Outcomes Based Education Curricula (Academic Year 2015 – 2016)

advertisement
M. S. RAMAIAH INSTITUTE OF TECHNOLOGY
BANGALORE-54
(Autonomous Institute, Affiliated to VTU)
Computer Science and Engineering
Outcomes Based Education Curricula
(Academic Year 2015 – 2016)
V & VI Semester
History of the Institute
M. S. Ramaiah Institute of Technology was started in 1962 by the late Dr. M.S. Ramaiah, our
Founder Chairman who was a renowned visionary, philanthropist, and a pioneer in creating
several landmark infrastructure projects in India. Noticing the shortage of talented engineering
professionals required to build a modern India, Dr. M.S. Ramaiah envisioned MSRIT as an
institute of excellence imparting quality and affordable education. Part of Gokula Education
Foundation, MSRIT has grown over the years with significant contributions from various
professionals in different capacities, ably led by Dr. M.S. Ramaiah himself, whose personal
commitment has seen the institution through its formative years. Today, MSRIT stands tall as
one of India’s finest names in Engineering Education and has produced around 35,000
engineering professionals who occupy responsible positions across the globe.
History of Department of Computer Science and Engineering
Year of Establishment
Names of the Programmes
offered
1984
1. UG: B.E. in Computer science and Engineering
2. PG: M.Tech. in Computer Science and Engineering
3. PG: M.Tech. in Computer Networks and Engineering
4. Ph.D
5. M.Sc(Engg.) by research
Faculty
Name
Sl. No.
Qualification
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
Dr. K G Srinivasa
M.E, Ph.D
Dr. R. Srinivasan
D.Sc.
Dr .S Ramani
Ph.D
Nagabhushan A.M
M.Tech
Dr. Anita Kanavalli
M.E., Ph.D
Dr. Seema S
M.S., Ph.D
Dr. Annapurna P. Patil
M. Tech, Ph.D
Jagadish S Kallimani
M.Tech, (Ph.D)
Jayalakshmi D S
M.Sc(Engg), (Ph.D)
Dr. Monica R Mundada
M.Tech, Ph.D
Sanjeetha R
M.Tech
A Parkavi
M.E. (Ph.D)
Veena G S
M.Tech (Ph.D)
J Geetha
M.Tech, (Ph.D)
Dr. T N R Kumar
M. Tech Ph.D
Mamatha Jadav V
M.Tech
Chethan C T
B.E.
Sini Anna Alex
M.E, (Ph.D)
Vandana Sardar
M.E.
Meera Devi
M.Tech
Mallegowda M
M.Tech
Divakar Harekal
M.E.
Chandrika Prasad
M.Tech
S Rajarajeswari
M.E, (Ph.D)
Sowmyarani C N
M.E. (Ph.D)
Pramod S Sunagar
M.Tech
Sowmya B J
M.Tech
Pradeep Kumar D
M.Tech
Ganeshayya I Shidaganti
M.Tech
Chetan
M.Tech
Darshana A Naik
M.Tech
Srinidhi H
M.Tech
Aparna R
B.E, M.Tech
Hanumantha Raju R
B.E, M.Tech
Visiting Faculty Members from Industry
35.
Dr. Ramamurthy Badrinath
Ph.D
36.
N. Pramod
B.E.
37.
Jayasimha Rao
38.
Sriram Kashyap
M.S. in Machine Learning and
Data Mining from Aalto
University School of Science
MTech from IIT Madras
Designation
HOD, Professor
Emeritus Professor
Emeritus Professor
Emeritus Professor
Professor
Associate Professor
Associate Professor
Associate Professor
Associate Professor
Associate Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
Assistant Professor
AICTE-INAE distinguished
Visiting Professor
Application Engineering at
Thoughtworks Pvt. Ltd.
Entrepreneur
Intel, Bangalore
Vision and Mission of the Institute
Vision
To evolve into an autonomous institution of International standards for imparting quality
Technical Education
Mission
MSRIT shall deliver global quality technical education by nurturing a conducive learning
environment for a better tomorrow through continuous improvement and customization.
Quality Policy
“We at M. S. Ramaiah Institute of Technology, Bangalore strive to deliver comprehensive,
continually enhanced, global quality technical and management education through an established
Quality Management system complemented by the synergistic interaction of the stakeholders
concerned”.
Vision and Mission of the Department
Vision
To build a strong learning and research environment in the field of Computer Science and
Engineering that responds to the challenges of 21st century.
Mission
To produce computer science graduates who, trained in design and implementation of
computational systems through competitive curriculum and research in collaboration with
industry and other organizations.
To educate students in technology competencies by providing professionally committed faculty
and staff.
To inculcate strong ethical values, leadership abilities and research capabilities in the minds of
students so as to work towards the progress of the society.
Process for Defining the Vision and the Mission of the Department
Programme Educational Objectives (PEOs)
A B.E. (Computer Science & Engineering) graduate of M. S. Ramaiah Institute of Technology
should, within three to five years of graduation
1. Pursue a successful career in the field of Computer Science & Engineering or a related
field utilizing his/her education and contribute to the profession as an excellent employee,
or as an entrepreneur
2. Be aware of the developments in the field of Computer Science & Engineering,
continuously enhance their knowledge informally or by pursuing graduate studies
3. Be able to work effectively in multidisciplinary environments and be responsible
members/leaders of their communities
PEO Derivation Process
Programme Outcomes (POs)
The outcomes of the Bachelor of Engineering in Computer Science & Engineering Programme
are as follows:
A B.E. (Computer Science & Engineering) graduate must demonstrate
1. An ability to apply knowledge of mathematics, science, and engineering as it applies to
Computer Science & Engineering
2. An ability to identify, formulate, study, and analyze and solve complex computing
problems
3. An ability to design a computer-based system, component, software or process to meet the
desired needs
4. An ability to design and conduct experiments, evaluate results and provide valid
conclusions
5. An ability to use modern computing techniques, technologies and tools necessary for
computing engineering practice.
6. An ability to understand and assess the societal, legal and security issues related to the
practice of computer science and engineering.
7. An ability to understand the impact of computing solutions in an economic, environmental
and societal context.
8. An understanding of professional and ethical responsibilities in professional engineering
practice.
9. An ability to function effectively individually and in team, and in multi-disciplinary
environment.
10. An ability to communicate effectively.
11. An understanding of the engineering and management principles required for project and
finance management.
12. Recognition of the need for, and an ability to engage in life-long learning.
PO Derivation Process
Mapping of PEOs and POs
Sl.
No.
1
2
3
Programme
Educational
Objectives
Excel in
career
Life-long
learning
Work in
diverse
teams and
show
Leadership
Programme Outcomes
PO1
PO2
PO3
PO4
PO5
PO6
PO7
PO8
PO9
PO10
PO11
PO12
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Curriculum Breakdown Distribution
Sl. No.
Courses
Weightage
1
Basic Science Core Courses
13%
2
Basic Engineering Science Core Courses
13%
3
Humanities and Social Science Core Courses
3%
4
Professional Courses and Electives
62%
5
Major Project
9%
6
Mandatory Learning Courses
0%
x
x
x
x
Board of Studies for the Term 2015-2016
1. Head of the Department
concerned:
2. At least five faculty members at
different
levels
covering
different
specializations
constituting nominated by the
Academic Council
Dr. K G Srinivasa
Chairperson
Dr. Anita Kanavalli
Prof. Jagadish S Kallimani
Prof. Jayalakshmi D S
Prof. H V Divakar
Prof. Sanjeetha R
Prof. A Parkavi
Prof. Chandrika Prasaad
Member
Member
Member
Member
Member
Member
Member
Dr. R. Srinivasan
Dr. S. Ramani
Prof. Nagabhushan A M
Member
Member
Member
Dr. Kavi Mahesh, Professor, PESIT
Dr. G Varaprasad Associate
Professor, BMSCE
Member
Member
Dr. N.K. Srinath, Professor, RVCE
Member
6. One
representative
from
industry/corporate sector allied
area relating to placement
nominated by the Academic
Council
Mr. Rajesh Vijayarajan, HewlettPackard
Member
7. One postgraduate meritorious
alumnus to be nominated by the
Principal
Sriram Kashyap, Intel Corporation
Member
3. Special invitees
4. Two experts in the subject from
outside the college
5. One expert from outside the
college, nominated by the Vice
Chancellor
9
Department Advisory Board for the term 2015-2016
1. Head of the Department concerned
Dr. K G Srinivasa
Member
2. Experts from other organizations for
Department Advisory Board
Dr. Satish Vadhiyar, SERC, IISC Bangalore
Dr. Srinivasaraghavan, IIIT Bangalore
Dr. K Sangeeta Iyer
Member
Member
Member
Industry Advisory Board for the Term 2015-2016
1. Head of the Department concerned
Dr. K G Srinivasa
Member
2. Experts from industry constituting
the Industry Advisory Board
Dr. Badrinath Ramamurthy, HP Labs, India
Dr. N.C. Narendra, CTS
Dr. Yogesh Simhan, SERC, IISC
Mr. Sreekanth Iyer, IBM
Mr. Nishant Kulkarni, IBM
Mr. Muthuraman Ranganath, SAP Technologies
Mr. K Murali, Amazon
Member
Member
Member
Member
Member
Member
Member
10
Scheme of Studies for Third Year B.E. (CSE) for the batch 2013-2017
V Semester
Total Credits: 25
Code
Subject
L T P Credit
CS512
Operating Systems
4 0 0 4
CS513
Database Systems
4 0 0 4
CS514
Computer Networks
4 0 0 4
CS515
Software Engineering
3 0 1 4
Elective Group I
* * * 4
CSL511 Java Laboratory
0 1 1 2
CSL512 DBMS and OS Laboratory
0 0 2 2
CSL514 Computer Networks Laboratory
0 0 1 1
VI Semester
Total Credits: 25
Code
Subject
L T P Credit
CS612
Compiler Design
3 1 0 4
CS613
Embedded Systems
4 0 0 4
CS621
Computer Security
3 1 0 4
CS622
Computer Graphics
3 0 1 4
Elective Group II
* * * 4
CSL611 Unix Systems Programming Laboratory
0 1 1 2
CSL613 Embedded Systems Laboratory
0 0 1 1
CSL612 Internet Technologies & Software
0 1 1 2
Development for Portable Devices
Laboratory
List of Electives:
Elective Group I
Elective Group II
1 CSPE01 Data Mining (3:1:0)
13 CSPE13 Analysis of Computer Data
Networks (4:0:0)
2 CSPE02 Machine Learning (3:1:0)
14 CSPE14 Operations Research (4:0:0)
3 CSPE03 Cloud Computing (4:0:0)
15 CSPE15 Advanced Algorithms (3:0:1)
4 CSPE04 Distributed Systems (4:0:0)
16 CSPE16 Artificial Intelligence (4:0:0)
5 CSPE05 Big Data and Data Science
17 CSPE17 System Simulation (4:0:0)
(3:0:1)
6 CSPE06 Storage Area Networks (4:0:0) 18 CSPE18 Pattern Recognition (4:0:0)
7 CSPE07 Information Retrieval (3:0:1)
19 CSPE19 Advanced Computer Architecture
(4:0:0)
8 CSPE08 Social Network Analysis
20 CSPE20 Computer Systems Performance
(3:1:0)
Analysis (4:0:0)
9 CSPE09 Wireless Sensor Networks
21 CSPE21 Software Testing (3:0:1)
(4:0:0)
10 CSPE10 Mobile Computing (4:0:0)
22 CSPE22 Software Architecture and Design
Patterns (4:0:0)
11 CSPE11 Multimedia Computing (3:0:1) 23 CSPE23 Service Oriented Architectures
and Web Services (4:0:0)
12 CSPE12 Software Defined Networks
24 CSPE24 Object Oriented Modelling and
(4:0:0)
Design (4:0:0)
11
Course Title: Operating Systems
Course Code: CS512
Credits (L:T:P) : 4:0:0
Core/ Elective: Core
Type of Course: Lecture
Total Contact Hours: 56 Hrs
Prerequisites:
Nil
Course Contents:
Unit 1
Operating system Overview: Operating system objectives and Functions, Major Achievements, Developments
leading to Modern operating systems, Linux, Real-Time System Concepts
Unit 2
Process Description and Control: What is Process? Process states, Process Description, Process Control, Processes
and Threads. Process Scheduling: Basic Concepts, Scheduling criteria, Scheduling Algorithms
Unit 3
Concurrency: Mutual Exclusion and Synchronization: Principles of Concurrency, Mutual Exclusion: Hardware
Support, Semaphores, Monitors, Message Passing, Readers/Writers Problem. Concurrency: Deadlock and
Starvation: Principles of deadlock, Deadlock Prevention, Deadlock avoidance, Deadlock Detection, Dining
Philosopher’s Problem
Unit 4
Memory Management - Memory Management Strategies: Background, Swapping, Contiguous memory allocation,
Paging, Structure of page table, Segmentation. Virtual Memory Management: Background, Demand paging,
Copy-on-write, Page replacement, Allocation of frames, Thrashing.
File System: Implementation of File System - File System, File concept, Access methods, Directory structure, File
system mounting, File sharing, Protection.
Unit 5
Implementing File System: File system structure, File system implementation, Directory implementation,
Allocation methods, Free space management. Secondary Storage Structures: Mass storage structures: Disk
structure, Disk scheduling, Disk management, Swap space management
Text Book:
1. Abraham Silberschatz, Peter Baer Galvin, Greg Gagne: Operating System Principles, 8th edition, WileyIndia, 2011.
2. William Stallings: Operating Systems internals and Design Principles, 8th Edition, Pearson Education,
2014
3. Jean J Labrosse: MicroC/OS-II The Real-Time Kernel, Second Edition, CMP Books, 2006
Reference Books:
1. D.M Dhamdhere: Operating systems - A concept based Approach, 3rd Edition, Tata McGraw- Hill, 2012.
2. P.C.P. Bhatt: Introduction to Operating Systems Concepts and Practice, 3rd Edition, PHI, 2010.
3. Harvey M Deital: Operating systems, 3rd Edition, Pearson Education, 2011.
Course Delivery:
The course will be delivered through lectures, class room interaction, Online courses
12
Direct & Indirect Assessment Methods
Course Assessment and Evaluation:
What
To whom
C
I
E
S
E
E
When/ Where
(Frequency in the
course)
Max
marks
Evidence
collected
Contributing to
Course
Outcomes
Internal
assessment
tests
Thrice(Average of
the best two will
be computed)
30
Blue books
1,2, 3,4,5,6 & 7
Online
Courses/Quiz
Once
20
Quiz answers/
Course
certificates
1,2, 3,4,5,6 & 7
End of course
(Answering 5 of
10 questions)
100
Answer scripts
1,2, 3,4,5,6 & 7
Standard
examination
Students
End of course
survey
End of course
Questionnaire &
Responses
-
1,2, 3,4,5,6 & 7
Effectiveness of
Delivery of
instructions &
Assessment
Methods
Course Outcomes:
At the end of the course the student will be able to:
1. Describe the functions, major achievement and development of Operating Systems.
2. Implement concepts of Process scheduling using preemptive and non preemptive scheduling algorithms.
3. Illustrate the concepts of classical synchronization problems.
4. Demonstrate different methods for handling deadlocks using detection, prevention and avoidance
techniques.
5. Explain the concepts of memory management techniques including virtual memory.
6. Describe file systems and its implementation.
7. Illustrate secondary storage structure including disk scheduling algorithm.
Mapping course outcomes with programme outcomes:
Course Outcomes
Programme Outcomes
1
x
2
4
5
Implement concepts of Process scheduling using
preemptive and non preemptive scheduling
algorithms.
Illustrate
the
concepts
of
classical
synchronization problems.
x
x
x
x
x
x
x
x
Demonstrate different methods for handling
deadlocks using detection, prevention and
avoidance techniques.
Explain the concepts of memory management
techniques including virtual memory.
Describe file systems and its implementation.
x
x
x
x
x
x
x
x
x
x
x
x
Illustrate secondary storage structure including
disk scheduling algorithm.
x
x
Describe the functions, major achievement and
development of Operating Systems.
13
3
x
6
7
8
9
10
11
12
x
Course Title: Database Systems
Course Code: CS513
Credits (L:T:P) : 4:0:0
Core/ Elective: Core
Type of course: Lecture
Total Contact Hours: 56 Hours
Prerequisites: Nil
Course Contents:
Unit 1
Introduction: Characteristics of Database approach, Actors on the Scene, Workers behind the scene, Advantages of
using DBMS approach, Data models, schemas and instances, Three-schema architecture and data independence,
Database languages and interfaces, the database system environment, Centralized and client-server architectures,
Classification of Database Management systems, Entity-Relationship Model: Conceptual Database using high level
conceptual data models for Database Design, A Sample Database Application, Entity types, Entity sets Attributes
and Keys Relationship types, Relationship Sets, Roles and Structural Constraints Weak Entity Types..
Unit 2
Relational Model and Relational Algebra: Relational Model Concepts, Relational Model Concepts, Relational
Model Constraints and Relational Database Schema Update Operations, Transactions and Dealing with Constraint
violations, Unary Relational operations, Relational Algebra Operations from Set Theory, Binary Relational
Operations, JOIN and DIVISION, Additional Relational Operations, Examples of Queries in Relational Algebra
Relational Database Design Using ER- to-Relational Mapping.
Unit 3
Introduction to SQL: Overview of the SQL Query Language, SQL Data Definition, Basic structure of SQL
Queries, Additional Basic Operations, Null values, Aggregate Functions, nested Sub queries, Modification of the
Database, Join Expressions, Views, Transactions, Integrity Constraints, SQL Data Types and Schemas,
Authorization. Database programming issues and techniques, Embedded SQL.
Unit 4
Database Design: Informal Design Guidelines for Relation Schemas, Functional Dependencies, Normal Forms
based on Primary Keys, General Definitions of 2nd and 3rd Normal Forms, Boyce Codd Normal Forms, Multivalued
Dependencies and IV Normal Forms, Join Dependencies and V Normal Forms, Inference Rules, Equivalence and
Minimal Cover, Properties of Relational Decomposition, Algorithms for relational database schema design.
Unit 5
Transaction Management: Transaction Concept, A Simple Transaction Model, Transaction Atomicity and
Durability, Serializability, Transaction Isolation and Atomicity, Transaction Isolation Levels, Implementation of
Isolation Levels. Concurrency Control: Lock-Based Protocols, Deadlock Handling. Recovery System: Failure
Classification, Storage, Recovery and Atomicity, Recovery Algorithm
Text Book:
1. Elmasri and Navathe: Fundamentals of Database Systems, 5th Edition, Addison-Wesley, 2011.
2. Silberschatz, Korth and Sudharshan: Data base System Concepts, 6th Edition, Tata McGraw Hill, 2011
Reference Books:
1. .C.J. Date, A. Kannan, S. Swamynatham: An Introduction to Database Systems, 8th Edition, Pearson education,
2009.
Course Delivery:
The course will be delivered through lectures, class room interaction, group discussion, lab exercises and projects.
14
Course Assessment and Evaluation:
CIE
To Whom
Internal
Assessment
Tests
When/ Where
(Frequency in
the course)
Thrice(Average
of the best two
will be
computed)
Max
Marks
Evidence
Collected
Contribution to
Course Outcomes
30
Blue Books
1,2,3,4,5 & 6
Once
20
Project
Reports/Online
Course
certificates
2,3,4,5
End of Course
100
Answer scripts
1,2,3,4,5 & 6
Questionnaire
1,2,3,4,5 & 6
ffectiveness of
Delivery of
instructions &
Assessment Methods
Mini
Projects/Online
Course
Students
SEE
Direct & Indirect Assessment Methods
What
Standard
Examination
End of Course
Survey
End of the
course
-
Course Outcomes:
At the end of the course the student will be able to:
1. Differentiate database systems from traditional file systems by enumerating the features provided by database
systems..
