROGRAMME SPECIFIC
OUTCOMES (PSO) MAPPING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
PSO1 H H H H H H H H H H
PSO2 H H H H H H H H H H
PSO3 H H H H H H H H H H
PSO4 H H H H H H H H H H
PSO5 H H H H H H H H H H
(Suggested by UGC as per Six Sigma Tool – Cause and Effect Matrix)
Assign the value : 1 – Low ; 2 – Medium ; 3 – High ; 0 – No Correlation
Candidates who have passed in any one of the following or equivalent are eligible to apply:
(i) BCA/Bachelor Degree in Computer Science stream (or) equivalent Degree.(OR)
th
(ii) B.Sc., /B.Com. / B.A. with Mathematics at 10 , +2 level or at Graduation
Level (with additional bridge Courses as per the norms of the concerned
University).
Obtained at least 50% marks (45% marks in case of candidates belonging to reserved
category) in the qualifying Examination.
Course Modules:
Module1 : Computer Organization and Architecture
Module2 : Data Structures and Algorithms
Module3 : Problem Solving Techniques
Module4 : Operating Systems
Module5 : Object oriented programming
Module6 : Database Management System
Module 7 : Software Engineering
Module 8 : Computer Networks
11
DURATION OF THE PROGRAMME AND MEDIUM
The programme shall be of two years duration spread over four semesters under choice
based credit system. The Maximum duration to complete the course shall be two academic
years after normal completion of the programme. The medium of instruction/study is English.
12
SEMESTER - II
SEMESTER - III
13
23UPCSC1L07 Web Technologies 2 3 40 60 100 3
Lab
23UPCSC1L08 Integrated 2 3 40 60 100 3
Technologies Lab
(AML)
Discipline Elective Subject - 3 3 25 75 100 3
Centric Theory
Elective V
Discipline Elective Subject - Lab 1 2 40 60 100 3
Centric
Elective V-
Lab
NME - II Non Major Elective - 2 3 25 75 100 3
II
23UPCSC1I01 Internship/Industrial 2 - 100 100 3
Activity
26 20 11 385 615 1000 -
SEMESTER - IV
CREDIT CALCULATION
Lecture 1 1
Tutorial/Demonstration 1 1
Practical/Internship/Self-Learning 2/1 1
14
ATTAINMENT RUBRICS FOR THEORY COURSES
K CO
Section Approaches Mark Pattern Level Coverage
One word (Answer all 20X1 = 20 (Multiple
A K1-K2
questions) Choice Questions)
100 to 200 words (Answer any 3X5 = 15
CO1 – CO5
B three out of five (Analytical type K4-K6
questions) questions)
5X8 = 40 (Essay
C 500 to 1000 words type questions) K2-K6
15
QUESTIONPAPERPATTERN
o Internal Assessment - 40
o Joint Viva-Voce - 60
(Internal Examiner 30 and External Examiner 30)
(iii) Dissertation
o Internal Assessment - 50
o Report Evaluation by External Examiner - 50
o Joint Viva-Voce - 100
(Internal Examiner 50 and External Examiner 50)
GRADING SYSTEM
Evaluation of performance of students is based on ten-point scale grading system as given below.
17
Subject Code: 23UPCSC1C01 Credits: 04
UNIT -I
Basic bash Shell Commands: Interacting with the shell-Traversing the file system-Listing files
and directories-Managing files and directories-Viewing file contents.
UNIT-II
More Structured Commands: Looping with for statement-Iterating with the until statement-
Using the while statement-Combining loops-Redirecting loop output.
18
UNIT-III
Writing Scripts for Graphical Desktops: Creating text menus-Building text window widgets-
Adding X Window graphics.
Introducing Sed and Gawk: Learning about the sed Editor-Getting introduced to the gawk
Editor-Exploring sed Editor basics.
UNIT-IV
UNIT-V
Working with Alternative Shells: Understanding the dash shell-Programming in the dash shell-
Introducing the zsh shell-Writing scripts for zsh.
Producing Scripts for Database, Web, and E-Mail: Writing database shell scripts-Using the
Internet from your scripts-Emailing reports from scripts
TEXT BOOKS:
1. Richard Blum, Christine Bresnahan, “Linux Command Line and Shell Scripting BIBLE”,
Wiley Publishing, 3rd Edition 2015.Chapters: 3, 11 to 14, 16 to 25.
19
2. Mokhtar Ebrahim, Andrew Mallett, “Mastering Linux Shell Scripting”, Packt Publishing, 2nd
Edition, 2018. Chapter: 14.
REFERENCE BOOKS:
1. ClifFlynt, Sarath Lakshman, Shantanu Tushar, “Linux Shell Scripting Cookbook”, Packt
Publishing, 3rd Edition, 2017.
2. Stephen G.Kochan, Patrick Wood, “Shell Programming in Unix, Linux, and OS X”, Addison
Wesley Professional, 4th Edition, 2016.
3. Robert Love, “Linux System Programming”, O'Reilly Media, Inc, 2013
4. W.R. Stevens, “Advanced Programming in the UNIX environment”, 2nd Edition, Pearson
Education, 2013
5. Graham Glass, King Ables, “UNIX for Programmers and Users”, 3rd Edition, Pearson
Education, 2003
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H H L H L L M M M
CO2 H H M L H L L M M M
CO3 H H M L H L L M M H
CO4 H H M L H L L M M M
CO5 H H M L H L L M M M
20
Subject Code: 23UPCSC1C02 Credits: 04
PYTHON PROGRAMMING
COURSE OBJECTIVES:
To acquire programming skills in core Python
To learn Strings and function
To develop object oriented skills in Python
To comprehend various Python Packages
To develop web applications using Django
UNIT I
UNIT II
Strings and Text Files: Accessing Characters and substrings in strings - Data encryption-Strings
and Number systems- String methods - Text - Lists and Dictionaries: Lists - Dictionaries -
Design with Functions: A Quick review - Problem Solving with top-Down Design - Design with
recursive Functions - Managing a Program‟s namespace - Higher-Order Functions
UNIT III
Design with Classes: Getting inside Objects and Classes - Data-Modeling Examples - Building a
New Data Structure - The Two - Dimensional Grid - Structuring Classes with Inheritance and
Polymorphism-GraphicalUserInterfaces-The Behavior of terminal-Based programs
and GUI-Based programs - Coding Simple GUI-Based programs - Windows and Window
Components - Command Buttons and responding to events
UNIT IV
Working with Python Packages: NumPy Library-Ndarray- Basic Operations - Indexing, Slicing
and Iteration - Array manipulation - Pandas - The Series - The DataFrame - The Index Objects -
Data Vizualization with Matplotlib- The Matplotlib Architecture -Pyplot- The Plotting Window -
Adding Elements to the Chart - Line Charts - Bar Charts - Pie charts
UNIT V
Django: Installing Django- Building an Application - Project Creation - Designing the Data
Schema - Creating an administration site for models - Working with QuerySets and Managers -
Retrieving Objects - Building List and Detail Views
21
TEXT BOOKS:
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M H M H H H H M
CO2 H H H M H H H H H H
CO3 H M H H M H M H H M
CO4 H H H H H H H M H H
CO5 H H H H H H H H H M
22
Subject Code: 23UPCSC1C03 Credits: 05
DISCRETE MATHEMATICS
(Theorems and Proofs are not expected)
COURSE OBJECTIVE
To know the concepts of relations and functions
To distinguish among different normal forms and quantifiers
To solve recurrence relations, permutations and combinations
To know and solve matrices , rank of matrix and characteristic equations
To study the graphs and its types
UNIT-I
UNIT-II
UNIT-III
UNIT-IV
UNIT-V
Graphs -Connected Graphs -Euler Graphs- Euler line-Hamiltonian circuits and paths - planar
graphs - Complete graph-Bipartite graph-Hyper cube graph-Matrix representation of graphs.
23
TEXT BOOK:
REFERENCE BOOKS
1. Kimmo Eriksson &Hillevi Gavel, “Discrete Mathematics & Discrete Models”, Student
literature AB, 2015.
2. Kenneth H. Rosen, “Discrete Mathematics and applications”, McGraw Hill, 2012
COURSE OUTCOMES
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6 -Create
24
Subject Code: 23UPCSC1L01 Credits: 02
LIST OF EXPERIMENTS
1. Write a Shell Script program to calculate the number of days between two dates.
2. Write a Shell Script program to check systems on local network using control structures
with user input.
3. Write a Shell Script program to check systems on local network using control structures
with file input.
4. Write a Shell Script program to demonstrate the script control commands.
5. Write a Shell Script program to demonstrate the Shell script function.
6. Write a Shell Script program to demonstrate the Regular Expressions.
7. Write a Shell Script program to demonstrate the sed and awk Commands.
8. Write a Shell Script program to demonstrate the File Backup process through creating a
daily archive location.
9. Write a Shell Script program to create a following GUI tools.
a) Creating text menus
b) Building text window widgets
10. Write a Shell Script program to demonstrate to connect a PostgreSQL database and
performing CRUD operations.
25
COURSE OUTCOMES
CO1: To understand, apply and analyze the concepts and methodology of Linux
shell programming
CO3: To understand, analyses and evaluate the functions, graphical desktop K1-K6
interface and editors
To collaborate, apply and review the concepts and methodology of regular
CO4:
expression and advanced gawk
To comprehend, use and analyze the advance concepts such as alternate
CO5:
shell script, dy and bash scripting using PostgreSQL
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H H L H L L L M L
CO2 H H H L H L L L M L
CO3 H H H L H L L L M H
CO4 H H H L H L L L M L
CO5 H H H L H L L L M H
26
Subject Code: 23UPCSC1L02 Credits: 02
COURSE OBJECTIVES:
LIST OF EXPERIMENTS
1. Program using elementary data items, lists, dictionaries and tuples
10. Program for creating dynamic and interactive web pages using forms
27
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M H H H H H H M
CO2 H H H H H H H H H H
CO3 H H H H H H M H H M
CO4 H H H H H H H M H H
CO5 H H H H L H M H H M
28
Subject Code: 23UPCSC1L03 Credits: 02
COURSE OBJECTIVES
LIST OF EXPERIMENTS
1. Create Pie chart for Sales and Sales % by Country (sorted in descending order)
2. Create Bar chart for Sales by Country by Year (rounded to nearest thousand and sorted by
Grand Total)
3. Create Line char for Sales by Ship Mode (First Class, Same Day, Second Class and
Standard Class)
4. Create Scatter chart for Sales by Ship Mode by Country (rounded to the nearest dollar and
sorted by First Class)
5. Create heat map for Sales by Category by Sub-Category (in thousands and sorted by sales
value in descending order)
6. Design and create the label for vendor list
7. Design and create the dash board
8. Sales by Ship Mode (First Class, Same Day, Second Class and Standard Class)
9. Sales by Ship Mode by Country (rounded to the nearest dollar and sorted by First Class)
10. Sales by Category by Sub-Category (in thousands and sorted by sales value in
descending order)
29
COURSE OUTCOMES
CO3: Comprehend, create and deploy labels and heat map. K1-K6
CO4: Enable to create and apply dashboard for various data processing
CO5: Illustrate and apply data visualization tool for any data set
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- evaluate and K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M L M H L L L -
CO2 H M H H H M L L L -
CO3 H H H H H H L L L -
CO4 H M M H M L L L L -
CO5 M H M L H M L L L -
H- High; M-Medium; L-Low
30
Subject Code: 23UPCSC1S01 Credits: 01
LIST OF EXPERIMENTS
1. Characteristics of Technical Writing
3. Vocabulary Development
4. Sentence Completion
5. Error Spotting
31
16. English through Mass Media
TEXT BOOKS
1. Uma Narula, “Development Communication: Theory and Practice”, Revised Edition,
Har-Aanad Publication, 2019.
