188
188
UNIVERSITY DEPARTMENTS
M.E. COMPUTER SCIENCE AND ENGINEERING
(SPECIALIZATION IN BIG DATA ANALYTICS)
REGULATIONS – 2023
VISION AND MISSION
1
PROGRAM OUTCOMES (POs):
Engineering Graduates will be able to:
PO Graduate Attribute Programme Outcomes
#
1 Research Aptitude An ability to independently carry out research /
Investigations, identify problems and develop solutions to
solve practical problems.
2 Technical documentation An ability to write and present a substantial technical
report/ document.
3 Technical competence Students should be able to demonstrate a degree of
mastery over the area as per the specialization of the
program. The mastery should be at a level higher than
the requirements in the appropriate bachelor program
4 Handle complex problems Use research based knowledge, methods, appropriate
techniques, resources and tools to solve complex
engineering issues with an understanding of the
limitations.
5 Environmental Ensure development of socially relevant and ecofriendly
Sustainability and societal indigenous products by applying technical knowledge,
Ethics ethical principles and, sound engineering practices
6 Life-long learning Recognize the need for independent, life-long learning
and engage in the broadest context of technological
change.
2
Mapping of Course Outcome and Programme Outcome
Year Semester Course Name PO1 PO2 PO3 PO4 PO5 PO6
Advanced Mathematics for
3 3 3 3 2 2
Scientific Computing
Research Methodology and IPR
Data Structures and Algorithms 2.5 - 3 2.2 - -
Multicore Architectures 3 3 3 2 1 2
Sem 1
Professional Elective IV
Professional Elective V
Year 2
Project Work I
Sem 4
Project Work II
3
ANNA UNIVERSITY, CHENNAI
UNIVERSITY DEPARTMENTS
M.E. COMPUTER SCIENCE AND ENGINEERING
(SPECIALIZATION IN BIG DATA ANALYTICS)
REGULATIONS – 2023
CHOICE BASED CREDIT SYSTEM
CURRICULA AND SYLLABI
SEMESTER I
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. Advanced Mathematics for Scientific
MA3154 FC 4 0 0 4 4
Computing
2. RM3151 Research Methodology and IPR RMC 2 1 0 3 3
3. CP3151 Data Structures and Algorithms PCC 3 0 0 3 3
4. CP3153 Multicore Architectures PCC 3 0 0 3 3
5. BD3151 Big Data Mining and Analytics PCC 3 0 0 3 3
6. CP3152 Database Technologies PCC 3 0 0 3 3
PRACTICALS
7. Data Structures and Algorithms
CP3161 EEC 0 0 4 4 2
Laboratory
8. BD3111 Big Data Computing Laboratory EEC 0 0 3 3 1.5
TOTAL 18 1 7 26 22.5
SEMESTER II
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. CP3251 Advanced Operating Systems PCC 3 0 0 3 3
2. BD3201 Big Data Query Languages PCC 3 0 2 5 4
3. CP3252 Machine Learning PCC 3 0 3 6 4.5
4. Professional Elective I PEC 3 0 0 3 3
5. Professional Elective II PEC 3 0 0 3 3
PRACTICALS
6. CP3261 Professional Practices EEC 0 0 4 4 2
TOTAL 15 0 9 24 19.5
4
SEMESTER III
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
THEORY
1. CP3351 Cyber Security PCC 3 0 0 3 3
2. Professional Elective III PEC 3 0 2 5 4
3. Professional Elective IV PEC 3 0 0 3 3
4. Professional Elective V PEC 3 0 0 3 3
PRACTICALS
5. BD3311 Project Work I EEC 0 0 12 12 6
TOTAL 12 0 14 26 19
SEMESTER IV
PERIODS TOTAL
S. COURSE CATE
COURSE TITLE PER WEEK CONTACT CREDITS
NO. CODE GORY
L T P PERIODS
PRACTICALS
1. BD3411 Project Work II EEC 0 0 24 24 12
TOTAL 0 0 24 24 12
5
8. BD3201 Big Data Query Languages PCC 3 0 2 5 4
9. CP3252 Machine Learning PCC 3 0 3 6 4.5
10. CP3351 Cyber Security PCC 3 0 0 3 3
6
Adhoc and Wireless Sensor
22. CP3051 PEC 3 0 0 3 3
Networks
23. SE3053 Software Security PEC 3 0 0 3 3
24. CP3080 Virtualization Techniques PEC 3 0 0 3 3
Database Administration
25. CP3059 PEC 3 0 0 3 3
and Tuning
Data Warehousing and
26. CP3058 PEC 3 0 0 3 3
Data Mining Techniques
27. CP3076 Social Network Analysis PEC 3 0 0 3 3
Software Testing and
28. SE3054 PEC 3 0 0 3 3
Quality Assurance
29. CP3079 User Interface Design PEC 3 0 0 3 3
Software Reliability Metrics
30. SE3052 PEC 3 0 0 3 3
and Models
31. CP3081 Visualization Techniques PEC 3 0 0 3 3
32. BD3051 Foundations of Data Science PEC 3 0 0 3 3
33. CP3071 Wireless Communications PEC 3 0 0 3 3
34. CP3053 Agile Methodologies PEC 3 0 0 3 3
Statistical Natural
35. CP3078 PEC 3 0 0 3 3
Language Processing
36. CP3074 Quantum Computing PEC 3 0 0 3 3
Formal Methods in Software
37. SE3051 PEC 3 0 0 3 3
Systems
38. CP3066 GPU Computing PEC 3 0 0 3 3
39. CP3061 Devops and Microservices PEC 3 0 0 3 3
Full Stack Web Application
40. CP3064 PEC 3 0 2 5 4
Development
41. CP3054 Bioinformatics PEC 3 0 0 3 3
42. CP3069 Mixed Reality PEC 3 0 0 3 3
43. CP3057 Cyber Physical Systems PEC 3 0 0 3 3
7
SUMMARY
8
MA3154 ADVANCED MATHEMATICS FOR SCIENTIFIC COMPUTING LTPC
4 004
UNIT II SIMULATION 12
Discrete Event Simulation – Monte – Carlo Simulation – Stochastic Simulation – Applications to
real time problems.
REFERENCES:
1. Jay L. Devore, “Probability and Statistics for Engineering and the Sciences”, Cengage
Learning, 9th Edition, Boston, 2016.
2. Johnson, R.A, Irwin Miller and John Freund., “Miller and Freund’s Probability and Statistics
for Engineers”, Pearson Education, 9th Edition, New York, 2016.
3. Johnson, R.A., and Wichern, D.W., “Applied Multivariate Statistical Analysis”, Pearson
Education, Sixth Edition, New Delhi, 2013.
4. Ross. S.M., “Probability Models for Computer Science”, Academic Press, SanDiego, 2002.
5. Taha H.A.,, “Operations Research: An Introduction”, Prentice Hall of India Pvt. Ltd. 10th
Edition, New Delhi, 2017.
6. Winston, W.L., “Operations Research”, Thomson – Brooks/Cole, Fourth Edition, Belmont,
2003.
9
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 3 3 3 2 2
CO2 3 3 3 3 2 2
CO3 3 3 3 3 2 2
CO4 3 3 3 3 2 2
CO5 3 3 3 3 2 2
UNIT V PATENTS 9
Patents – objectives and benefits of patent, concept, features of patent, inventive steps,
specifications, types of patent application; patenting process - patent filling, examination of patent,
grant of patent, revocation; equitable assignments; Licenses, licensing of patents; patent agents,
registration of patent agents.
TOTAL: 45 PERIODS
COURSE OUTCOMES
Upon completion of the course, the student can
CO1: Describe different types of research; identify, review and define the research problem
CO2: Select suitable design of experiment s; describe types of data and the tools for collection of
data
CO3: Explain the process of data analysis; interpret and present the result in suitable form
CO4: Explain about Intellectual property rights, types and procedures
CO5: Execute patent filing and licensing
10
REFERENCES:
1. Cooper Donald R, Schindler Pamela S and Sharma JK, “Business Research Methods”, Tata
McGraw Hill Education, 11e (2012).
2. Soumitro Banerjee, “Research methodology for natural sciences”, IISc Press, Kolkata, 2022,
3. Catherine J. Holland, “Intellectual property: Patents, Trademarks, Copyrights, Trade Secrets”,
Entrepreneur Press, 2007.
4. David Hunt, Long Nguyen, Matthew Rodgers, “Patent searching: tools & techniques”, Wiley,
2007.
5. The Institute of Company Secretaries of India, Statutory body under an Act of parliament,
“Professional Programme Intellectual Property Rights, Law and practice”, September 2013.
UNIT IV NP COMPLETENESS 9
NP Classes- Polynomial Time Verification – Theory of Reducibility - NP Completeness Proof for
Vertex Cover & Hamiltonian Cycle
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand, design and implement balanced search structures
CO2:Analyse algorithms for time complexity
11
CO3:Understand and implement different meldable priority queues
CO4:Appreciate Approximation and randomized algorithm design
CO5:Apply various data structures for solving problems
CO-PO Mapping
12
3. Yan Solihin, “Fundamentals of Parallel Multicore Architecture”, Chapman & Hall/CRC
Press, 2016.
4. David B. Kirk, Wen-mei W. Hwu, “Programming Massively Parallel Processors”, Morgan
Kauffman, 2010.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Discuss and evaluate the performance of computer systems
CO2:Discuss and point out the various ways of exploiting ILP
CO3:Point out the various optimizations that can be performed to improve the memory hierarchy
design
CO4:Discuss the issues related to multiprocessing and suggest solutions
CO5:Point out the salient features of different multicore architectures and how they exploit different
types of parallelism
CO6:Point out the salient features of different example domain specific architectures
CO-PO Mapping
13
UNIT IV LINK ANALYSIS AND FREQUENT ITEMSETS 9
Page Rank –Efficient Computation – Topic Sensitive Page Rank – Link Spam – Hubs and
Authorities - Market Basket Model – Apriori algorithm – Handling Larger Datasets in Main Memory
– Limited Pass Algorithm – Counting Frequent Items.