2. Design entity-relationship diagrams to represent simple database applications
3. Construct relational algebraic expressions for queries using the concepts of relational database theory
4. Formulate using SQL, solutions to a broad range of query and data update problems
5. Apply Normalization to improve database design
6. Identify the basic issues of transaction processing and concurrency control.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
Differentiate database systems from traditional
file systems by enumerating the features
provided by database systems
Design entity-relationship diagrams to represent
simple database applications
Construct relational algebraic expressions for
queries using the concepts of relational database
theory
Formulate using SQL, solutions to a broad range
of query and data update problems
Apply Normalization to improve database
design
Identify
the basic issues of transaction
processing and concurrency control
x
2
3
4
5
x
x
x
x
x
x
x
6
x
x
x
x
x
x
15
x
x
7
8
9
10
11
12
Course Title: Computer Networks
Course Code: CS514
Credits (L:T:P:) : 4:0:0
Core/ Elective: Core
Type of course: Lecture
Total Contact Hours: 56 Hrs
Prerequisites: Data Communication
Course Contents:
Unit 1
Application Layer: Principles of Network Applications: Network Application Architectures,Application-Layer
Protocols,The Web and HTTP: Overview of HTTP, Non-Persistent and Persistent Connections, HTTP Message
Format, User-Server Interaction-Cookies,Web Caching,The Conditional GET.File Transfer-FTP:FTP Commands
and Replies, Electronic Mail in the Internet: SMTP, Comparison with HTTP, Mail Access Protocols. DNS—The
Internet’s Directory Service: Services Provided by DNS,Overview of How DNS Works,DNS Records and
Messages, Peer-to Peer Applications: P2P File Distribution, Distributed Hash Tables (DHTs), Case Study: P2P
Internet Telephony with Skype
Unit 2
Transport layer: Multiplexing and Demultiplexing,Connectionless Transport-UDP:UDP Segment Structure, UDP
Checksum,Connection-Oriented Transport-TCP: The TCP Connection, TCP Segment Structure, Round-Trip Time
Estimation and Timeout, Reliable Data Transfer, Flow Control,TCP Connection Management,Principles of
Congestion Control, Approaches to Congestion Control,TCP Congestion Control
Unit 3
Network Layer: Forwarding and Routing, The Internet Protocol (IP): Forwarding and addressing in the Internet,
Datagram Format, IPv4 Addressing, classful Addressing, Classless addressing,IPv6 Addressing, The IPv6 protocol,
ICMPv4, The ICMPv6 protocol,Transition from IPv4 to IPv6,Routing Algorithms- The Distance-Vector
Routing,Link-State Routing, path vector routing
Unit 4
Unicast routing protocols-RIP, OSPF, BGP4, Multicast Routing: Introduction, Multicasting basics, Intradomain and
interdomain multicast protocols, IGMP
Wireless and Mobile Networks: Introduction, WiFi 802.11 Wireless LANs- The 802.11 Architecture,Mobility in
the Same IP Subnet, Advanced Features in 802.11, Beyond 802.11, WiMAX, Cellular Internet Access-An Overview
of Cellular Architecture, Mobility Management Principles, Addressing, Routing to a Mobile Node, Mobile IP,
Managing Mobility in Cellular Networks, Routing Calls to a Mobile User, Handoffs in GSM, Wireless and
Mobility: Impact on Higher-layer Protocols
Unit 5
Multimedia Networking: Multimedia Networking Applications- Examples of Multimedia Applications, Streaming
Stored Audio and Video - RTSP, Removing Jitter at the Receiver for Audio, Recovering from Packet Loss,
Distributing Multimedia in Today’s Internet - Content Distribution Networks, Protocols for Real-Time Interactive
Applications, RTP, RTCP, SIP, H.323, Flow control to improve QoS, Integrated Services, Differentiated services.
Text Book:
1. James F. Kurose and Keith W. Ross: Computer Networking: A Top-Down Approach, 5th edition, AddisonWesley, 2009.
2. Forouzan: Data Communications and Networking, 5th edition, McGraw Hill Education 2013.
Reference Books:
1. Larry L. Peterson and Bruce S Davie: Computer Networks: A Systems Approach, Fifth Edition, Elsevier, 2011.
2. Tanenbaum: Computer Networks, 4th Ed, Pearson Education/PHI, 2003.
3. William Stallings: Data and Computer Communications, 8th Edition, Pearson Education, 2012.
4. Behrouz A. Forouzan: Data communication and Networking, 4th edition, Tata McGraw-Hill, 2012.
Course Delivery:
The course will be delivered through lectures, class room interaction, group discussion and lab exercises.
16
Course Assessment and Evaluation:
To
Whom
Direct & Indirect Assessment Methods
What
Internal
Assessment Tests
When/ Where
(Frequency in
the course)
Thrice(Average of
the best two will
be computed)
Max
Marks
Evidence
Collected
Contribution to
Course Outcomes
30
Blue Books
1,2 3,4,5,6 & 7
Soft copy of
the ppt and
report
1,2 3,4,5,6 & 7
Answer
scripts
1,2 3,4,5,6 & 7
Questionnaire
1,2 3,4,5,6 & 7
Effectiveness of
Delivery of
instructions &
Assessment
Methods
CIE
Theory
Assignments
SEE
Standard
Examination
Students
End of Course
Survey
Once
20
End of Course
(Answering
5 of 10 questions)
100
End of the course
-
Course Outcomes:
At the end of the course students should be able to:
1. Describe the various application layer protocols used by TCP/IP reference model
2. Differentiate between connection oriented and connection less services of transport layer.
3. Solve problems of routing using various routing protocols and algorithms.
4. Identify the drawbacks of classful addressing and the need for classless & IPv6 addressing.
5. Manage mobility in Internet and cellular networks.
6. Compare features of different wireless network standards
7. Identify the challenges in multimedia networking with respect to content delivery and Quality of Service.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
2
3
4
5
6
x
x
x
x
x
x
x
x
x
x
x
x
Solve problems of routing using various routing
protocols and algorithms.
x
x
x
x
x
x
Identify the drawbacks of classful addressing and the
need for classless & IPv6 addressing.
x
x
x
x
x
Manage mobility in Internet and cellular networks.
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Describe the various application layer protocols used
by TCP/IP reference model
Differentiate between connection oriented and
connection less services of transport layer.
Compare features of different wireless network
standards
Identify the challenges in multimedia networking
with respect to content delivery and Quality of
Service.
17
x
7
8
9
10
11
12
Course Title: Software Engineering
Course Code: CS515
Credits (L:T:P) : 3:0:1
Core/ Elective: Core
Type of course: Lecture, Practical
Total Contact Hours: 70
Prerequisites:
Nil
Course Contents:
Unit 1
The Software Problem & Processes: Cost, Schedule & Quality, Scale & Change, Software Processes: Process &
Project, Component Software Processes, Software Development Process Models, Project Management Process
Unit 2
Requirements Analysis & Project Planning: Requirements Analysis & Specification: Value of a Good SRS,
Requirements Process, Requirements Specification, Functional Specification with Use Cases, Other Approaches for
Analysis,
Planning a Software Project: Effort Estimation, Project Schedule & Staffing, Quality Planning, Risk Management
Planning, Project Monitoring Plan
Unit 3
Design, Coding: Design: Design Concepts, Function-oriented Design, Object-oriented Design, Detailed Design,
Metrics,
Coding: Programming Principles & Guidelines, Incrementally Developing Code, Managing Evolving Code.
Unit 4
Unit Testing and Testing: Unit Testing, Code Inspection, Metrics Testing Concepts, Testing Process, Black-box
Testing, White-box Testing, Metrics.
Unit 5
Software Engineering for new paradigms- Web and Cloud Web Engineering: Web Applications vs
Conventional Software
Impact of Cloud computing on Software Development life cycle: Limitations and Challenges in Cloud-Based
Applications Development- Introduction and Challenges. Impact of Cloud computing on Software Development life
cycle.
Textbooks
1. Pankaj Jalote: A Concise Introduction to Software Engineering , Springer, 2008 (Chapters: 1-4, 6-8)
2. Emilia Mendes, Nile Mosley: Web Engineering, Springer, 2006 (Chapter: 1)
3. Zaigham Mahmood, Saqib Saeed: Software Engineering framework for the cloud computing Paradigms,
Springer, 2013(Chapters 3,4)
Reference Books
1. Roger S. Pressman: Software Engineering A Practitioner's Approach, 7th Edition, McGraw Hill, 2010
2. David Gustafson: Software Engineering, Schaum's Outline Series, McGraw Hill, 2002 (Chapters: 6)
Course Delivery:
The course will be delivered through lectures in the classroom
18
Course Assessment and Evaluation:
To
Whom
Direct & Indirect Assessment Methods
What
Internal
Assessment
Test
Software
Engineering
Lab
using
open source
tools
CIE
CIE
Standard
Examination
SEE
End of Course
Survey
Students
When/
Where
(Frequency in the
course)
Thrice (Average of
the best two will be
computed)
Max
Marks
Evidence
Collected
Contribution
to
Course
Outcomes
30
Blue Books
1, 2, 3, 4 & 5
Daily
Evaluation
based
on
the
Performance(20M)
20
Report
1,2,3,4 & 5
End of Course
(Answering
5 of 10 questions)
100
Answer
scripts
1,2,3,4 & 5
Questionnaire
1, 2, 3, 4 & 5
Effectiveness of
Delivery
of
instructions &
Assessment
Methods
End of the course
-
Course Outcomes:
At the end of the course the students should be able to:
1. Recall the principles and techniques of Software Engineering.
2. Identify the activities in project management, requirement engineering process and the different types of
system models.
3. Illustrate the knowledge of design engineering in software development.
4. Formulate different testing methods and tools.
5. Familiarize and differentiate the need for software engineering practices for Web Engineering and Cloud
Computing.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Recall the principles and techniques of Software
Engineering
Identify the activities in project management,
requirement engineering process and the different
types of system models
Illustrate the knowledge of design engineering in
software development
Formulate different testing methods and tools
Familiarize and differentiate the need for software
engineering practices for Web Engineering and Cloud
Computing.
Programme Outcomes
1
2
x
3
4
5
6
7
8
9
10
11
12
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
19
Course Title: Java Laboratory
Course Code: CSL511
Credits (L:T:P) : 0:1:1
Core/ Elective: Core
Type of course: Practical
Total Contact Hours: 28
Prerequisites: OOPS with C++
Course Contents:
There shall be a minimum of 2 exercises conducted on each of the following topics.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
Classes, objects, overloading
Inheritance, interface and packages
Exception Handling
Multi-Threading
Event Handling
Collection Frame Works
Swings and Strings
JDBC
Servlets
JSP
JSP and Servlets using JDBC
Java Bean
Network Programming using sockets.
Mini-Project
Reference Books:
1. Herbert Schildt: Java The Complete Reference, 8th Edition, Tata McGraw Hill, 2013.
2. Y. Daniel Liang: Introduction to JAVA Programming, 7th Edition, Pearson Education, 2012.
3. Jim Keogh: J2EE The Complete Reference, first edition, Tata McGraw Hill, 2011.
4. Ivan Bayross, Sharanam Shah, Cyntiha Bayross and Vishali Shah:Java EE 5 for
Beginners, 2nd edition SPD (Sharoff Publishers & Distributors Pvt. Ltd.), August 2008.
Course Delivery:
The course will be delivered through lectures in the laboratory with exercises.
20
Course Assessment and Evaluation:
To
Whom
What
Direct & Indirect Assessment Methods
Lab Test
CIE
Demo at the end of
semester
Mini project
Viva
SEE
Lab
Examination
End of Course
Survey
When/
Where
(Frequency in the
course)
1Lab Test
Students
Every
Week(Average of
the total score will
be computed)
End
of
Course
(Executing
2
programs)
End of the course
Max
Marks
Evidence
Collected
Contribution
to
Course Outcomes
20
Data sheets
1,2,3,4,5,6 & 7
20
code
1,2,3,4,5,6 & 7
10
Viva Result
Sheets
Recollection Skills
50
-
Answer
scripts
1,2,3,4,5,6 & 7
Questionnaire
1,2,3,4,5,6 & 7
Effectiveness of
Delivery of
instructions &
Assessment Methods
Course Outcomes:
At the end of the course the students should be able to:
1. Design Java applications with inheritance and interface concepts.
2. Design Java applications with multithreading concepts and demonstrate the error handling concepts.
3. Design GUI applications with the help of swings and handle events.
4. Implement Data structures using Java Collection Frame Works.
5. Design client server applications using socket Programming
6. Design J2EE applications with database access.
7. Develop web applications using JSP and Servlets.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Design Java applications with inheritance and
interface concepts.
Design Java applications with multithreading
concepts and demonstrate the error handling
concepts.
Design GUI applications with the help of swings
and handle events
Implement Data structures using Java Collection
Frame Works
Design client server applications using socket
Programming
Design J2EE applications with database access
Develop web applications using JSP and Servlets
Programme Outcomes
1
2
3
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
21
4
5
6
7
8
9
10
11
12
Course Title: DBMS and OS Laboratory
Course Code: CSL512
Credits (L:T:P) : 0:0:2
Core/ Elective: Core
Type of course: Practical
Total Contact Hours: 56
Prerequisites: Nil
Course Contents:
1. Introduction to MongoDB and CRUD Operations
2. MongoDBUsage in Enterprise Applications
3. Develop an Entity-Relationship(ER) Model and Mapping to Relational Model
4. Impalement SQL Queries using DDL,DML Statements
5. Build an Application model in Oracle DB using Nested queries, Triggers and Views
6. Design a Database application for a particular case study using Visual Basic/Java Script in visual studio
/Eclipse Tool.
7. UNIX operating system calls
8. Implement various Scheduling Algorithms
9. Develop an Application using Threading , Synchronization and Inter Process communication Applications
10. Implement Various File Organization Techniques
11. Implement Bankers Algorithm for Dead Lock Avoidance
12. Demonstration of working of Operating System using VM Emulators
Reference Books:
1. Database Management Systems” by Raghu Ramakrishnan, JohannersGehrke, Second Edition. McGrawHill Education
2. Fundamentals of Database Systems” by RamezElmasri, Shamkant B. Navathe ,Fifth Edition, Pearson
Publications
3. Database System Concepts” by Abraham Silberschatz , Henry F. Korth, sixth Edition ,McGraw Hill
Education
4. Operating System Concepts” by Abraham Silberschatz ,Peter B. Galvin, Seventh edition Addison-Wesley
Publisher
Course Delivery:
The course will be delivered through lab exercises using Software Tools
Course Assessment and Evaluation:
Direct & Indirect
Assessment Methods
What
To
Whom
Internal
Assessment
Tests
CIE
When/ Where
(Frequency in the
course)
Twice(Average of
the best two will
be computed)
Max
Marks
Evidence
Collected
40
Record Book /
Data sheets
Contribution
to Course
Outcomes
1,2,3,4,5,6,7 &
8
Students
Mini Project
End of the Course
22
10
Project
Documentation
1,2,3,4,5,6,7 &
8
SEE
Practical
Examination
End of Course
Survey
End of Course
50
End of the course
Answer scripts
1,2,3,4,5,6,7 &
8
Questionnaire
1,2,3,4,5,6,7 &
8 Effectiveness
of Delivery of
instructions &
Assessment
Methods
-
Course Outcomes:
At the end of the course the student will be able to
1. Recognize the Core MongoDB Operations
2. Create an Enterprise Application using MongoDB
3. Design an OracleDB ApplicationUsing SQL Queries
4. Develop a Real-time DB Application Using IDE
5. Construct a program on, Dead lock Avoidance to ensure deadlock is avoided.
6. Illustrate the concepts of Threading, Synchronization and IPC.
7. Create Programs on Various File Allocation Technique.
8. Compare the efficiency of various Scheduling Algorithms.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
Recognize the Core MongoDB Operations
Create an Enterprise Application using MongoDB
Design an Oracle DB Application Using SQL
Queries
Develop a Real-time DB Application Using IDE
Construct a program on, Dead lock Avoidance to
ensure deadlock is avoided.
2
x
3
4
x
x
x
x
x
x
x
x
x
x
x
Illustrate the concepts of Threading,
Synchronization and IPC.
x
x
Create Programs on Various File Allocation
Technique.
x
x
Compare the efficiency of various Scheduling
Algorithms.
x
23
5
x
x
x
6
7
8
9
10
11
12
Course Title: Computer Networks Laboratory
Course Code: CSL514
Credits (L:T:P) : 0:0:1
Core/ Elective: Core
Type of course: Practical
Total Contact Hours: 28
Prerequisites: Data Communication
Course Contents:
Note: Student is required to solve one problem from PART-A and one problem from PART-B. The questions
are allotted based on lots. Both questions carry equal marks.
PART - A
Implement the following in C/C++ or Wireshark as suitable.
1. Write a program for error detection using CRC-CCITT (16-bits).
2. Write a program to generate Hamming Code for error detection and correction.
3. Trace Hypertext Transfer Protocol.
4. Trace Domain Name Server.
5. Write a client-server program using TCP/IP sockets in which client requests for a file by sending the file
name to the server, and the server sends back the contents of the requested file if present.
6. Trace Internet Protocol and Internet Control Message Protocol
7.
Trace Dynamic Host Configuration Protocol.
8. Write a program to implement traffic policing using Leaky bucket algorithm.
9. Write a program to implement traffic policing using Token bucket algorithm.
PART-B
The following experiments shall be conducted using either NS-2/NS3/OMNET++ or any other suitable
simulator.
10. Simulate a three nodes point-to-point network with duplex links between them. Set the queue size vary the
bandwidth and find the number of packets dropped.
11. Simulate a four node point-to-point network, and connect the links as follows: n0-n2, n1-n2 and n2-n3.
Apply TCP agent between n0-n3 and UDP agent between n1-n3. Apply relevant applications over TCP and
UDP agents by changing the parameters and determine the number of packets sent by TCP/UDP.
12. Simulate simple Extended Service Set with transmitting nodes in wireless LAN and determine the
performance with respect to transmission of packets.
13. Simulate a wireless network, generate traffic and analyze its performance.
14. Simulate a transmission of ping message over a network topology consisting of 6 nodes and find the
number of packets dropped due to congestion.
Reference Books:
1. James F. Kurose and Keith W. Ross: Computer Networking: A Top-Down Approach, 5th edition, AddisonWesley, 2009.
2. Larry L. Peterson and Bruce S Davie: Computer Networks: A Systems Approach, Fifth Edition, Elsevier, 2011.
3. Behrouz A. Forouzan: Data communication and Networking, 4th edition, Tata McGraw-Hill, 2012.
4. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff: Unix Network programming, The sockets networking
API, Addison-Wesley Professional, 2004
Course Delivery: The course will be delivered through lab exercises & practical assignments.
24
Course Assessment and Evaluation:
When/ Where
(Frequency in
the course)
Max
Marks
Evidence
Collected
Contribution to
Course Outcomes
Internal
Assessment Tests
Once
30
Blue Books
1,2 3,4 & 5
Practical
Assignment
Once
20
Soft copy of
ppt & report
1,2,3,4 & 5
Answer
scripts
1,2,3,4 &5
Questionnaire
1, 2, 3,4,5
Effectiveness of
Delivery of
instructions &
Assessment
Methods
Direct Assessment Methods
What
CIE
SEE
Practical
Examination
End of Course
Survey
To
Whom
End of Course
50
Students
End of the course
-
Course Outcomes:
At the end of the course the student will be able to:
1. Illustrate networking concepts using programming languages like C/C++.
2. Use packet sniffing tools like Wireshark to intercept & analyze the packets at different network layers.
3. Use simulators like NS2/NS3/OMNET++.
4. Design client-server applications using socket programming.
5. Implement networking modules and protocols.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Illustrate networking concepts using programming
languages like C/C++.
Use packet sniffing tools like Wireshark to
intercept & analyze the packets at different
network layers.
Use simulators like NS2/NS3/OMNET++
Design client-server applications using socket
programming.
Implement networking modules and protocols.
Programme Outcomes
1
2
3
4
5
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
25
6
7
8
9
10
11
12
Course Title: Compiler Design
Course Code: CS612
Credits (L:T:P) : 3:1:0
Core/ Elective: Core
Type of Course: Lecture, Tutorial
Total Contact Hours: 70
Prerequisites: Nil
Course Contents:
Unit 1
Introduction, Lexical Analysis: Language processors, The structure of Compilers, Lexical analysis: The role of
Lexical Analyzer, Input Buffering, Specifications of Tokens, Recognition of Tokens. Syntax Analysis: Introduction,
Writing a Grammar.
Unit 2
Parsing: Top-down Parsing, Bottom-up Parsing, Introduction to LR Parsing: Simple LR parser. More powerful LR
Parsers: Canonical parser, LALR parser.
Unit 3
Syntax-Directed Definitions: Evaluation order for SDDs, Applications of Syntax-directed translation, Syntaxdirected translation schemes. Run-Time Environments: Storage organization, Stack allocation of space.
Unit 4
Intermediate Code Generation: Variants of syntax trees, Three-address code, Types and declarations, Translation
of expressions, Type checking, Control flow, Back patching, Switch statements, Intermediate code for procedures.
Unit 5
Code Generation: Issues in the design of Code Generator, The Target language, Addresses in the target code, Basic
blocks and Flow graphs, Optimization of basic blocks, A Simple Code Generator.
Text Books:
1. Alfred V Aho, Monica S. Lam, Ravi Sethi, Jeffrey D Ullman: Compilers- Principles, Techniques and Tools, 2nd
Edition, Pearson education, 2012.