2. Annette Capel and Wendy Sharp, “Cambridge English: Objective First”, Fourth Edition,
Cambridge University Press, 2013.
3. Emma Sue-Prince, “The Advantage: The 7 Soft Skills You Need to Stay One Step
Ahead”, First Edition, FT Press, 2013.
4. Guy Brook-Hart, “Cambridge English: Business Benchmark”, Second Edition,
Cambridge University Press, 2014.
5. Norman Lewis, “How to Read Better & Faster”, Binny Publishing House, New Delhi,
1978.
REFERENCE BOOKS
1. Michael McCarthy and Felicity O„Dell, “English Vocabulary in Use:100 Units of
Vocabulary Reference and Practice”, Cambridge UniversityPress,1996.
2. Murphy, Raymond, “Intermediate English Grammar”, Second Edition, Cambridge
University Press, 1999.
COURSE OUTCOMES
On the successful completion of the course, students will be able
CO1: To gain basic professional communication skills and social contexts
effectively.
CO2: To acquire useful words and apply them in situational context.
CO3: To develop listening and reading skills through comprehension passages K1-K6
CO4: To enrich the leadership qualities and interpersonal communication
CO5: To enhance essential characteristics in writing
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6-Create
32
Subject Code: 23UPCSC1C04 Credits: 05
UNIT-I
Abstract Data Types: Introduction-Date Abstract Data Type – Bags-Iterators. Arrays: Array
Structure-Python List-Two Dimensional Arrays-Matrix Abstract Data Type. Sets, Maps: Sets –
Maps – Multi-Dimensional Arrays.
UNIT-II
UNIT-III
Stacks, Queues, and Deques: Stacks – Queues – Double-Ended Queues Linked. Lists: Singly
Linked Lists-Circularly Linked Lists-Doubly Linked Lists. Trees: General Trees-Binary Trees-
Implementing Trees-Tree Traversal Algorithms.
UNIT-IV
Priority Queues: Priority Queue Abstract Data Type- Implementing a Priority Queue – Heaps-
Sorting with a Priority Queue. Maps, Hash Tables, and Skip Lists: Maps and Dictionaries-Hash
Tables- Sorted Maps-Skip Lists-Sets, Multi Sets, and Multi Maps.
UNIT-V
Search Trees: Binary Search Trees-Balanced Search Trees-AVL Trees-Splay Trees. Sorting
and Selection: Merge sort-Quick sort-Sorting through an Algorithmic Lens- Comparing Sorting
Algorithms-Selection. Graph Algorithms: Graphs-Data Structures for Graphs-Graph Traversals-
Shortest Paths-Minimum Spanning Trees.
33
TEXT BOOKS:
1. Rance D. Necaise, “Data Structures and Algorithms Using Python”, John Wiley & Sons,
2011. (Unit – 1)Chapters: 1, 2, 3.
2. Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser, “Data Structures and
Algorithms in Python”, John Wiley & Sons, 2013. (Unit – 2, 3, 4, and 5) Chapters: 3 to 12,
and 14.
REFERENCE BOOKS:
1. Dr. Basant Agarwal; Benjamin Baka, “Hands-On Data Structures and Algorithms with
Python: Write complex and powerful code using the latest features of Python 3.7”, Packt
Publishing, 2018.
2. Magnus Lie Hetland, “Python Algorithms: Mastering Basic Algorithms in the Python
Language”, Apress, 2014.
COURSE OUTCOME:
CO4 Apply and Analyze right models based on the problem domain
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H M L L L L H H H L
CO2 H M H M M L L L L L
CO3 H H H L L L M M M M
CO4 H H H L L L M M M L
CO5 H H H L M M H H H H
H- High; M-Medium; L-Low
34
Subject Code: 23UPCSC1C05 Credits: 04
UNIT I
Big Data and Analytics: Classification of Digital Data: Structured Data- Semi Structured Data
and Unstructured Data.
Introduction to Big Data: Characteristics - Evolution - Definition - Challenges with Big Data -
Other Characteristics of Data - Big Data - Traditional Business Intelligence versus Big Data -
Data Warehouse and Hadoop.
Environment Big Data Analytics: Classification of Analytics - Challenges - Big Data Analytics
important - Data Science - Data Scientist - Terminologies used in Big Data Environments -
Basically Available Soft State Eventual Consistency - Top Analytics Tools
UNIT II
Technology Landscape: NoSQL, Comparison of SQL and NoSQL, Hadoop -RDBMS Versus
Hadoop - Distributed Computing Challenges -Hadoop Overview - Hadoop Distributed File
System - Processing Data with Hadoop - Managing Resources and Applications with Hadoop
YARN - Interacting with Hadoop Ecosystem
UNIT III
Mongodb and Mapreduce Programming: MongoDB: Mongo DB - Terms used in RDBMS
and Mongo DB - Data Types - MongoDB Query Language.
MapReduce: Mapper - Reducer - Combiner -Partitioner- Searching - Sorting - Compression
UNIT IV
Hive: Introduction - Architecture - Data Types - File Formats - Hive Query Language Statements
- Partitions - Bucketing - Views - Sub- Query - Joins - Aggregations - Group by and Having -
RCFile - Implementation - Hive User Defined Function - Serialization and Deserialization.
UNIT V
Pig: Introduction - Anatomy - Features - Philosophy - Use Case for Pig - Pig Latin Overview -
Pig Primitive Data Types - Running Pig - Execution Modes of Pig - HDFS Commands -
Relational Operators - Eval Function - Complex Data Types - Piggy Bank - User-Defined
35
Functions - Parameter Substitution - Diagnostic Operator - Word Count Example using Pig - Pig
at Yahoo! - Pig Versus Hive
TEXT BOOK:
1. Seema Acharya, Subhashini Chellappan, “Big Data and Analytics”, Wiley Publications, First
Edition,2015
REFERENCE BOOK:
1. Judith Huruwitz, Alan Nugent, Fern Halper, Marcia Kaufman, “Big data for dummies”, John
Wiley & Sons, Inc. (2013)
2. Tom White, “Hadoop The Definitive Guide”, O‟Reilly Publications, Fourth Edition, 2015
3. Dirk Deroos, Paul C.Zikopoulos, Roman B.Melnky, Bruce Brown, Rafael Coss, “Hadoop For
Dummies”, Wiley Publications, 2014
4. Robert D.Schneider, “Hadoop For Dummies”, John Wiley & Sons, Inc. (2012)
5. Paul Zikopoulos, “Understanding Big Data: Analytics for Enterprise Class Hadoop and
Streaming Data, McGraw Hill, 2012 Chuck Lam, “Hadoop In Action”, Dreamtech
Publications, 2010
COURSE OUTCOMES
On the successful completion of the course, students will be able to
To understand, illustrate and evaluate the concepts and techniques of
CO1: Data Science, Big Data Analytics and its tools
To collaborate, apply and review the computing for big data in
CO2:
Hadoop, and NoSQL environment.
To comprehend, implement and review the concepts of data science
CO3: K1-K6
and big data analytics projects using MapReduce, and MongoDB
To understand, use and analyze the concepts of big data analytics
CO4:
projects using HIVE database.
To illustrate, develop and review the concepts of PIG database in
CO5:
Hadoop environment.
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5 Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H L H H - L - H - -
CO2 H L L L M L - L - -
CO3 H L M M H L - M - H
CO4 H L M M H L - M - H
CO5 H H H H H L - H - H
H- High; M-Medium; L-Low
36
Subject Code: 23UPCSC1C06 Credits: 04
SOFT COMPUTING
COURSE OBJECTIVES:
● Develop the skills to gain a basic understanding of neural network theory and fuzzy logic
theory.
● To understand supervised and unsupervised learning algorithms
● To enable the students to gain a basic understanding of neural networks.
● To know about fuzzy logic, fuzzy inference systems, and their functions.
● To impart basic knowledge on Genetic algorithms and their applications.
UNIT-I
INTRODUCTION TO SOFT COMPUTING: Artificial Neural Networks- Biological
Neurons- Basic Models of Artificial Neural Networks – Connections – Learning-Activation
Functions- Important Terminologies of ANNs- Muculloch and Pitts Neuron-Linear Separability-
Hebb Network-Flowchart of Training Process-Training Algorithm.
UNIT – II
SUPERVISED LEARNING NETWORK : Perceptron Networks–Perceptron Learning Rule –
Architecture-Flowchart for Training Process-Perceptron Training Algorithms for Single Output
Classes-Perceptron Training Algorithm for Multiple Output Classes-Perceptron Network Testing
Algorithm - Adaptive Linear Neuron-Delta Rule for Single Output Unit-Flowchart for training
algorithm-Training Algorithm – Testing Algorithm - Multiple Adaptive Linear Neurons-
Architecture-Flowchart of Training Process-Training Algorithm-Back Propagation Network –
Architecture-Flowchart for Training Process-Training Algorithm-Learning Factors of Back-
Propagation Network-Radial Basis Function Network – Architecture-Flowchart for Training
Process-Training Algorithm.
UNIT-III
UNSUPERVISED LEARNING NETWORK: Associative Memory Networks - Auto
Associative Memory Network– Architecture-Flowchart for Training Process-Training
Algorithm-Testing Algorithm- Bidirectional Associative Memory – Architecture-Discrete
Bidirectional Associative Memory-Iterative Auto Associative Memory Networks - Linear Auto
Associative Memory-Kohonen Self-Organizing Feature Map – Architecture-Flowchart for
Training Process-Training Algorithm.
37
UNIT-IV
INTRODUCTION TO FUZZY LOGIC: Classical Sets –Operations on Classical Sets-Fuzzy
sets - Fuzzy Sets- Properties of Fuzzy Sets- Fuzzy Relations –Membership Functions:
Fuzzification- Methods of Membership Value Assignments – Defuzzification – Lambda-Cuts for
Fuzzy sets and Fuzzy Relations – Defuzzification Methods–Max-Membership Principle-Centroid
Method-Weighted Average Method-Mean Max Membership-Center of Sums-Center of Largest
Area-First of Maxima
UNIT-V
GENETIC ALGORITHM: Introduction -Biological Background - Basic Operators and
terminologies in Genetic algorithm- Search Space- Effects of genetic Operators – Traditional Vs
Genetic Algorithm - Simple GA- General Genetic Algorithm- The Scheme Theorem -
Applications
TEXT BOOK
1. Principles of Soft Computing, S.N. Sivanandam, S.N.Deepa, Wiley, Third Edition, 2019.
REFERENCE BOOKS
1. Das, A. (2018). Artificial Intelligence and Soft Computing for Beginners.
2. Amit, K. (2018). Artificial intelligence and soft computing: behavioral and cognitive
modeling of the human brain. CRC press.