UNIT V CLUSTERING 9
Introduction to Clustering Techniques – Hierarchical Clustering –Algorithms – K-Means – CURE –
Clustering in Non–Euclidean Spaces – Streams and Parallelism – Case Study: Advertising on the
Web – Recommendation Systems
TOTAL: 45 PERIODS
REFERENCES
1. Jure Leskovec, AnandRajaraman, Jeffrey David Ullman, “Mining of Massive Datasets”,
Cambridge University Press, Second Edition, 2014.
2. Jiawei Han, MichelineKamber, Jian Pei, “Data Mining Concepts and Techniques”, Morgan
Kaufman Publications, Third Edition, 2011.
3. Ian H.Witten, Eibe Frank “Data Mining – Practical Machine Learning Tools and
Techniques”, Morgan Kaufman Publications, Third Edition, 2011.
4. David Hand, HeikkiMannila and Padhraic Smyth, “Principles of Data Mining”, MIT
Press,2001.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Design algorithms by employing Map Reduce technique for solving Big Data problems.
CO2:Identify similarities using appropriate measures.
CO3:Point out problems associated with streaming data and handle them.
CO4:Discuss algorithms for link analysis and frequent itemset mining.
CO5:Design solutions for problems in Big Data by suggesting appropriate clustering techniques.
CO-PO Mapping
14
UNIT II PARALLEL AND DISTRIBUTED DATABASES 9
Parallel Databases – I/O Parallelism - Inter-Query and Intra-Query Parallelism– Inter-Operation
and Intra-operation Parallelism – Performance evaluation for Parallel DB Systems –Distributed
Database Architecture – Distributed Data Storage – Distributed Transactions – Distributed Query
Processing – Distributed Transaction Management – Load balancing tools for DDB – DDB
Security.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Design a Relational Database for an Enterprise.
CO2:Design a Distributed Database, Active Database and Temporal Database for an Enterprise.
CO3:Gain the knowledge in advanced databases.
CO4:Comprehend the use of XML Database, Web Database, Spatial Database, Multimedia
Database and Deductive Database.
CO5:Use MongoDB NoSQL Database to Maintain Data of an Enterprise.
15
CO-PO Mapping
LIST OF EXPERIMENTS:
1. Linked list implementation of Stack and Queue ADTs
2. Binary Search tree
3. Min/Max Heap
4. AVL tree
5. Red- Black tree
6. Splay Tree
7. Leftist Heap
8. Binomial Heap
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Apply suitable data structures in problem solving.
CO2:Select suitable search structures for an application
CO3:Understand priority queue implementations
CO4:Differentiate between approximation and Randomized algorithms
CO5:Understand NP complete problem solutions
TOTAL: 60 PERIODS
CO-PO Mapping
CO-PO Mapping
UNIT I INTRODUCTION 9
Distributed Operating Systems – Issues – Communication Primitives – Limitations of a
Distributed System – Lamport’s Logical Clocks – Vector Clocks – Causal Ordering of
Messages
17
UNIT V MOBILE AND CLOUD OPERATING SYSTEMS 9
Android – Overall Architecture – Linux Kernel – Hardware Support – Native User-Space –
Dalvik and Android’s Java – System Services – Introduction to Cloud Operating Systems
TOTAL: 45 PERIODS
REFERENCES
1. Mukesh Singhal and Niranjan G. Shivaratri, “Advanced Concepts in Operating
Systems – Distributed, Database and Multiprocessor Operating Systems”, Tata MC
Graw-Hill, 2001.
2. Rajib Mall, “Real-Time Systems: Theory and Practice”, Pearson Education India, 2006.
3. Karim Yaghmour, “Embedded Android”, O’Reilly, First Edition, 2013.
4. Nikolay Elenkov, “Android Security Internals: An In-Depth Guide to Android’s Security
Architecture”, No Starch Press, 2014.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify the features of distributed operating systems.
CO2:Demonstrate the various protocols of distributed operating systems.
CO3:Identify the different features of real time operating systems.
CO4:Discuss the features of mobile operating systems.
CO5:Discuss the features of cloud operating systems.
CO-PO Mapping
18
UNIT III DATA ANALYSIS USING R AND HADOOP 9
Features of R Language - HADOOP Features – HDFS and Map Reduce architecture – R and
Hadoop Integrated Programming Environment- RHIPE Introduction – Architecture of RHIPE –
RHIPE function reference. RHADOOP Introduction – Architecture of RHADOOP – RHADOOP
function reference, SQL on HADOOP.
PRACTICAL EXERCISES 30
1. Perform descriptive and predictive analytics using “R programming”
2. Loading data into HDFS using R & Perform various HDFS commands
3. MapReduce application for word counting on R HADOOP after successful installation of three R
packages (rhdfs, rmr, and rhbase)
4. “Pig” installation & Develop Pig Scripts and call UDF’s to accomplish functionalities to meet
the problem objectives & Embedding PIG Latin in Python
TOTAL: 75 PERIODS
REFERENCES
1. Data Science and Big Data Analytics – Discovering, Analysing, Visualizing and presenting
data – EMC Education Services, EMC2, Wiley Publications, 2015.
2. Jared P. Lander, “R for Everyone: Advanced Analytics and Graphics”, Addison-Wesley
Data & Analytics Series, 2013.
3. Prajapati, V, “Big Data Analytics with R and Hadoop”, Packt Publishing Ltd, 2013.
4. Gates, A. Programming Pig.” O’Reilly Media, Inc.”, 2011.
5. Capriolo, E., Wampler, D., &Rutherglen, J., “Programming Hive”, O’Reilly Media, Inc.”,2012
6. Tom White “ Hadoop: The Definitive Guide” Third Edition, O‟reilly Media, 2011.
7. Michael Berthold, David J. Hand, “Intelligent Data Analysis”, Springer, 2007.
8. Norman Matloff , “The Art of R Programming: A Tour of Statistical Software Design”,
NoStarch Press, 2011.
9. Zikopoulos, P., Parasuraman, K., Deutsch, T., Giles, J., & Corrigan, D.V Harness the
Power of Big Data The IBM Big Data Platform. McGraw Hill Professional, 2012.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Design the Big data using tools.
CO2:Design applications using R & HADOOP.
CO3:Design applications using RHADOOP& RHIPE.
CO4:Develop Pig scripts for Big data applications.
CO5:Design Big data applications schema and use HIVEQL.
19
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 2 3 3 - -
CO2 3 2 3 3 - -
CO3 3 2 3 3 2 -
CO4 3 1 3 3 - -
CO5 3 1 3 3 - -
20
SUGGESTED LIST OF EXPERIMENTS 45
1. Problem solving using Regression models: Linear regression, Logistic regression and
to evaluate the performance.
2. Problem solving using Classification: SVM, K-nearest Neighbour, and Decision Trees
and evaluate the performance.
3. Solving problems based on Decision by committee approach: Bagging and Boosting
application
4. Problem solving using unsupervised learning models: Clustering algorithms and to
evaluate the performance.
5. Application of dimensionality reduction techniques for numeric and text and image data.
6. Game development and robotic application development using reinforcement learning
model.
7. Implement Bayesian Inference in Gene Expression Analysis
8. Implement Sequential Learning using Hidden Markov Model
9. Application of CRFs in Natural Language Processing
10. Building and training Nueral networks using back propagation algorithm with gradient
descent.
11. Image Classification using Convolutional Neural Networks with cross validation.
TOTAL: 90 PERIODS
REFERENCES
1. Stephen Marsland, “Machine Learning – An Algorithmic Perspective”, Chapman and Hall,
CRC Press, Second Edition, 2014.
2. Christopher Bishop, “Pattern Recognition and Machine Learning” Springer, 2007.
3. Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012.
4. EthemAlpaydin, “Introduction to Machine Learning”, MIT Press, Third Edition, 2014.
5. Tom Mitchell, “Machine Learning”, McGraw-Hill, 1997.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain the basic concepts of machine learning
CO2:Analyze linear and non-linear techniques for classification problems
CO3:Apply unsupervised and reinforcement algorithms, probabilistic and evolutionary approaches
for the given problems
CO4:Analyze importance of neural networks in machine learning and deep learning.
CO5:Identify applications suitable for different types of Machine Learning and to Implement
appropriate learning algorithm for an application and to analyze the results.
CO-PO Mapping
21
CP3261 PROFESSIONAL PRACTICES LTPC
0 042
22
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 2 2 2 3 3 2
CO2 3 2 2 3 2 3
CO3 3 3 3 3 2 2
CO4 3 2 3 3 3 3
CO5 3 2 3 3 2 2
UNIT I INTRODUCTION 9
Need for Cyber security - History of Cyber security - Defining Cyberspace and Cyber security-
Standards - CIA Triad – Cyber security Framework
UNIT V TOOLS 9
Zenmap – Hydra –Kismet – John the Ripper – Airgeddon – Deauther Board – Aircrack-ng –
EvilOSX
TOTAL: 45 PERIODS
REFERENCES
1. William Stallings, Effective Cybersecurity: A Guide to Using Best Practices and Standards,
1st edition, 2019.
2. Charles J. Brooks, Christopher Grow, Philip A. Craig, Donald Short, Cybersecurity
Essentials, Wiley Publisher, 2018.
3. Yuri Diogenes, ErdalOzkaya, Cyber security - Attack and Defense Strategies, Packt
Publishers, 2018.
23
4. Carol C. Woody, Nancy R. Mead, Cyber Security Engineering: A Practical Approach
forSystems and Software Assurance, Addison-Wesley, 2016.