Reference Books:
1. Kenneth C Louden: Compiler Construction - Principles & Practice, First Edition, Brooks/Cole, CENGAGE
learning, 1997.
2. Andrew W Appel: Modern Compiler Implementation in C, First Edition, Cambridge University Press, 2010.
Course Delivery:
The course will be delivered through lectures, class room interaction, group discussion and exercises and self-study
cases.
26
Course Assessment and Evaluation:
Direct & Indirect Assessment
Methods
When/ Where
(Frequency in the
course)
Thrice(Average of
the best two will
be computed)
To
Whom
What
Internal
Assessment
Tests
Practical
Assignment
CIE
SEE
Standard
Examination
Students
End of Course
Survey
Max
Marks
Evidence
Collected
Contribution to
Course Outcomes
30
Blue Books
1,2,3,4,5 & 6
Twice
20
Online
Submission
Working with
Compiler Tools
End of Course
(Answering
5 of 10 questions)
100
Answer
scripts
1,2,3,4,5 & 6
1,2,3,4,5 & 6
Effectiveness of
Delivery of
instructions &
Assessment Methods
End of the course
Course Outcomes:
At the end of the course students should be able to:
1. Construct lexical analyser to recognize inputs using patterns
2. Devise different types of syntax analyzers using grammars
3. Illustrate syntax-directed translation schemes for grammars
4. Formulate intermediate code generators for programming statements
5. Develope assemlby language code for the given itnermediate codes
6. Compose optimized code for intermediate codes and assembly langugage code
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Construct
lexical
analyser to recognize
inputs using patterns
Devise different types
of syntax analyzers
using grammars
Illustrate
syntaxdirected
translation
schemes for grammars
Formulate
intermediate
code
generators
for
programming
statements
Develope
assemlby
language code for the
given
itnermediate
codes
Compose optimized
code for intermediate
codes and assembly
langugage code
Programme Outcomes
PO1
PO2
PO3
PO4
PO5
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
27
PO6
PO7
PO8
PO9
PO10
PO11
PO12
Course Title: Embedded systems
Course Code: CS613
Credits (L:T:P) : 4:0:0
Core/ Elective: Core
Type of course: Lecture
Total Contact Hours: 56
Prerequisites: Microprocessors and Computer Organization.
Course Contents:
Unit 1
Embedded Computing: Introduction, Complex Systems and Microprocessors Embedded Systems Design Process,
design metrics, flow and optimization,. Specifications and modeling, Cortex-M0 Technical Overview,
Implementation Features System Features , Debug Features, Advantages
Unit 2
Programming model , Operation Modes and States , Architecture, Registers and Special Registers Behaviors of the
Application Program Status Register (APSR), Memory System Overview, Stack Memory , Operations Introduction
to Cortex-M0 Programming, Instruction Set
Unit 3
Instruction Usage Examples, implementation of various structures like loop, switch, function, subroutine, Memory
System, Exceptions and Interrupts, Interrupt Control and System Control
Unit 4
Simple Application Programming, Simple Input /Output, Simple Interrupt Programming, Sensors, Thermistors,
LDRs, LEDs 7 segment, LCD, Stepper motor , relays, Actuator, and ADCs
Unit 5
Embedded/ Real time tasks, real time systems, types of real time systems Quality of good real time systems. Real
Time Operating System Concepts: Architecture of the kernel. Task and task scheduler. ISR. Semaphores. Mutex.
Mailboxes. Message queues. Message queues Pipes. Signals. Memory management. Priority inversion problemText
Text Books:
1. Wayne Wolf “Computers as Components Principles of Embedded Computer System Design”, Second
Edition, Elsevier, 2008.
2. Joseph Yiu, “ The Definitive Guide to the ARM Cortex-M0 “, 1st edition, Newnes - an imprint of Elsevier,
2011
3. Lyla B. Das, “Embedded Systems an integrated approach “ , 1st edition, Pearson, 2013.
4. KVVK Prasad, “Embedded/Real Time Systems : Concepts, Design and Programming “ , 1st edition,
Dreamtech, 2011 .
Reference Books:
1. Frank Wahid/Tony Givargis “Embedded System Design A Unified Hardware/Software Introduction “ 1st
Edition, John Wiley & Sons, 2002.
2. Raj Kamal , “Embedded Systems: Architecture ,Programming and Design”, Tata McGrawhill, New
Delhi,2003.
3. Tammy Noergaard, “Embedded Systems Architecture- Comprehensive Guide for Engineer and
Programmers – Elsevier Publication, 2005
4. Barnett, Cox & O’cull,”Embedded C programming”,Thomson ,2005.
Course Delivery: lectures, ppt, videos
28
Course Assessment and Evaluation:
Direct & Indirect Assessment Methods
What
To
Whom
Internal
Assessment Tests
CIE
SEE
Class-room
Surprise Quiz
Standard
Examination
Students
End of Course
Survey
When/ Where
(Frequency in the
course)
Thrice(Average of
the best two will be
computed)
Twice(Summation
of the two will be
computed)
Max
Marks
Evidence
Collected
Contribution to
Course Outcomes
30
Blue Books
1,2 3,4,5,6 & 7
20
Quiz papers
100
Answer scripts
1,2 3,4,5,6 & 7
Questionnaire
1,2 3,4,5,6 & 7
Effectiveness of
Delivery of
instructions &
Assessment
Methods
End of Course
(Answering
5 of 10 questions)
End of the course
-
1,2 3,4,5,6 & 7
Course Outcomes:
At the end of the course the students should be able to
1. Identify embedded system requirements and goals
2. Summarize the Cortex M0 architecture memory mapping and its advantages for designing embedded
system
3. Compare the different Programming models for embedded systems
4. Evaluate cortex M0 in assembly instructions and write embedded C programs using CMSIS features .
5. Devise programs using interrupt capabilities
6. Compare the working of various sensors and actuators and their interface with microcontrollers
7. Estimate the kernel of RTOS and its various deployments for embedded systems.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
Identify embedded system requirements and goals
Summarize the Cortex M0 architecture memory
mapping and its advantages for designing embedded
system
Compare the different Programming models for
embedded systems
Evaluate cortex M0 in assembly instructions and write
embedded C programs using CMSIS features .
Devise programs using interrupt capabilities
2
x
3
4
5
6
x
x
Compare the working of various sensors and actuators
and their interface with microcontrollers
Estimate the kernel of RTOS and its various
deployments for embedded systems.
29
8
9
10
x
11
12
x
x
x
x
x
x
x
x
x
x
x
x
x
x
7
x
x
x
x
x
x
x
x
x
x
x
Course Title: Computer Security
Course Code: CS621
Credits (L:T:P) : 3:1:0
Core/ Elective: Core
Type of course: Lecture, Tutorial
Total Contact Hours: 70
Prerequisites:
Nil
Course Contents:
Unit 1
Introduction: Security Goals, Cryptographic Attacks, Services and Mechanism, Techniques. Mathematics of
Cryptography: Integer Arithmetic, Modular Arithmetic, Matrices, Linear Congruence.
Unit 2
Traditional Symmetric-Key Ciphers: Introduction, Substitution Ciphers, Transpositionl Ciphers, Stream and
Block Ciphers. Data Encryption Standard (DES): Introduction, DES Structure, DES Analysis, Security of DES,
Multiple DES, Examples of Block Ciphers influenced by DES.
Advanced Encryption Standard: Introduction, Transformations, Key Expansion, The AES Ciphers, Examples,
Analysis of AES.
Unit 3
Encipherment using Modern Symmetric-Key Ciphers: Use of Modern Block Ciphers, Use of Stream Ciphers,
Other Issues.
Asymmetric Key Cryptography: Introduction, RSA Cryptosystem, Rabin Cryptosystem, Elgamal Cryptosystem,
Elliptic Curve Cryptosystems
Unit 4
Message authentication: Authentication Requirements, Authentication Functions, Message Authentication Codes,
Security of MACs, MACs based on Hash Functions: MAC.
Digital signatures: Digital Signatures, Digital Signature Standard.
Key management and distribution: Symmetric Key distribution using symmetric encryption, Symmetric Key
distribution using Asymmetric encryption, Distribution of public keys, X.509 certificates, Kerberos.
Unit 5
Transport level security: Web Security considerations, Secure Sockets Layer and Transport Layer Security.
Transport Layer Security, HTTPS, Secure Shell.
Internet security: Electronic Mail Security: Pretty Good Privacy, S/MIME. IP Security: Overview, IP Security
Policy.
System security: Intruders: Intruders, Intrusion detection.
Malicious Software: Types of Malicious Software, Viruses. Firewalls: The need for Firewalls, Firewall
Characteristics, Types of Firewalls.
Text Books:
1. Behrouz A. Forouzan, Debdeep Mukhopadhyay: Cryptography and Network Security, 2nd Edition, Special
Indian Edition, Tata McGraw-Hill, 2011.
2. William Stallings, Cryptography and Network Security, Fifth Edition, Prentice Hall of India, 2005
Reference Books:
1. Josef Pieprzyk, Thomas Hardjono, Jennifer Serberry Fundamentals of Computer Security, Springer.
Course Delivery:
The course will be delivered through lectures in the classroom
30
Course Assessment and Evaluation:
To
Whom
Direct & Indirect Assessment Methods
What
Internal
Assessment
Test
Cryptography
and Network
Security
Tutorials
CIE
CIE
Standard
Examination
SEE
End of Course
Survey
Student
When/
Where
(Frequency in the
course)
Thrice (Average of
the best two will be
computed)
Max
Marks
Evidence
Collected
Contribution to
Course
Outcomes
30
Blue Books
1, 2, 3, 4 & 5
Daily
Evaluation
based
on
the
Performance(20M)
20
Report
1,2,3,4 & 5
End of Course
(Answering
5 of 10 questions)
100
Answer
scripts
1,2,3,4 & 5
Questionna
ire
1, 2, 3, 4 & 5
Effectiveness of
Delivery
of
instructions &
Assessment
Methods
End of the course
-
Course Outcomes:
At the end of the course the students should be able to:
1. Interpret the security goals and the threats to security
2. Identify and formulate the type of encryption method DES or AES depending on the need and security
threat perception
3. Compare and Contrast the need of Symmetric-key and Asymmetric-key Ciphers.
4. Summarize the fundamentals of Key Management and Identity need for Digital Signatures and its utility
5. Identify security goals achieved at application layer, and appraise the need for firewalls.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Interpret the security goals and the threats to security
Identify and formulate the type of encryption method
DES or AES depending on the need and security threat
perception
Compare and Contrast the need of Symmetric-key and
Asymmetric-key Ciphers
Summarize the fundamentals of Key Management and
Identity need for Digital Signatures and its utility
Identify security goals achieved at application layer,
and Appraise the need for firewalls.
Programme Outcomes
1
x
2
x
3
x
x
x
x
x
x
x
x
x
x
31
4
5
x
x
6
x
7
8
9
x
10
x
11
12
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Course Title: Computer Graphics
Course Code: CS622
Credits (L:T:P) : 3:0:1
Core/ Elective: Core
Type of course: Lecture, Practicals
Total Contact Hours: 70
Prerequisites:
Mathematics, data structures
Course Contents:
Unit 1
Introduction: Applications of computer graphics, A graphics system, Images: Physical and synthetic, Imaging
Systems, The synthetic camera model, The programmer’s interface, Graphics architectures, Programmable Pipelines
Graphics Programming: Programming two-dimensional applications, OpenGL application programming interface,
Primitives and attributes, color, viewing, control functions, the gasket program, polygons and recursions, the threedimensional gasket, adding interactions, menus.
Unit 2
Geometric Objects and Transformations: Scalars, Points, and Vectors, Three-dimensional Primitives, Coordinate
Systems and Frames, Modeling a Colored Cube, Affine Transformations, Rotation, Translation and Scaling,
Transformation in Homogeneous Coordinates, Concatenation of Transformations, OpenGL Transformation
Matrices, Spinning of cube, Interfaces to three-dimensional applications.
Unit 3
Implementation: Basic Implementation Strategies, Four major tasks, Clipping, Line-segment clipping, Polygon
clipping, Clipping of other primitives. Clipping in three dimensions, Rasterization, Bresenham’s algorithm, Polygon
Rasterization, Hidden-surface removal,
Unit 4
Viewing: Classical and computer viewing, Viewing with a Computer, Positioning of the camera, Parallel
Projections, Perspective projections, Projections in OpenGL, Hidden-surface removal, Parallel-projection matrices,
Perspective-projection matrices, Interactive Mesh Displays, Projections and Shadows.
Unit 5
Lighting and Shading: Light and Matter, Light sources, The Phong reflection model, Polygon shading,
Approximation of sphere by recursive subdivision, Specifying lighting parameters, Implementing a lighting model
Text Books:
1. Edward Angel and Dave Shreiner: Interactive Computer Graphics - A Top-Down Approach with Shader-based
OpenGL, 6th Edition, Pearson Education, 2011.
Reference Books:
1. Donald Hearn and Pauline Baker: Computer Graphics with OpenGL, 3rd Edition, Pearson Education, 2011.
2. F.S. Hill Jr.: Computer Graphics Using OpenGL, 3rd Edition, Pearson Education, 2009.
3. James D Foley, Andries Van Dam, Steven K Feiner, John F Hughes: Computer Graphics, 2nd Edition, Pearson
Education, 2011
Course Delivery:
The course will be delivered through lectures, classroom interactions, presentations and code demo.
Course Assessment and Evaluation:
Direct &
Indirect
Assessment
Methods
CIE
What
Internal
Assessment
Tests
Assignment/Qu
iz
To Whom
Students
When/ Where
(Frequency in
the course)
Thrice(Average
of the best two
will be
computed)
Max
Mark
s
Evidence
Collected
Contribution to
Course Outcomes
30
Blue Books
1,2,3,4,5,6,7
Once
20
Quiz Papers
1,2,3,4,5,6,7
32
SEE
Standard
Examination
End of Course
Survey
End of Course
(Answering
5 of 10 questions)
Answer
scripts
1,2,3,4,5,6,7
Questionnaire
1, 2 ,3,4,5,6,7
Effectiveness of
Delivery of
instructions &
Assessment Methods
100
End of the course
-
Course Outcomes:
1.
2.
3.
4.
5.
6.
7.
Explain the image formation process and the pipeline architecture of computer graphics
Describe the software and hardware components of a computer graphics system and basics of OpenGL
API’s
Derive the geometrical transformations used in interactive computer graphics in different coordinate
systems
Discuss the different algorithms for clipping and rasterization of lines and polygons, and for hidden surface
removal.
Derive matrix formulations for different types of viewing and projections.
Explain different lighting and shading models.
Write 3D computer graphics applications in OpenGL using knowledge of display systems, image synthesis,
and interactive control.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
Explain the image formation process and the
pipeline architecture of computer graphics.
x
Describe the software and hardware components
of a computer graphics system and basics of
OpenGL API’s.
x
Derive the geometrical transformations used in
interactive computer graphics in different
coordinate systems.
x
Discuss the different algorithms for clipping and
rasterization of lines and polygons, and for
hidden surface removal.
Derive matrix formulations for different types of
viewing and projections.
Explain different lighting and shading models.
x
2
3
x
x
x
x
x
x
4
5
6
7
8
9
10
11
12
x
x
x
x
x
Write 3D computer graphics applications in
OpenGL using knowledge of display systems,
image synthesis, and interactive control.
x
33
x
Course Title: Unix Systems Programming Laboratory
Course Code: CSL611
Credits (L:T:P) : 0:1:1
Core/ Elective: Core
Type of course: Tutorials, Laboratory
Total Contact Hours: 56
Prerequisites: NIL
Course Contents:
1. Basic file I/O functions & properties of a file.
2. File Types, File access permission and File links.
3. Creating the process and process accounting.
4. Feature provided by different signal implementation.
5. Coding rules and Characteristics of Daemon Process
6. Process termination and setjmp, longjmp function.
7. Client-Server Models using pipes
8. Orphaned process group and Interprocess communication.
Text Books:
1.
W. Richard Stevens: Advanced Programming in the UNIX Environment, Second Edition, Pearson
education, 2011.
Reference Books:
1. Terrence Chan: UNIX System Programming Using C++, First edition, Prentice Hall India, 2011.
2. Kay A Robbins and Steve Robbins: Unix Systems Programming, First Edition, Pearson Education, 2009.
3. Marc J. Rochkind: Advanced UNIX Programming, 2nd Edition, Pearson
Course Delivery:
This course is delivered using lectures and Practical to enable the students to: apply the UNIX system Programming
concepts while programming, explore the knowledge by applying on suitable applications
Course Assessment and Evaluation:
Direct & Indirect Assessment
Methods
What
C
I
E
S
E
E
To
Whom
Continuous Evaluation
in Lab
Internal Assessment
Tests: Write-up,
Execution & Viva
Standard Examination
End of Course
Survey
Students
When/ Where
(Frequency in
the course)
Every Lab
Session
Twice(Summati
on of the two
will be
computed)
End of Course
End of the
course
34
Max
Mar
ks
Evidence
Collected
Contribution to
Course Outcomes
10
Data Sheets
1,2,3,4 & 5
40
Quiz sheets /
LMS
1,2,3,4 & 5
50
Answer scripts
1,2,3,4 & 5
Questionnaire
1,2,3,4 & 5
Effectiveness of
Delivery of
instructions &
Assessment
Methods
Course Outcomes:
At the end of the course, the students will be able to:
1. Identify UNIX system calls and commands.
2. Describe the functions available for file I/O and changing the properties of the file in Unix OS.
3. Identify different types of files supported by UNIX operating System.
4. Illustrate the basic IPC issues and techniques in UNIX system programming
5. Explain the creation of new process, process accounting and process termination.
Mapping Course Outcomes with ProgrammeOutcomes:
Course Outcomes
ProgrammeOutcomes
1
2
x
x
x
Describe the functions available for file I/O and
changing the properties of the file in Unix OS
x
x
x
Identify different types of files supported by UNIX
operating System
x
x
x
Illustrate the basic IPC issues and techniques in
UNIX system programming
x
x
x
Explain the creation of new process, process
accounting and process termination
x
x
x
Identify UNIX system calls and commands
35
3
4
5
6
7
8
9
10
11
12
Course Title: Embedded Systems Laboratory
Course Code: CSL613
Credits (L:T:P):
Core/ Elective: Core
0:0:1
Type of course: Practicals
Total Contact Hours: 28
Prerequisites: The student should have undergone the course on Microprocessors and Computer organization.
Course Contents:
Experiments that are to be conducted as a part of the course
Introduction to the nuvoton 140 board, introduction to all the ports peripherals Introduction to Kiel software 4.0
simulator
Part A : write Assembly programs
1. Program for 64 bit addition, to use a counter
2. Program for 64 bit subtraction, multiplication
3. Program for copy 10 locations
4. Program for copy swap 10 memory locations
5. Program for copy factorial, using branch instruction square root
6. Program for copy use of fuctions use of bit extraction
7. Program for use of bit clear
8. Program for copy sign extention
9. Program using multiple load and store instruction
Part B : write Embedded C programs using CMSIS
1. programs in c introduction to cmsis files. Using gpio use rgb leds
2. program to use the leds to toggle using gpio
3. GPIO to scan 3x3 keypad (Smpl_7seg_Keypad)
4. GPIO controlled by 3x3 keypad (Smple_GPIO_Keypad)
5. GPIO to read Body IR Sensor (Smpl_GPIO_BodyInfrared)
6. GPIO interfacing with LCM (Smpl_GPIO_LCM16x2)
7. Smpl_GPIO_Buzzer
8. Counter program using seg_display routine
9. Smpl_GPIO_Interrupt
10. using ADC to read variable resistor
11. Exercise using ADC using variable resistor and display on LCD using built in function
Text Books:
1. Wayne Wolf “Computers as Components Principles of Embedded Computer System Design”, Second
Edition, Elsevier, 2008.