3. Rajasekaran, S., &Pai, G. V. (2011). Neural networks, fuzzy logic and genetic algorithm:
synthesis and applications (with cd). PHI Learning Pvt. Ltd.
4. Jang, J. S. R., Sun, C. T., &Mizutani, E. (2004). Neuro-fuzzy and soft computing-a
computational approach to learning and machine intelligence [Book Review]. IEEE
Transactions on automatic control, 42(10), 1482-1484.
5. Gupta, M. M. (2004). Soft computing and intelligent systems: theory and applications.
Elsevier.
6. Jang, J. S. R., Sun, C. T., &Mizutani, E. (1997). Neuro-fuzzy and soft computing-a
computational approach to learning and machine intelligence [Book Review]. IEEE
Transactions on automatic control, 42(10), 1482-1484.
38
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H M H M H H H M H M
CO2 M H M H M M M H M H
CO3 M M H H H M M H H H
CO4 H H M M M H H H H M
CO5 H H H H H M H M M H
H- High; M-Medium; L-Low
39
Subject Code: 23UPCSC1L04 Credits: 02
COURSE OBJECTIVES
LIST OF EXPERIMENTS
IMPLEMENT THE FOLLOWING PROBLEMS USING PYTHON 3.4 AND ABOVE
1. Recursion concepts.
i) Linear recursion
2. Stack ADT.
3. Queue ADT.
6. Merge sort.
7. Quick sort.
40
COURSE OUTCOMES
CO5 Learn how to develop ADT for the various real-time problems
K1- Remember, K2 - Understand, K3 - Apply , K4 - Analyze, K5 - Evaluate, K6 -Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H M L L L L H H M M
CO2 H M H M M L H M H L
CO3 H H H L L L M M M M
CO4 H H H M M H M M H H
CO5 H H H H L M H M M M
H- High; M-Medium; L-Low
41
Subject Code: 23UPCSC1L05 Credits: 02
LIST OF EXPERIMENTS
1. Implement File System Shell Commands for HDFS in Hadoop Environment
2. Write a Mapreduce program using single reduce function for finding Maximum and
Minimum Number
3. Write a Mapreduce program using multiple reduce function for Word Count in an given
Text document
4. Implement the following using Pig Latin Input and Output Operations Relational
Operations
5. Implement the following using Pig Latin User Defined Functions Advanced Relational
Operations
6. Write a Word Count program using Pig Latin Script
7. Write a program to find a maximum temperature using Pig Latin Script
8. Implement the following using Hive commands Handling the Database Creating and
Manipulating table
9. Implement Simple Queries for database using Mongo
10. Implement Simple Queries for collections using Mongo
42
COURSE OUTCOMES
CO1: Understand and develop conceptually how Big Data is stored and
implement it using different tools
CO2: Comprehend and implement programs for data storage in HDFS and
table manipulation using Big Data tools in Hadoop environment
CO3: Understand and Critically analyse existing Big Datasets and K1-K6
implementations the solutions for it using MongoDB
CO4: Understand and examine existing Big Datasets and implementations
the solutions using HIVE database
CO5: Comprehend and review existing datasets and implementations the
solutions to handle it using PIG
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M H M H M H H -
CO2 H M H H H M M L L M
CO3 H H H H H H H M M H
CO4 H M H H H M H M M H
CO5 H H H H H H H H H H
H- High; M-Medium; L-Low
43
Subject Code: 23UPPGC1H01 Credit : 1
UNIT I: INTRODUCTION
Meaning and Definitions of Human Rights - Characteristics and Importance of Human Rights -
Evolution of Human Rights - Formation, Structure and Functions of the UNO - Universal
Declaration of Human Rights - International Covenants - Violations of Human Rights in the
Contemporary Era.
UNIT II: HUMAN RIGHTS IN INDIA
Development of Human Rights in India - Constituent Assembly and Indian Constitution -
Fundamental Rights and its Classification - Directive Principles of State Policy - Fundamental
Duties.
UNIT III
Rights of Marginalized and other Disadvantaged People: Rights of Women - Rights of
Children - Rights of Differently Abled - Rights of Elderly - Rights of Scheduled Castes - Rights
of Scheduled Tribes - Rights of Minorities - Rights of Prisoners - Rights of Persons Living with
HIVAIDS - Rights of LGBT.
UNIT IV
Human Rights Movements: Peasant Movements (Tebhaga and Telangana) - Scheduled Caste
Movements (Mahar and Ad-Dharmi) - Scheduled Tribes Movements (Santhal and Munda) -
Environmental Movements (Chipko and Narmada BachaoAndolan) - Social Reform Movements
(Vaikom and Self Respect).
UNIT V
Redressal Mechanisms: Protection of Human Rights Act, 1993 (Amendment 2019) - Structure
and Functions of National and State Human Rights Commissions - National Commission for SCs
- National Commission for STs - National Commission for Women - National Commission for
Minorities - Characteristics and Objectives of Human Rights Education.
REFERENCE BOOKS
1. Sudarshanam Gankidi, Human Rights in India: Prospective and Retrospective, Rawat
Publications, Jaipur, 2019.
2. SatvinderJuss, Human Rights in India, Routledge, New Delhi, 2020.
3. Namita Gupta, Social Justice and Human Rights in India, Rawat Publications, Jaipur, 2021.
4. Mark Frezo, The Sociology of Human Rights, John Willy & Sons, U.K. 2014.
5. Chiranjivi J. Nirmal, Human Rights in India: Historical, Social and Political Perspectives,
Oxford University Press, New York, 2000.
6. Dr. S. Mehartaj Begum, Human Rights in India: Issues and perspectives, APH Publishing
Corporation, New Delhi, 2010.
7. Asha Kiran, The History of Human Rights, Mangalam Publications, Delhi, 2011.
8. Bani Borgohain, Human Rights, Kanishka Publishers & Distributors, New Delhi-2, 2007.
9. Jayan Chudhary, A Textbook of Human Rights, Wisdom Press, New Delhi, 2011.
44
Subject Code: 23UPCSC1C07 Credits: 04
UNIT I
An Overview of Java: Object Oriented Programming- Data Types, Variables, and Arrays:
Primitive Types-Literals Variables - Type Conversion and Casting - Arrays-Operators: Control
Statements-Classes and Methods - Inheritance- Exception Handling.
UNIT II
String Handling: The String Constructors - String Length - Special String Operations - Character
Extraction - String Comparison - Searching Strings - Modifying a String - Input/Output: The I/O
Classes and Interfaces – File - Byte Streams - Character Streams.
UNIT III
Introducing GUI Programming with Swing– Introducing Swing - Swing Is Built on the AWT-
Two Key Swing Features - The MVC Connection - Components and Containers - The Swing
Packages - A Simple Swing Application - Exploring Swing.
UNIT IV
Java Beans: Introduction - Advantages of Beans – Introspection - The JavaBeans API - A Bean
Example. Servlets: Life Cycle Simple Servlet-Servlet API-Packages-Cookies session tracking.
UNIT V
Network Programming: Working with URLs- Working with Sockets - Remote Method
Invocation. Introduction to Database Management Systems - Tables, Rows, and Columns -
Introduction to the SQL SELECT Statement - Inserting Rows - Updating and Deleting Existing
Rows - Creating and Deleting Tables - Creating a New Database with JDBC - Scrollable Result
Sets.
TEXT BOOKS:
1. Herbert Schildt, “Java the Complete Reference”, 10th edition, McGraw Hill Publishing
Company Ltd, New Delhi, 2017.
45
2. Tony Goddis, “Starting out with Java from Control Structures Through Objects” 6th Edition,
Pearson Education Limited, 2016
REFERENCE BOOKS :
COURSE OUTCOMES
K1-K6
CO3: Creation of graphical representation using Applet
46
Subject Code: 23UPCSC1C08 Credits: 04
WEB TECHNOLOGIES
COURSE OBJECTIVES
● Understand the fundamentals of the web and thereby develop web applications using
various development languages and tools.
● Enrich knowledge about XHTML control and Cascading Style Sheets.
● Provide in- depth knowledge about Javascript.
● To enhance knowledge in XML documents with presentations using CSS and XSLT.
● Deliver depth knowledge about PHP, Angular JS, Jquery.
UNIT I
WEB FUNDAMENTALS AND HTML: A Brief Introduction to the Internet - The World
Wide Web - Web Browsers - Web Servers -URLs, MIME, HTTP, Security- Introduction to
HTML- Origins and Evolution of HTML and HTML - Basic Syntax - Standard HTML
Document Structure - Basic Text Markup – Images- Hypertext Links - Lists, Tables, Forms, The
Audio Element, The Video Element - Organization Elements, The Time Element
UNIT II
INTRODUCTION TO XHTML AND CSS: Basic syntax, Standard structure, Basic text-
markup, Images, Hypertext Links. Lists, Tables, Forms, Frames, syntactic differences between
HTML and XHTML-Introduction, Levels of style sheets, Style specification formats, Selector
forms, Property value forms, Font properties, List properties, Color, Alignment of text, The box
model, Background images, The<span> and <div>tags, Conflict resolution.
UNIT III
UNIT IV
UNIT V
TEXT BOOKS:
1. Robert W. Sebesta: Programming the World Wide Web, Eighth Edition, Pearson education,
2015. UNITS: 1,2,3,4
2. Dayley Brad, Dayley Brendan ,” Angular JS, JavaScript, and j Query All in One”, Sams
Teach Yourself 1st Edition, Kindle Edition, 2015.UNIT: 5
REFERENCE BOOKS:
1. M. Srinivasan: Web Programming Building Internet Applications, 3rdEdition, Wiley India,
2009.
2. Jeffrey C. Jackson: Web Technologies-A Computer Science Perspective, Pearson Education,
7thImpression,2012.
3. Chris Bates: Web Technology Theory and Practice, Pearson Education, 2012.
4. Raj Kamal: Internet and Web Technologies, McGraw Hill Education.
COURSE OUTCOMES:
On the successful completion of the course, students will be able to:
CO1 Design dynamic web pages using Javascript, Jquery and Angular Java
script
CO2 Develop Web pages using HTML, CSS and XML
CO3 Create web application using PHP and MySQL K1-K6
CO4 To design dynamic web pages using Angular javascript
CO5 Develop interactive web pages using Jquery
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M H H H H M M H M M
CO2 H H M H H H M H H H
CO3 H H H M H H M M H M
CO4 H H H M H M M H H M
CO5 H H H M H H M H M H
H- High; M-Medium; L-Low
48
Subject Code: 23UPCSC1C09 Credits: 04
ADVANCED MACHINE LEARNING TECHNIQUES
COURSE OBJECTIVES
To understand the concepts of Machine Learning.
● To understand the theoretical and practical aspects of types of machine learning
● To teach and get familiarized with supervised learning and their applications.