5. Thomas A. Johnson Cyber Security- Protecting Critical Infrastructures from Cyber Attack
andCyber Warfare, CRC Press, 2015.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Analyze and evaluate the cyber security needs of an organization.
CO2:Analyze the security issues in networks and computer systems to secure an infrastructure.
CO3:Design operational cyber security strategies and policies.
CO4:Apply critical thinking and problem-solving skills to detect current and future attacks on an
organization’s computer systems and networks.
CO5:Understand the functionality of cyber security tools.
CO-PO Mapping
UNIT I INTRODUCTION 9
Introduction–Principles of Linked Data– URIs, RDF data model, RDF Serialisation, Relationship
links, Identity links, Vocabulary Links– Linked Data Design Considerations–Web of Data–
Bootstrapping – Topology
24
Triangles, Large scale machine learning– Machine-Learning Model, Perceptrons, SVM, Learning
from Nearest Neighbours
TOTAL: 45 PERIODS
REFERENCES
1. Tom Heath, Christian Bizer: Linked Data: Evolving the Web into a Global Data Space, Morgan
& Claypool Publishers, 2011.
2. David Wood: Linking Government Data”, Springer Science & Business Media, 2011.
3. Jure Leskovec, AnandRajaraman, Jeffrey David Ullman: Mining of Massive Datasets,
Cambridge University Press, Third Edition,2020.
4. Olivier Curé, Guillaume Blin: RDF Database Systems: Triples Storage and SPARQL Query
Processing, Morgan Kaufmann, 2014.
5. Bob DuCharme: Learning SPARQL, "O'Reilly Media, Inc.", 2011
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Create, Store & Retrieve LOD.
CO2:Design methodologies for publishing & consuming LOD.
CO3:Use RDF & SPARQL to query LOD.
CO4:Design recommendation algorithms based on LOD.
CO5:Design algorithms for handling LOD using large-scale machine learning.
CO-PO Mapping
UNIT I INTRODUCTION 9
Definition of data intensive computing - Data science - Big data -5Vs – Architecture - Data-
intensive computing platforms: notion of parallel and distributed computing systems used in both
HPC and commercial domains - similarities and differences in hardware and software stacks
25
UNIT IV NOSQL DATA MODELS 9
Key-value store (Dynamo) - column store (BigTable, HBase, Cassendra) - document-based
(MongoDB, CouchDB) - object store - graph-based, etc.
UNIT V VIRTUALIZATION 9
Data intensive computing under virtualization environment – OpenStack, Docker
TOTAL: 45 PERIODS
REFERENCES
1. Furht, Borko, and Armando Escalante, “Handbook of data intensive computing”, Springer
Science & Business Media, 2011.
2. Tom White, “Hadoop: The Definitive Guide”, O'Reilly Media. October 2010.
3. Benjamin Depardon, Gaël Le Mahec, Cyril Séguin. Analysis of Six Distributed File
Systems. [Research Report] 2013, pp.44. ⟨hal-00789086⟩
4. Radez, Dan. “OpenStack Essentials”. Packt Publishing Ltd, 2016.
5. Turnbull, James. “The Docker Book: Containerization is the new virtualization.”, 2014.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Design applications that involve data intensive computing.
CO2:Suggest appropriate architecture for data intensive computing systems.
CO3:Decide on the appropriate techniques of Map Reduce, Mongo DB, for the different
applications.
CO4:Identify parallel processing techniques for data intensive computing.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 2 2 2 2 2
CO2 3 2 2 2 2 2
CO3 3 3 3 3 3 3
CO4 3 3 3 3 3 3
UNIT I INTRODUCTION 9
Context of data visualization – Definition, Methodology, Visualization design objectives. Key
Factors – Purpose, visualization function and tone, visualization design options – Data
representation, Data Presentation, Seven stages of data visualization, widgets, data visualization
tools.
26
UNIT III DATA VISUALIZATION USING R 9
Reading and getting data into R (External Data): Using CSV files, XML files, Web Data,
JSON files, Databases, Excel files. Working with R Charts and Graphs:
Histograms, Boxplots, Bar Charts, Line Graphs, Scatter plots, Pie Charts
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the representation of complex and voluminous data.
CO2:Design and use various methodologies present in data visualization.
CO3:Understand the various process and tools used for data visualization.
CO4:Use interactive data visualization to make inferences.
CO5:Discuss the process involved and security issues present in data visualization.
CO-PO Mapping
27
UNIT II STREAM MINING ALGORITHMS 9
Evaluating streaming algorithms - learning from data streams - evaluation issues – open issues.
Clustering from data streams - clustering examples - clustering variables. Frequent pattern mining
- frequent Itemset mining - heavy hitters - mining frequent item set from data streams - sequence
pattern mining.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the applicability and utility of different machine learning algorithms.
CO2:Describe and apply current research trends in data-stream processing.
CO3:Analyze the suitability of stream mining algorithms for data stream systems.
CO4:Program and build stream processing systems, services and applications.
CO5:Solve problems in real-world applications that process data streams.
CO-PO Mapping
28
BD3005 BIG DATA ACQUISITION LTPC
3 003
TOTAL: 45 PERIODS
REFERENCES
1. Bart Baesens, "Analytics in a Big Data World: The Essential Guide to Data Science and its
Applications", John Wiley & Sons, 2014
2. Min Chen, Shiwen Mao, Yin Zhang, Victor CM Leung,Big Data: Related Technologies,
Challenges and Future Prospects, Springer, 2014.
3. Michael Minelli, Michele Chambers, Ambiga Dhiraj ,“Big Data, Big Analytics: Emerging
Business Intelligence and Analytic Trends”, John Wiley & Sons, 2013.
4. Raj, Pethuru, “Handbook of Research on Cloud Infrastructures for Big Data Analytics”, IGI
Global.
5. Jeyaraj, Rathinaraja, Ganeshkumar Pugalendhi, and Anand Paul. “Big Data with Hadoop
MapReduce: A Classroom Approach”, CRC Press, 2020.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify the various sources of Big Data.
CO2:Apply several key big data technologies used for storage, analysis and manipulation of data.
CO3:Design new algorithms for collecting Big Data from various sources.
CO4:Design algorithms for pre-processing Big Data other than the traditional approaches.
CO5:Design methodologies to extract data from structured and un-structured data for analytics.
29
CO-PO Mapping
UNIT II VIRTUALIZATION 9
Implementation Levels of Virtualization - Virtualization Structures, Tools and Mechanisms -
Virtualization of CPU, Memory, and I/O Devices - Virtual Clusters and Resource Management -
Virtualization for Data-Center Automation.
PRACTICAL EXERCISES 30
1. Experiment with public SaaS.
2. Create a software using public PaaS.
3. Experiment storage services in cloud.
4. Create VMs in public cloud platforms.
5. Experiment with load balancing.
6. Experiment with elasticity in the cloud.
7. Interlink storage services with VMs.
8. Set up a virtual private cloud using public cloud platforms.
9. Set up an open source private cloud.
30
10. Experiment with CLI in the open source private cloud.
TOTAL: 75 PERIODS
REFERENCES
1. Kai Hwang, Geoffrey C Fox, Jack J Dongarra, “Distributed and Cloud Computing From
Parallel Processing to the Internet of Things”, Morgan Kauffman imprint of Elsevier, 2012.
2. Arshdeep Bahga, Vijay Madisetti, “Cloud Computing: A Hands-On Approach”, Universities
Press (India) Private Limited, 2014.
3. James E Smith and Ravi Nair, “Virtual Machines”, Elsevier, 2005.
4. Thomas Erl, Zaigham Mahood, Ricardo Puttini, “Cloud Computing, Concept, Technology &
Architecture”, Prentice Hall, 2013.
5. Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi, “Mastering Cloud Computing”,
Tata McGraw-Hill, 2013.
6. Toby Velte, Anthony Velte, Robert C. Elsenpeter, “Cloud Computing, A Practical
Approach”,Tata McGraw-Hill Edition, 2010.
7. Tom White, “Hadoop: The Definitive Guide”, O’Reilly Media, 4th Edition, 2015.
8. John Rittinghouse and James Ransome, “Cloud Computing Implementation, Management
and Security”, CRC Press, 2010.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Articulate the main concepts, key technologies, strengths and limitations of cloud computing.
CO2:Identify the architecture, infrastructure and delivery models of cloud computing.
CO3:Explain the core issues of cloud computing such as security, privacy and interoperability.
CO4:Choose the appropriate technologies, algorithms and approaches for the related issues.
CO5:Set up and use cloud platforms and services.
CO-PO Mapping
31
URL Obfuscation- buffer overflow- DNS poisoning -ARP poisoning -Identity Theft - IoT Attacks -
BOTs and BOTNETs
UNIT IV EXPLOITATION 9
Introduction to Metasploit – Reconnaissance with Metasploit – Port Scanning with Metasploit –
Compromising a Windows Host with Metasploit – Client Side Exploitation Methods – E–Mails with
Malicious Attachments – Creating a Custom Executable – Creating a Backdoor with SET – PDF
Hacking – Social Engineering Toolkit – Browser Exploitation – Post–Exploitation – Acquiring
Situation Awareness – Hashing Algorithms – Windows Hashing Methods – Cracking the Hashes –
Brute force Dictionary Attacks – Password Salts –Rainbow Tables – John the Ripper – Gathering
OS Information – Harvesting Stored Credentials.
32
CO-PO Mapping
LIST OF EXPERIMENTS 30
1. Intensity Transformations
2. Filtering in the Spatial domain
3. Filtering in the Frequency Domain
4. Image Restoration
5. Detection of Discontinuities
6. Region Based Segmentation
7. Morphological operations
8. Feature Extraction
9. Feature Selection
33
10. Motion Detection and Estimation
11. Video Enhancement and Restoration
12. Video Segmentation
13. Motion Tracking in Video
14. Steganography
15. Watermarking
TOTAL: 75 PERIODS
REFERENCES
1. Rafael C.Gonzalez and Richard E.Woods, “Digital Image Processing”, Third Edition,
Pearson Education, New Delhi, 2008
2. Al Bovik (Alan C Bovik, “The Essential Guide to Video Processing”, Academic Press,
Second Edition, 2009.