2. Joseph Yiu, “ The Definitive Guide to the ARM Cortex-M0 “, 1st edition, Newnes - an imprint of Elsevier,
2011
3. Lyla B. Das, “Embedded Systems an integrated approach “ , 1st edition, Pearson, 2013.
Reference Books:
1. Rob Toulson ans Tim Wilmshurst “ Fast and Effective Embedded systems Design applying the ARM
mbed” First edition 2012, Newnes - an imprint of Elsevier
Course Delivery:
Through lab experiments in lab with nuvoton 140 board, with introduction to various all the ports peripherals AND
introduction to Kiel software 4.0 simulator
36
Course Assessment and Evaluation:
Direct & Indirect Assessment
Methods
What
CIE
SEE
To
Whom
When/ Where
(Frequency in the
course)
Max
Marks
Evidence
Collected
Contribution to
Course Outcomes
Internal Lab Test
30
Blue Books
1,2 3,4,5,6 & 7
20
Project report
and evaluation
1,2 3,4,5,6 & 7
100
Answer scripts
1,2 3,4,5,6 & 7
Questionnaire
1,2 3,4,5,6 & 7
Effectiveness of
Delivery of
instructions &
Assessment
Methods
Internal
Assessment Tests
Class-room
Surprise Quiz
Standard
Examination
End of Course
Survey
Mini Project
Students
End of Course
(Answering
5 of 10 questions)
End of the course
-
Course Outcomes:
At the end of the course, the students will be able to:
1. Explore various CortexM0 instructions.
2. Examine GPIO ports connected to various on board interfaces.
3. Devise programs using multiple interfaces, interrupts and RTC
4. Explore use of multiple interfaces, interrupts, setting priority
5. Demonstrate combination of assembly and embedded c programming
6. Evaluate the use of real-time OS for doing multiple jobs.
7. Design a new task using different concepts learnt in this course and demonstrate a team project.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Explore various CortexM0 instructions
Examine GPIO ports connected to various on board
interfaces
Devise programs using multiple interfaces, interrupts
and RTC
Explore use of multiple interfaces, interrupts, setting
priority
Demonstrate combination of assembly and embedded
c programming
Evaluate the use of Real-time OS for doing multiple
jobs
Design a new task using different concepts learnt in
this course and demonstrate a team project.
Programme Outcomes
1
x
2
3
4
5
6
7
x
x
8
9
x
10
11
12
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
37
x
x
x
x
x
x
x
x
x
x
Course Title: Internet Technologies & Software Development for
Portable Devices Laboratory
Course Code: CSL612
Credits (L:T:P) : 0:1:1
Core/ Elective: Core
Type of course: Practical
Total Contact Hours: 56
Prerequisites: Knowledge of OOP Language
Course Contents:
There shall be a minimum of 2 exercises conducted on each of the following topics.
1.
2.
3.
4.
5.
6.
7.
8.
9.
HTML5
Java Script
PHP and MYSQL
Ruby on Rails
Develop an android application to investigate the activity life cycle and the fragments
Develop an android application to create user interfaces with different layouts and views.
Develop an android application on using implicit & explicit Intents.
Develop an android application to work with SQLite data storage.
Mini-Project
Reference Books:
1. Robert W. Sebesta: Programming the World Wide Web, 4th edition, Pearson education, 2012.
2. M. Deitel, P.J. Deitel, A. B. Goldberg: Internet & World Wide Web How to H program, 4th Edition,
Pearson education, 2011.
3. Professional Android 4 Application Development, by Reto Meier, WROX Press, Wiley Publishing.
4. Android Application Development, Programming with the Google SDK, by, Rick Rogers, John Lombardo,
ZigurdMednieks, Blake Meike, SPD, Oreilly, ISBN10: 81-8404-733-9, ISBN13:978-81-8404-733-2
Course Delivery:
The course will be delivered through lectures in the laboratory with exercises.
Course Assessment and Evaluation:
To
Whom
What
Lab Test
CIE
Demo at the end of
semester
Miniproject
Viva
Direct Assessment
Methods
Students
SEE
Lab
Examination
End of Course
Survey
When/
Where
(Frequency in the
course)
One Lab Test
Every
Week(Average of
the total score will
End
of
Course
(Executing
2
End of the course
38
Max
Marks
Evidence
Collected
Contribution
to
Course Outcomes
20
Data sheets
1,2,3,4 & 5
20
code
1,2,3,4 & 5
10
Viva Result
Sheets
Answer
scripts
Recollection Skills
50
-
Questionnaire
1,2,3,4 & 5
1,2,3,4 & 5
Effectiveness of
Delivery of
instructions &
Assessment Methods
Course Outcomes:
At the end of the course the students should be able to:
1. Develop web pages with various media contents usingHTML5.
2. Create a robust Client side validation with java script.
3. Design dynamic data-driven Web sites using MySQL and PHP.
4. Design a database application using Ruby on Rail framework.
5. Demonstrate the activity life cycle and fragment life cycle.
6. Illustrate the usage of different Views & ViewGroups.
7. Develop android applicationsto invoke different applications using Intents.
8. Design an android database application using SQLite.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Develop web pages with various media contents
usingHTML5.
Create a robust Client side validation with java
script
Design dynamic data-driven Web sites using
MySQL and PHP.
Design a database application using Ruby on Rail
framework
Demonstrate the activity life cycle and fragment
life cycle.
Illustrate the usage of different Views &
ViewGroups.
Develop android applications to invoke different
applications using Intents.
Design an android database application using
SQLite
Programme Outcomes
1
2
3
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
39
4
5
6
7
8
9
10
11
12
Course Title: Data Mining
Course Code: CSPE01
Credits (L:T:P) : 3:1:0
Type of course: Lecture, Tutorials
Core/ Elective: Elective
Total Contact Hours: 70
Prerequisites: Nil
Course Contents:
Unit 1
DATA MINING Introduction – Data – Types of Data – Data Mining Functionalities –Classification of Data Mining
Systems – Issues –Data Preprocessing- C4.5 Algorithm Description- C4.5 Features - Two Illustrative Examples.
Unit 2
ASSOCIATION RULE MINING Mining Frequent Patterns – Apriori Algorithm Description,. - Two Illustrative
Examples- Mining various Kinds of Association Rules – Correlation Analysis – Constraint Based Association
Mining.
Unit 3
CLASSIFICATION AND PREDICTION Basic Concepts - Decision Tree Induction - Bayesian Classification –
Rule Based Classification – Classification by Back propagation – Support Vector Machines – Associative
Classification – Lazy Learners – Other Classification Methods – Prediction.
Unit 4
CLUSTERING AND TRENDS IN DATA MINING Cluster Analysis - Types of Data – Categorization of Major
Clustering Methods – K-means– Partitioning Methods – Hierarchical Methods - Density-Based Methods –Grid
Based Methods – Model-Based Clustering Methods – Clustering High Dimensional Data - Constraint – Based
Cluster Analysis – Outlier Analysis – Data Mining Applications.
Unit 5
MINING Mining the World Wide Web - Page Rank Algorithm, Text mining, Mining Time Series Data, The CART
Algorithm Briefly Stated, Ensemble methods-Increasing the Accuracy, Mining genomic data.
References:
Jiawei Han and Micheline Kamber: Data Mining Concepts and Techniques, Elsevier, 2nd Edition, 2009.
Xindong Wu and Vipin Kumar: The top ten Algorithms in Data Mining, Chapman and Hall/CRC press.
Pang-Ning Tan, Michael Steinbach and Vipin Kumar, “Introduction to Data Mining”, Person Education, 2007.
K.P. Soman, Shyam Diwakar and V. Aja, “Insight into Data Mining Theory and Practice”, Eastern Economy
Edition, Prentice Hall of India, 2006.
G. K. Gupta, “Introduction to Data Mining with Case Studies”, Eastern Economy Edition, Prentice Hall
of India, 2006.
7. Daniel T.Larose, “Data Mining Methods and Models”, Wiley-Interscience, 2006.
1.
2.
3.
4.
5.
6.
Course outcomes:
At the end of the course the students will be able to:
1.
2.
3.
4.
5.
6.
7.
Understand ways in which the methods of data mining differ from the more classical statistical approaches
to data analysis, the rationale for data mining methods.
Illustrate the kinds of patterns that can be discovered by association rule mining.
Implement different classification and prediction techniques in numerous applications.
Compute dissimilarities between objects represented by various attributes or variable types and examine
several clustering techniques.
Analyze the results generated from the constructed artifact to determine if patterns of clusters were detected
in the data sets.
Assess time series data from web and use it for prediction.
Perform data Preprocessing, Classification algorithms using WEKA, R.
40
Mapping Course Outcomes with Programme Outcomes:
Programme Outcomes
Course Outcomes
1
Understand ways in which the methods of data mining
differ from the more classical statistical approaches to
data analysis, the rationale for data mining methods.
Illustrate the kinds of patterns that can be discovered by
association rule mining.
Implement different classification and prediction
techniques in numerous applications.
Compute dissimilarities between objects represented by
various attributes or variable types and examine several
clustering techniques.
Analyze the results generated from the constructed
artifact to determine if patterns of clusters were detected
in the data sets.
Assess time series data from web and use it for
prediction.
Perform data Preprocessing, Classification algorithms
using WEKA, R.
41
2
x
3
4
5
6
7
x
x
x
x
x
8
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
9
10
11
12
x
x
x
Course Title: Machine Learning
Course Code: CSPE02
Credits (L:T:P) : 3:1:0
Core/ Elective: Elective
Type of Course: Lecture, Practicals
Total Contact Hours: 70
Prerequisites: NIL
Course Contents:
Unit 1
Introduction: Probability theory (Bishop ch-1 & Appendix B,C); What is machine learning, example machine
learning applications (Alpaydin ch-1) Supervised Learning:Learning a Class from Examples, VC-dimension, PAC
learning, Noise, Learning multiple classes, Regression, Model selection and generalisation. (Alpaydin ch-2)
Unit 2
Bayesian Learning: Classification, losses and risks, utility theory (Alpaydin ch3 (3.1, 3.2, 3.3, 3.5)) MLE,
Evaluating an estimator, bayes estimator, parametric classificaion (Alpaydin ch4 - 4.1-4.5) (Bishop 4.2);
Discriminant functions Introduction, Discriminant functions, Least squares classification, Fisher’s linear
discriminant, fixed basis functions, logistic regression (Bishop 4.1,4.3.1,4.3.2)
Unit 3
Multivariate methods: Multivariate Data,Parameter Estimation,Estimation of Missing Values,Multivariate Normal
Distribution,Multivariate Classification,Tuning Complexity,Discrete Features,Multivariate Regression (Alpaydin
ch-5)
Nonparametric methods: Nearest Neighbor Classifier, Nonparametric Density Estimation (Alpaydin ch-8 selected
topics)
Unit 4
Maximum margin classifiers: SVM, Introduction to kernel methods, Overlapping class distributions, Relation to
logistic
regression,Multiclass SVMs, SVMs for regression (Bishop ch 6 and 7 only covered topics). Mixture models and
EM K-means clustering, Mixture of gaussians, Hierarchical Clustering, Choosing the Number of Clusters (Bishop
9.1,9.2, Alpaydin 7.7,7.8)
Unit 5
Dimensionality reduction - (Alpaydin ch6) Combining Models (Bishop ch-14)
Text Books:
1.
Ethem Alpaydin "Introduction To Machine Learning" 2nd Edition PHI Learning Pvt. Ltd-New Delhi
2.
Christopher Bishop "Pattern Recognition and Machine Learning" CBS Publishers & Distributors-New
Delhi
Course Outcomes:
At the end of the course, a student should be able to
1. Explain the concepts and issues of learning systems.
2. Evaluate decision tree based learning algorithm.
3. Evaluate Bayesian learning algorithm.
4. Determine sample complexity for infinite hypothesis spaces
5. Evaluate rule- based learning algorithm.
42
Course Title: Cloud Computing
Credits (L:T:P): 4:0:0
Type of course: Lecture
Course Code: CSPE03
Core/ Elective: Elective
Total Contact Hours: 56
Prerequisites: NIL
Course Contents:
Unit 1
Introduction: Definition, characteristics, Benefits, challenges of cloud computing, cloud models: service-IaaSPaaS-SaaS, deployment-Public,Private,hybrid,Community, cloud services: Amazon, Google, Azure, online
services, open source private clouds, SLA. Applications: Healthcare, Energy systems, transportation,
manufacturing, Education, Government, mobile communication, application development.
Cloud Application Development: Amazon web Services: EC2 Instances, Connecting Clients, Security Rules,
Launch an EC2 Linux Instance and connect it, create EC2 placement Group, to use S3 in java, to manage SQS
services in C#, to install simple notification service on Ubuntu 10.04.
Unit 2
Cloud Architecture, programming model: NIST reference architecture, Architectural styles of cloud applications ,
single , multi ,hybrid cloud site, redundant, non redundant , 3 tier, multi tier architectures , programming model :
compute and data intensive , Compute intensive model: parallel computation – BSP , Workflows , coordination of
multiple activities- zoo keeper, data intensive model: big data- map reduce programming model ,map reduce in
cloud, map reduce applications – hadoop distributed file system, Grep the Web, graph processing- SSSP, SSSP in
mapreduce, Pregel programming model , other big data programming models.
Unit 3
Cloud Resource Virtualization: basics of virtualization, types of virtualization techniques, merits and demerits of
virtualization, full vs para-virtualization – virtual machine monitor/hypervisor - virtual machine basics, taxonomy of
virtual machines, process vs system virtual machines – emulation: interpretation and binary translation – HLL,
virtual machines , storage, desktop and application virtualization, applying virtualization.
Unit 4
Cloud Resource Management and Scheduling: Policies and mechanisms for resource management, Resource
bundling, combinatorial , fair queuing, Start time fair queuing, borrowed virtual time, Cloud scheduling subject to
deadlines, Scheduling map reduce applications subject to deadlines, Resource management and application scaling.
Unit 5
Cloud Security : Risks, privacy and privacy impacts assessments, Multi-tenancy Issues, Security in VM, OS,
Virtualization system security issues and vulnerabilities, Virtualization System-Specific Attacks: Technologies for
Virtualization-Based Security Enhancement, Legal , Compliance Issues: Responsibility, ownership of data, right to
penetration test, local law where data is held, examination of modern Security Standards (eg PCIDSS), how
standards deal with cloud services and virtualization, compliance for the cloud provider vs. compliance for the
customer.
References:
1. Cloud Computing: Theory and Practice, Dan Marinescu, 1st edition, MK Publishers, 2013.
2. Distributed and Cloud Computing, From Parallel Processing to the Internet of Things, Kai Hwang, Jack
Dongarra, Geoffrey Fox. MK Publishers.
3. Cloud Computing: A Practical Approach, Anthony T. Velte, Toby J. Velte, Robert Elsenpeter, McGraw Fill,
2010
4. Cloud computing A Hands on Approach Arshdeep Bahga,Vijay Madisetti Universities Publications
5. Online Readings : http://www.pds.ewi.tudelft.nl/ , http://csrc.nist.gov/publications/nistpubs
43
Course Outcomes:
At the end of the course the students will be able to:
1. To derive the best practice model for developing and deploying cloud based applications
2. Develop cloud applications by integrating commercial cloud services as saas provider
3. Propose an Enterprise/private cloud by designing own cloud architecture and provide Iaas
4. Compose services in a distributed computing environment to achieve tasks relevant to a knowledge-based
business or public service.
5. Deploy programme using the APIs of Cloud Computing , create Virtual Machine images and to deploy
them on a Cloud.
6. Evaluate the security issues related to multi-tenancy and Appraise compliance issues that arise from cloud
computing
7. Performance evaluations and critical evaluations of a small scale virtual environment developed in the lab.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
To derive the best practice model for developing and
deploying cloud based applications
Develop cloud applications by integrating commercial
cloud services as saas provider
Propose an Enterprise/private cloud by designing own
cloud architecture and provide Iaas as service
Compose services in a distributed computing
environment to achieve tasks relevant to a knowledgebased business or public service.
Deploy programme using the APIs of Cloud
Computing create Virtual Machine images and to
deploy them on a Cloud.
Evaluate the security issues related to multi-tenancy
and Appraise compliance issues that arise from cloud
computing
Performance evaluations and critical evaluations of a
small scale virtual environment developed in the lab.
Programme Outcomes
1
2
3
4
5
x
x
x
x
x
6
x
x
x
x
x
x
x
x
x
x
44
x
8
9
x
x
x
x
10
11
x
x
x
x
x
7
x
x
x
x
x
x
12
Course Title: Distributed Systems
Credits (L:T:P) : 4:0:0
Type of Course: Lecture
Course Code: CSPE04
Core/ Elective: Elective
Total Contact Hours: 56
Prerequisites: Basic knowledge of internet technologies
Course Contents:
Unit 1
Introduction: Distributed Systems - Need and motivation, Challenges(Fallacies); Architecture: System Models,
common terminologies; Distributed System Kinds: Storage, Compute, Coordination
Unit 2
Distributed Storage Systems - 1: Shared Memory: Model, Distributed Shared Memory, Linearizability; Data
Aspects: Partitioning, Sharding, Fault-Tolerance, Consistency, ACID; CAP Theorem, BASE, Brewer’s Conjecture
explained;
Unit 3
Distributed Storage Systems - 2: Distributed Replication: Consistency and Paxos Algorithm; Access Patterns
and Data Models: Key-Value, Document, Columnar, Files, Graph, Inverted Index; DynamoDb: Distributed KeyValue Store, Architecture, CAP Implications HDFS: Distributed File System, Architecture, CAP Implications;
Elasticsearch: Distributed search solution, CAP Implications; Other distributed storage solution as Case Study and
assignment
Unit 4
Distributed Compute Systems: Synchronous and Asynchronous Processing, Data and Task Parallel systems, Data
locality; Fault Tolerance in Processing; Pipelines and Workflows; MapReduce: Programming paradigm, Google
MapReduce - Architecture and phases. Stream Processing: Introduction and Concepts, Comparative study of S4,
Storm and Borealis. [Additional Reading - Split Query processing, other forms of distributed query processing]
Unit 5
Distributed Coordination: Why coordination in Distributed systems?, Zookeeper: Architecture and applications;
Paxos revisited; Leader election, Byzantine Problem simple description, Quorum Systems
Reading Material:
Main References:
 Coulouris et.al. Distributed Systems Concepts and Design
 Links: http://azmuri.files.wordpress.com/2013/09/george-coulouris-distributed-systems-concepts-anddesign-5th-edition.pdf
 https://drive.google.com/file/d/0B3XfLh7sFg6xdmVRdE1ZcWcwbHM/preview (Just save locally)
 Notes on Theory of Distributed Systems,James Apnes
 http://cs-www.cs.yale.edu/homes/aspnes/classes/465/notes.pdf
 Distributed algorithms Nancy Lynch
Unit1: Recommended Reading  https://gist.github.com/jboner/2841832
 Building a distributed system requires a methodical approach to requirements https://queue.acm.org/detail.cfm?id=2482856
 Distributed Systems Fallacies - http://www.rgoarchitects.com/Files/fallacies.pdf
 Chapter 1 and 2 of Coulouris et.al Distributed Systems Concepts and Design Coulouris.pdf
 Lecture Notes: Introduction to DistSys
 http://www.cs.helsinki.fi/u/jakangas/Teaching/DistSys/DistSys-08f-1.pdf
 www.cis.upenn.edu/~lee/00cse380/lectures/ln13-ds.ppt
45


Unit2:










Unit3:








Unit4:








Unit5:


http://www0.cs.ucl.ac.uk/staff/ucacwxe/lectures/ds98-99/dsee3.pdf
For discussion on Common Terminologies, refer Coulouris. Section 1.5 but use terminologies in the above
presentations
Notes on Theory of Distributed Systems,James Apnes: Chapter 15 and 16 http://cswww.cs.yale.edu/homes/aspnes/classes/465/notes.pdf
CAP Theorem - http://www.cs.berkeley.edu/~brewer/cs262b-2004/PODC-keynote.pdf
Proof/Explanation for Brewer's CAP Conjecture https://github.com/machinelearner/distSysTheory/blob/master/literature/brewersconjecture/BrewersConjecture-SigAct.pdf?raw=true
http://webpages.cs.luc.edu/~pld/353/gilbert_lynch_brewer_proof.pdf
Distributed Databases: http://pcbunn.cithep.caltech.edu/DistributedDatabasesPakistan.pdf(Partitioning),
Sharding ,Replication and CAP implications - http://www.dia.uniroma3.it/~torlone/bigdata/L7-NoSQL.pdf
http://www.inf.unibz.it/dis/teaching/DDB/ln/ddb03.pdf(Explained partitioning as fragmentation)
Linearizability:
https://github.com/machinelearner/distSysTheory/blob/master/literature/linearizability/p463herlihy.pdf?raw=true(Can leave out the axioms and theorems - not in scope for under-grad class)
Consistency - http://www.cs.uoi.gr/~pitoura/courses/ds04_gr/cons-repl.pdf
Failures and distributed Systems http://www.cse.psu.edu/~gcao/teach/513-00/c7.pdf
Replication: http://www.cs.cmu.edu/~dga/15-440/F12/lectures/15-replication.pdf
Coulouris Chapter 18 and http://book.mixu.net/distsys/replication.html
Paxos Lecture - https://www.youtube.com/watch?v=WX4gjowx45E
Paxos Algorithm Explained - http://research.microsoft.com/en-us/um/people/lamport/pubs/paxossimple.pdf
http://the-paper-trail.org/blog/consensus-protocols-paxos/
DynamoDb http://www.allthingsdistributed.com/files/amazon-dynamo-sosp2007.pdf
HDFS Architecture: http://hadoop.apache.org/docs/r1.2.1/hdfs_design.html
,http://aosabook.org/en/hdfs.html
https://github.com/machinelearner/distSysTheory/blob/master/literature/hdfs/hdfs.pdf?raw=true
Parallel Computing Paradigm http://www.buyya.com/cluster/v2chap1.pdf,
http://www.cs.unc.edu/~dewan/242/s07/notes/ipc/node9.html
http://www.cse.iitd.ernet.in/~dheerajb/parallel_paradigms.pdf
MapReduce Google
http://static.googleusercontent.com/media/research.google.com/en//archive/mapreduce-osdi04.pdf
S4 - Stream Processing http://www.4lunas.org/pub/2010-s4.pdf
Borealis - http://www.cs.harvard.edu/~mdw/course/cs260r/papers/borealis-cidr05.pdf
http://grids.ucs.indiana.edu/ptliupages/publications/survey_stream_processing.pdf
Distributed Algorithms by Nancy Lynch - Chapters on Asynchronous and Synchronous Networks
Refer to Notes - James Apnes 6,7,10,14
Consensus Survey - http://courses.csail.mit.edu/6.897/fall04/papers/Fischer/fischer-survey.ps
46




Refer: Distributed algorithms Nancy Lynch for further reading
Zookeeper Overview: http://zookeeper.apache.org/doc/trunk/zookeeperOver.pdf
Zookeeper - Yahoo Research
https://github.com/machinelearner/distSysTheory/blob/master/literature/zookeeper/Hunt.pdf?raw=true
Byzantine generals problem: http://research.microsoft.com/en-us/um/people/lamport/pubs/byz.pdf
Course Outcomes :
At the end of the course the students will be able to:
1. Describe the architecture models of the distributed systems
2. Survey the available distributed storage systems through case study and assignment
3. Defend the use of various techniques in distributed compute systems
4. Explain the modern architectures of co-ordintation in distributed systems
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Describe the architecture models of the distributed
systems
Survey the available distributed storage systems
through case study and assignment
Defend the use of various techniques in distributed
compute systems
Explain the modern architectures of co-ordintation
in distributed systems
Programme Outcomes
1
x
47
2
3
4
5
6
7
8
9
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
10
11
x
12
Course Title: Big Data and Data Science
Course Code: CSPE05
Credits (L:T:P) : 3:0:1
Core/ Elective: Elective
Type of Course: Lecture, Practical
Total Contact Hours: 70
Prerequisites: Nil
Course Contents:
Unit 1
Introduction to Big Data and related technologies: Dawn of the Big Data Era, Definition and Features of Big
Data, Big Data Value, The Development of Big Data, Challenges of Big Data.
