Updated Syllabus - ME CSE Word Document PDF
Updated Syllabus - ME CSE Word Document PDF
                                                                                              Instructional
 Unit                                      Description
                                                                                                 Hours
        LINEAR PROGRAMMING
   I                                                                                                12
        Formulation – Graphical solution – Simplex method – Two phase method –
        Transportation and Assignment Problems
        SIMULATION
  II    Discrete Event Simulation – Monte – Carlo Simulation – Stochastic Simulation –              12
        Applications to real time problems
        ESTIMATION THEORY
  III   Estimators: Unbiasedness, Consistency, Efficiency and Sufficiency – Maximum                 12
        Likelihood Estimation – Method of moments
        TESTING OF HYPOTHESIS
        Sampling distributions – Estimation of parameters – Statistical hypothesis –
  IV    Tests based on Normal, t, Chi-square and F distributions for mean, variance                 12
        and proportion, Tests for independence of attributes and goodness of fit.
        MULTIVARIATE ANALYSIS
        Random vectors and Matrices – Mean vectors and Covariance matrices –
  V                                                                                                 12
        Multivariate Normal density and its properties – Principal components: Population
        principal components – Principal components from standardized variables
                                                                Total Instructional Hours           60
Course       CO1:    Formulate and find optimal solution in the real life optimizing/allocation/assignment
Outcome              problems involving conditions and resource constraints.
             CO2:    Simulate appropriate application/distribution problems.
             CO3:    Obtain the value of the point estimators using the method of moments and method of
                     maximum likelihood.
             CO4:    Apply the concept of various test statistics used in hypothesis testing for mean and
                     variances of large and small samples.
             CO5:    Get exposure to the principal component analysis of random vectors and matrices.
                     HICET – Department of Computer Science and Engineering
REFERENCE BOOKS:
R1: Jay L.Devore, “Probability and Statistics for Engineering and the Sciences”, Cengage Learning, 9th
    Edition, Boston, 2016
R2: Johnson, R.A, Irwin Miller and John Freund., “Miller and Freund’s Probability and Statistics for
    Engineers”, Pearson Education, 9th Edition, New York, 2016.
R3: Ross. S.M., “Probability Models for Computer Science”, Academic Press, SanDiego, 2002.
R4: Taha H.A.,, “Operations Research: An Introduction”, Prentice Hall of India Pvt. Ltd. 10th Edition, New
    Delhi, 2017
R5: Winston, W.L., “Operations Research”, Thomson – Brooks/Cole, Fourth Edition, Belmont, 2003.
         FUNDAMENTALS
  I      Properties of Big-oh Notation –Conditional Asymptotic Notation – Algorithm                   12
         Analysis – Amortized Analysis – Introduction to NP-Completeness/NP-Hard –
         Recurrence Equations – Solving Recurrence Equations – Time-Space Tradeoff
         SEARCH STRUCTURES
 II      Binary Search Trees – AVL Trees – Red-Black trees – Multi-way Search                         12
         Trees –B-Trees – Splay Trees – Tries.
         HEAP STRUCTURES
 III     Min/Max heaps – Deaps – Leftist Heaps – Binomial Heaps – Fibonacci                           12
         Heaps – Skew Heaps – Lazy Binomial Heaps
         GEOMETRIC ALGORITHMS
         Segment Trees – 1-Dimensional Range Searching – k-d Trees – Line Segment
IV                                                                                                    12
         Intersection – Computing the Overlay of Two Subdivisions – Range Trees –
         Voronoi Diagram
         ADDITIONAL TOPICS
         Approximation Algorithms: Vertex Cover & Euclidean Travelling Salesperson
 V                                                                                                    12
         Problem – Randomized Algorithms: Closest Pair Problem & Minimum Spanning
         Trees – Online Algorithm: Euclidean Spanning Tree
                                                              Total Instructional Hours               60
REFERENCE BOOKS:
R1: Ellis Horowitz, Sartaj Sahni, Susan Anderson-Freed, “Fundamentals of Data Structures in
    C”,Second Edition, University Press, 2008
R2: Gilles Brassard, Paul Bratley, “Algorithmics: Theory and Practice”, Prentice Hall, 1988.
R3: Mark de Berg, Otfried Cheong, Marc van Kreveld, Mark Overmars, “Computational Geometry
    Algorithms and Applications”, Third Edition, Springer, 2008.