3. S.Sridhar, “Digital Image Processing”, Oxford University Press, New Delhi, 2011.
4. Murat Tekalp, “Digital Video Processing”, Prentice Hall, 2015.
5. Oges Marques, “Practical Image and Video Processing Using MATLAB”, Wiley-IEEE
Press, 2011.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Have a clear impression of the breadth and practical scope of digital image processing and
have arrived at a level of understanding that it is the foundation for most of the work currently
underway in this field.
CO2:Critically analyze the role of video in modern technologies.
CO3:Implement basic image and video processing algorithms.
CO4:Design and develop various applications that incorporate different techniques of Image and
Video processing.
CO5:Apply and explore new techniques in the areas of Image and Video Processing.
CO-PO Mapping
34
UNIT III SYMMETRIC KEY ENCRYPTIONS 9
Block ciphers: Modes of operation, DES and its variants, AES, Blowfish and Two fish encryption,
linear and differential cryptanalysis.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Present the exploitation present in the security and learn the basic protocols
CO2:Apply the different cryptographic operations and key exchange protocols
CO3:Apply zero knowledge proofs and Exchange of Secrets
CO4:Analyze various cryptography techniques and its applications
CO5:Apply cryptographic Hash function to the real world application to achieve secured system.
CO-PO Mapping
35
CP3068 INTERNET OF THINGS LTPC
3 024
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1;Explain the underlying architectures and models in IoT.
CO2:Analyze different connectivity technologies for IoT.
CO3:Develop simple applications using Arduino / Raspberry Pi.
36
CO4:Apply data analytics techniques to IoT.
CO5:Study the needs and suggest appropriate solutions for Industrial applications
CO-PO Mapping
UNIT V DEVOPS 9
DevOps: Motivation-Cloud as a platform-Operations- Deployment Pipeline: Overall Architecture -
Building and Testing-Deployment- Case study: Migrating to Microservices.
TOTAL: 45 PERIODS
REFERENCES
1. Roger S. Pressman, “Software Engineering – A Practioner’s Approach”, MC Graw Hill, 8th
edition.
2. Ian Sommerville, “Software Engineering”, Addison-Wesley, 9th Edition, 2010
37
3. Len Bass, Ingo Weber and Liming Zhu, “DevOps: A Software Architect‘s Perspective”,
Pearson Education, 2016.
4. Bernd Bruegge, Allen H. Dutoit, “Object-Oriented Software Engineering”, Prentice
Hall,Third Edition, 2009.
5. Robert E. Filman, Tzilla Elrad, Siobhán Clarke, Mehmet Aksit, “Aspect-Oriented Software
Development”, Addison-Wesley Professional, 2004.
6. Renu Rajni, Pradeep Oak, “Software Testing: Effective Methods, Tools and
Techniques”,Tata McGraw Hill, 2004.
7. Jonathan Bowen, “Formal Specification and Documentation using Z – A Case Study
Approach”, Intl Thomson Computer Press, 1996.
8. Antoni Diller, “Z: An Introduction to Formal Methods”, Wiley, 1994.
9. James Shore, Shane Warden “The Art of Agile Development – Pragmatic guide to agile
software development”, O’Reilly Media, October 2007.
10. Ken Schwaber, “Agile Project Management with SCRUM”, Microsoft Press, 2004.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Select Appropriate Process Model for Software Development.
CO2:Analyze user requirements and design S/W using object-oriented methodology in UML
CO3:Apply the various design patterns in software development
CO4:Incorporate appropriate quality factors and standards during Software Development
CO5:Apply software testing techniques in various software development stages
CO6:Understand the application of DevOps for software development
CO-PO Mapping
38
for Deep learning : Parameter norm Penalties, data set augmentation, Dropout, Multi task learning,
Early stopping – Hyperparameters for deep learning.
PRACTICAL EXERCISES 30
Environment : TensorFlow/Keras
Processor : GPU or Cloud GPUs
1 Implement a perceptron to evaluate logical operations including XOR
2 Implement a Multi-Layer Perceptron and train the model using feed forward algorithm.
3 Build a MLP and train it using backpropagation algorithm with gradient decent optimization
4 Demonstrate the contexts of under fitting, Overfitting and good fit with MLP and generalize
the model you built.
5 Build and evaluate a convolutional Neural Network model for image classification
6 Implement Transfer Learning concept for Sentence classification in Convolutional Neural
Networks.
7 Build and evaluate variational autoencoder for image generation
8 Build and evaluate RNN structure (LSTM/GRU) to do PoS tagging, Sentence
Classification, and Text Generation.
9 Build a GAN to generate image from text and evaluate the performance.
10 Implement Sentiment Analysis using Recursive Neural Networks
11 Build a Deep learning model for speech recognition
12 Implement Object Detection using Yolo V6
13 Build a Deep learning model to summarize a video with Attention Models
14 Build a Deep Learning model to evaluate energy efficiency in IoT devices.
TOTAL: 75 PERIODS
REFERENCES
1. Ian Good Fellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2017.
2. Francois Chollet, “Deep Learning with Python”, Manning Publications, 2018.
3. Josh Patterson, Adam Gibson, "Deep Learning: A Practitioner’s Approach”, O’Reilly Media,
2017.
39
4. Ragav Venkatesan, Baoxin Li, “Convolutional Neural Networks in Visual Computing”, CRC
Press, 2018.
5. Joshua F. Wiley, “R Deep Learning Essentials”, Packt Publications, 2016.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the role of Applied Mathematics and the need of Deep learning.
CO2:To optimize and generalize deep neural networks for better performance.
CO3:To design and implement Convolutional and recurrent Neural Networks and Critically Analyse
in Image and text Related Projects
CO4:To design and implement Deep Learning Applications.
CO5:To learn deep generative networks implications in unsupervised learning.
CO-PO Mapping
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Design web pages that follow standards and are usable.
CO2:Design web sites that are appealing.
CO3:Appreciate the usage of Content management System for designing web Content.
CO4:Take advantage of Content Management System tools for managing content for large web
sites.
CO5:Use analytics tools for better management.
CO-PO Mapping
41
UNIT III ONTOLOGY LEARNING FOR SEMANTIC WEB 9
Taxonomy for Ontology Learning – Layered Approach – Phases of Ontology Learning –Importing
and Processing Ontologies and Documents – Ontology Learning Algorithms –Methods for
evaluating Ontologies
UNIT V APPLICATIONS 9
Web Services – Semantic Web Services – Case Study for specific domain – Security issues –
Web Data Exchange and Syndication – Semantic Wikis – Semantic Portals – Semantic Metadata
in Data Formats – Semantic Web in Life Sciences – Ontologies for Standardizations – Rule
Interchange Format.
TOTAL: 45 PERIODS
REFERENCES
1. Pascal Hitzler, Markus Krötzsch, Sebastian Rudolph, “Foundations of Semantic Web
Technologies”, Chapman & Hall/CRC, 2009.
2. Asuncion Gomez-Perez, Oscar Corcho, Mariano Fernandez-Lopez, “Ontological
Engineering: with Examples from the Areas of Knowledge Management, e-Commerce and
the Semantic Web”, Springer, 2004.
3. Grigoris Antoniou, Frank van Harmelen, “A Semantic Web Primer (Cooperative Information
Systems)”, MIT Press, 2004.
4. Alexander Maedche, “Ontology Learning for the Semantic Web”, First Edition, Springer.
2002.
5. John Davies, Dieter Fensel, Frank Van Harmelen, “Towards the Semantic Web: Ontology
Driven Knowledge Management”, John Wiley, 2003.
6. John Davies, Rudi Studer, Paul Warren, (Editor), “Semantic Web Technologies: Trends
and Research in Ontology-Based Systems”, Wiley, 2006.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Create ontology for a given domain.
CO2:Develop an application using ontology languages and tools.
CO3:Understand the concepts of semantic Web.
CO4:Use ontology related tools and technologies for application creation.
CO5:Design and develop applications using semantic web.
CO6:Understand the standards related to semantic web.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 - 3 1 2 3
CO2 3 - 3 2 3 3
CO3 2 1 1 1 1 3
CO4 3 - 2 3 2 3
CO5 3 - 3 2 3 3
CO6 2 - 1 1 1 3
42
CP3070 MOBILE APPLICATION DEVELOPMENT LTPC
3 003
UNIT I INTRODUCTION 9
Mobile applications – Characteristics and Benefits – Application Model – Frameworks and Tools –
Mobile OS: Android, iOS – versions with its features – Android architecture –ART(Android
Runtime) – ADB(Android Debug Bridge) – Application framework basics
REFERENCES
1. Reto Meier, “Professional Android 4 Application Development”, Wiley, 2012
2. Wei-Meng Lee, “Beginning Android Application Development”, Wiley Publishing, 2011
3. Zigurd Mednieks, Laird Dornin, G. Blake Meike, Masumi Nakamura, “Programming
4. Android”, O’Reilly, 2011
5. Rick Rogers, John Lombardo, Zigurd Mednieks, Blake Meike, “Android Application
Development”, O’Reilly, 2010
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Acquire the knowledge on Android OS and its features.
CO2:Acquire knowledge on GUI design required for Android App development.
CO3:Apply the knowledge of persistence Data storage mechanism in Android Apps.
CO4:Develop web based mobile application that accesses internet and location data.