● To teach and get familiarized with the concepts and algorithms of unsupervised learning.
● To appreciate the concepts and algorithms of deep learning.
UNIT I
Managing and Understanding Data: Data Structures, Vectors And Factors: Lists, Data frames,
Matrixes and arrays - Managing Data - Exploring and Understanding Data: Exploring the
Structure of Data, Exploring Numeric variables - Exploring Categorical Variables- Exploring
Relationships between Variables.
UNIT II
Lazy Learning - Classification Using Nearest Neighbors:The kNN Algorithm- Diagnosing
Breast Cancer with the kNN Algorithm- Probabilistic Learning - Classification Using Naive
Bayes: Basic concepts of Bayesian Methods- The Naïve Bayes Algorithm- Example - filtering
Mobile Phone Spam with the Naive Bayes Algorithm.
Divide and Conquer -Classification Using Decision Trees and Rules: Understanding Decision
Trees- Example - Identifying Risky Bank Loans using C5.0 Decision Trees- Understanding
Classification Rules- Example - Identifying Poisonous Mushrooms with Rule Learners.
UNIT III
Black Box Methods Neural Networks and Support Vector Machines: Understanding Neural
Networks, from Biological to Artificial Neurons, Activation Functions, Network Topology,
Training Neural Networks with Backpropagation - Modeling the Strength of Concrete with
ANNs- Understanding Support Vector Machines- Performing OCR with SVMs- Finding Patterns
49
- Market Basket Analysis Using Association Rules: Understanding Association Rules- Example -
Identifying Frequently Purchased Groceries with Association Rules.
UNIT IV
Finding Groups of Data -Clustering with K-Means: Understanding Clustering- The k-means
Algorithm for clustering- Finding teen market segments using k-means Clustering - Evaluating
Model Performance: Measuring Performance for Classification- Beyond Accuracy - other
Measures of Performance, Visualizing Performance Tradeoffs.
Improving Model Performance: Tuning Stock Models for Better Performance-Using Caret for
Automated Parameter Tuning- Creating a simple Tuned Model- Customizing the Tuning Process-
Improving Model Performance with meta-learning- Understanding Ensembles - Bagging –
Boosting- Random forests.
UNIT V
Introduction to Deep Learning: Introduction to Deep Learning, Single Layer Perceptron Model
(SLP), Multilayer Perceptron Model (MLP), Convolutional Neural Networks (CNNs), Recurrent
Neural Networks (RNNs),Restricted Boltzmann Machines (RBMs).
TEXT BOOKS
1. Brett Lantz, “Machine Learning with R”, Addison-Wesley Packt Publishing, 2013.
2. TawehBeysolow, “Introduction to Deep Learning Using R: A Step-by-Step Guide to
Learning and Implementing Deep Learning Models Using R”, San Francisco, California,
USA, 2017.
REFERENCE BOOKS:
1. Daniel T. Larose, Chantal D. Larose, “Data mining and Predictive analytics”, Second Ed.,
Wiley Publication, 2015.
2. Bertt Lantz, “Machine Learning with R: Expert techniques for predictive modeling”, 3rd
Edition, April 15,2019,
3. Jason Bell, “Machine Learning: Hands-On for Developers and Technical Professionals”,
Wiley Publication,2015.
50
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H L H M M H M M M
CO2 H H M H H M H H H M
CO3 H H H H H M M H M H
CO4 H H M H M M H H M M
CO5 H H H H H M H M H H
H- High; M-Medium; L-Low
51
Subject Code: 23UPCSC1L06 Credits: 02
COURSE OBJECTIVES
LIST OF EXPERIMENTS
1. Implementation of java interface.
52
COURSE OUTCOMES
On the successful completion of the course, students will be able to:
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H H H M H H H H H
CO2 H H H L M H H H H L
CO3 H H M M L H H H M M
CO4 M H M M H H M H M M
CO5 H M M M M L H M M M
H- High; M-Medium; L-Low
53
Subject Code: 23UPCSC1L07 Credits: 02
● Learn how to create web pages using HTML, CSS and Javascript.
● Implement dynamic web pages using Javascript, Jquery and Angular Java script
● To create web applications using PHP and MySQL
● Create web pages using XML and Cascading Style Sheets
● Create XML documents and Schemas.
LIST OF EXPERIMENTS
1. Develop a web page to display your education details in a tabular format.
2. Develop a web page to display your CV on a web page.
3. Design a Homepage having three links: About Us, Our Services andContact Us. Create
separate web pages for the three links.
4. Design a web page to demonstrate the usage of inline CSS, internal CSS and external CSS.
5. Design an XML document and create a style sheet in CSS & display the document in the
browser.
6. Develop a web page to Create image maps.
7. Design a web page to perform input validation using Angular Javascript.
8. Develop a web page in PHP to fetch details from the database.
9. Design a web page to hide paragraph using JQuery
10. Create a web page and add Javascript to handle mouse events and formevents
54
COURSE OUTCOMES
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M H H H H M M H M M
CO2 H H M H H H M H H H
CO3 H H H M M H M M H M
CO4 M M H M H M M H H M
CO5 M M H M H H M H M M
H- High; M-Medium; L-Low
55
Subject Code: 23UPCSC1L08 Credits: 02
COURSE OBJECTIVES
LIST OF EXPERIMENTS
1. Write a python program to compute the Central Tendency Measures: Mean, Median, Mode,
2. Implement a Linear Regression and Multiple Linear Regression with a Real Dataset
6. Implementation Decision tree for classification using sklearn and its parameter tuning
56
COURSE OUTCOMES:
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H H M H H H H M M
CO2 H H H H H M H H H M
CO3 H H H H H H M M H M
CO4 H H H M M H M H M M
CO5 H H H M M H M H H M
H- High; M-Medium; L-Low
57
Subject Code: 23UPCSC1E01 Credits: 03
UNIT I
UNIT II
UNIT III
UNIT IV
CRM: Three main pillars of CRM. GETTING TO KNOW YOUR CUSTOMER: 360-degree
client view. UTILIZING ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING IN
58
YOUR CRM STRATEGY: Evolution of AI-Current state of AI-Teaming up AI with people-
Applying AI to your CRM solution-ethical aspects of AI-An example of AI in CRM processes.
UNIT V
CLOUD VERSUS ON PREMISE VERSUS HYBRID: Factors influencing vendor selection-
Hybrid deployment-what are your options. CRM DIFFERENTIATORS: It‟s not about the feature
list; it‟s about the ecosystem-Fourth industrial revolution and CRM-AI and smart cloud-To cloud
or not to cloud-Leveraging smart cloud into CRM-Big data-Social selling and advertising-
Implementation tools-Sustainable CRM platform.
TEXT BOOKS
1. Keith Gordon, “Principles of Data Management Facilitating Information Sharing”, BCS
Learning, 2013. (Chapters:1-5, 7,8,12,13,14)
2. Max Fatouretchi, “The Art of CRM”, Packt Publishing, 2019.(Chapters: 1,2,5,8,9)
REFERENCE BOOKS
1. Peter Ghavami, “Big Data Management: Data Governance Principles for Big Data
Analytics”, De Gruyter, 2020.
2. Francis Buttle, Stan Maklan, “Customer Relationship Management Concepts and
Technologies”, Routledge, 2019.
COURSE OUTCOME
On the successful completion of the course, students will be able to:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M H M H H H H M
CO2 H H H M H H H H H H
CO3 H M H H M H M H H M
CO4 H H H H H H H M H H
CO5 H H H H H H H H H M
H- High; M-Medium; L-Low
59
Subject Code: 23UPCSC1E02 Credits: 01
COURSE OBJECTIVES
● To acquire basic scripting knowledge in MongoDB
LIST OF EXPERIMENTS
1. Write a script to create a MongoDB database and perform insert operation
9. Create a Zoho CRM account and organize your Tasks, Meetings and Deals
60
COURSE OUTCOMES
CO4 Assess Zoho CRM features for managing the customer relationships
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H H H H M H H H M
CO2 H H H H H H H H H H
CO3 H M H H M H M H H H
CO4 H H H M H H H L H H
CO5 H H H H M H H H H H
H- High; M-Medium; L-Low
61
Subject Code: 23UPCSC1E03 Credits: 03
UNIT I
UNIT II
UNIT III
UNIT IV
62
UNIT V
Architecting Modern Applications.- Importance of Performance - Performance improvement -
Server side caching - Web application performance - Database performance -Securing software
systems - Threat modelling- Secure by design
TEXT BOOK
REFERENCE BOOKS
1. Oliver Vogel, Indo Arnold, Arif Chughtai and TimoKehrer, “Software Architecture”
Springer-Verlag, 2011.
2. Ian Gorton, “Essential Software architecture”, Second Edition, Springer, 2011
3. Len Bass, Paul Clements and Rick Kazman, “Software architecture in practice”, Third
edition, Addison-Wesley, 2013
COURSE OUTCOMES
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- evaluate and K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M H H H H H M H H H
CO2 M H H H H H H H H H
CO3 H H M H H M H M H H
CO4 H H H H M H H H L H
CO5 M H H H H M H H H H
H- High; M-Medium; L-Low
63
Subject Code: 23UPCSC1E04 Credits: 01
COURSE OBJECTIVES
● To understand and implement the basic concepts of Software architecture and its
functions.
● To acquire programming skills to develop Implement various technologies and services
associated with network protocols along with the challenges of data transfer.
● Implement the importance and functioning of Routing Protocols over communication
service.
● To acquire skills to connect two routers and any two switches.
● To comprehend related to SSH protocols and accessing the remote device.
Note: Use the solid servers and client specification for implementation
https://github.com/solid/specification/.
LIST OF EXPERIMENTS
1. Find the WebID profile document and display the necessary attributes
2. Set and access the primary authentications with account recovery mechanisms
3. Set and access the secondary authentications with account recovery mechanisms
9. Managing subscriptions and friends list using Social Web App protocol
10. Managing list of followers and following list using Social Web App protocol
64
COURSE OUTCOMES
Comprehend and evaluate the access control and content representation use K1-K6
CO3 of FTP server
Identify and examine the notifications, friends, and follower list of social
CO5 application protocols.
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5-Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M L M H H H H M
CO2 H M H H H H H H H H
CO3 H M H M H M H H M H
CO4 H M L H M H H M H H
CO5 M H M L H H H H M H
H- High; M-Medium; L-Low
65
Subject Code: 23UPCSC1E05 Credits: 03
NETWORK PROTOCOLS
COURSE OBJECTIVES
● To understand the basic concepts of Transmission Control Protocol/Internet Protocol and
associated functions
● Explore to describe the internet architecture and its processes associated with the data
transfer and to provide the quality of service
● To understand technologies and services associated with network protocols along with the
challenges of data transfer.
● Learners will understand the importance and functioning of Routing Protocols over
communication service.
● Empower the learners to comprehend and manage the issues associated with IP protocols
like data traffic problems, security and mobility.
UNIT I
Transmission Control Protocol/Internet Protocol : Fundamental Architecture - Internet Protocol
Basics - Routing - Transport-Layer Protocols : Transmission Control Protocol - User Datagram
Protocol - Stream Control Transmission Protocol - Real-Time Transport Protocol.