Cloud Computing, Relationship Between Cloud Computing and Big Data, IoT, IoT Preliminaries, Relationship
Between IoT and Big Data, Data Center, Hadoop Preliminaries, Relationship between Hadoop and Big Data
Unit 2
Big Data Acquisition and Analysis: Enterprise Data, IoT Data, Bio-medical Data, Data Generation from Other
Fields. Big Data Acquisition, Data Collection, Data Transportation, Data Pre-processing, Storage Mechanism for
Big Data Big Data Analysis: Traditional Data Analysis, Big Data Analytic Methods, Architecture for Big Data
Analysis, Real-Time vs. Offline Analysis, Analysis at Different Levels, Analysis with Different Complexity, Tools
for Big Data Mining and Analysis.
Unit 3
Big Data Analysis Using Hadoop: Hadoop: MapReduce Basics: Functional Programming Roots, Mappers and
Reducers, The Execution Framework, Partitioners and Combiners, The Distributed File System, Hadoop Cluster
Architecture. Graph Algorithms: Graph Representations, Parallel Breadth-First Search, PageRank, Issues with
Graph Processing.
Unit 4
Big data analysis using R: Introduction to R: Understanding datasets, Data structures: Vectors, Matrices, Arrays,
Data frames, Factors, Lists Modeling Methods: Mapping problems to machine learning tasks: Solving
classification problems, scoring Problems, Working without known targets, Problem-to-method mapping.
Unit 5
Big Data applications: Application Evolution, Big Data Analysis Fields, Structured Data Analysis, Text Data
Analysis, Web Data Analysis, Multimedia Data Analysis, Network Data Analysis, Mobile Traffic Analysis.
Key Applications, Application of Big Data in Enterprises, Application of IoT Based Big Data, Application of Online
Social Network-Oriented Big Data, Applications of Healthcare and Medical Big Data, Collective Intelligence, Smart
Grid.
Reference Material: (In no particular order of precedence)
1. Principles of Big Data: Preparing, Sharing and Analyzing Complex Information, Jules J Berman, First
Edition, MK Publishers, 2013.
2. The Field Guide to Data Science:http://www.boozallen.com/media/file/TheFieldGuidetoDataScience.pdf
3. Understanding Big Data: ftp://129.35.224.12/software/tw/Defining_Big_Data_through_3V_v.pdf
4. Ghemawat et.al Google, MapReduce: Simplied Data Processing on Large Clusters
http://static.googleusercontent.com/media/research.google.com/en//archive/mapreduceosdi04.pdf
5. Hadoop Tutorial: http://developer.yahoo.com/hadoop/tutorial/
Course Delivery
The course will be delivered through lectures, presentations, classroom discussions, practice exercises and practical
sessions.
Text Books:
1. Chen, M., Mao, S., Zhang, Y., & Leung, V. C.“Big Data-Related Technologies, Challenges and Future
Prospect”s , 2014, Springer (Chapters: 1-6)
2. Lin, J., & Dyer, C. “Data-intensive text processing with MapReduce”,2010, (Chapters: 2and 5)
3. Robert I. Kabacoff, “R in Action”, 2011,(Chapter 2 Pages:21-32)
4. Zumel, N., & Mount, J. “Practical data science with R”, 2014, (Chapters: 5, Pages 81-91 )
48
Reference Books
1. O. R. Team. Big Data Now: Current Perspectives from O’Reilly Radar. O’Reilly Media, 2011.
2. Adler, Joseph. R in a Nutshell, Second Edition. O’Reilly Media, 2012.
Course Assessment and evaluation:
Direct & Indirect Assessment Methods
What
CIE
To
Whom
Internal
Assessment
Tests
When/ Where
(Frequency in
the course)
Thrice (Average
of the best two
will be
computed)
Lab test
SEE
Semester
End
Examination
Students
End of Course
Survey
Once
End of Course
(Answering
5 of 10
questions)
Max
Marks
Evidence
Collected
Contribution to
Course
Outcomes
25
Blue Books
1,2,3,4,5,6 & 7
25
Data Sheets
1,2,3,4,5,6 & 7
50
Answer
scripts
1,2,3,4,5,6 & 7
Questionnaire
1,2,3,4,5,6 & 7
Effectiveness of
Delivery of
instructions &
Assessment
Methods
End of the
course
-
Course Outcomes
At the end of the course the students should be able to:
1. Review the features of Big Data and its types
2. Identify the relationship of big data to Cloud Computing and IoT.
3. Ilustrate different steps involved in acquisition of Big data, pre-processing
4. Identify the different storage systems for Big data.
5. Examine different types of analysis techniques involved in processing of Big Data.
6. Illustrate different types of analysis through evaluation models for Big data.
7. Estimate the need for Big data applications.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Review the features of Big Data and its types
Identify the relationship of big data to Cloud
Computing and IoT.
Ilustrate different steps involved in acquisition of Big
data, pre-processing
Identify the different storage systems for Big data.
Examine different types of analysis techniques
involved in processing of Big Data.
Illustrate different types of analysis through
evaluation models for Big data.
Estimate the need for Big data applications.
Programme Outcomes
1
x
2
x
3
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
49
4
5
6
7
8
9
10
11
12
x
x
x
x
Course Title: Storage Area Networks
Course Code: CSPE06
Credits (L:T:P) : 4:0:0
Core/ Elective: Elective
Type of course: Lecture
Total Contact Hours: 56
Prerequisites:
Computer Networks, Computer Organization, Operating system
Course Contents:
Unit 1
Introduction: Server Centric IT Architecture and its Limitations; Storage – Centric IT Architecture and its
advantages. Case study: Replacing a server with Storage Networks The Data Storage and Data Access problem; The
Battle for size and access.
Intelligent Disk Subsystems: Architecture of Intelligent Disk Subsystems; Hard disks and Internal I/O Channels;
JBOD, Storage virtualization using RAID and different RAID levels; Caching: Acceleration of Hard Disk Access;
Intelligent disk subsystems, Availability of disk subsystems.
Unit 2
I/O Techniques: The Physical I/O path from the CPU to the Storage System; SCSI; Fibre Channel Protocol Stack;
Fibre Channel SAN; IP Storage.
Unit 3
Network Attached Storage: The NAS Architecture, The NAS hardware Architecture, The NAS Sotfware
Architecture, Network connectivity, NAS as a storage system.
File System and NAS: Local File Systems; Network file Systems and file servers; Shared Disk file systems;
Comparison of fibre Channel and NAS.
Unit 4
Storage Virtualization: Definition of Storage virtualization ; Implementation Considerations; Storage virtualization
on Block or file level; Storage virtualization on various levels of the storage Network; Symmetric and Asymmetric
storage virtualization in the Network.
Unit 5
SAN Architecture and Hardware devices: Overview, Creating a Network for storage; SAN Hardware devices;
The fibre channel switch; Host Bus Adaptors; Putting the storage in SAN; Fabric operation from a Hardware
perspective.
Software Components of SAN: The switch’s Operating system; Device Drivers; Supporting the switch’s
components; Configuration options for SANs.
Management: Planning Business Continuity; Managing availability; Managing Serviceability; Capacity planning;
Security considerations.
Text Book:
1. Ulf Troppens, Rainer Erkens and Wolfgang Muller: Storage Networks Explained, 1st edition, Wiley India,
2012.
Reference Books:
1. Marc Farley: Storage Networking Fundamentals – An Introduction to Storage Devices, Subsystems,
Applications, Management, and File Systems, Cisco Press, 2005.
2. Robert Spalding: “Storage Networks The Complete Reference”, 1st edition, Tata McGraw-Hill, 2011.
3. Richard Barker and Paul Massiglia: “Storage Area Network Essentials A CompleteGuide to understanding
and Implementing SANs”, 1st edition, John Wiley India, 2011.
50
Course Delivery: Lecture,ppt and videos
Course Assessment and Evaluation:
Direct & Indirect Assessment Methods
What
To
Whom
Internal
Assessment Tests
CIE
Class-room
Surprise Quiz
SEE
Standard
Examination
When/ Where
(Frequency in the
course)
Thrice(Average of
the best two will be
computed)
Twice(Summation
of the two will be
computed)
Students
End of Course
Survey
Max
Marks
Evidence
Collected
Contribution to
Course Outcomes
30
Blue Books
1,2 3,4,5 & 6
20
Quiz papers
100
Answer scripts
1,2 3,4,5 & 6
Questionnaire
1,2 3,4,5 & 6
Effectiveness of
Delivery of
instructions &
Assessment
Methods
End of Course
(Answering
5 of 10 questions)
End of the course
-
1,2 3,4,5 & 6
Course Outcomes:
At the end of the course the students should be able to
1. Describe storage centric architecture as a necessity for an enterprise data storage
2.
Recognize Storage Area Networks and Local area Networks (Ethernet)
3.
Illustrate the working of various layers of Fiber Channel protocol stack.
4.
Identify the need for NAS and IP SAN at an Enterprise requirements
5.
Evaluate virtualizations Block /File level in SAN networks
6.
Identify SAN and NAS Hardware and Software components
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Describe storage centric architecture as a necessity for
an enterprise data storage
Programme Outcomes
1
2
x
3
4
5
x
x
Recognize San networks / Lan networks
x
x
x
Illustrate the working of various layers of Fiber
Channel protocol stack.
x
x
x
Identify the need for NAS and IP SAN for an
Enterprise storage requirements
x
x
Evaluate virtualizations Block /File level in SAN
networks
x
Identify SAN and NAS Hardware and Software
components
x
51
6
x
x
x
7
8
9
10
x
x
x
x
x
x
x
x
x
x
11
12
x
x
x
x
x
x
x
Course Title: Information Retrieval
Course Code: CSPE07
Credits (L:T:P:SS) : 3:0:1
Core/ Elective: Elective
Type of course: Lecture, Practicals
Total Contact Hours: 70
Prerequisites: NIL
Course Content:
Unit 1
Introduction: Overview, History of IR, Text Operations: Document preprocessing, Document Clustering, Text
Compression, Indexing: Inverted files, Mathematics for IR: Set Theory, Mathematical Logic, Probability and
Linear algebra, Classic IR Models: Boolean Model, Vector space model: tf-idf weighing, Probabilistic Model.
Unit 2
Evaluation Measures: Precision, Recall, Alternative Measures, Reference Collections: TREC, Relevance
Feedback and Query Expansion, Text Classification: The text classification problem, Flat clustering:
Clustering in information retrieval, Problem Statement, Hierarchical clustering: Hierarchical agglomerative
clustering,, Single-link and Complete-link clustering.
Unit 3
String Matching algorithms: Knuth Morris Pratt and Rabin Karp, Stemming algorithm: Porter, Map reduce
algorithms: tf- idf calculation and indexing, Classification: Naive Bayes algorithm, Clustering: k-means
algorithm.
Unit 4
Web search engines: Architecture, Web Crawling and Indexing: Overview, Crawling, Distributing Indexes,
Connectivity Servers. Link analysis: Web as a graph, Page Rank, Hubs and Authorities.
Unit 5
XML Retrieval: Basic XML Concepts, Challenges in XML retrieval, a vector space model for XML retrieval,
Introduction to Semantic Web: Purpose, Semantic Web Stack, RDF, RDFS, Ontology, Web ontology language
(OWL) and ontology tools.
Text Books/ Online Books
1. Ricardo Baeza-Yates, Berthier Ribeiro-Neto: Modern Information Retrieval, Pearson Education, 1999.
2. Introduction to Information Retrieval. C.D. Manning, P. Raghavan, H. Schütze. Cambridge UP, 2008.
3.
Mathematics for Classical Information Retrieval: Roots and Applications: Dariush Alimohammadi,
http://digitalcommons.unl.edu/cgi/viewcontent.cgi?article=1002&context=zeabook
4.
http://www.dcc.fc.up.pt/~zp/aulas/1213/pde/geral/bibliografia/MIT.Press.A.Semantic.Web.Primer.eBookTLFeBOOK.pdf
Reference Books:
1. William B Frakes, Ricardo Baeza Yates: Information Retrieval Data Structures and Algorithms, PH PTR,
1992.
2. David A Grossman, Ophir Frieder: Information Retrieval Algorithms and Heuristics, 2e, Springer, 2004.
Course Delivery:
The course will be delivered through lectures and presentations.
52
Course Assessment and Evaluation:
Direct & Indirect Assessment Methods
What
CIE
To Whom
Internal
Assessment Tests
Lab Assignments
SEE
Students
Standard
Examination
When/ Where
(Frequency in
the course)
Thrice
(Average of
the best two
will be
computed)
Throughout
Semester
End of Course
(Answering
5 of 10
questions)
End of Course
Survey
End of the
course
Max
Mark
s
Evidence
Collected
Contribution to
Course Outcomes
30
Blue Books
1,2,3,4,5 & 6
20
Softcopy of lab
assignments
1,2,3,4,5 & 6
100
Answer scripts
1,2,3,4,5 & 6
Questionnaire
1,2,3,4,5 & 6
Effectiveness of
Delivery of
instructions &
Assessment Methods
-
Course Outcomes:
At the end of the course, a student should be able to
1. Describe text operations and various information retrieval models.
2. Assess an IR system using various evaluation measures.
3. Explain text classification and clustering techniques.
4. Illustrate algorithms such as string matching, map reduce, classification and clustering.
5. Discuss techniques for web information retrieval such as web search engine, web crawling and link analysis.
6. Explain XML Retrieval and various semantic web technologies.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Describe text operations
and various information
retrieval models.
Assess an IR system
using various evaluation
measures.
Explain
text
classification
and
clustering techniques.
Illustrate algorithms such
as string matching, map
reduce, classification and
clustering.
Discuss techniques for
web information retrieval
such as web search
engine, web crawling
and link analysis.
Explain XML Retrieval
and various semantic
web technologies
PO1
PO2
PO3
PO4
Programme Outcomes
PO5 PO6 PO7 PO8
PO9
PO10
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
53
PO11
PO12
Course Title: Social network analysis
Course Code: CSPE08
Credits (L:T:P) : (3:1:0)
Core/ Elective: Elective
Type of course: Lecture, Tutorial
Total Contact Hours: 70
Prerequisites:
Nil
Course Contents:
Unit 1
Social Structure : Sociometry and Sociogram, Exploratory Social Network Analysis, Assembling a Social Network.
Attributes and Relations: The World System, Partitions, Reduction of a Network, Vectors and Coordinates, Network
Analysis and Statistics
Unit 2
Cohesive Subgroups: Density and Degree, Components, Cores, Cores. Sentiments and Friendship: Balance Theory,
Detecting Structural Balance and Clusterability, Development in Time. Affiliations: Two-Mode and One-Mode
Networks, m-Slices, The Third Dimension
Unit 3
Center and Periphery: Distance, Betweenness. Brokers and Bridges: Bridges and Bi-Components, Ego-Networks
and Constraint, Affiliations and Brokerage Roles. Diffusion: Contagion, Exposure and Thresholds, Critical Mass.
Unit 4
Prestige: Popularity and Indegree, Correlation, Domains, Proximity Prestige. Ranking: Triadic Analysis, Acyclic
Networks, Symmetric-Acyclic Decomposition, Genealogies and Citations: Genealogy of the Ragusan Nobility,
Family Trees, Family Trees, Citations among Papers on Network Centrality, Citations
Unit 5
Blockmodels: Matrices and Permutation, Roles and Positions: Equivalence, Blockmodeling. Pajek: Creating
Network Files for Pajek, Exporting Visualizations
Text Books:
1.
2.
3.
Exploratory social Network Analysis with Pajek, WOUTER DE NOOY, ANDREJ MRVAR, VLADIMIR
BATAGELJ, Cambridge University press, 2005
Introduction to social network methods, Hanneman, Robert A. and Mark Riddle. 2005. University of
California, Riverside ( published in digital form at http://faculty.ucr.edu/~hanneman/ )
Social Network Analysis for Startups, Maksim Tsvetovat and Alexander Kouznetsov, Oreilly,2011
Course Delivery:
The course will be delivered through lectures, software tools in laboratory, class room interaction, group discussion,
exercises and self study cases.
54
Course Outcomes:
At the end of the course, a student should be able to
1.
2.
3.
4.
5.
6.
7.
Describe social structure and attributes of real world scenarios.
Find the statistical details of different social networks
Indicate the cohesive nature of different social networks
Estimate the affiliations of social network elements
Examine the brokerage properties in social networks
Assess ranking of real world social networks
Verify the roles of social network elements
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
4
5
×
×
×
×
×
×
×
×
×
×
×
×
×
×
×
×
×
×
×
Examine the brokerage properties in social networks
×
×
×
×
×
Assess ranking of real world social networks
×
×
×
×
×
Verify the roles of social network elements
×
×
×
×
×
Describe social structure and attributes of real world
scenarios.
Find the statistical details of different social
networks
Indicate the cohesive nature of different social
networks
Estimate the affiliations of social network elements
1
2
×
55
3
6
7
8
9
10
11
12
Course Title: Wireless Sensor Networks
Course Code: CSPE09
Credits (L:T:P) : 4:0:0
Core/ Elective: Elective
Type of course: Lecture, Laboratory
Total Contact Hours: 70
Prerequisites:
Computer Networks
Course Contents:
Unit 1
Introduction: Definition of Wireless Sensor Networks (WSNs), difference between the adhoc and sensor n/ws,
challenges for WSN and applications of WSN. Single node architecture: Hardware components, energy
consumption in sensor nodes, brief study of operating systems like TinyOS and NesC. Ntework architecture:
Network scenarios, QOS parameters, design principles of WSN and the interfaces.
Unit 2
Communication Protocols: Physicallayer protocols - Introduction, Wireless channel and communication
fundamentals, Physical layer & transceiver design considerations in WSNs. MAC layer protocolsFundamentals of
(wireless) MAC protocols, Low duty cycle protocols and wakeup concepts, Contention-based protocols, Schedulebased protocols, The IEEE 802.15.4 MAC protocol, IEEE 802.11 and Bluetooth.