CO5:Apply the knowledge in App development using telephony and Google Map services
CO6:Design and apply the knowledge to publish Android applications into Market
43
CO-PO Mapping
UNIT I INTRODUCTION 9
Blockchain Overview-History and Origin of Blockchain - Technical Concepts of Blockchain
Systems: - Physical Ledger Technology and Security - Digital Ledger Technology, Digital Security
Technology: - Cryptographic Hash Functions - Digital Signatures
UNIT II FOUNDATIONS 9
Centralization vs. Decentralization of Blockchain - Distributed Ledger Technology (DLT) Technical
Concepts: Mining - Distributed Consensus- Incentives - Proof of Work - Cryptosystems in practice-
Distributed Networks – Attacks - Consensus Protocols
PRACTICAL EXERCISES 30
1. Implement cryptographic hash functions
2. Implement Decentralized Applications
3. Implement a simple program using Web3 Javascript API
4. Set up Go-Ethereum client
5. Set up Python Ethereum Client
TOTAL: 75 PERIODS
REFERENCES
1. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology, Decentralization, and
Smart Contracts Explained”, Second Edition, Packt Publishing, 2018.
44
2. Narayanan, J. Bonneau, E. Felten, A. Miller, S. Goldfeder, “Bitcoin and Cryptocurrency
Technologies: A Comprehensive Introduction” Princeton University Press, 2016.
3. Alex Leverington, “Ethereum Programming” Packt Publishing Limited, 2017.
4. Andreas Antonopoulos, Satoshi Nakamoto, “Mastering Bitcoin”, O’Reilly Publishing, 2014.
5. Roger Wattenhofer, “The Science of the Blockchain” Create Space Independent Publishing
Platform, 2016.
6. Arshdeep Bahga and Vijay Madisetti, “Blockchain Applications : A Hands-On Approach”, 2017.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain cryptocurrencies and their relationship with the blockchain technology.
CO2:Explain the different steps in the use of Bitcoins.
CO3:Relate Web 3 and Hyperledger to concepts in blockchain technologies.
CO4:Apply blockchains to different real-life problems
CO5:Implement a simple application using Ethereum.
CO-PO Mapping
45
UNIT IV MULTIMEDIA COMMUNICATION SYSTEMS 9
Multimedia Communication Standards,Transport Protocols, streaming protocols, Internet Protocols
Wireless multimedia communications, synchronization and QOS, security, Entertainment
networks, Collaborative multimedia support, Real-time distributed multimedia networks, Hypertext,
Hypermedia.
TOTAL: 45 PERIODS
REFERENCES
1. Ze-Nian Li, Mark S. Drew, Jiangchuan Liu, “Fundamentals of Multimedia”, Second Edition,
Springer Nature (Texts in Computer Science), 2014.
2. Prabhat K. Andleigh, Kiran Thakrar, “Multimedia Systems Design”, Pearson Education
India, Ist Edition, 2015
3. Ralf Steinmetz and KlaraNahrstedt, “Multimedia computing, communications, and
applications”, Pearson India, Pearson, 2002.
4. Fred Halsall, “Multimedia Communications: Applications, Networks, Protocols and
Standards”, Pearson Education, 2002.
5. Khalid Sayood, “Introduction to Data Compression”, 4th Edition, Morgan Kauffman, 2012.
6. K.R. Rao, Zoran S. Bojkovic, Bojan M. Bakmaz, “ Wireless Multimedia Communication
systems: Design, Analysis and Implementation”, CRC press, 2017.
7. V.S. Subrahmanian, “Principles of Multimedia Database Systems”, Elsevier / Morgan
Kauffmann, 2008.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Handle the multimedia elements effectively
CO2:Use Multimedia Hardware and Software for Editing and Authoring multimedia applications
CO3:Implement Compression algorithms for various multimedia applications
CO4:Develop effective strategies to deliver Quality-of-Experience in networked Multimedia
applications
CO5:Design and develop multimedia applications in various domains
CO-PO Mapping
46
CP3067 INFORMATION RETRIEVAL TECHNIQUES LTPC
3 003
UNIT I INTRODUCTION 9
Basic Concepts – Practical Issues – Retrieval Process – Architecture – Boolean Retrieval
– Retrieval Evaluation – Open Source IR Systems–History of Web Search – Web
Characteristics– The impact of the web on IR –IR Versus Web Search–Components of a
Search engine
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Build an Information Retrieval system using the available tools.
CO2:Identify and design the various components of an Information Retrieval system.
CO3:Measure effectiveness and efficiency of information retrieval techniques.
47
CO4:Use parallel Information Retrieval approaches in real world problems.
CO5:Design an efficient search engine and analyze the Web content structure
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 - 3 2 - -
CO2 3 - 3 - - -
CO3 3 - 3 - - -
CO4 3 - 3 2 - 3
CO5 3 - 3 2 - -
UNIT I INTRODUCTION 10
Introduction to Parallel Algorithms – Principles of Parallel Algorithm Design- Parallel Algorithm
Models - Analyzing Parallel Algorithms- PRAM Algorithms: PRAM Model of Computation – Parallel
Reduction – Prefix Sum-List ranking- Merging Sorted lists
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the difference between sequential and parallel algorithms.
48
CO2:Design parallel algorithms in various models of parallel computation.
CO3:Understand various parallel processor organizations
CO4:Design parallel searching and sorting algorithms
CO5:Design parallel graph algorithms
CO-PO Mapping
UNIT V APPLICATIONS 9
Control systems; Speech systems; Image processing; Natural language processing and decision
making, Handwritten Script Recognition; Automotive Systems and Manufacturing; Decision
Support System; Bioinformatics; Investment and trading.
49
TOTAL: 45 PERIODS
REFERENCES
1. S. Rajasekaran, G.A. Vijayalakshmi Pai, “Neural Networks, Fuzzy Logic and Genetic
Algorithm: Synthesis and Applications”, Prentice Hall of India, 2010.
2. J.S.R. Jang, C.T. Sun, E. Mizutani, “Neuro-Fuzzy and Soft Computing”, Pearson
Education, 2004.
3. An Introduction to Genetic Algorithm Melanic Mitchell (MIT Press)
4. Evolutionary Algorithm for Solving Multi-objective, Optimization Problems (2ndEdition),
Collelo, Lament, Veldhnizer (Springer)
5. S.N. Sivanandam, S.N. Deepa, “Principles of Soft Computing”, Second Edition, Wiley-India,
2007
6. Siman Haykin, “Neural Networks”, Prentice Hall of India, 1999.
7. Timothy Ross, “Fuzzy Logic with Engineering Applications”, Wiley Publications, 2016.
8. David E. Goldberg, “Genetic Algorithms in Search, Optimization and Machine Learning”,
Pearson Education, 2008.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Describe human intelligence and AI Explain how intelligent system works.
CO2:Recognize the feasibility of applying a soft computing methodology for a particular problem.
CO3:Apply fuzzy logic and reasoning to handle uncertainty and solve engineering problems.
CO4:Apply genetic algorithms to optimization problems.
CO5:Design neural networks for pattern classification and regression problems
CO6:Develop some familiarity with current research problems and research methods in Soft
Computing Techniques
CO-PO Mapping
UNIT I INTRODUCTION 8
Introduction – Making rational choices: basics of Games – strategy – preferences – payoffs –
Mathematical basics –Game theory –Rational Choice – Basic solution concepts-non-cooperative
versus cooperative games – Basic computational issues – finding equilibria and learning in games-
Typical application areas for game theory (e.g. Google’s sponsored search, eBay auctions,
electricity trading markets).
50
UNIT II GAMES WITH PERFECT INFORMATION 10
Games with Perfect Information – Strategic games – prisoner’s dilemma, matching pennies- Nash
equilibria- theory and illustrations – Cournot and Bertrand models of oligopoly- auctions- mixed
strategy equilibrium- zero-sum games- Extensive Games with Perfect Information-repeated games
(prisoner’s dilemma)- subgame perfect Nash equilibrium; computational issues.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1: Discuss the notion of a strategic game and equilibria and identify the characteristics of main
applications of these concepts.
51
CO2: Discuss the use of Nash Equilibrium for other problems.
CO3: Identify key strategic aspects and based on these be able to connect them to appropriate
game theoretic concepts given a real world situation.
CO4: Identify some applications that need aspects of Bayesian Games.
CO5: Implement a typical Virtual Business scenario using Game theory.
CO-PO Mapping
52
REFERENCES
1. Subir Kumar Sarkar, “Wireless Sensor and Ad Hoc Networks Under Diversified Network
Scenarios”, Auerbach Publications, 2012.
2. Jing (Selina) He, Mr. Shouling Ji, Yi Pan, Yingshu Li, ,”Wireless Ad Hoc and Sensor
Networks Management, Performance, and Applications”, CRC Press, 2014
3. Holger Karl, Andreas Willig, “Protocols and Architectures for Wireless Sensor Networks”,
Wiley India Private Limited, 2011.
4. Erdal Çayirci, Chunming Rong, “Security in Wireless Ad Hoc and Sensor Networks”, John
Wiley and Sons, 2009.
5. Carlos De Morais Cordeiro, Dharma Prakash Agrawal, “Ad Hoc and Sensor Networks:
Theory and Applications”, World Scientific Publishing, Second Edition, 2011.
6. Waltenegus Dargie, Christian Poellabauer, “Fundamentals of Wireless Sensor
Networks Theory and Practice”, Wiley India Private Limited, 2014
7. Adrian Perrig, J.D. Tygar, “Secure Broadcast Communication: In Wired and Wireless
Networks”, Kluwer Academic Publishers, Springer, 2002.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identifying suitable routing protocols for various scenarios of ad hoc networks.
CO2:To explore various mobility models for MANETs.
CO3:Identify different issues in wireless sensor networks.