UNIT II
Internet Architecture: Internet Exchange Point - History of Internet Exchange Points - Internet
Service Provider Interconnection Relationships - Peering and Transit - IP Routing Protocols:
Overview of Routing Protocols - Routing Information Protocol - Open Shortest Path First -
Border Gateway Protocol - Multiprotocol Label Switching.
UNIT III
IP Quality Of Service : Introduction - Quality of Service in IP Version 4 - Integrated Services -
Differentiated Services - Quality of Service with Nested Differentiated Services Levels - IP
Multicast and Any cast: Addressing - Multicast Routing - Routing Protocols –Any casting- IPv6
Any cast Routing Protocol: Protocol Independent Any cast - Sparse Mode - Transport over
Packet: Draft-Martini Signaling and Encapsulation - Layer-2 Tunneling Protocol.
UNIT IV
Virtual Private Wired Service - Types of Private Wire Services - Generic Routing Encapsulation
- Layer-2 Tunneling Protocol - Layer-3 Virtual Private Network 2547bis, Virtual Router - IP and
Optical Networking: IP/Optical Network Evolution - Challenges in Legacy Traditional
IP/Optical Networks - Automated Provisioning in IP/Optical Networks - Control Plane Models
for IP/Optical Networking - Next-Generation Multi Layer Network Design Requirements -
Benefits and Challenges in IP/Optical Networking - IP Version 6: Addresses in IP Version 6 - IP
Packet Headers - IP Address Resolution - IP Version 6 Deployment: Drivers and Impediments.
66
UNIT V
IP Traffic Engineering: Models of Traffic Demands - Optimal Routing with Multiprotocol Label
Switching - Link-Weight Optimization with Open Shortest Path First - Extended Shortest-Path-
Based Routing Schemes - IP Network Security: Introduction - Detection of Denial-of-Service
Attack - IP Trace back- Edge Sampling Scheme - Advanced Marking Scheme - Mobility
Support for IP: Mobility Management Approaches - Security Threats Related to IP Mobility -
Mobility Support in IPv6 - Reactive Versus Proactive Mobility Support - Relation to Multi
homing - Protocols Supplementing.
TEXT BOOK
1. Eiji Oki, Roberto Rojas-Cessa, Mallikarjun Tatipamula, Christian Vogt, “Advanced Internet
Protocols, Services and Applications”, Copyright © 2012 by John Wiley & Sons, Inc.
REFERENCE BOOKS
1. BehrouzA.Forouzan, “TCP/IP Protocol Suite”, Fourth Edition, Tata Mcgraw-Hill Edition
2010.
2. Michael A. Gallo & William M. “Computer Communications and Networking Technologies”
- Hancock- BROOKS & COLE
3. Douglas E. Comer “Computer Networks and Internets” - PEARSON.
4. William Stallings, “Data and Computer Communications”, Eighth Edition, Pearson
Education.
5. Eric Cole, “Network Security Bible”, 2nd edition, Wiley Publishers.
6. James Irvine and David Harley, “Data communication and networks”, Publishers: Wiley
India.
COURSE OUTCOMES
On the successful completion of the course, students will be able to:
Understand, analyse and examine the concepts of Communication
CO1 Protocols with its architecture and functions
Illustrate and apply the appropriate internet architecture along with efficient
CO2
protocol models for the user defined communication environment
Comprehend, categorize and formulate the appropriate IP routing protocol
CO3 to establish a efficient data transfer K1-K6
Comprehend, analyse and evaluate the concepts of Virtual wired service
CO4 and IP/optical networking with its functions and deployment
Elucidate, analyse and inspect the IP traffic engineering and its models
CO5
along with the security mechanisms
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- evaluate and K6- Create
MAPPING WITH PROGRAMME OUTCOME
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M H L L M H M M L H
CO2 H M H H M L M H H M
CO3 H H M M H H H M M H
CO4 H M H H M L H L H M
CO5 M H L L H L M H L H
H- High; M-Medium; L-Low
67
Subject Code: 23UPCSC1E06 Credits: 01
LIST OF EXPERIMENTS
1. Implement the following commands
a. ipconfig
b. ping
c. traceroute
d. netsat
e. nslookup
68
COURSE OUTCOMES
Comprehend the programming skills the SSH protocols and accessing the
CO1:
remote device
Design to Connect any two switches and get the status of each switches
CO4:
Solve to Connect two routers and get packets from the routers.
CO5:
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5-Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H M M M M L M M M M
CO2 H H H H H L H H H H
CO3 H H H H H L H H H H
CO4 H H H H H L H H H H
CO5 H M M M M L M M M M
H- High; M-Medium; L-Low
69
Subject Code: 23UPCSC1E07 Credits: 03
UNIT I
Introducing C#: .NET Framework - C# language - Visual Studio 2017 - Writing a C# Program:
Visual Studio 2017 Development Environment - Console Applications - Desktop Applications -
Variables and Expressions: Basic C# Syntax - Basic C# Console Application Structure -
Variables - Expressions - Flow Control: Boolean Logic - Branching - Looping.
UNIT II
More About Variables: Type Conversion - Complex Variable Types - String Manipulation –
Functions: Defining and Using Functions - Variable Scope - The Main Function - Struct
Functions - Overloading Functions - Using Delegates - Debugging and Error Handling:
Debugging in Visual Studio - Error Handling - Introduction to Object Oriented Programming:
Object-Oriented Programming - OOP Techniques - OOP in Desktop Applications.
UNIT III
Defining Classes: Class Definitions in C# - System.Object - Constructors and Destructors - OOP
Tools in Visual Studio - Class Library Projects - Interfaces Versus Abstract Classes - Struct
Types - Shallow Copying Versus Deep Copying - Defining Class Members: Member Definitions
- Additional Class Member Topics - Interface Implementation - Partial Class Definitions - Partial
Method Definitions - The Call Hierarchy Window - Basic Cloud Programming: Cloud, Cloud
Computing, and the Cloud Optimized Stack - Cloud Patterns and Best Practices - Using
Microsoft Azure C# Libraries to Create a Storage Container - Creating an ASP.NET 4.7 Web
Site That Uses the Storage Container - Advanced Cloud Programming and Deployment: Creating
an ASP.NET Web API - Deploying and Consuming an ASP.NET Web API on Microsoft Azure -
Scaling an ASP.NET Web API on Microsoft Azure.
UNIT IV
.NET Standard and .NET Core: Cross-Platform Basics and Must Know Terms – Need of .NET -
Referencing and Targeting Frameworks - .NET Core - Building and Packaging a.NET Standard
Library - Building a .NET Core Application with Visual Studio - Porting from .NET Framework
to .NET Core - ASP.NET and ASP.NET Core: Overview of Web Applications – Use of
ASP.NET - ASP.NET Web Forms - Creating ASP.NET Core Web Applications – Files: File
Classes for Input and Output – Streams - Monitoring the File System - XML and JSON: XML
70
Basics - JSON Basics - XML Schemas - XML Document Object Model - Converting XML to
JSON - Searching XML with XPath.
UNIT V
LINQ: LINQ to XML - LINQ Providers - LINQ Query Syntax - LINQ Method Syntax - Ordering
Query Results - Understanding the order by Clause - Querying a Large Data Set -Using
Aggregate Operators - Using the Select Distinct Query - Ordering by Multiple Levels -Using
Group Queries - Using Joins – Databases: Using Databases - Installing SQL Server - Express -
Entity Framework - Code First Database - Finding the Database - Navigating Database
Relationships - Handling Migrations - Creating and Querying XML from an Existing Database -
Universal Apps: Windows Universal Apps - App Concepts and Design - App Development -
Common Elements of Windows Store Apps - Windows Store.
TEXT BOOK
1. Benjamin Perkins, Jacob Vibe Hammer, Jon D. Reid, “Beginning C#7 Programming with
Visual Studio 2017”, Wiley Publishing, 2018.Chapters: 1 to 10, 16 to 23, and 25.
REFERENCE BOOKS
1. Nagel, Christian, “Professional C 7 and .NET Core 2.0”, Wrox Publishing, 2018.
2. Mehboob Ahmed Khan, Ovais, “C# 7 and .NET Core 2.0 High Performance”, Packt
Publishing, 2018
COURSE OUTCOME
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H L M L L L M M M M
CO2 H M L M M L H H H H
CO3 H H H M M L H H H H
CO4 H M L M M L H H H H
CO5 H M H M M L M M M M
H- High; M-Medium; L-Low
71
Subject Code: 23UPCSC1E08 Credits: 01
COURSE OBJECTIVES
LIST OF EXPERIMENTS
1. Demonstrate method overloading and method overriding
3. Multilevel Inheritance
4. Interfaces
6. Azure Storage Container Using the Microsoft Azure Storage Client Library
72
COURSE OUTCOME
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H L M L L L M M M M
CO2 H M L M L L H H H H
CO3 H H H M L L H H H H
CO4 H M L M L L H H H H
CO5 H H H M L L M M M M
H- High; M-Medium; L-Low
73
Subject Code: 23UPCSC1E09 Credits: 03
SOFTWARE DEVELOPMENT TECHNOLOGIES
COURSE OBJECTIVES
● To learn and Implementing Micro services
● To analysing the Azure Kubernetes Service
● To learn and anlyse .NET DevOps for Azure and its applications
● To building code for .NET core applications
● To get familiarized with Azure pipelines
UNIT I
Implementing Microservices: Client to microservices communication, Interservice
communication, data considerations, security, monitoring, microservices hosting platform
options. Azure Service Fabric: Introduction, core concepts, supported programming models,
service fabric clusters, develop and deploy applications of service fabric. Monitoring Azure
Service Fabric Clusters: Azure application, resource manager template, Adding Application
Monitoring to a Stateless Service Using Application Insights, Cluster monitoring, Infrastructure
monitoring.
UNIT II
Azure Kubernetes Service (AKS): Introduction to kubernetes and AKS, AKS development
tools, Deploy applications on AKS. Monitoring AKS: Monitoring, Azure monitor and analytics,
monitoring AKS clusters, native kubernetes dashboard, Prometheus and Grafana. Securing
Microservices: Authentication in microservices, Implenting security using API gateway pattern,
Creating application using Ocrlot and securing APIs with Azure AD. Database Design for
Microservices: Data stores, monolithic approach, Microservices approach, harnessing cloud
computing, database options on MS Azure, overcoming application development challenges.
Building Microservices on Azure Stack: Azure stack, Offering IaaS, PaaS on-premises
simplified, SaaS on Azure stack.
UNIT III
.NET DevOps for Azure: DevOps introduction, Problem and solution. Professional Grade
DevOps Environment: The state of DevOps, professional grade DevOps vision, DevOps
architecture, tools for professional DevOps environment, DevOps centered application. Tracking
work: Process template, Types of work items, Customizing the process, Working with the
process. Tracking code: Number of repositories, Git repository, structure, branching pattern,
Azure repos configuration, GIT and Azure.