Unit 3
Link layer protocols: Fundamentals: Tasks and requirements, Error control, Framing, Link management. Naming
and addressing: Fundamentals, Address and name management in wireless sensor networks, Assignment of MAC
addresses, Distributed assignment of locally unique addresses, Content-based and geographic addressing.
Unit 4
Time synchronization: Introduction to the time synchronization problem, Protocols based on sender/receiver
synchronization, Protocols based on receiver/receiver synchronization. Localization and Positioning: Properties of
positioning, Possible approaches, Mathematical basics for the lateration problem, Single-hop localization,
Positioning in multi-hop environments, Impact of anchor placement.
Unit 5
Routing Protocols: The many faces of forwarding and routing, Gossiping and agent-based unicast forwarding,
Energy-efficient unicast, Broadcast and multicast, Geographic routing for Mobile nodes.
Text Books:
1.
2.
Holger Karl & Andreas Willig, " Protocols And Architectures for Wireless Sensor Networks" , John Wiley,
2005.
Feng Zhao & Leonidas J. Guibas, “Wireless Sensor Networks- An Information Processing Approach",
Elsevier, 2007.
Reference Books:
1. KazemSohraby, Daniel Minoli, &TaiebZnati, “Wireless Sensor Networks- Technology, Protocols, And
Applications”, John Wiley, 2007.
2. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, 2003.
Course Delivery:
The course will be delivered through lectures, class room interaction, group discussion and lab exercises and selfstudy cases.
56
Course Outcomes:
At the end of the course the students should be able to:
1. Explain the hardware and software components of wireless sensor networks.
2. Summarize the fundamentals of MAC protocols.
3. Recognize the important tasks of Link layer addressing and naming schemes in WSNs
4. Identify the time synchronization problems and understand the principal design trade-offs for positioning
nodes in the network.
5. Compare the different mechanisms available for routing in the network.
6. Devise new applications for WSNs.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
4
5
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Explain the hardware and software components of
wireless sensor networks.
Identify the time synchronization problems and
understand the principal design trade-offs for
positioning nodes in the network.
Compare the different mechanism available for
routing in the network
Devise new applications for WSNs
3
x
Summarize the fundamentals of MAC protocols.
Recognize the important tasks of Link layer
addressing and naming schemes in WSNs
2
57
x
6
7
8
9
10
11
12
Course Title: Mobile Computing
Course Code: CSPE10
Credits (L:T:P) : 4:0:0
Core/ Elective: Elective
Type of course: Lecture
Total Contact Hours: 56
Prerequisites:
Nil
Course Contents:
Unit 1
Introduction; Types of computing; wireless transaction - Signals, antennas, signal propagation, multiplexing
modulation, spread spectrum; medium access: SDMA, FDMA,TDMA, CDMA. OFDM, Wireless LAN: IEEE
802.11, HiperLAN, Blue tooth, Wi Max.
Unit 2
Mobile Network layer – mobile IP, Dynamic host configuration protocol, Mobile adhoc networks. Mobile transport
layer-Traditional and classical TCP, TCP over 2.5 (3.0) G wireless networks, performance enhancing proxies,
Communication Systems: GSM,DECT, TETRA, UMTS, IMIT 200, LTE.
Unit 3
Databases: Database Hoarding Techniques, Data Caching, Transactional Models, Query Processing.Data
Dissemination and Broadcasting Systems: Communication Asymmetry, Classification of Data-Delivery
Mechanisms, Data Dissemination Broadcast Models, Selective Tuning and Indexing Techniques.
Unit 4
Data Synchronization in Mobile Computing Systems: Synchronization, Synchronizationsoftware for mobile devices,
Synchronization protocols, SyncML – Synchronization language for mobile computing, Sync4J (Funambol),
Synchronized Multimedia Markup Language (SMIL). Mobile Devices: Server and Management: Mobile agent,
Application server, Gateways, Portals, Service Discovery, Device management, Mobile file systems, security.
Unit 5
Support Mobility- File Systems, Mobile Security, Mobile operating systems: PalmOs, Windows, Symbian OS,
Android, iOS, Linux for Mobile devices.
Text Books:
1. Mobile Computing, RajKamal, Oxford University Press, 2nd Edition, 2012
2. Jochen Schiller, Mobile Communications, 2nd Edition, Pearson 2003
Reference Books:
1. Reza B, Mobile Computing Principles, Cambridge University press 2005
2. Dr. Ashok Talukder, MsRoopaYavagal, Mr. Hasan Ahmed: Mobile Computing, Technology, Applications and
Service Creation, 2nd Edition, Tata McGraw Hill, 2010.
3. Martyn Mallik: Mobile and Wireless Design Essentials, First Edition, Wiley, 2011.
Course Delivery:
The course will be delivered through lectures, presentations, classroom discussions, and practical implementations.
Questions for CIE and SEE are designed in accordance with the Revised Bloom’s taxonomy.
58
Course Assessment Methods:
When/ Where
(Frequency in the
course)
Max
Marks
Evidence
Collected
Contribution to
Course
Outcomes
Internal
Tests
Thrice(Average of
the best two will be
computed)
30
Blue Books
1,2,3,4 & 5
Quiz
Twice
20
Quiz Papers
1,2,3,4 & 5
End of Course
(Answering 5 out
of 10 Questions)
50
Answer scripts
1,2,3,4 & 5
Questionnaire
1, 2, 3, 4 & 5
Effectiveness of
Delivery of
instructions &
Assessment
Methods
Direct & Indirect Assessment Methods
What
To Whom
CIE
SEE
Standard
Examination
Students
End of Course Survey
End of the course
-
Course Outcomes:
At the end of the course, a student should be able to:
1. Identify the basic networking concepts, principles and techniques in mobile networks.
2. Identify the concept of mobile network and transport layer for mobile networks and telecommunication
systems.
3. Outline the database handling, data dissemination, Synchronization with respect to different Mobile OS.
4. Estimate data synchronization in mobile computing systems.
5. Illustrate the mobility support using different file systems and platforms.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Identify the basic networking concepts, principles and
techniques in mobile networks.
Identify the concept of mobile network and transport
layer for mobile networks and telecommunication
systems.
Outline the database handling, data dissemination,
Synchronization with respect to different Mobile OS.
Estimate data synchronization in mobile computing
systems.
Illustrate the mobility support using different file
systems and platforms.
Programme Outcomes
1
2
3
4
x
x
5
x
x
x
x
x
x
x
59
x
x
x
x
x
6
7
8
9
10
11
12
Course Title: Multimedia Computing
Course Code: CSPE11
Credits (L:T:P) : 3:0:1
Core/ Elective: Elective
Type of Course: Lecture, Practicals
Total Contact Hours: 56
Prerequisites: NIL
Unit 1
Introduction, Media and Data Streams, Audio Technology: Multimedia Elements, Multimedia Applications,
Multimedia Systems Architecture, Evolving Technologies for Multimedia Systems, Defining Objects for
Multimedia Systems, Multimedia Data Interface Standards, The need for Data Compression, Multimedia Databases.
Media: Perception Media, Representation Media, Presentation Media, Storage Media, Characterizing Continuous
Media Data Streams. Sound: Frequency, Amplitude, Sound Perception and Psychoacoustics, Audio Representation
on Computers, Three Dimensional Sound Projection, Music and MIDI Standards, Speech Signals, Speech Output,
Speech Input, Speech Transmission. Graphics and Images, Video Technology, Computer-Based Animation:
Capturing Graphics and Images Computer Assisted Graphics and Image Processing, Reconstructing Images,
Graphics and Image Output Options. Basics, Television Systems, Digitalization of Video Signals, Digital
Television, Basic Concepts, Specification of Animations, Methods of Controlling Animation, Display of Animation,
Transmission of Animation, Virtual Reality Modeling Language.
Unit 2
Data Compression: Storage Space, Coding Requirements, Source, Entropy, and Hybrid Coding, Basic
Compression Techniques, JPEG: Image Preparation, Lossy Sequential DCT-based Mode, Expanded Lossy DCTbased Mode, Lossless Mode, Hierarchical Mode. H.261 (Px64) and H.263: Image Preparation, Coding Algorithms,
Data Stream, H.263+ and H.263L, MPEG: Video Encoding, Audio Coding, Data Stream, MPEG-2, MPEG-4,
MPEG-7, Fractal Compression.
Unit 3
Optical Storage Media: History of Optical Storage, Basic Technology, Video Discs and Other WORMs, Compact
Disc Digital Audio, Compact Disc Read Only Memory, CD-ROM Extended Architecture, Further CD-ROM-Based
Developments, Compact Disc Recordable, Compact Disc Magneto-Optical, Compact Disc Read/Write, Digital
Versatile Disc. Content Analysis : Simple Vs. Complex Features, Analysis of Individual Images, Analysis of Image
Sequences, Audio Analysis, Applications.
Unit 4
Data and File Format Standards: Rich-Text Format, TIFF File Format, Resource Interchange File Format (RIFF),
MIDI File Format, JPEG DIB File Format for Still and Motion Images, AVI Indeo File Format, MPEG Standards,
TWAIN.
Unit 5
Multimedia Application Design: Multimedia Application Classes, Types of Multimedia Systems, Virtual Reality
Design, Components of Multimedia Systems, Organizing Multimedia Databases, Application Workflow Design
Issues, Distributed Application Design Issues.
Text Books:
1. Ralf Steinmetz, Klara Narstedt: Multimedia Fundamentals: Vol 1-Media Coding and Content Processing,
First Edition, PHI, 2010.
2. Prabhat K. Andleigh, Kiran Thakrar: Multimedia Systems Design,1st Edition, PHI, 2011.
Reference Books:
1. K.R. Rao, Zoran S. Bojkovic and Dragorad A. Milovanovic: Multimedia Communication Systems:
Techniques, Standards, and Networks, 1st Edition, PHI , 2010.
2. Nalin K Sharad: Multimedia information Networking, PHI, 2002.
60
Course Outcomes:
At the end of the course, a student should be able to
1. Identify the basic concepts of media, data streams and audio technology
2. Implement different data compression techniques including video, audio and fractal compression.
3. Demonstrate different optical storage media including content Analysis
4. Identify the different data and file format standards like TIFF, RIFFF, MIDI and MPEG.
5. Analyze multimedia application design methods like Virtual Reality design and workflow design.
61
Course Title: Software Defined Networks
Course Code: CSPE12
Credits (L:T:P:SS) : 4:0:0
Core/ Elective: Elective
Type of course: Lecture
Total Contact Hours: 56
Prerequisites:
Data Communications and Computer Networks
Course Contents:
Unit 1
Introduction - Basic Packet-Switching Terminology, The Modern Data Center, Traditional Switch Architecture,
Autonomous and Dynamic Forwarding Tables, Can We Increase the Packet-Forwarding IQ? Open Source and
Technological Shifts.
Why SDN? Evolution of Switches and Control Planes, Cost, SDN Implications for Research and Innovation, Data
Center Innovation, Data Center Needs
Unit 2
The Genesis of SDN: The Evolution of Networking Technology, Forerunners of SDN, Software Defined
Networking is Born, Sustaining SDN Interoperability, Open Source Contributions, Legacy Mechanisms Evolve
Toward SDN, Network Virtualization.
How SDN Works - Fundamental Characteristics of SDN, SDN Operation, SDN Devices, SDN Controller, SDN
Applications, Alternate SDN Methods
Unit 3
The OpenFlow Specification - OpenFlow Overview, OpenFlow 1.0 and OpenFlow Basics, OpenFlow 1.1
Additions, OpenFlow 1.2 Additions, OpenFlow 1.3 Additions, OpenFlow Limitations.
Alternative Definitions of SDN - Potential Drawbacks of Open SDN, SDN via APIs, SDN via Hypervisor-Based
Overlays, SDN via Opening Up the Device, Network Functions Virtualization, Alternatives Overlap and Ranking
Unit 4
SDN in the Data Center- Data Center Definition, Data Center Demands, Tunneling Technologies for the Data
Center, Path Technologies in the Data Center, Ethernet Fabrics in the Data Center, SDN Use Cases in the Data
Center, Open SDN versus Overlays in the Data Center, Real-World Data Center Implementations.
SDN in Other Environments - Consistent Policy Configuration, Global Network View, Wide Area Networks,
Service Provider and Carrier Networks, Campus Networks, Hospitality Networks, Mobile Networks, In-Line
Network Functions, Optical Networks, SDN vs. P2P/Overlay Networks
Unit 5
SDN Applications- Reactive versus Proactive Applications, Reactive SDN Applications, Proactive SDN
Applications, Analyzing Simple SDN Applications, Creating Network Virtualization Tunnels, Offloading Flows in
the Data Center, Access Control for the Campus, Traffic Engineering for Service Providers
SDN Futures - Potential Novel Applications of Open SDN, Applying Programming Techniques to Networks,
Security Applications, Hiding IP Addresses, Segregating IPSec Traffic in Mobile Networks, Roaming in Mobile
Networks, Traffic Engineering in Mobile Networks, Energy Savings, SDN-Enabled Switching Chips
Text Book:
1. Paul Goransson, Chuck Black: Software Defined Networks A Comprehensive Approach , Elsevier, 2014.
Reference Book:
1. Thomas D.Nadeau & Ken Gray: SDN Software Defined Networks O'Reilly publishers, First edition, 2013.
Course Delivery:
The course will be delivered through lectures and assignments.
62
Course Outcomes:
At the end of the course students should be able to:
1.
2.
3.
4.
5.
6.
7.
Differentiate between traditional networks and software defined networks
Identify the characteristics of SDN
Describe the working of SDN
Compare the performance of various open flow versions
Define SDN via APIs and Hypervisor based overlays
Identify various SDN applications and environments that benefits from its use.
Discuss future applications for SDN with respect to security and mobility of networks.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Differentiate between traditional networks and
software defined networks
Identify the characteristics of SDN
Describe the working of SDN
Compare the performance of various open flow
versions
Programme Outcomes
1
2
3
4
5
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Identify various SDN applications and environments
that benefits from its use.
x
x
x
x
x
Discuss future applications for SDN with respect to
security and mobility of networks.
x
x
x
x
x
Define SDN via APIs and Hypervisor based overlays
63
6
x
7
8
9
10
11
12
x
Course Title: Analysis of Computer Data Networks
Course Code: CSPE13
Credits (L:T:P) : 4:0:0
Core/ Elective: Core
Type of course: Lecturer
Total Contact Hours: 56
Prerequisites:
Computer Network and Data Communication
Course contents:
Unit 1
Review of Digital Transmission, Error Detection, Effectiveness of Error Detection codes, Two-dimensional Parity
checks, Polynomial codes. Standardized Polynomial Codes, Error Detecting Capability of a Polynomial code, Linear
Codes, Performance of Linear Codes, Error Correction(Garcia’s Book pages 166 to 190)
Unit 2
Introduction to Data Link Layer, Framing, Character – oriented Framing, Bit- oriented Framing, Length fields,
Framing with errors, Maximum Frame size-Variable Frame Length, Fixed Frame Length, Little’s theorem,
Probabilistic Form of Little’s theorem, Applications of Little’s theorem, Occupancy distribution upon arrival,
Occupancy Distribution upon arrival, Occupancy distribution up to departure, Brief review of
Queuing models (Gallager’s book, pages 86-96, 152-162, 171-173)
Unit 3:
Delay Models in Data Networks – Introduction, Multiplexing of Traffic on a Communication Link, Queuing
Models. Statistical Multiplexing, Poisson arrival process and packet loss probability, M/M/m/m: The m-server loss
system, M/G/1 system, Priority Queuing, nonpreemptive priority, Preemptive resume priority, Network of queues,
Jackson’s theorem (Garcia’s book pages 340-348, Gallager’s book pages 178, 179, 186-190,
203-209, 221-229)
Unit 4:
Multiaccess communication-Review of Aloha Networks, Idealized Slotted Multiaccess Model, Stabilized Slotted
Aloha, Splitting algorithms, Tree Algorithms, FCFS Splitting Algorithms, Improvements in the FCFS splitting
Algorithm, CSMA Slotted Aloha, FCFS Splitting Algorithms for CSMA (Gallager’s book pages 275-277, 282 –
283, 289 – 302, 305 – 307, 310, 311)
Unit 5:
Topological Design of Networks: Flow Models, An overview of Topological Design Problems, Subnet Design
Problem, Capacity Assignment Problem, Heuristic Methods for Capacity Assignment, Network Reliability Issues,
Spanning Tree Topology Design (Gallager’s book Pages 433-448)
Text Books:
1. Alberto Leon-Garcia and Indra Widjaja, Communication Networks, Fundmental Concepts and Key
Architectures, Second Reprint, Tata McGraw-Hill, 2004
2. Dimitri Bertsekas and Robert Gallager, Data Networks, Second Edition, Prentics Hall of India, 2000
Reference Books:
1. Anurag Kumar, Manjunath and Joy Kuri: Communication Networking2. An Analytical Approach, Indian Reprint, Morgan Kaufman Publishers, 2006
64
Course Outcomes:
At the end of the course student should be able to
1.
2.
3.
4.
5.
6.
Illustrate mathematical and engineering aspects of the performance in Data Networks.
Create a mathematical model of the given problem in computer Networks
Identify the role of Little’s theorem in the analysis typically in Occupancy distribution on arrival and
Occupancy Distribution on Departure
Review the study on Queuing models and apply to the cases of Priority Queuing, non-preemptive
priority and preemptive resume priority
Describe special theorems like Jackson’s theorem and its applications, splitting algorithms and application
to ALOHA Networks
Discuss Topological design of networks, flow models, spanning tree topology, subnet design problem, etc.
65
Course Title: Operations Research
Course Code: CSPE14
Credits (L:T:P) : 4:0:0
Core/ Elective: Elective
Type of course: Lecture
Total Contact Hours: 56
Prerequisites: NIL
Course Contents:
Unit 1
Introduction, Linear Programming – 1: Introduction: The origin, nature and impact of OR, Defining the problem
and gathering data, Formulating a mathematical model, Deriving solutions from the model, Testing the model,
Preparing to apply the model, Implementation. Introduction to Linear Programming: Prototype example, The linear
programming (LP) model.
Unit 2
LP – 2, Simplex Method: Assumptions of LP, Additional examples. The essence of the simplex method, Setting
up the simplex method, Algebra of the simplex method, the simplex method in tabular form, Tie breaking in the
simplex method, Adapting to other model forms, Post optimality analysis, Computer implementation, Foundation of
the simplex method.
Unit 3
Simplex Method – 2, Duality Theory: The revised simplex method, a fundamental insight. The essence of duality
theory, Economic interpretation of duality, Primal dual relationship, Adapting to other primal forms.
Unit 4
Duality Theory and Sensitivity Analysis, Other Algorithms for LP : The role of duality in sensitive analysis,
The essence of sensitivity analysis, Applying sensitivity analysis. The dual simplex method, Parametric linear
programming, The upper bound technique.Transportation and Assignment Problems: The transportation problem, A
streamlined simplex method for the transportation problem, The assignment problem, A special algorithm for the
assignment problem.
Unit 5
Game Theory, Decision Analysis: Game Theory: The formulation of two persons, zero sum games, Solving
simple games- a prototype example, Games with mixed strategies, Graphical solution procedure, Solving by linear
programming, Extensions.
Decision Analysis: A prototype example, Decision making without experimentation, Decision making with
experimentation, Decision trees. Metaheuristics: The nature of Metaheuristics, Tabu Search, Simulated Annealing,
Genetic Algorithms.
Text Book:
1. Frederick S. Hillier and Gerald J. Lieberman: Introduction to Operations Research: Concepts and Cases, 8th
Edition, Tata McGraw Hill, 2005.
Reference Books:
1. Wayne L. Winston: Operations Research Applications and Algorithms, 4th Edition, Cengage Learning,
2003.
2. Hamdy A Taha: Operations Research: An Introduction, 8th Edition, Pearson Education, 2007.
66
Course Outcomes:
At the end of the course, a student should be able to
1.
2.
3.
4.
5.
Formulate the mathematical model and Apply the Linear Programming techniques.
Describe the simplex method in tabular form, algebra of simplex method and post optimality analysis.
Apply and identify the simplex method-2, essence of duality theory and primal dual relationship.
Apply and analyze essence of sensitivity analysis, algorithms for transportation and assignment problems.
Demonstrate the algorithm for the formulation of zero sum game, decision making with experimentation
and simulated annealing.
67
Course Title: Advanced Algorithms
Course Code: CSPE15
Credits (L:T:P:S) : 3:0:1
Core/ Elective: Elective
Type of course: Lecture, Practical
Total Contact Hours: 56
Prerequisites: Algorithms
Course Contents:
Unit 1
Analysis Techniques: Growth of Functions, Asymptotic notations, Standard notations and common functions,
Recurrences and Solution of Recurrence equations – The Substitution method, The recurrence – tree method, The
master method, Amortized Analysis: Aggregate, Accounting and Potential Methods.