CO4:Analyze various algorithms used in WSN
CO5:Identify and critique security issues in ad hoc and sensor networks
CO-PO Mapping
53
UNIT III SECURITY RISK MANAGEMENT 9
Risk Management Life Cycle – Risk Profiling – Risk Exposure Factors – Risk Evaluation And
Mitigation – Risk Assessment Techniques – Threat and Vulnerability Management.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify various vulnerabilities related to memory attacks.
CO2:Apply security principles in software development.
CO3:Evaluate the extent of security risks
CO4:Involve selection of testing techniques related to software security in the testing phase of
software development.
CO5:Use tools for securing software.
CO-PO Mapping
54
CP3080 VIRTUALIZATION TECHNIQUES LTPC
3 003
55
REFERENCES
1. James E. Smith, Ravi Nair, “Virtual Machines: Versatile Platforms for Systems and
Processes”, Elsevier/Morgan Kaufmann, 2005
2. David Marshall, Wade A. Reynolds, “Advanced Server Virtualization: VMware and
Microsoft Platform in the Virtual Data Center”, Auerbach Publications, 2006
3. Kumar Reddy, Victor Moreno, “Network virtualization”, Cisco Press, July, 2006.
4. Chris Wolf, Erick M. Halter, “Virtualization: From the Desktop to the Enterprise”, A Press
2005
5. Kenneth Hess , Amy Newman, “Practical Virtualization Solutions: Virtualization from the
Trenches”, Prentice Hall, 2010
6. Lee Badger , Tim Grance , Robert Patt -Corner , Jeff Voas Cloud Computing Synopsis and
Recommendations NIST, May 2011
7. Tom White -Hadoop: The Definitive Guide Storage and Analysis at Internet Scale O'Reilly
Media Press May 2012
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the virtualization technologies.
CO2:Explore virtual clusters and resource management in virtualized environments.
CO3:Apply various virtual machine programming languages.
CO4:Differentiate between network and storage virtualization.
CO5:Understand the concept of service creation environments for developing cloud-based
applications.
CO-PO Mapping
TOTAL: 45 PERIODS
REFERENCES
1. Craig S. Mullins, "Database Administration: The Complete Guide to Practices and
Procedures", Addison-Wesley Professional, 2nd edition, 2013.
2. Dennis Shasha and Philippe Bonnet, "Database Tuning, Principles, Experiments and
Troubleshooting Techniques", Elsevier Reprint, 2005.
3. C.J.Date, A.Kannan, S.Swamynathan, ―An Introduction to Database Systems‖, Eighth
Edition, Pearson Education, 2006.
4. R. Elmasri, S.B. Navathe, ―Fundamentals of Database Systems‖, Sixth Edition, Pearson
Education/Addison Wesley, 2010.
5. Craig S. Mullins. “DB2 Developer's Guide A Solutions-Oriented Approach to Learning the
Foundation and Capabilities of DB2 for Z/OS”, IBM Press, 6th edition, 2012.
6. Henry F Korth, Abraham Silberschatz, S. Sudharshan, ―Database System Concepts,
Seventh Edition, McGraw Hill, 2019
7. Thomas Connoly and Carlolyn Begg, "Database Systems, A Practical Approach to Design,
Implementation and Management", Fourth Edition, Pearson Education, 2008
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:An ability to understand various DBA roles, tasks and tools
CO2:Apply various Database recovery, backup and security privileges and
CO3:Differentiate between monitoring and management in the context of database administration
and explain their respective roles in ensuring database performance and availability.
57
CO4:Effectively tune and optimize relational databases, including query optimization, concurrency
control, recovery subsystem tuning, index selection, and hardware considerations.
CO5:Possess the skills to effectively optimize and tune database systems by employing
techniques such as normalization, denormalization, clustering, query tuning, performance
monitoring, and troubleshooting various subsystems.
CO-PO Mapping
58
Methods : distance based agglomerative and divisible clustering, Probabilistic hierarchical
Clustering Density-Based Methods : DBSCAN, DENCLUE – Expectation Maximization -Grid
Based Methods – Clustering High-Dimensional Data - Clustering Graph and Network Data -
Outlier Analysis.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Evolve multidimensional intelligent model from typical system.
CO2:Design and implement data warehouse and to do Business Analytics.
CO3:Acquire knowledge on data and to prepare data for mining
CO4:Design and deploy classification and clustering techniques.
CO5:Evaluate various mining techniques on complex data objects.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 3 2 1 1 -
CO2 3 3 3 3 3 1
CO3 3 2 2 3 1 -
CO4 3 3 3 3 3 1
CO5 3 3 3 3 3 1
UNIT I INTRODUCTION 9
Introduction to Semantic Web: Limitations of current Web - Development of Semantic Web -
Emergence of the Social Web - Social Network analysis: Development of Social Network Analysis
- Key concepts and measures in network analysis - Applications of Social Network Analysis-
59
Graph Essentials –Graph Basics – Graph Representation- Types of Graphs – Connectivity in
Graphs – Special Graphs – Graph Algorithms.
UNIT V APPLICATIONS 9
Classical Recommendation Algorithms- Recommendation Using Social Context-Evaluating
Recommendations Behavior Analytics: Individual Behavior- Collective Behavior- Hacking on
Twitter Data-Twitter: Friends, Followers, and Set wise Operations-Analyzing Tweets-Visualizing
tons of tweets.
TOTAL: 45 PERIODS
REFERENCES
1. R. Zafarani, M. Abbasi, and H. Liu,“Social Media Mining: An Introduction”, Cambridge
University Press, 2014.
2. Peter Mika, “Social Networks and the Semantic Web”, First Edition, Springer 2007.
3. Borko Furht, “Handbook of Social Network Technologies and Applications”, 1st Edition,
Springer, 2010.
4. Guandong Xu ,Yanchun Zhang and Lin Li, “Web Mining and Social Networking –
Techniques and applications”, First Edition, Springer, 2011.
5. Dion Goh and Schubert Foo, “Social information Retrieval Systems: Emerging
Technologies and Applications for Searching the Web Effectively”, IGI Global Snippet,
2008.
6. Matthew A. Russell, “Mining the Social Web”, O‟Reilly Media,2nd edition, 2013.
7. Colleen McCue, “Data Mining and Predictive Analysis: Intelligence Gathering and
Crime Analysis”, Elsevier,2nd edition, 2015.
60
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Develop semantic web related applications.
CO2:Represent knowledge using ontology.
CO3:Predict human behaviour in social web and related communities.
CO4:Visualize social networks
CO5:Apply social network analysis techniques in real-life applications
CO-PO Mapping
UNIT I INTRODUCTION 9
Introduction to Software Quality - Challenges – Quality Factors – Testing Activities – Test Case
Selection – Power of Test – Components of SQA – SQA Components in Project Life Cycle – Test
Groups – Software Quality Assurance Group – Reviews
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Develop Quality plans and use SQA components in project life cycle.
CO2:Analyze the product Quality.
CO3:Judge the use of infrastructure components and use configuration items for Quality control.
CO4:Use various testing methods and verify.
CO5:Assess Quality standards of various software products.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 - 3 2 - -
CO2 2 - 3 - - -
CO3 2 - 2 2 - -
CO4 3 - 3 3 - -
CO5 2 - 2 2 - 3
UNIT I INTRODUCTION 9
process of Design thinking, Human factors in Interaction Design, Understanding Users- cognition
and cognitive frameworks, User Centred approaches - modeling users personas and goals,
Usability, accessibility standards and Universal Usability. HCI and software Engineering, User
Centric Computing, Computational User models.
62
REFERENCES
1. Ben Shneiderman, Catherine Plaisant, Maxine Cohen, Steven Jacobs, NiklasElmqvist,
“Designing the User Interface: Strategies for Effective Human-Computer Interaction”, Sixth
Edition, Pearson Education, 2018.
2. Jenny Preece, Helen Sharp, Yvonne Rogers, “Interaction Design: Beyond Human
Computer Interaction”, Wiley Student Edition, 5th Edition, Wiley, 2019.
3. Jenifer Tidwell, Charles Brewer & Aynne Valencia, “Designing Interfaces: Patterns for
Effective Interaction Design”, Third Edition,O'reilly, 2020.
4. Alan Cooper, Robert Reimann, David Cronin, Christopher Noessel, “About Face: The
Essentials of Interaction Design”, 4th Edition, Wiley, 2014.
5. Samit Bhattacharya, “Human-Computer Interaction: User-Centric Computing for Design”,
McGrawHill, 1st Edition, 2019.
6. Donald A. Norman, “Design of Everyday Things”, MIT Press, 2013.
7. Steve Krug, “Don't Make Me Think, Revisited: A Common Sense Approach to Web and
Mobile Usability”, Third Edition, New Riders, 2014.
8. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale, “Human Computer Interaction”,
Third Edition, Pearson Education, 2004.
9. Alan Dix, Devina Ramduny-Ellis, Jo Hare, Steve Gil,l TouchIT: Understanding Design in
a Physical-Digital World, Oxford University Press, 1st Edition, 2022.
10. https://www.nngroup.com
11. https://www.interaction-design.org/
12. www.mural.co
13. https://m3.material.io/
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Apply usability principles and user/cognitive modeling for various design tasks.
CO2:Use the different design methods, interaction styles, metaphors, basic design paradigms
CO3:Create advanced interaction designs for a variety of use cases in complex environments.
CO4:Evaluate interaction designs and implementations.
CO5:Use formal models and notation to design interactions for new systems.
CO6:Explore use cases from real world examples and suggest usable designs.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 2 2 3 2 2 1
CO2 2 2 3 2 2 1
CO3 2 2 3 2 2 1
CO4 2 2 3 2 2 1
CO5 2 2 3 2 2 1
CO6 2 2 3 2 2 1
63
SE3052 SOFTWARE RELIABILITY METRICS AND MODELS LTPC
3 003
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify and apply various software metrics, which determine the quality level of software.