UNIT IV
Building the code: Structure of build, using builds with .NET core and Azure pipelines,
Validating the code: Strategy for defect detection, Implementing defect detection. Release
candidate creation: Designing release candidate architecture, Azure artifacts workflow for release
candidates, Deploying the release: Designing deployment pipeline, Implementing deployment in
Azure pipelines. Operating and monitoring release: Principles, Architectures for observability,
Jumpstarting observability.
74
UNIT V
Introduction to APIs: Introduction, API economy, APIs in public sector. API Strategy and
Architecture: API Strategy, API value chain, API architecture, API management. API
Development: Considerations, Standards, kick-start API development, team orientation. API
Gateways: API Gateways in public cloud, Azure API management, AWS API gateway. API
Security: Request-based security, Authentication and authorization.
TEXT BOOKS
1. Harsh Chawla and Hemant Kathuria, “Building Microservices Applications on Microsoft
Azure- Designing, Developing, Deploying, and Monitoring”, Apress, 2019.
2. Jeffrey Palermo, NET DevOps for Azure A Developer‟s Guide to DevOps Architecture the
Right Way, Apress, 2019.
3. Thurupathan and Vijayakumar, Practical API Architecture and Development with Azure and
AWS - Design and Implementation of APIs for the Cloud, Apress, 2018.
REFERENCE BOOKS
1. Karl Matthias and Sean P. Kane, Docker: Up and Running, O'Reilly Publication, Second
Edition 2018.
2. Len Bass, Ingo Weber, Liming Zhu, “Dev Ops, A Software Architects Perspective”, Addison
Wesley-Pearson Publication, First Edition 2015.
3. John Ferguson Smart, “Jenkins, The Definitive Guide”, „O'Reilly Publication, First Edition
2011.
COURSE OUTCOMES
On the successful completion of the course, students will be able:
CO1: To understand, apply and summarize the basic concepts of Micro
services communication Microsoft Azure and Dev Ops for software
development life cycle
CO2: To illustrate, and implement Azure Kubernetes Service tools for software
development life cycle
CO3: To recognize, analyse and summarize the functionalities of .NET Dev K1 –K6
Ops for Azure applications
CO4: To understand, design and evaluate the principles and architecture service
tools for software development life cycle.
CO5: To comprehend, implement and review the functionalities of API and API
gateways for cloud and Azure applications
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
COURSE OBJECTIVES
● To understand the concept of DevOps with associated technologies and methodologies.
● To be familiarized with Jenkins, which is used to build & test software Applications
● To understand Continuous integration in Devops environment.
● To understand Docker to build, ship and run containerized images
● To use Docker to deploy and manage Software applications running on Container.
LIST OF EXPERIMENTS
1. Deploy Version Control System / Source Code Management, install git and create a GitHub
account.
2. Perform various GIT operations on local and Remote repositories using GIT Cheat-Sheet
3. Continuous Integration: install and configure Jenkins with Maven/Ant/Gradle to setup a
build Job.
4. Build the pipeline of jobs using Maven / Gradle / Ant in Jenkins, create a pipeline script to
Test and deploy an application over the tomcat server.
5. Implement Jenkins Master-Slave Architecture and scale your Jenkins standalone
implementation by implementing slave nodes.
6. Setup and Run Selenium Tests in Jenkins Using Maven.
7. Implement Docker Architecture and Container Life Cycle, install Docker and execute
docker commands to manage images and interact with containers.
8. Implement Docker file instructions, build an image for a sample web application using
Docker file.
9. Install and Configure Pull based Software Configuration Management and provisioning
tools using Puppet.
76
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M M M M H M H H
CO2 H H M H M H H M H H
CO3 H H M H M H H H H H
CO4 H H M H M H H M H H
CO5 H H M M M M H M H H
H- High; M-Medium; L-Low
77
Subject Code: 23UPCSC1E11 Credits: 03
INTERNET OF THINGS
COURSE OBJECTIVES
● To get familiar with the evolution of IOT with its design principles
● To outline the functionalities and protocols of internet communication
● To analyze the hardware and software components needed to construct IOT applications
● To identify the appropriate protocol for API construction and writing embedded code
● To realize various business models and ethics in Internet of Things
IOT Access Technologies: Physical and MAC layers, topology and Security of IEEE 802.15.4,
802.15.4g, 802.15.4e, 1901.2a, 802.11ah and LoRaWAN- Network Layer: IP versions,
Constrained Nodes and Constrained Networks - Optimizing IP for IOT: From 6LoWPAN to 6Lo,
Routing over Low Power and Lossy Networks - Application Transport Methods: Supervisory
Control and Data Acquisition - Application Layer Protocols: CoAP and MQTT.
Prototyping Online Components: Getting started with an API - Writing a New API - Real-Time
Reactions - Other Protocols. Techniques for Writing Embedded Code: Memory Management -
Performance and Battery Life - Libraries - Debugging.
Business Models: History of Business Models - Model - Internet of Starting up - Lean Startups.
Moving to Manufacture: Designing Kits - Designing Printed circuit boards - Certification - Costs
- Scaling Up Software. Ethics: Privacy - Control - Environment - Solutions.
78
TEXT BOOKS
1. David Hanes, Gonzalo Salgueiro, Patrick Grossetete, Rob Barton and Jerome Henry, “IoT
Fundamentals: Networking Technologies, Protocols and Use Cases for Internet of Things”,
Cisco Press, 2017 (UNIT I and II)
2. Adrian McEwen and Hakim Cassimally, “Designing the Internet of Things”, Wiley, 2014.
(UNIT III, IV and V)
REFERENCE BOOKS
1. Ovidiu Vermesan and Peter Friess, “Internet of Things – From Research and Innovation to
Market Deployement”, River Publishers, 2014.
2. Peter Waher, “Learning Internet of Things”, Packt Publishing, 2015.
3. Donald Norris, “The Internet of Things: Do-It-Yourself at Home Projects for Arduino,
Raspberry Pi and Beagle Bone Black”, McGraw Hill, 2015.
COURSE OUTCOMES
On the successful completion of the course, students will be able to:
CO1: Comprehend the IoT evolution with its architecture and sensors
CO2: Understand the networking concepts for communication and underlying IoT
protocols
CO3: Assess the embedded technologies and develop prototypes for the IoT
products K1- K6
CO4: Evaluate the use of Application Programming Interface and design an API for
IoT in realtime
CO5: Recognize the ethics of business models and perform security analysis
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M H H H H H H H
CO2 H H H H H H H M H H
CO3 H M H H H H M H H M
CO4 H H H H H H H H H H
CO5 H H H H M H H H H M
H- High; M-Medium; L-Low
79
Subject Code: 23UPCSC1E12 Credits: 01
COURSE OBJECTIVES
● To create IoT program to turn ON/OFF LED
● To implement IoT program for object detection
● To develop IoT programs for agricultural purpose
● To create web server program for local hosting
● To design IoT application for health monitoring
LIST OF EXPERIMENTS
1. To develop an IoT program to turn ON/OFF LED light (3.3V)
2. To develop an IoT program using IR sensor (Smart Garbage Monitoring, Detecting Parking
Availability, etc.)
3. To develop an IoT program using Humidity and Temperature Monitoring (Forest fire
7. To develop an real-time IoT program using Relay Module (Smart Home Automation with
230V)
9. To develop an IoT program for Gas Leakage detection (Home, Industry, etc.)
80
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M H H H M H H H
CO2 H H H H H H H M H H
CO3 H M H H H H M H H M
CO4 H H H H H H H H H H
CO5 H H H H M H L H H M
H- High; M-Medium; L-Low
81
Subject Code: 23UPCSC1E13 Credits: 03
COURSE OBJECTIVES
UNIT V
Digital Signatures – Elgamal Digital Signature Scheme – Schnorr Digital Signature Scheme –
NIST Digital Signature Algorithm – Elliptic Curve Digital Signature Algorithm – RSA-PSS
Digital Signature Algorithm – Key Management and Distribution: Symmetric Key Distribution
Using Symmetric Encryption – Symmetric Key Distribution Using Asymmetric Encryption –
Distribution of Public Keys – X.509 Certificates – Public-Key Infrastructure.
82
TEXT BOOKS
1. William Stallings, “Cryptography and Network Security – Principles and Practices”, Pearson
Education / PHI, 7th Edition, 2017.
2. Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography And Network Security”,
McGraw Hill Education, 3rd Edition, 2015.
REFERENCE BOOKS
1. Bernard Menezes, “Network Security and Cryptography”, Cengage,1st Edition, 2010.
2. William Stallings, “Cryptography and Network Security”, Pearson Education India, Sixth
Edition, 2016.
3. V.K. Jain, “Cryptography and Network Security”, Khanna Book Publishing, New Delhi,
2016.
4. C.K. Shyamala, N. Harini, Dr. T. R. Padmanabhan, “Cryptography and Security”, Wiley
India Pvt. Ltd.,2011
COURSE OUTCOMES
On the successful completion of the course, students will be able to:
Comprehend and analyze the security concepts to apply and evaluate the
CO1:
encryption techniques in various models
Understand and examine the various data encryption standards and number
CO2:
theory. Illustrate and evaluate the various techniques in different applications
Grasp the knowledge of AES techniques and apply to evaluate the performance
CO3: K1-K6
with different key types
Comprehend and analyse the basics of hash function and MAC that helps to
CO4:
develop the encryption models in various application
Understand and illustrate the need of digital signature to examine the method of
CO5: providing good security to the document. And also learn the concept of key
management
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- evaluate and K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 M H M L M H M M M H
CO2 M H H M M L M H H M
CO3 H H H M H M H M H H
CO4 H M H H M L H M H M
CO5 M H M L H L M H M H
H- High; M-Medium; L-Low
83
Subject Code: 23UPCSC1E14 Credits: 01
COURSE OBJECTIVE
LIST OF EXPERIMENTS
1. Write a program that contains a string (char pointer) with a value „Hello world‟. The
program should XOR each character in the string with 0 and display the result
2. Write a program to perform encryption and decryption using the Ceaser Cipher
3. Write a program to perform encryption and decryption using the Hill Cipher
4. Write a program to perform encryption and decryption using the Vernam Cipher
5. Write a program to perform encryption and decryption using the Substitution Cipher
6. Write a program to perform encryption and decryption using the DES algorithm
10. Identify and capture the user name and password in a same network using wireshark
84
COURSE OUTCOMES
K1-K6
CO3 Evaluate the use of different encryption and decryption techniques
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H L M L - L L M M M
CO2 H L M L M L L H H H
CO3 H L H L H L L H H H
CO4 H L H L H L L H H H
CO5 H L H L H L L M M M
H- High; M-Medium; L-Low
85
Course Code: 23UPCSC1E15 Credits: 3
COMPUTER VISION
COURSE OBJECTIVES:
● To get understanding about Computer vision techniques behind a wide variety of real-
world applications.
● To get familiar with various Computer Vision fundamental algorithms and how to
implement and apply.
● To get an idea of how to build a computer vision application with Python language.
● To understand various machine learning techniques that are used in computer vision
tasks.
● To incorporate machine learning techniques with computer vision systems.