Unit 2
Graph Algorithms: Bellman-Ford Algorithm, Single source shortest paths in a DAG, Johnson’s Algorithm for
sparse graphs, Maximum bipartite matching. Trees: B-trees, Red-Black trees Hashing: General Idea, Hash
Function, Separate Chaining, Open addressing, Rehashing, Extendible hashing
Unit 3
Number – Theoretic Algorithms: Elementary notations, GCD, Modular Arithmetic, Solving modular linear
equations, The Chinese remainder theorem, Powers of an element, RSA cryptosystem. Heaps: Heaps, Priority
Queues, Binomial Heaps, Fibonacci Heaps.
Unit 4
String Matching Algorithms: Naïve string matching, Rabin – Karp algorithm, String matching with finite
automata, Knuth-Morris-Pratt algorithm, Boyer-Moore Algorithms.
Unit 5
Algorithmic Puzzles: Magic Square, n-queens problem, Glove Selection, Ferrying Soldiers, Jigsaw Puzzle
Assembly, A Stack of Fake Coins, Maximum Sum Descent, Hats of Two Colors, Pluses and Minuses, Searching for
a Pattern, Locker Doors, Palindrome Counting, Inverting a Coin Triangle, Sorting 5 in 7.
Text Books:
1. T H Cormen, C E Leiserson, R L Rivest and C Stein: Introduction to Algorithms, 3/e, PHI, 2011.
2. Mark Allen Weiss: Data Structures and Algorithm Analysis in C++, 3rd Edition, Pearson Education, 2011.
3. Anany Levitin and Maria Levitin: Algorithmic Puzzle, Oxford University Press, 2011
Reference Books:
1. Ellis Horowitz, Sartaj Sahni, S Rajasekharan: Fundamentals of Computer Algorithms, University Press,
2007.
2. Alfred V Aho, John E Hopcroft, J D Ullman: The Design and Analysis of Computer Algorithms, Pearson
Education, 2011.
Course Delivery:
The course will be delivered through lectures and presentations.
Course Assessment and Evaluation Scheme:
Direct &
Indirect
Assessment
Methods
What
CIE
SEE
Internal
Assessment
Tests
Assignment
Standard
Examination
To
Whom
Student
s
When/ Where
(Frequency in the
course)
Thrice(Average of the
best two will be
computed)
Once
End of Course
(Answering
5 of 10 questions)
68
Max
Marks
Evidence
Collected
Contribution to
Course
Outcomes
30
Blue Books
1,2,3,4,5,6 & 7
20
Solutions
1,2,3,4,5,6 & 7
100
Answer scripts
1,2,3,4,5,6 & 7
End of Course
Survey
End of the course
-
1,2 ,3,4,5 & 6
Effectiveness of
Delivery of
instructions &
Assessment
Methods
Questionnaire
Course Outcomes:
At the end of the course, a student should be able to
1 Devise recurrence relations and amortized cost of various operations.
2 Illustrate graph algorithms such as Bellman-Ford, Shortest path, and Bipartite matching.
3 Explain B-trees, Red-Black trees and hashing techniques.
4 Identify the methods for solving modular linear equations, Chinese remainder theorem and RSA
cryptosystem.
5 Describe types of heaps such as Binomial and Fibonacci heaps.
6 Assess the string matching algorithms such as Boyer-Moore and Knuth-Morris-Pratt algorithm.
7 Compose mathematical models, objective functions and constraints to solve algorithmic puzzles.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Devise recurrence relations
and
amortized cost of various
operations.
Illustrate graph algorithms
such
as
Bellman-Ford,
Shortest path, and Bipartite
matching.
Explain B-trees, Red-Black
trees and hashing techniques
Identify the methods for
solving
modular
linear
equations, Chinese remainder
theorem
and
RSA
cryptosystem.
Describe types of heaps such
as
Binomial and Fibonacci heaps.
Assess the string matching
algorithms
such as Boyer-Moore and
Knuth
Morris-Pratt algorithm.
Compose
mathematical
models, objective functions
and constraints to solve
algorithmic puzzles.
PO
1
PO
2
PO
3
x
x
x
x
x
x
x
x
x
x
x
x
PO
4
x
PO
10
PO
11
PO
12
x
x
x
Programme Outcomes
PO PO PO PO PO
5
6
7
8
9
x
69
x
x
x
x
x
x
x
x
x
Course Title: Artificial Intelligence
Course Code: CSPE16
Credits (L:T:P) : 4:0:0
Core/ Elective: Elective
Type of course: Lecture
Total Contact Hours: 56
Prerequisites:
Knowledge of any advance programming language
Course Content:
Unit 1
Introduction: What is AI? Intelligent Agents: Agents and environment, Rationality, the nature of environment, the
structure of agents. Problem-solving by search: Problem-solving agents, Example problems, searching for solution,
Uninformed search strategies.
Unit 2
Informed Search and Exploration: Informed search strategies, Heuristic functions, On-line search agents and
unknown environment. Logical Agents: Knowledge-based agents, The wumpus world, Logic, propositional logic,
Reasoning patterns in propositional logic, Effective propositional inference, Agents based on propositional logic
Unit 3
First-Order Logic: Representation revisited, Syntax and semantics of first-order logic, Using first-order logic,
Knowledge engineering in first-order logic. Interference in First-order Logic: Propositional versus first-order
inference, Unification and lifting, Forward chaining, Backward chaining, Resolution.
Unit 4
Planning: The Planning problem, planning with state-space approach, Planning graphs, Planning with propositional
logic. Uncertainty: Acting under uncertainty, Basic probability Notations, Inference using full joint distributions,
Independence, Bayes’ rule and its use. Learning from observations: Forms of Learning, Inductive learning,
learning decision trees, Ensemble learning, Computational learning theory
Unit 5
Natural Language Processing: Introduction, syntactic processing, semantic Analysis, discourse and pragmatic
processing, statistical natural language processing.
Genetic Algorithms: GA, Significance of genetic operators, Termination parameters, Niching and Speciation,
Evolving Neural Networks, Theoretical grounding, Ant Algorithms.
AI: Present and Future: Peer reviews in class room on Advance Topics in AI, AI Programming Languages,
Current state of art of AI and its future.
Text Book:
1. Stuart Russel, Peter Norvig: Artificial Intelligence - A Modern Approach, 2nd Edition, Pearson Education,
2012.
2. Elaine Rich, Kevin Knight, Shivashankar B Nair: Artificial Intelligence, 3rd Edition, Tata McGraw Hill, 2011.
Reference Books:
1. Nils J. Nilsson: Principles of Artificial Intelligence, First Edition, Elsevier, 2002.
2. Luger, G. F., & Stubblefield, W. A., Artificial Intelligence - Structures and Strategies for Complex Problem
Solving. New York, NY: Addison Wesley, 5th edition (2005).
Course Delivery:
The course will be delivered through lectures, presentations, classroom discussions, and practical implementations.
70
Course Assessment and Evaluation:
Direct & Indirect Assessment Methods
What
To
Whom
Internal
Assessment
Tests
CIE
Implementation
of AI
Techniques
SEE
When/
Where
(Frequency
in the
course)
Thrice
(Average of
the best two
will be
computed)
Max
Marks
Evidence
Collected
Contribution
to Course
Outcomes
30
Blue Books
1,2,3,4,5 & 6
Review 1
Review 2
20
Soft copies of
the mini
projects/ AI
techniques
implemented
1,2,3,4,5 & 6
End of
Course
(Answering
5 of 10
questions)
100
Answer scripts
1,2,3,4,5 & 6
End of the
course
-
Questionnaire
1,2,3,4,5 & 6,
Relevance of
the course
Students
Semester End
Examination
End of Course
Survey
Course Outcomes:
At the end of the course, a student should be able to
1. Identify the modern view of AI and its application based on agent philosophy.
2. Compare the various searching algorithms commonly used in AI by implementing them.
3. Summarize the various knowledge representation and inference techniques.
4. Examine the various learning and planning techniques available and its application.
5. Review the various methods of handling uncertainty.
6. Examine the role of Natural Language processing and Genetic Algorithms in building Intelligent Systems.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
Identify the modern view of AI and its application
based on agent philosophy
Compare the various searching algorithms commonly
used in AI by implementing them.
Summarize the various knowledge representation and
inference techniques
Examine the various learning and planning techniques
available and its application.
Review the various methods of handling uncertainty
Examine the role of Natural Language processing and
Genetic Algorithms in building Intelligent Systems.
71
2
3
4
5
6
7
8
9
10
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
11
12
Course Title: System Simulation
Course Code: CSPE17
Credits (L:T:P) 4:0:0
Core/ Elective: Elective
Type of course: Lecture
Total Contact Hours: 56
Prerequisites: NIL
Course Content:
Unit 1
Introduction: When simulation is the appropriate tool and when it is not appropriate, Advantages and
disadvantages of Simulation, Areas of application, Systems and system environment, Components of a system,
Discrete and continuous systems, Model of a system, Types of Models, Discrete-Event System Simulation, Steps in
a Simulation Study. Simulation examples: Simulation of queuing systems, Simulation of inventory systems, Other
examples of simulation.
Unit 2
General Principles, Simulation Software: Concepts in Discrete-Event Simulation: The Event-Scheduling / TimeAdvance Algorithm, World Views, Manual simulation Using Event Scheduling, List processing. Simulation in Java,
Simulation in GPSS. Queuing Models: Characteristics of Queuing Systems.
Unit 3
Random-Number Generation, Random-Variate Generation: Properties of random numbers, Generation of
pseudo-random numbers, Techniques for generating random numbers, Tests for Random Numbers. Random-Variate
Generation: Inverse transform technique, Acceptance-Rejection technique, Special properties.
Unit 4
Input Modeling: Data Collection, Identifying the distribution with data, Parameter estimation, Goodness of Fit
Tests, Fitting a non-stationary Poisson process, Selecting input models without data, Multivariate and Time-Series
input models.
Unit 5
Output Analysis for a Single Model: Types of simulations with respect to output analysis, Stochastic nature of
output data, Measures of performance and their estimation, Output analysis for terminating simulations, Output
analysis for steady-state simulations. Verification and Validation of Simulation Models: Model building, verification
and validation, Verification of simulation models, Calibration and validation of models. Optimization via
Simulation.
Text Book:
1. Jerry Banks, John S. Carson II, Barry L. Nelson, David M. Nicol: Discrete-Event System Simulation, 4th
Edition, Pearson Education, 2012.
Reference Books:
1. Lawrence M. Leemis, Stephen K. Park: Discrete – Event Simulation: A First Course, First edition, Pearson
/ Prentice-Hall, 2006.
2. Averill M. Law: Simulation Modeling and Analysis, 4th Edition, Tata McGraw-Hill, 2011.
Course Delivery:
The course will be delivered through lectures, presentations, classroom discussions, and practical implementations.
72
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
2
Identify modelling a system and types of simulation
tools.
x
x
Describe the concepts of scheduleing /Queueing
system using simulation software
x
x
Test random function generation through various
transform techniques
x
x
x
x
x
x
Figure out the data collection process
Interpret the stochastic nature of output data.
3
4
5
6
7
Course Outcomes:
At the end of the course, a student should be able to
1.
2.
3.
4.
5.
Identify modelling a system and types of simulation tools.
Describe the concepts of scheduleing /Queueing system using simulation software
Test random function generation through various transform techniques
Figure out the data collection process
Interpret the stochastic nature of output data.
73
8
9
10
11
12
Course Title: Pattern Recognition
Course Code: CSPE18
Credits (L:T:P) : 4:0:0
Core/ Elective: Elective
Type of course: Lecture
Total Contact Hours: 56 Hrs
Prerequisites: NIL
Course Contents:
Unit 1
Introduction: Machine perception, an example, Pattern Recognition System, The Design Cycle, Learning and
Adaptation. Bayesian Decision Theory: Introduction, Bayesian Decision Theory, Continuous Features, Minimum
error rate, classification, classifiers, discriminant functions, and decision surfaces, the normal density, Discriminant
functions for the normal density.
Unit 2
Maximum-likelihood and Bayesian Parameter Estimation: Introduction, Maximum-likelihood estimation,
Bayesian Estimation, Bayesian parameter estimation: Gaussian Case, general theory, Hidden Markov Models. Nonparametric Techniques: Introduction, Density Estimation, Parzen windows, KN – Nearest- Neighbor Estimation,
The Nearest- Neighbor Rule, Metrics and Nearest-Neighbor Classification.
Unit 3
Linear Discriminant Functions: Introduction, Linear Discriminant Functions and Decision Surfaces, Generalized
Linear Discriminant Functions, The Two-Category Linearly Separable case, Minimizing the Perception Criterion
Functions, Relaxation Procedures, Non-separable Behavior, Minimum Squared-Error procedures, The Ho-Kashyap
procedures. Stochastic Methods: Introduction, Stochastic Search, Boltzmann Learning, Boltzmann Networks and
Graphical Models, Evolutionary Methods.
Unit 4
Non-Metric Methods: Introduction, Decision Trees, CART, Other Tree Methods, Recognition with Strings,
Grammatical Methods.
Unit 5
Unsupervised Learning and Clustering: Introduction, Mixture Densities and Identifiability, Maximum-Likelihood
Estimates, Application to Normal Mixtures, Unsupervised Bayesian Learning, Data Description and Clustering,
Criterion Functions for Clustering.
Text Book:
1. Richard O. Duda, Peter E. Hart, and David G. Stork: Pattern Classification, 2nd Edition, WileyInterscience, 2012.
Reference Book:
1. Earl Gose, Richard Johnsonbaugh, Steve Jost: Pattern Recognition and Image Analysis, HAR/DSK Edition,
Pearson Education, 2007.
Course Delivery:
PPT presentations, Black Board approach
74
Course Outcomes:
At the end of the course the student should be able to
1.
2.
3.
4.
5.
6.
7.
Analyse using Top-down approach the pattern recognition System
Interpret Bayesian decision theorem
Analyse the bayesian estimation, Density estimation
Explain linear discriminant functions
Use different stochastic methods for linear discriminant functions.
Check different non-parametric methods.
Assess the criteria for unsupervised learning and clustering
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Analyse using Top-down approach the pattern
recognition System
Interpret Bayesian decision theorem
Check the bayesian estimation, Density estimation
Infer about linear discriminant functions
Use different stochastic methods for linear
discriminant functions.
Check different non-parametric methods.
Assess the criteria for unsupervised learning and
clustering
Programme Outcomes
1
2
x
x
x
x
x
x
x
x
x
x
x
x
x
x
75
3
4
5
6
7
8
9
10
11
12
Course Title: Advanced Computer Architecture
Course Code: CSPE19
Credits (L:T:P) : 4:0:0
Core/ Elective: Core
Type of course: Lecture
Total Contact Hours: 56
Prerequisites: Computer Organization, Introduction to Microprocessors
Course Contents:
Unit 1
Fundamentals of Quantitative Design and Analysis: Classes of Computers, Defining Computer Architecture,
Trends in Technology, Trends in Cost, Dependability, Measuring Reporting and Summarizing Performance,
Quantitative Principles of Computer Design, Introduction to Pipelining and Pipeline Hazards.
Unit 2
Instruction–Level Parallelism: Concepts and Challenges, Basic Compiler Techniques for Exposing ILP, Reducing
Branch cost with Advanced branch Prediction, Overcoming Data Hazards with Dynamic Scheduling examples and
the Algorithm, Exploiting ILP Using Multiple Issue and Static Scheduling and Dynamic Scheduling, Case studyThe Intel Core i7.
Unit 3
Thread–Level Parallelism: Introduction, Centralized Shared-Memory Architectures, Performance of symmetric
shared memory Multiprocessors, Distributed Shared Memory and Directory-Based Coherence, Synchronization:
The Basics, Models of Memory Consistency.
Unit 4
Memory Hierarchy Design: Introduction, Ten Advanced Optimizations of Cache Performance, Memory
Technology and Optimizations, Protection: Virtual Memory and Virtual Machines, Memory Hierarchies in the ARM
Cortex-A8.
Unit 5
Data Level Parallelism in Vector, SIMD Architectures and Warehouse-Scale Computers: Introduction, Vector
Architecture, SIMD Instruction set Extensions for Multimedia, Introduction to Warehouse-scale Computers,
Programming Models and Workloads for Warehouse-scale Computers, Computer Architecture for Warehouse-scale
Computers. Case Study: Google Warehouse Scale Computer.
Text Book:
1. John L. Hennessey and David A. Patterson: Computer Architecture, A Quantitative Approach, 5th Edition,
Elsevier, 2012.
Reference Books:
1. Kai Hwang, Naresh Jotwani: Advanced Computer Architecture - Parallelism, Scalability, Programmability,
2th Edition, Tata McGraw Hill, 2011.
2. David E. Culler, Jaswinder Pal Singh: Parallel Computer Architecture, A Hardware / Software Approach,
Morgan Kauffman, 1st edition, 2010.
Course Delivery: The course will be delivered through lectures, presentations, classroom discussions, and practical
implementations. Questions for CIE and SEE are designed in accordance with the Bloom’s taxonomy.
76
Course Assessment and Evaluation:
CIE
To Whom
Internal
Assessment
Tests
When/ Where
(Frequency in
the course)
Thrice(Average
of the best two
will be
computed)
Max
Marks
Evidence
Collected
Contribution to
Course Outcomes
30
Blue Books
1,2,3,4 & 5
Twice
20
Test Data
Sheets
1,2,3,4 & 5
End of Course
(Answering
5 of 10
questions)
100
Answer
scripts
1,2,3,4 & 5
Questionnaire
1, 2,3,4 & 5
Effectiveness of
Delivery of
instructions &
Assessment Methods
Quiz
SEE
Direct & Indirect Assessment Methods
What
Standard
Examination
Students
End of Course
Survey
End of the course
-
Course Outcomes:
At the end of the course students should be able to:
1. Interpret the growth in processor performance, development of IC for higher reliability and availability
2. Explain the concept of parallelism and challenges associated with instruction level parallelism.
3. Organize the complexity of different types of memory architectures.
4. Find the techniques to optimize the cache, and virtual machines.
5. Examine the different architectures under data level parallelism and warehouse scale computers.
Mapping Course Outcomes with program Outcomes:
Course Outcomes
1
Interpret
the growth in processor
performance, development of IC for higher
reliability and availability
Explain the concept of parallelism and
challenges associated with instruction level
parallelism.
Organize the complexity of different types of
memory architectures
Find the techniques to optimize the cache,
and virtual machines
Examinethe different architectures under
data level parallelism and warehouse scale
computers
2
3
Program Outcomes
5
6 7
8 9
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
77
x
4
10
x
x
11
12
x
x
x
x
x
Course Title: Computer Systems Performance Analysis
Course Code: CSPE20
Credits (L:T:P) :4:0:0
Core/ Elective: Elective
Type of course: Lecture
Total Contact Hours: 56
Prerequisites: Students should have undergone a course on probability theory, matrices, software engineering
aspects and queuing theory
Course Contents:
Unit 1
Introduction: The art of Performance Evaluation; Common Mistakes in Performance Evaluation, A Systematic
Approach to Performance Evaluation, Selecting an Evaluation Technique, Selecting Performance Metrics,
Commonly used Performance Metrics, Utility Classification of Performance Metrics, Setting Performance
Requirements.
Unit 2
Workloads, Workload Selection and Characterization: Types of Work loads, addition instructions, Instruction
mixes, Kernels; Synthetic programs, Application benchmarks, Popular benchmarks. Work load Selection: Services
exercised, level of detail; Representativeness; Timeliness, Other considerations in workload selection. Work load
characterization Techniques: Terminology; Averaging, Specifying dispersion, Single Parameter Histograms, Multi
Parameter Histograms, Principle Component Analysis, Markov Models, Clustering.
Unit 3
Monitors, Program Execution Monitors and Accounting Logs: Monitors: Terminology and classification;
Software and hardware monitors, Software versus hardware monitors, Firmware and hybrid monitors, Distributed
System Monitors, Program Execution Monitors and Accounting Logs, Program Execution Monitors, Techniques for
Improving Program Performance, Accounting Logs, Analysis and
Interpretation of Accounting log data, using accounting logs to answer commonly asked questions.
Unit 4
Capacity Planning and Benchmarking: Steps in capacity planning and management; Problems in Capacity
Planning; Common Mistakes in Benchmarking; Benchmarking Games; Load Drivers; Remote-Terminal Emulation;
Components of an RTE; Limitations of RTEs.Experimental Design and and Analysis: Introduction: Terminology,
Common mistakes in experiments, Types of experimental designs, 2k Factorial Designs, Concepts, Computation of
effects, Sign table method for computing effects; Allocation of variance; General 2k Factorial Designs, General full
factorial designs with k factors: Model, Analysis of a General Design, Informal Methods.