CO2:Identify and evaluate the reliability of any given software product.
CO3:Understand the fault handling and failure forecasting techniques in software systems.
64
CO4:Understand and Comprehend different time-dependent and time-independent software
reliability models.
CO5:Design reliability models for evaluating the quality level of software systems based on the
requirement.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 - 3 3 1 3
CO2 3 - 3 3 3 3
CO3 2 - 1 1 1 3
CO4 2 2 2 1 1 3
CO5 3 - 3 2 2 3
UNIT I INTRODUCTION 9
Introduction – Visualization Stages – Computational Support – Issues – Different Types of Tasks –
Data representation – Limitation: Display Space, Rendering Time, Navigation Link.
REFERENCES
1. Robert Spence, “Information Visualization An Introduction”, Third Edition, Pearson
Education, 2014.
65
2. Colin Ware, “Information Visualization Perception for Design”, Third edition, Margon
Kaufmann Publishers, 2012.
3. Robert Spence, “Information Visualization Design for Interaction”, Second Edition, Pearson
Education, 2006.
4. Benjamin B. Bederson and Ben shneiderman, “The Craft of Information Visualization”,
Morgan Kaufmann Publishers, 2003.
5. Thomas strothotte, “Computational Visualization: Graphics, Abstraction and Interactivity”,
Springer, 1998.
6. Matthew O. Ward, George Grinstein, Daniel Keim, “Interactive Data Visualization:
Foundation, Techniques and Applications”, Second Edition, A. K. Peters/CRC Press, 2015.
7. Joerg Osarek, “Virtual Reality Analytics”, Gordon’s Arcade, 2016.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Apply mathematics and basic science knowledge for designing information visualizing
System.
CO2:Collect data ethically and solve engineering problem in visualizing the information.
CO3:Implement algorithms and techniques for interactive information visualization.
CO4:Conduct experiments by applying various modern visualization tool and solve the space
layout problem.
CO5:Analyze and design system to visualize multidisciplinary multivariate Data individually or in
teams.
CO6:Develop a cost effective and a scalable information visualization system.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 1 1 1 1 1 1
CO2 1 1 2 2 2 1
CO3 2 1 3 3 3 1
CO4 3 2 2 1 1 1
CO5 1 1 1 1 1 1
CO6 1 1 2 2 1 1
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Define the data science process
CO2:Understand different types of data description for data science process
CO3:Gain knowledge on relationships between data
CO4:Use the python libraries for data wrangling
CO5:Apply visualization libraries in python to interpret and explore data
CO-PO Mapping
67
Strategies – Interference and system capacity- Co-Channel Interference- Adjacent Channel
Interference – Trunking and Grade of service – Improving coverage & capacity in cellular systems-
Cell Splitting- Sectoring-Repeaters for Range Extension-Microcell Zone Concept.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand concepts of wireless communication.
CO2:Analyse the different types of wireless channels and coding
CO3:Understand about transmitter and receiver diversity and equalisation.
CO4:Learn about performance of the digital modulation.
CO5:Explore 5G, 6G technology concepts.
68
CO-PO Mapping
69
4. Hazza and Dubinsky, “Agile Software Engineering, Series: Undergraduate Topics in
Computer Science”, Springer, 2009.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Analyze existing problems with the team, development process and wider organization
CO2:Apply a thorough understanding of Agile principles and specific practices
CO3:Select the most appropriate way to improve results for a specific circumstance or need
CO4:Judge and craft appropriate adaptations to existing practices or processes depending upon
analysis of typical problems
CO5:Evaluate likely successes and formulate plans to manage likely risks or problems
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 3 1 3 - 2 3
CO2 2 - 3 3 1 3
CO3 3 - - - 3 3
CO4 2 - 1 2 3 3
CO5 1 3 - - 2 3
70
UNIT IV SEMANTIC AND PRAGMATIC INTERPRETATION 9
Representation of Meaning – Desirable Properties - Computational Semantics -Word Senses -
Relations Between Senses – WorldNet - Event Participants- Proposition Bank - Frame Net –
Metaphor. Computational Lexical Semantics – Word Sense Disambiguation- Supervised Word
Sense Disambiguation - Dictionary and Thesaurus Methods- Word Similarity – Minimally
Supervised WSD - Hyponymy and Other Word Relations - Semantic Role Labeling –
Unsupervised Sense Disambiguation. Computational Discourse - Discourse Segmentation –
Unsupervised Discourse - Segmentation - Text Coherence - Reference Resolution –Phenomena–
Features and algorithms - Pronominal Anaphora Resolution.
UNIT V APPLICATIONS 9
Information Extraction – Named Entity Recognition - Relation Detection and Classification –
Temporal and Event Processing - Template-Filling - Biomedical Information Extraction. Question
Answering and Summarization -Information Retrieval -Factoid Question Answering -
Summarization - Single and Multi-Document Summarization - Focused Summarization -
Evaluation. Dialog and Conversational Agents – Properties of Human Conversations – Basic
Dialogue Systems - VoiceXML - Information- State and Dialogue Acts - Markov Decision Process
Architecture. Machine Translation –Issues in Machine Translation - Classical MT and the Vauquois
Triangle -Statistical MT - Phrase-Based Translation Model - Alignment in MT –IBM Models –
Evaluation.
TOTAL: 45 PERIODS
REFERENCES
1. Jurafsky and Martin, “Speech and Language Processing”, Pearson Prentice Hall, Second
Edition, 2008.
2. Christopher D. Manning and HinrichSchütze, “Foundations of Statistical Natural Language
Processing”, MIT Press, 1999.
3. Stevan Bird, “Natural Language Processing with Python”, Shroff, 2009
4. James Allen, “Natural Language Understanding”, Addison Wesley, Second Edition, 2007.
5. NitinIndurkhya, Fred J. Damerau, “Handbook of Natural Language Processing”,
(Chapman& Hall/CRC Machine Learning & Pattern Recognition), Second Edition, 2010.
6. Alexander Clark, Chris Fox, Shalom Lappin, “The Handbook of Computational Linguistics
and Natural Language Processing”, Wiley-Blackwell, 2012.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Identify the different linguistic components of given sentences.
CO2:Design a morphological analyser for a language of your choice using finite state automata
concepts.
CO3:Implement the Earley algorithm for a language of your choice by providing suitable grammar
and words.
CO4:Use a machine learning algorithm for word sense disambiguation.
CO5:Build a tagger to semantically tag words using WordNet.
CO6:Design a business application that uses different aspects of language processing.
CO-PO Mapping
71
CO3 2 - 3 3 - 2
CO4 2 - 2 2 - 2
CO5 2 - 2 2 - 3
CO6 2 - 2 2 - 3
TOTAL: 45 PERIODS
REFERENCES
1. Michael A. Nielsen, Issac L. Chuang, Quantum Computation and Quantum Information,
Cambridge University Press, Tenth Edition 2010.
2. Parag K Lala, Quantum Computing, A Beginners Introduction, Mc Graw Hill Education,
First edition 2020.
3. Chris Bernhardt, Quantum Computing for Everyone, The MIT Press, Reprint edition 2020.
4. Jack D. Hidary’s Quantum Computing: An applied approach, Springer, 2019.
72
5. Eric Johnston, Nic Harrigan, and Mercedes Gimeno Segovia, Programming Quantum
Computers: Essential Algorithms and Code, O′reilly, 2019.
6. Pierpaolo Marturano, Quantum Computing, De Gruyter Oldenbourg Publishing, 2023.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Understand the basics of quantum computing.
CO2:Understand the background of Quantum Mechanics.
CO3:Analyse the computation models.
CO4:Model the circuits using quantum computation. Environments and frameworks.
CO5:Understand the quantum operations such as noise and error-correction.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 1 - 2 2 1 1
CO2 1 - 2 2 1 1
CO3 3 - 3 2 1 1
CO4 3 - 3 2 1 1
CO5 3 - 3 2 1 1
UNIT I INTRODUCTION 9
Need for Formal methods – Problems in Natural Language Specifications, Formal Versus Informal
Programming – Advantages of Formal Methods – Requirements of Formal System – Types –
Prepositional Logic – Predicate Logic – Relationships and Functions.
UNIT II FORMAL SPECIFICATION STYLE 9
Model-Oriented – Specifications – Concurrency-Based Specifications –Example Specification
Languages.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:To model various classes of software systems within appropriate formalisms
CO2:To model various classes of software systems within appropriate formalisms;
CO3:To interpret and apply the formal languages of the formalisms for modeling software systems
CO4:To apply specific techniques for the analysis and verification of software systems;
CO5:To formulate and prove properties of software systems within studied formalisms
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 1 1 2 - - 1
CO2 1 1 3 3 2 1
CO3 3 1 3 3 1 1
CO4 3 1 3 3 1 1
CO5 2 3 3 1 1 1
74
REFERENCES
1. Shane Cook, “CUDA Programming: A Developer’s Guide to Parallel Computing with GPUs”,
Morgan Kaufmann, 2013.
2. David R. Kaeli, Perhaad Mistry, Dana Schaa, Dong Ping Zhang, “Heterogeneous Computing
with OpenCL 2.0”, Morgan Kauffman, 2015.
3. David B. Kirk, Wen-mei W. Hwu, “Programming Massively Parallel Processors – A Hands-on
Approach”, Third Edition, Morgan Kaufmann, 2016.
4. Nicholas Wilt, “CUDA Handbook: A Comprehensive Guide to GPU Programming”, Addison
Wesley, 2013.
5. Jason Sanders, Edward Kandrot, “CUDA by Example: An Introduction to General Purpose
GPU Programming”, Addison Wesley, 2011.
6. https://developer.nvidia.com/language-solutions
7. https://www.khronos.org/opencl/
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Describe GPU Architecture.
CO2:Write programs using CUDA, identify issues and debug them.