UNITI
Basic Image Handling and Processing: PIL - the Python Imaging Library - Matplotlib - NumPy
- SciPy - Advanced example: Image de-noising. Local Image Descriptors: Harris corner
detector - SIFT – Scale - Invariant Feature Transform - Matching Geotagged Images.
UNITII
Image to Image Mappings: Homographies - Warping images - Creating Panoramas. Camera
Models and Augmented Reality: The Pin-hole Camera Model - Camera Calibration - Pose
Estimation from Planes and Markers - Augmented Reality.
UNITIII
Multiple View Geometry: Epipolar Geometry-Computing with Cameras and 3D Structure -
Multiple View Reconstruction - Stereo Images. Clustering Images: K-means Clustering-
Hierarchical Clustering-Spectral Clustering.
UNITIV
Searching Images: Content based Image Retrieval-Visual Words-Indexing Images- Searching
the Database for Images-Ranking Results using Geometry-Building Demos and Web
Applications. Classifying Image Content: K-Nearest Neighbors-Bayes Classifier-Support
Vector Machines-Optical Character Recognition.
UNITV
Image Segmentation: Graph Cuts-Segmentation using Clustering-Variational Methods.
OpenCV: Python Interface-OpenCV Basics-Processing Video-Tracking.
86
TEXT BOOK:
1. Jan Erik Solem, “Programming Computer Vision with Python: Tools and Algorithms for
Analyzing Images”, O‟REILLY Media, Inc, 2012.
REFERENCE BOOK:
1. David A. Forsyth, Jean Ponce, “Computer Vision A Modern Approach”, Second Edition,
Pearson Publication, 2012.
2. Xiaoyue Jiang, Abdenour Hadid, Yanwei Pang, Eric Granger, Xiaoyi Feng, “Deep Learning
in Object Detection and Recognition”, Springer 2019.
3. Benjamin Planche and Eliot Andres, “Hands-on Computer Vision with TensorFlow 2:
Leverage Deep Learning to Create Powerful Image Processing Apps with TensorFlow 2.0
and Keras”, 2019.
COURSE OUTCOME:
CO1 To understand and recall computer vision and its application areas
CO2 To develop build a computer vision system
To apply and analyze a design range of algorithms for image processing and
CO3
computer vision K1-K6
To develop incorporate machine learning techniques with computer vision
CO4
system
CO5 To apply and analyze image segmentation and image registration
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H L M L L L M M M H
CO2 H M L M M L H L H L
CO3 H H H M M L M L M L
CO4 H H H M M L M L M L
CO5 H H H M M L H L H L
H- High; M-Medium; L-Low
87
Course Code: 23UPCSC1E16 Credits: 1
● To get an idea of how to build a computer vision application with Python language.
● To get familiar with various Computer Vision fundamental algorithms and how to
implement and apply.
LIST OF EXPERIMENTS
1. Image Loading, Exploring and displaying an Image.
2. Access and Manipulate of Image Pixels.
3. Image Transformations.
i) Resizing
ii) Rotation
4. Addition operation of Two Images.
88
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H L M L L L M M M H
CO2 H M L M M L H L H L
CO3 H H H M M L M L M L
CO4 H H H M M L M L M L
CO5 H H H M M L H L H L
H- High; M-Medium; L-Low
89
Subject Code: 23UPCSC1E17 Credits: 03
SOCIAL NETWORKS
COURSE OBJECTIVES
● To learn about Social media, Social networking and Webcasts
● To understanding and building a Word Press Powered Website
● To analysis the Social Networking & Micro-Blogging.
● To learn and analysis the Widgets & Badges.
● To explore the importance of Website optimization.
UNIT I
Introduction: Social Media Strategy-Important First Decisions -Websites, Blogs - RSS Feeds
Mapping -Preparation - Multimedia Items Gathering Content for Blog Posts RSS Feeds & Blogs-
RSS Feeds-The Feed Reader-The Feed-Options for Creating an RSS Feed-Planning Feed –Blogs-
Options for Starting. Blog and RSS Feed-Feed or Blog Content-Search Engine Optimization
(SEO)-Feed Burner-RSS Feed and Blog Directories-An Optimization Plan for Blog or RSS Feed
UNIT II
Building a Word Press Powered Website: Word Press as A CMS - Diversity of Word Press Sites-
The Anatomy of a Word Press Site -a Brief Look at the Word Press Dashboard Planning - Site
Themes Plug-ins setting up Sidebars Building Pages- Posting Blog Entries. Podcasting,
Vidcasting, & Webcasting- Publishing Options for Podcast- Creating and Uploading Podcast
Episodes-Publishing Podcast Optimizing Podcast- Webcasting
UNIT III
Social Networking & Micro-Blogging: Facebook-The Facebook Profile -Myspace LinkedIn –
Twitter-Niche Social Networking Sites-Creating Own Social Network-Promoting Social
Networking Presence- Social Bookmarking & Crowd-Sourcing - Social Bookmarking-A Social
Bookmarking Strategy – Crowd-Sourced News Sites- Preparation And Tracking Progress Media
Communities-Image Sharing Sites-Image Sharing Strategy-Video Sharing Sites-Video Sharing
Strategy-Searching And Search Engine Placement-Connecting With Others.
UNIT IV
Widgets & Badges: Highlighting Social Web Presence-Sharing And Syndicating Content Making
Site More Interactive-Promoting Products And Making Money-Using Widgets In Word Press-
Widget Communities And Directories- Working Widgets Into Strategy Social Media
Newsrooms-Building Social Media Newsroom - Populating The Newsroom-Social Media News
Releases-Social Media Newsroom Examples. More Social Tools-Social Calendars-Social Pages
Wikis-Social Search Portals-Virtual Worlds.
90
UNIT V
Website optimization: A Website Optimization Plan - Streamlining Web Presence-An Integration
Plan- Looking to the Future-Life streaming: The Future of Blogging-Distributed Social
Networking-Social Ranking, Relevancy, and - Defriending-Web 3.0 or The Semantic Web-
Mobile Technology- Measuring Your Success-A Qualitative Framework-A Quantitative
Framework-Tools to Help You Measure-Come To Your Own Conclusions
TEXT BOOK
1. Deltina hay - A Survival Guide To social Media and Web 2.0 Optimization‖, Dalton
Publishing, 2009
REFERENCE BOOKS
1. Miriam Salpeter - Social Networking for Career Success Learning Express, 2011.
2. Miles, Peggy, - Internet world guide to webcasting Wiley, 2008 Professionals”, Wiley
Publication,2015.
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H H M H L M H M H
CO2 H H H H H L H H H H
CO3 H H H H H L H H H H
CO4 H H H H H L H H H H
CO5 H H H M H L M H M H
H- High; M-Medium; L-Low
91
Subject Code: 23UPCSC1E18 Credits: 01
COURSE OBJECTIVES
LIST OF EXPERIMENTS
2. To analyzing and visualizing tweets and tweet entities with frequency analysis
92
COURSE OUTCOMES
On the successful completion of the course, students will be able to:
To understand, implement and review the fundamental techniques and
CO1:
principles for social networks.
To design and develop the programs using the tools required to develop
CO2:
and manage social network like Facebook, LinkedIn, Google+, GitHub
To create and explore the functionality of social networking tools such as K1-K6
CO3:
GitHub
To understand , implement and review the fundamental principles for
CO4
social network graph.
CO5 To comprehend and critically analyse the existing API for social networks
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M - M H M M M H
CO2 H M H H H M H H H H
CO3 H H H H H H H H H H
CO4 H M H H H M H H H H
CO5 H H H H H H M M M H
H- High; M-Medium; L-Low
93
Subject Code: 23UPCSC1E19 Credits: 03
CYBER SECURITY
COURSE OBJECTIVES
● To understand the basics of Cybercrime and Computer forensics with protecting mechanism
● To explore the working principles of WLAN, Email and Smartphone along with security
mechanism and guidelines
● To gain the ability to understand the importance of cyber investigations with its functioning
role and learn the basics of Wi Fi and its security measures
● To understand and learn the method of seize the digital evidence
● To learn and analyze the concepts of digital forensics with cybercrime prevention techniques
UNIT I
UNIT II
Tips for buying online: Clearing cache for browsers - wireless LAN-major issues with
WLAN-safe browsing guidelines for social networking sites - email security tips -
introduction-smartphone security guidelines - purses, wallets, smart phones - platforms, setup
and installation-communicating securely with a smartphone.
UNIT III
Cyber investigation roles: Introduction - role as a cybercrime investigator - the role of law
enforcement officers - the role of the prosecuting attorney - incident response: introduction-
post mortem versus live forensics - computer analysis for the hacker defender program-
network analysis - legal issues of intercepting Wi-Fi transmission - Wi-Fi technology - Wi-Fi
RF-scanning RF - eavesdropping on Wi-Fi - fourth amendment expectation of privacy in
WLAN.
UNIT IV
Seizure of digital information: introduction – defining digital evidence – digital evidence seizure
methodology – factors limiting the wholesale seizure of hardware – other options for seizing
digital evidence – common threads within digital evidence seizure – determining the most
appropriate seizure method– conducting cyber investigations–demystifying computer/cyber crime
– IP addresses – the explosion of networking – interpersonal communication.
94
UNIT V
Digital forensics and analyzing data: introduction – the evolution of computer forensics–
phases of digital forensics-collection – examination-analysis – reporting – Cybercrime
prevention: Introduction – crime targeted at a government agency.
TEXT BOOKS
1. Dr.Jeetendra Pande, “Introduction to Cyber Security” Published by Uttarakhand Open
University, 2017.(Chapter: 1.2-6.4,9.3-12.2)
2. Anthony reyes, Kevin o‟shea, Jim steele, Jon R. Hansen, Captain Benjamin R. Jean
Thomas Ralph, “Cyber-crime investigations” - bridging the gaps between security
professionals, law enforcement, and prosecutors, 2007.(Chapter: 4, 5, 6, 7, 8, 9,10)
REFERENCE BOOKS
1. Sebastian Klipper, “Cyber Security”, Ein Einblick Für Wirtschaftswissenschaftler.
Fachmedien Wiesbaden,2015
2. John G.Voller Black and Veatch, “Cyber Security” Published by John Wiley & Sons,
Inc., Hoboken, New Jersey Published simultaneously in Canada ©2014.
COURSE OUTCOMES
On the successful completion of the course, students will be able to:
Understand, describe, analyze and examine the basics of Cyber security
CO1: concepts and its implementation in India
Comprehend and demonstrate the security tips in browsers, WLAN, social
networks, Email security and Smart phone. Apply the investigations in post
CO2: mortem and Forensics
CO3: Understand, apply and evaluate the various investigation roles and Wi Fi K1-K6
protecting mechanisms.