Unit 5
Queuing Models: Introduction: Queuing Notation; Rules for all Queues; Little’s Law, Types of Stochastic Process.
Analysis of Single Queue: Birth-Death Processes; M/M/1 Queue; M/M/m Queue; M/M/m/B Queue with finite
buffers; Results for other M/M/1 Queuing Systems. Queuing Networks: Open and Closed Queuing Networks;
Product form networks, queuing Network models of Computer Systems. Operational Laws: Utilization Law; Forced
Flow Law; Little’s Law; General Response Time Law; Interactive Response Time Law; Bottleneck Analysis; Mean
Value Analysis and Related Techniques; Analysis of Open Queuing Networks; Mean Value Analysis;
Text Book:
1. Raj Jain: The Art of Computer Systems Performance Analysis, 1st edition, John Wiley and Sons, 2012.
Reference Books:
1. Paul J Fortier, howard E Michel: computer Systems Performance Evaluation and prediction, 1st edition,
Elsevier, 2009.
2. Trivedi K S: Probability and Statistics with Reliability, Queuing and Computer Science Applications, 1st
edition, PHI, 2011.
Course Delivery: The course will be delivered through lectures, presentations, classroom discussions, and case
studies. Questions for CIE and SEE are designed in accordance with the Bloom’s taxonomy
78
Course Outcomes:
At the end of the course the students should be able to
1. Appreciate issues of Performance evaluation, selection of evaluation technique
2. Recognize the metrics for performance evaluation
3. Distinguish and differentiate the computational workloads, considerations for workload selection.
4. Discuss terminology to characterize the workload and analyses
5. Appreciate remote terminal emulation usage , capacity planning and management
6. Evaluate various Queuing models ,Queuing networks, Operational laws
79
Course Title: Software Testing
Course Code: CSPE21
Credits (L:T:P) : 3:0:1
Core/ Elective: Elective
Type of course: Lecture, Practicals
Total Contact Hours:56
Prerequisites:
NIL
Course Contents:
Unit 1
A Perspective on Testing, Examples: Basic definitions, Test cases, Insights from a Venn diagram, Identifying test
cases, Error and fault taxonomies, Levels of testing. Examples: Generalized pseudo code, the triangle problem, The
Next Date function, The commission problem, The SATM (Simple Automatic Teller Machine) problem, The
currency converter, Saturn windshield wiper.
Unit 2
Boundary Value Testing, Equivalence Class Testing, Decision Table-Based Testing: Boundary value analysis,
Robustness testing, Worst-case testing, Special value testing, Examples, Random testing, Equivalence classes,
Equivalence test cases for the triangle problem, Next Date function, and the commission problem, Guidelines and
observations. Decision tables, Test cases for the triangle problem, Next Date function, and the commission problem,
Guidelines and observations. Path Testing, Data Flow Testing:DD paths, Test coverage metrics, Basis path testing,
guidelines and observations, Definition-Use testing, Slice-based testing, Guidelines and observations.
Unit 3
Levels of Testing, Integration Testing: Traditional view of testing levels, Alternative life-cycle models, The SATM
system, Separating integration and system testing. A closer look at the SATM system, Decomposition-based, call
graph-based, Path-based integrations, System Testing, Interaction Testing:Threads, Basic concepts for requirements
specification, Finding threads, Structural strategies and functional strategies for thread testing, SATM test threads,
System testing guidelines, ASF (Atomic System Functions) testing example. Context of interaction, A taxonomy of
interactions, Interaction, composition, and determinism, Client/Server Testing.
Unit 4
Process Framework: Validation and verification, Degrees of freedom, Varieties of software. Basic
principles:Sensitivity, redundancy, restriction, partition, visibility, Feedback. The quality process, Planning and
monitoring, Quality goals,Dependability properties, Analysis, Testing, Improving the process, Organizational
factors, Fault-Based Testing,Test Execution:Overview, Assumptions in fault-based testing, Mutation analysis, Faultbased adequacy criteria,Variations on mutation analysis. Test Execution: Overview, from test case specifications to
test cases, Scaffolding, Generic versus specific scaffolding, Test oracles, Self-checks as oracles, Capture and replay.
Unit 5
Planning and Monitoring the Process, Documenting Analysis and Test: Quality and process, Test and analysis
strategies and plans, Risk planning, Monitoring the process, Improving the process, The quality team, Organizing
documents, Test strategy document, Analysis and test plan, Test design specifications documents, Test and analysis
reports.
Text Books:
1.
2.
Paul C. Jorgensen: Software Testing, A Craftsman’s Approach, 3rdEdition, Auerbach Publications, 2012.
Mauro Pezze, Michal Young: Software Testing and Analysis –Process, Principles and Techniques,
1stEdition, WileyIndia, 2011.
80
Reference Books:
1. Aditya P Mathur:Foundations of Software Testing, 1stEdition,Pearson Education, 2008.
2. Srinivasan Desikan, Gopalaswamy Ramesh: Software testing Principles and Practices, 2ndEdition, Pearson
Education, 2007
Course Delivery:
The course will be delivered through lectures, presentations, classroom discussions, and practical implementations.
Questions for CIE and SEE are designed in accordance with the Revised Bloom’s taxonomy.
Course Outcomes:
At the end of the course, a student should be able to
1. Identify Test cases, Error and fault taxonomies, Levels of testing.
2. Classify different types of testing (Boundary Value Testing, Equivalence Class Testing and Decision TableBased Testing).
3. Recognize Alternative life - cycle models, recognize Basic concepts for requirements specification, assess
context of interaction.
4. Recognize approaches for Test Execution: from test case specifications to test cases, Scaffolding, Generic
versus specific scaffolding.
5. Identify and plan strategies to test design specifications document.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
2
Identify Test cases, Error and fault taxonomies, Levels
of testing.
x
x
Classify Boundary Value Testing, Equivalence Class
Testing and Decision Table-Based Testing.
x
x
x
x
x
x
x
x
Recognize Alternative life - cycle models, recognize
Basic concepts for requirements specification, assess
context of interaction.
Recognize approaches for Test Execution: from test
case specifications to test cases, Scaffolding, Generic
versus specific scaffolding.
Identify analysis strategies and plans, to Test design
specifications documents, to Test and analysis reports.
81
3
4
5
6
7
8
9
10
11
12
x
x
x
x
x
x
x
x
x
x
x
Course Title: Software Architecture and Design Patterns
Course Code: CSPE22
Credits (L:T:P) : 4:0:0
Core/ Elective: Elective
Type of Course: Lecture
Total Contact Hours: 56
Prerequisites: NIL
Unit 1
Introduction: The Architecture Business Cycle: Where do architectures come from? Software processes and the
architecture business cycle, What makes a “good” architecture? What software architecture is and what it is not,
Other points of view, Architectural patterns, reference models and reference architectures, Importance of software
architecture, Architectural structures and views.
Unit 2
Architectural Styles and Case Studies: Architectural styles, Pipes and filters, Data abstraction and object-oriented
organization, Event-based, implicit invocation, Layered systems, Repositories, Interpreters, Process control, Other
familiar architectures, Heterogeneous architectures. Case Studies: Keyword in Context, Instrumentation software,
Mobile robotics, Cruise control, Three vignettes in mixed style.
Unit 3
Quality: Functionality and architecture, Architecture and quality attributes, System quality attributes, Quality
attribute scenarios in practice, Other system quality attributes, Business qualities, Architecture qualities. Achieving
Quality: Introducing tactics, Availability tactics, Modifiability tactics, Performance tactics, Security tactics,
Testability tactics, Usability tactics, Relationship of tactics to architectural patterns, Architectural patterns and
styles.
Unit 4
Architectural Patterns: Introduction, From mud to structure: Layers, Pipes and Filters, Blackboard. Distributed
Systems: Broker, Interactive Systems: MVC, Presentation-Abstraction- Control. Adaptable Systems: Microkernel,
Reflection.
Unit 5
Some Design Patterns: Structural decomposition: Whole – Part, Organization of work: Master – Slave, Access
Control: Proxy. Designing and Documenting Software Architecture: Architecture in the life cycle, Designing the
architecture, Forming the team structure, Creating a skeletal system, Uses of architectural documentation, Views,
Choosing the relevant views, Documenting a view, Documentation across views.
Text Books:
1. Len Bass, Paul Clements, Rick Kazman: Software Architecture in Practice, 2nd Edition, Pearson
Education, 2011.
2. Frank Buschmann, Regine Meunier, Hans Rohnert, Peter Sommerlad, Michael Stal: Pattern-Oriented
Software Architecture, A System of Patterns, Volume 1, John Wiley and Sons, 2011.
3. Mary Shaw and David Garlan: Software Architecture- Perspectives on an Emerging Discipline, PrenticeHall of India, 2007.
Reference Books:
1. E. Gamma, R. Helm, R. Johnson, J. Vlissides: Design Patterns- Elements of Reusable Object-Oriented
Software, 1st Edition, Pearson Education, 2012.
2. Web site for Patterns: http://www.hillside.net/patterns/
Course Delivery
The course will be delivered through lectures in the classroom.
82
Course Assessment and Evaluation:
To
Whom
Direct & Indirect Assessment Methods
What
CIE
Internal
Assessment
Test
Quiz
SEE
Standard
Examination
Students
End of Course
Survey
When/ Where
(Frequency in
the course)
Thrice
(Average of the
best two will be
computed)
Max
Marks
Evidence
Collected
Contribution
to
Course Outcomes
30
Blue Books
1, 2, 3, 4 & 5
Once
20
Data sheets
1, 2, 3, 4 & 5
End of Course
(Answering
5
of
10
questions)
100
Answer scripts
1,2,3,4 & 5
Questionnaire
1, 2, 3, 4 & 5
Effectiveness
of
Delivery
of
instructions
&
Assessment
Methods
End of
course
the
-
Course Outcomes:
At the end of the course, a student should be able to:
1. Describe the foundational concepts of software architecture and the important principles and techniques of
software architecture.
2. Identify the structure, advantages and disadvantages of various architectural choices using case studies.
3. Recognize the need of Software architecture and quality requirements for a software system.
4. Assess different architecture styles and solutions.
5. Identify different architectural views and various design patterns for software systems.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
1
Describe the foundational concepts of software architecture
and the important principles and techniques of software
architecture.
Identify the structure, advantages and disadvantages of
various architectural choices using case studies.
Recognize the need of Software architecture and quality
requirements for a software system.
Assess different architecture styles and solutions.
Identify different architectural views and various design
patterns for software systems.
83
Programme Outcomes
4 5 6 7 8 9 10
2
3
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
11
12
Course Title: Service Oriented Architecture and Web Services
Course Code: CSPE23
Credits (L:T:P) : 4:0:0
Core/ Elective: Elective
Type of course: Lecture
Total Contact Hours: 56
Prerequisites: Internet Technology
Course Contents:
Unit 1
Introduction to SOA, Evolution of SOA: Fundamental SOA; Common Characteristics of contemporary SOA;
Common tangible benefits of SOA; An SOA timeline (from XML to Web services to SOA); The continuing
evolution of SOA (Standards organizations and Contributing vendors); The roots of SOA (comparing SOA to Past
architectures). Web Services and Primitive SOA: The Web services framework; services (as Web services); Service
descriptions (with WSDL); Messaging (with SOAP).
Unit 2
Web Services and Contemporary SOA: Message exchange patterns; Service activity; Coordination; Atomic
Transactions; Business activities; Orchestration; Choreography. Addressing; Reliable messaging; Correlation;
Polices; Metadata exchange; Security; Notification and eventing
Web Services and Contemporary SOA: Message exchange patterns; Service activity; Coordination; Atomic
Transactions; Business activities; Orchestration; Choreography. Addressing; Reliable messaging; Correlation;
Polices; Metadata exchange; Security; Notification and eventing
Unit 3
Principles of Service – Orientation: Services-orientation and the enterprise; Anatomy of a service-oriented
architecture; Common Principles of Service-orientation; How service orientation principles inter relate; Serviceorientation and object-orientation; Native Web service support for service- orientation principles
Unit 4
Service Layers: Service-orientation and contemporary SOA; Service layer abstraction; Application service layer,
Business service layer, Orchestration service layer; Agnostic services; Service layer configuration scenarios.
Business Process Design: WS-BPEL language basics; WS-Coordination overview; Service-oriented business
process design; WS-addressing language basics; WS-Reliable Messaging language basics
Unit 5
SOA Platforms: SOA platform basics; SOA support in J2EE; SOA support in .NET; Integration considerations
Text Book
1. Thomas Erl: Service-Oriented Architecture – Concepts, Technology, and Design, Pearson Education, 2005
Reference Book
2. Eric Newcomer, Greg Lomow: Understanding SOA with Web Services, Pearson education, 2005
Course Delivery: The course will be delivered through lectures, presentations and classroom discussions.
84
Course Assessment and Evaluation:
Direct & Indirect Assessment Methods
What
CIE
SEE
To
Whom
Internal
Assessment
Tests
Announced
quiz
Surprise
Quiz
Standard
Examination
End of Course
Survey
Students
When/ Where
(Frequency in the
course)
Thrice(Average of
the best two will be
computed)
Max
Marks
Evidence
Collected
Contribution to
Course Outcomes
30
Blue Books
1,2,3 & 4
Once
10
Once
10
End of Course
(Answering
5 of 10 questions)
100
End of the course
Quiz
Answers
Quiz
Answers
-
1, 2 ,3 & 4
Recollection
Skills
Answer
scripts
1,2,3 & 4
Questionnaire
1, 2 ,3, 4 & 5
Effectiveness of
Delivery of instructions
& Assessment Methods
Course Outcomes:
At the end of the course students should be able to:
1. Summarize Web Service and Service oriented Architecture.
2. Illustrate the principles of contemporary SOA and web service.
3. Appraise the principles the layers of Service Oriented Architecture.
4. Estimate the service oriented principles
5. Categorize SOA support in J2EE and SOA support in .NET focusing on platform overview.
Mapping Course Outcomes with Programme Outcomes:
Course Outcomes
Programme Outcomes
1
2
Summarize Web Service and Service oriented
Architecture
Illustrate the principles of contemporary SOA and
web service
Appraise the principles the layers of Service
Oriented Architecture
Estimate the service oriented principles
Categorize SOA support in J2EE and SOA
support in .NET focusing on platform overview
3
4
x
x
x
85
x
5
6
7
8
9
x
x
x
x
x
10
11
12
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Course Title: Object Oriented Modeling and Design
Course Code: CSPE24
Credits (L:T:P) : 4:0:0
Core/ Elective: core
Type of course: Lecture
Total Contact Hours: 56
Prerequisites: Knowledge of Software Engineering. OO Fundamentals
Course Contents
Unit 1
Introduction, Modeling Concepts, class Modeling: What is Object Orientation? What is OO development? OO
themes; Evidence for usefulness of OO development; OO modeling history. Modeling as Design Technique:
Modeling; abstraction; The three models. Class Modeling: Object and class concepts; Link and associations
concepts; Generalization and inheritance; A sample class model; Navigation of class models; Practical tips.
Advanced Class Modeling, State Modeling: Advanced object and class concepts; Association ends; N-ary
associations; Aggregation; Abstract classes; Multiple inheritance; Metadata; Reification; Constraints; Derived data;
Packages; Practical tips. State Modeling: Events, States, Transitions and Conditions; State diagrams; State diagram
behavior; Practical tips.
Unit 2
Advanced State Modeling, Interaction Modeling: Advanced State Modeling: Nested state diagrams; Nested
states; Signal generalization; Concurrency; A sample state model; Relation of class and state models; Practical tips.
Interaction Modeling: Use case models; Sequence models; Activity models. Use case relationships; Procedural
sequence models; Special constructs for activity models. Process Overview, System Conception, Domain
Analysis: Process Overview: Development stages; Development life cycle. System Conception: Devising a system
concept; Elaborating a concept; Preparing a problem statement. Domain Analysis: Overview of analysis; Domain
class model; Domain state model; Domain interaction model; Iterating the analysis.
Unit 3
Application Analysis, System Design: Application Analysis: Application interaction model; Application class
model; Application state model; Adding operations. Overview of system design; Estimating performance; Making a
reuse plan; Breaking a system in to sub-systems; Identifying concurrency; Allocation of sub-systems; Management
of data storage; Handling global resources; Choosing a software control strategy; Handling boundary conditions;
Setting the trade-off priorities; Common architectural styles; Architecture of the ATM system as the example.
Unit 4
Class Design, Implementation Modeling, Legacy Systems: Class Design: Overview of class design; Bridging the
gap; Realizing use cases; Designing algorithms; Recursing downwards, Refactoring; Design optimization;
Reification of behavior; Adjustment of inheritance; Organizing a class design; ATM example. Implementation
Modeling: Overview of implementation; Fine-tuning classes; Fine-tuning generalizations; Realizing associations;
Testing. Legacy Systems: Reverse engineering; Building the class models; Building the interaction model; Building
the state model; Reverse engineering tips; Wrapping; Maintenance.
Unit 5
Design Patterns: What is a pattern and what makes a pattern? Pattern categories; Relationships between patterns;
Pattern description. Communication Patterns: Forwarder-Receiver; Client-Dispatcher-Server; Publisher-Subscriber.
Idioms: Management Patterns: Command processor; View handler. Idioms: Introduction; what can idioms provide?
Idioms and style; Where to find idioms; Counted Pointer example.
86
Text Books:
1. Michael Blaha, James Rumbaugh: Object-Oriented Modeling and Design with UML, 2nd Edition, Pearson
Education, 2005.
2. Frank Buschmann, Regine Meunier, Hans Rohnert, Peter Sommerlad, Michael Stal: Pattern-Oriented Software
Architecture, A System of Patterns, Volume 1, John Wiley and Sons, 2007.
Reference Books:
1. Grady Booch et al: Object-Oriented Analysis and Design with Applications, 3rd Edition, Pearson Education,
2007.
2. Brahma Dathan, Sarnath Ramnath: Object-Oriented Analysis, Design, and Implementation, Universities Press,
2009.
Course Delivery: The course will be delivered through lectures, presentations, classroom discussions, and practical
implementations. Questions for CIE and SEE are designed in accordance with the Bloom’s taxonomy.
Course Outcomes:
At the end of the course the student will be able to:
1. Demonstrate an understanding of modeling as a design technique, identify and create class and state models
for a given case study.
2. Create advanced state and interaction models and apply the process of system conception and domain
analysis for any given problem.
3. Understand the process of application analysis and be able to develop a system design to a given case study
using Rational Suite.
4. Create a class design and implementation model and understand the reverse engineering process and its
importance.
5. Demonstrate an understanding of design patters and its implementation to provide solutions to some design
problems.
Mapping Course Outcomes with Programme Outcomes:
Programme Outcomes
Course Outcomes
Demonstrate an understanding of Modeling as a design
technique, identify and create class and state models for a
given case study
Create advanced state and Interaction Models and apply the
process of System Conception and Domain Analysis for any
given problem
Understand the process of application Analysis and be able to
develop a System Design to a given case study using
Rational Suite
Create a Class Design and Implementation Model and
understand the reverse engineering process and its
importance.
Demonstrate an understanding of design patterns and its
implementation to provide solutions to some design
problems.
87
1
2
x
3
4
5
x
x
x
x
x
x
x
x
x
x
x
x
x
6
7
8
9
10
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
11
12
Course Exit Survey Form
Dept of CSE, MSRIT, Bangalore
Name & USN of the student:
Contact details:
Sl
No.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Question
Quality of the course content
For the number of credits, the course workload
was
Relevance of the textbook to this course
Ideas/Concepts that you have found difficult to
grasp
Concepts/topics that should be removed from the
syllabus
New inclusions in the syllabus
Were the lectures clear/well organized and
presented at a reasonable pace?
Did the lectures stimulate you intellectually?
What approaches/aids would facilitate your
learning? You can check multiple options.
Did the problems worked out in the classroom
help you to understand how to solve questions on
your own?
Is the grading scheme clearly outlined and
reasonable/fair?
Are the assignment/lab experiment procedures
clearly explained?
Attainment level of CO1
Attainment level of CO2
Attainment level of CO3
Attainment level of CO4
Attainment level of CO5...COn
Excellent
Very Good
Course code:
Course name:
Responses
Good
Satisfactory
Poor
List
List
List
Yes/No
Yes/No
Lectures/ Programming Assignments/ Presentations/ Tutorials/ Demonstrations/ Practical Exercises/
Mini projects/ Group discussions/ Student seminars/ Expert guest lectures
Yes/No
Yes/No
Yes/No
Signature of the student with date
88
Download