CO3:Implement efficient algorithms in GPUs for common application kernels, such as matrix
multiplication.
CO4:Write simple programs using OpenCL.
CO5:Given a problem, identify efficient parallel programming patterns to solve it.
CO6:Compare different GPU programming paradigms.
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 1 1 2 - - 1
CO2 1 1 3 3 2 1
CO3 3 1 3 3 1 1
CO4 3 1 3 3 1 1
CO5 2 3 3 1 1 1
75
UNIT IV IMPLEMENTATION OF MICROSERVICES 11
Architecture of Microservices based systems – Integration and Communication – Architecture of
Individual Microservices - Testing Microservices and Microservice-Based Systems - Operations
and Continuous Delivery of Microservices - Organizational Effects of a Microservices-Based
Architecture.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain basic DevOps practices
CO2:Be familiar with a Deployment Pipeline and associated tools
CO3:Understand Microservice Architecture
CO4:Be familiar with incident response and disaster recovery
CO5:Develop services using different technologies
CO-PO Mapping
PO1 PO2 PO3 PO4 PO5 PO6
CO1 1 1 3 3 - 1
CO2 1 1 3 3 - 1
CO3 1 1 3 3 - 1
CO4 1 1 3 3 - 1
CO5 1 1 3 3 - 1
Lab Exercises:
installing Node.js, Using createRoot() and render() methods,
Using React Class and function components, properties, events, conditionals, forms
Implementing simple UI like menus
Lab Exercises:
Implement simple Client-server communication using TOMCAT from REACT client
installing any IDE like STS (Spring Tool Suite) and configuring for spring application
Creating Spring Boot project with Spring Initializr
implementing a simple hello world web application
Lab Exercises:
Install MongoDB Atlas Cluster, use Dependencies, Spring Web and Spring Data
MongoDB, Docker, Container
Create a CRUD application with MongoDB and Spring Boot.
Lab Exercises:
Building RESTful web services with annotations: Rest controller, Request mapping,
Request Body, Path Variable.
Building Microservice: using the dependencies on the Spring Initializr - Spring Web, Spring
Boot DevTools, Spring Boot Actuator, Config Client.
TOTAL: 75 PERIODS
77
REFERENCES
1. John Carnell, Illary Huaylupo Sánchez, “Spring Microservices in Action”, 2nd Edition,
Manning Publications, 2021.
2. Greg L. Turnquist, Learning Spring Boot 3.0, 3rd Edition, Packt Publishing, 2022.
3. David Herron, Node.js Web Development, Packt Publishing Limited, 5th edition, 2020.
4. David Flanagan, Javascript The Definitive Guide, Oreilly, 7th Edition, 2020.
5. K. Siva Prasad Reddy, Sai Upadhyayula, Beginning Spring Boot 3: Build Dynamic Cloud-
Native Java Applications and Microservices, A Press, 2022.
6. Craig Walls, Spring Boot in Action, Manning Publications, 2016.
7. https://spring.io
8. https://react.dev
9. https://www.mongodb.com/compatibility/spring-boot
10. https://nodejs.org/en
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Use Javascript and its libraries for building front-end applications
CO2:Use React.js to build client-side applications
CO3:Develop Spring Boot based web applications
CO4:Integrate web applications with MongoDB
CO5:Develop Web applications, RESTful web services and MicroServices using full stack
CO-PO Mapping
UNIT I INTRODUCTION 9
Bioinformatics- Need for Bioinformatics technologies – Overview of Bioinformatics
technologies - Structural bioinformatics – Data format and processing – Secondary resources and
applications – Role of Structural bioinformatics – Biological Data Integration System.
78
UNIT III GRAPHS 9
Hidden Markov modeling for biological data analysis and protein, gene families Sequence
identification – Sequence classification – multiple alignment generation – Comparative modeling
–Protein modeling – genomic modeling – Probabilistic modeling – Bayesian networks – Boolean
networks – Molecular modeling – Computer programs for molecular modeling.
REFERENCES
1. David W. Mount Bioinformatics: Sequence and Genome Analysis, Cold Spring Harbor
Laboratory Press, 2nd ed., 2004
2. Arthur M .Lesk, Introduction to Bioinformatics, Oxford University Press, 2014
3. Big Data Analysis for Bioinformatics and Biomedical Discoveries Edited by Shui Qing Ye,
CRC Press, Taylor and Francis Group, 2015
4. Bolón-Canedo, V., & Alonso-Betanzos, A. (Eds.). Microarray Bioinformatics. Methods in
Molecular Biology, 2019
5. Andrew R.Leach, Molecular Modeling Principles And Applications, Prentice Hall,2009.
6. Baldi,P.,Brunak, S.Bioinformatics: The Machine Learning Approach, East West Press, 2 nd
2001
7. Orpita Bosu, Bioinformatics – Databases, Tools and Algorithms, Oxford University Press,
2007.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Gather knowledge of basic bioinformatics and computational biology concepts
CO2:Perform analysis of biological data including proteomic, genomic and transcriptomic data and
provide meaningful interpretation of the results
CO3:Understand machine learning techniques, microarray data analysis and interpretation of
results
CO4:Understand the concepts of modelling for bioinformatics
CO5:Perform analysis of various methods of phylogenetic tree construction and its evolutions
CO-PO Mapping
79
CO3 1 2 1 1 3 3
CO4 1 2 2 2 2 2
CO5 1 2 1 - 2 3
UNIT I INTRODUCTION 9
Introduction to Virtual Reality – Definition – Three I’s of Virtual Reality – Virtual Reality Vs 3D
Computer Graphics – Benefits of Virtual Reality – Components of VR System – Introduction to AR
– System Structure of Augmented Reality – Key Technology in AR – 3D Vision – Approaches to
Augmented Reality – Alternative Interface Paradigms – Spatial AR – Input Devices – 3D Position
Trackers – Performance Parameters – Types Of Trackers – Interaction-Modelling and annotation-
Navigation and Manipulation Interfaces – Gesture Interfaces – Types of Gesture Input Devices –
Output Devices – Graphics Display – Human Visual System – Personal Graphics Displays – Large
Volume Displays – Sound Displays – Human Auditory System.
UNIT IV MR PROGRAMMING 9
VR Programming – Toolkits and Scene Graphs – World Toolkit – Java 3D – Comparison of World
Toolkit and Java 3D – GHOST – People Shop – Human Factors in VR – Methodology And
Terminology – VR Health and Safety Issues – VR and Society –Mixed Reality Coding –
Trajectories through Mixed Reality Performance – Mobile Interface Design – Quantitative
Evaluation – Qualitative Evaluation
UNIT V APPLICATIONS 9
Emerging MR Applications in Medical, Military & Manufacturing– Education, Arts and
Entertainment– Applications of MR in Robotics-Application of AI in AR & VR: virtual assistant,
Digital avatars and characters, user engagement, Interactive training, digital art creation –
Information Visualization –Wearable Computing – Games
TOTAL: 45 PERIODS
REFERENCES
1. Grigore C. Burdea, Philip Coiffet, “Virtual Reality Technology”, Second Edition, Wiley
India, 2006.
2. Benford, S., Giannachi G., “Performing Mixed Reality”, MIT Press, 2011
80
3. Dieter Schmalstieg, Tobias Hollerer, “Augmented Reality: Principles & Practice”, Addison
Wesley, 2016.
4. Charles Palmer, John Williamson, “Virtual Reality Blueprints: Create Compelling VR
Experiences for Mobile”, Packt Publisher, 2018.
5. John Vince, “Introduction to Virtual Reality”, Springer-Verlag, 2004.
6. William R. Sherman, Alan B.Craig: Understanding Virtual Reality – Interface,Application,
Design”, Morgan Kaufmann, 2003.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Discuss the basic concepts of Mixed Reality.
CO2:Design and develop the Mixed Reality applications in different domains.
CO3:Design various models using modelling techniques.
CO4:Perform Mixed Reality Programming with toolkits.
CO5:Understand the working principles of input output devices used in mixed reality
applications.
CO6:Evaluate mixed reality-based applications.
CO-PO Mapping
TOTAL: 45 PERIODS
REFERENCES
1. E. A. Lee and S. A. Seshia, “Introduction to Embedded Systems: A Cyber-Physical Systems
Approach”, 2011.
2. R. Alur, “Principles of Cyber-Physical Systems,” MIT Press, 2015.
3. R. Alur, “Principles of Cyber-Physical Systems,” MIT Press, 2015.
4. T. D. Lewis “Network Science: Theory and Applications”, Wiley, 2009.
5. P. Tabuada, “Verification and control of hybrid systems: a symbolic approach”, Springer-
Verlag 2009.
6. C. Cassandras, S. Lafortune, “Introduction to Discrete Event Systems”, Springer 2007.
7. Constance Heitmeyer and Dino Mandrioli, “Formal methods for real-time computing”, Wiley
publisher, 1996.
8. Platzer, Andre, " Logical Foundation of Cyber-Physical Systems", Theorectical Computer
Science, Springer-2018.
9. Rajkamal, " Enbedded Systems, Architecture, Programming and Design", Second Edition,
Tata McGraw-Hill Publisher, 2008.
COURSE OUTCOMES:
Upon completion of the course, the students will be able to
CO1:Explain and analyze the major concepts, philosophical and theoretical perspectives, empirical
findings,and historical trends in Cyber-Physical Systems.
CO2:Use Computational knowledge base to create their own methods for answering novel
questions of either a theoretical or applied nature, and to critically evaluate the work of others
in the same domain.
CO3:Articulate the main concepts, key technologies, strengths and limitations of Human Centered
Cyber Physical Systems.
CO4:Point out the challenges in HiTL and able to explain the future of HiTL CPS.
CO5:Be proficient with basic feedback and control research methods, including both theory-driven
and applied research design.
CO-PO Mapping