CO4: Understand, illustrate and evaluate the method of seize the digital
information and evidences forensics data and
evaluate the forensics reports
CO5: Comprehend, apply and appraise the methods digital forensics with
cybercrime prevention techniques
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H L M L M L M M M M
CO2 M H M L M L M M M M
CO3 M H L L M L M M M M
CO4 H M L H M L H M M M
CO5 M H M L H L M H H H
H- High; M-Medium; L-Low
95
Subject Code: 23UPCSC1E20 Credits: 01
LIST OF EXPERIMENTS
1. Install virtual box (kali Linux)
7. List all the network around us and display the information about the networks
96
COURSE OUTCOMES
On the successful completion of the course, students will be able to:
Comprehend the programming skills in Change the wireless device mode as
CO1:
monitor mode
CO2: Understand and implement multiple vulnerabilities webserver
CO3: Evaluate the use of different wireless device modes K1-K6
CO4: Design to Solve related to find the subdomains of webpage
CO5: Create and apply open ports in the network
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5-Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H M M M M L M M M M
CO2 H H H H H L H H H H
CO3 H H H H H L H H H H
CO4 H H H H H L H H H H
CO5 H M H M H L M M M M
H- High; M-Medium; L-Low
97
Subject Code: 23UPCSC1E21 Credits: 03
COURSE OBJECTIVES
● To understand about Blockchain is an emerging technology platform for developing
decentralized applications and data storage.
● To comprehend fundamentals of Public Key Cryptography technology and Consensus
Algorithms.
● To familiarize with Bitcoin Network, Bitcoin Clients, APIs and Payments technology of
blockchain operations.
● To engage with Components of the Ethereum ecosystem.
● To grasp about Development Tools and Frameworks.
98
- Nodes and miners - APIs, tools, and DApps - Supporting protocols - Programming languages.
TEXT BOOK
1. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder. Bitcoin
and Cryptocurrency Technologies Princeton University Press, 2016. ISBN 978-0691171692
REFERENCE BOOK
1. Andreas Antonopoulos. Mastering Bitcoin: Programming the open block chain. Oreilly
Publishers, 2017. ISBN 978-9352135745
COURSE OUTCOMES
On the successful completion of the course, students will be able to:
CO4 Comprehend and evaluate the alternate coin, Ethereum and smart contract.
CO5 Grasp and apply the knowledge of Tools and languages for applications
K1- Remember, K2- Understand, K3- Apply , K4- Analyze, K5-Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H M M L M H M M M M
CO2 H H H H H M H L M H
CO3 H H H H H H H H H M
CO4 H H H H M L H H H H
CO5 H M H L H L M H M L
H- High; M-Medium; L-Low
99
Subject Code: 23UPCSC1E22 Credits: 01
COURSE OBJECTIVES
LIST OF EXPERIMENTS
IMPLEMENT THE FOLLOWING
1. Create a Public Ledger and Private Ledger with the various attributes like Access,
8. Hashcash implementation
10. Create simple wallet transaction from one account to another account using
Metamask.
100
COURSE OUTCOMES
On the successful completion of the course, students will be able to:
Enable to setup your own private Blockchain and deploy smart contracts
CO1:
on Ethereum.
CO2: Gain familiarity and implement with cryptography and Consensus algorithms.
CO3: Create and deploy projects using Web3j. K1 –K6
Recall and deploy the structure and mechanism of Bitcoin, Ethereum,
CO4:
Hyper ledger
CO5: Implement Blockchain for various use cases
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M L M H M L M M
CO2 H M H H H M H H H H
CO3 H H H H H H H H H H
CO4 H M L H M L M H M M
CO5 M H M L H L H L H H
H- High; M-Medium; L-Low
101
Subject Code: 23UPCSC1E23 Credits: 03
OPTIMIZATION TECHNIQUES
COURSE OBJECTIVES
Transportation Model: North West corner Method, Least cost method, and Vogel‟s
Approximation Method. Assignment Model : Hungarian assignment model - Travelling Sales
Man Problem.
Simplex Method - Gradient of function - Steepest Descent method – Conjugate Gradient method
Particle Swarm Optimization method - Ant Colony optimization algorithm - Fruit Fly method -
Fire Fly method
TEXT BOOKS
1. Kanti Swarup, P. K. Gupta and Man Mohan, “Operations Research”, Sultan Chand and Sons,
New Delhi, 2014. (Unit 1, 2, and 3)
2. S. S. Rao, “Engineering Optimization: Theory and Practice”, JOHN WILEY & SONS,
INC., 2009. (Unit 4)
102
REFERENCE BOOK
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M H H H M H H H
CO2 H H H H H L H M H H
CO3 H M H H M H M H H L
CO4 H H H H H H H H H H
CO5 H H H H M L H H H M
H- High; M-Medium; L-Low
103
Subject Code: 23UPCSC1E24 Credits: 01
LIST OF EXPERIMENTS
1. Simplex algorithm
5. Modi algorithm
104
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H M H H H M H H H
CO2 H H H H H L H M H H
CO3 H M H H M H M H H L
CO4 H H H H H H H H H H
CO5 H H H H M L H H H M
H- High; M-Medium; L-Low
105
Subject Code: 23UPCSC1E25 Credits: 03
SOLUTION ARCHITECTURE
COURSE OBJECTIVES
UNIT I
UNIT II
UNIT III
Solution Architecture Design Patterns - Building an n-tier layered architecture - Creating multi-
tenant SaaS-based architecture - Building stateless and stateful architecture designs -
Understanding SOA - Performance Considerations - Design principles for architecture
performance - Technology selection for performance optimization - Managing performance
monitoring
UNIT IV
106
UNIT V
Cost Considerations - Design principles for cost optimization - Techniques for cost optimization -
Cost optimization in the public cloud - Architecting Legacy Systems - Learning the challenges of
legacy systems - Defining a strategy for system modernization - Looking at legacy system
modernization techniques - Defining a cloud migration strategy for legacy systems
TEXT BOOK
1. Saurabh Shrivastava and Neelanjali Srivastav, “Solutions Architect's Handbook”, Packt
Publishing, 2020
REFERENCE BOOKS
1. Alan McSweeney , “Introduction to Solution Architecture”, Kindle Edition, 2019
2. Bernard, Scott A. An introduction to holistic enterprise architecture. Author House, 2020.
COURSE OUTCOMES
CO2 Assess the cloud architecture and create hybrid cloud architecture
K1- K6
CO3 Analyze the design patterns for solution architecture
CO5 Optimize the cost in cloud and assess the legacy system
K1- Remember, K2- Understand, K3- Apply, K4- Analyze, K5- Evaluate, K6- Create
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H H H H H H H H M
CO2 H H H H H H H H H H
CO3 H M H H H H M H H H
CO4 H H H M H H H H H H
CO5 H H H H M H H H H M
H- High; M-Medium; L-Low
107
Subject Code: 23UPCSC1E26 Credits: 01
COURSE OBJECTIVES
LIST OF EXPERIMENTS
108
COURSE OUTCOMES
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H H H H H H H H H M
CO2 H H H H H H H H H H
CO3 H M H H H H M H H H
CO4 H H H M H H H H H H
CO5 H H H H M H H H H M
H- High; M-Medium; L-Low
109
Subject Code: 23UPCSC1E27 Credits: 03
UNIT I
MODERN PROCESSORS: Stored- Program computer architecture-General purpose cache
based microprocessor architecture-Memory hierarchies-Multicore processors-Multithreaded
processors-Vector processors. Basic optimization techniques for serial code: Scalar profiling-
Common sense optimizations-Simple measures, large impact-The role of compilers-C++
optimizations.
UNIT II
DATA ACCESS OPTIMIZATION: Balance analysis and light speed estimates-Storage order -
Algorithm classification and access optimizations-The Jacobi algorithm-Algorithm classification
and access optimizations-Sparse matrix-vector multiply. Parallel computers: Taxonomy of
parallel computing paradigms-Shared-memory computers-Distributed memory computers-
Hierarchical systems-Networks.
UNIT III
BASICS OF PARALLELIZATION: Introduction to Parallelism -Parallel scalability. Shared
memory parallel programming with OpenMP: Short introduction to OpenMP – OpenMP-
parallel Jacobi algorithm.
UNIT IV
EFFICIENT OPENMP PROGRAMMING: Profiling OpenMP programs-Performance
pitfalls-Parallel sparse matrix-vector multiply. Locality optimizations on ccNUMA
architectures: Locality of access on ccNUMA-ccNUMA optimization of sparse MVM-
Placement pitfalls-ccNUMA issues with C++.
UNIT V
DISTRIBUTED-MEMORY PARALLEL PROGRAMMING WITH MPI: Message passing-
A short introduction to MPI-MPI parallelization of a Jacobi solver. Efficient MPI
programming: MPI performance tools-Communication parameters-Synchronization,
serialization, contention-Reducing communication overhead-Understanding intranode point-to-
point communication.
110
TEXT BOOK
1. Georg Hager, Gerhard Wellein “Introduction to High Performance Computing for Scientists
and Engineers”, CRC Press, 2011.Chapters: 1 to 10.
REFERENCE BOOKS
2. Victor Eijkhout, “Introduction to High Performance Scientific Computing”, MIT Press, 2011.
COURSE OUTCOME
CO2 Design and develop a parallel programming with modern C, C++ and new
version of FORTRAN
CO3 Apply with parallel computing K1 - K6
CO4 Develop an efficient OpenMP programming
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H L M L L L H H H H
CO2 H M L M M L H L H L
CO3 H H H M M L M L M L
CO4 H H H M H L M L M H
CO5 H H H M M L M M M M
H- High; M-Medium; L-Low
111
Subject Code: 23UPCSC1E28 Credits: 01
COURSE OBJECTIVES
112
COURSE OUTCOMES:
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10
CO1 H L M L L L H H H H
CO2 H M L M M L H L H L
CO3 H H H M M L M L M L
CO4 H H H M H L M L M H
CO5 H H H M M L M M M M
H- High; M-Medium; L-Low
113
NON MAJOR ELECTIVE – II
MS-PowerPoint:
14. Prepare a presentation with embedding multimedia objects.
15. Prepare presentation with slide layout, animations, font effects,
hyperlinks.
MS-Publisher:
16. Prepare an academic calendar for an institution.
Reference Books:
1. Lisa A. Bucki, “MS Office 2013 Bible”, Wiley Publications, 2013.
2. Richard Mansfield, “Mastering VBA for Microsoft office 2016”, Wiley Publications,
2016.
3. Wayne L. Winston, “Microsoft Excel Data Analysis and Business Modeling”, PHI, 2017.
4. Manisha Nigam, “Data Analysis with Excel”, BPB Publications, 2019.
5. Michael Alexander and Dick Kusleika, “Excel Power Programming with VBA”, Wiley
Publications, 2016.
6. Michael Alexander and Dick Kuskeika, “Access the Comprehensive
tutorial guide”, Wiley Publications, 2016.
114
NON MAJOR ELECTIVE – II
LIST OF EXPERIMENTS
Implement the following in Python:
Reference Books:
1. Via, A., Rother, K., & Tramontano, A. (2014). Managing your biological data
with Python. Chapman and Hall/CRC.
2. Rocha, M., & Ferreira, P. G. (2018). Bioinformatics Algorithms: Design and
Implementation in Python. Academic Press.
3. Chun, W. (2001). Core python programming (Vol. 1). Prentice Hall Professional.
115
SEMESTER II
SEMESTER III
SEMESTER IV
Student should attend any lecture series / workshop / panel discussion / presentation on specific
subject. The student has to submit and present the report with detailed description
116