R4: R.C.T Lee, S.S Tseng, R.C Chang and Y.T Tsai, “Introduction to the Design and Analysis of
    Algorithms”, Tata McGraw-Hill Edition, 2012.
R5: Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein, “Introduction to
    Algorithms”, MIT Press, 2009
                                                                                             Instructional
Unit                                       Description
                                                                                                Hours
         RELATIONAL MODEL
         Entity Relationship Model – Relational Data Model – Mapping Entity
  I      Relationship Model to Relational Model – Relational Algebra – Structured                  9
         Query Language-Database Normalization – Transaction Management-
         Recovery
         PARALLEL AND DISTRIBUTED DATABASES
         Parallel Databases– I/O Parallelism– Inter-Query and Intra-Query
         Parallelism– Inter-Operation and Intra-operation Parallelism – Performance
 II      evaluation for Parallel DB Systems – Distributed Database Architecture-                   9
         Distributed Data Storage – Distributed Transactions – Distributed Query
         Processing –Distributed Transaction Management – Load balancing tools for
         DDB – DDB Security.
         XML AND WEB DATABASES
         XML Data Model – DTD – XML Schema – XML Querying – Web
 III     Databases – Open Database Connectivity-Java Database Connectivity–                        9
         Accessing Relational database using PHP – User Driven Querying – Writing
         to Web Databases – Session Management
         ACTIVE TEMPORAL AND DEDUCTIVE DATABASES
         Event Condition Action Model – Design and Implementation Issues for
IV       Active Databases – Termination, Confluence, Determination and                             9
         Modularization – Temporal Databases –Interpreting Time in Relational
         Databases – Deductive Databases – Datalog Queries
         NoSQL DATABASES
         NoSQL database vs traditional RDBMS database – Migrating from RDBMS
 V       to NoSQL– CRUD operations – Querying NoSQL stores – Indexing and                          9
         Ordering Datasets – MongoDB-Database creation and Querying– Web
         Application development using MongoDB
                                                                 Total Instructional Hours        45
REFERENCE BOOKS:
R1: R. Elmasri, S.B. Navathe, “Fundamentals of Database Systems”, Addison-Wesley, 2011.
R2: Han, Jiawei, Jian Pei, and MichelineKamber. Data mining: Concepts and Techniques. 2011.
R3: Thomas Cannolly and Carolyn Begg, “Database Systems, A Practical Approach to Design,
    Implementation and Management”, Third Edition, Pearson Education, 2007
R4: Henry F Korth, Abraham Silberschatz, S. Sudharshan, “Database System Concepts”, Fifth Edition,
    McGraw Hill, 2006
R5: C. J. Date, A.Kannan and S. Swamynathan, “An Introduction to Database Systems”, Eighth Edition,
    Pearson Education, 2006.
Course      CO1:         Understand the need of software architecture for sustainable dynamic systems
Outcome     CO2:         Have a sound knowledge on design principles and to apply for large scale systems
                      HICET – Department of Computer Science and Engineering
           CO4:      Have good knowledge on service oriented and model driven architectures and the aspect
                     oriented architecture
           CO5:      Have a working knowledge to develop appropriate architectures through various
                     case studies.
REFERENCE BOOKS:
R1: Essentials of software Architecture , Ion Gorton, Second Edition, Springer-verlag, 2011
R2: Software Architecture Design Illuminated, Kai Qian Jones and Bartlett Publishers Canada, 2010
                                                                                                    Instructional
 Unit                                        Description
                                                                                                       Hours
REFERENCE BOOKS:
R1: Asimov, “Introduction to Design”, Prentice Hall, 1962
R2: Halbert, “Resisting Intellectual Property”, Taylor & Francis Ltd ,2007
R3: Mayall, “Industrial Design”, McGraw Hill, 1992.
R4: Niebel, “Product Design”, McGraw Hill, 1974.
R5: Ranjit Kumar, 2nd Edition, “Research Methodology: A Step by Step Guide for beginners” 2010
COURSE OUTCOMES:
Upon completion of this course, the students will be able to
CO 1: analyze the algorithm’s efficiency of any given problem.(K4)
CO 2: apply different algorithmic design techniques to solve the problem.(S2,K3)
CO 3: use various efficient optimization techniques and parallel algorithms to reduce space complexity. (S5,K2)
CO 4: develop different approximation algorithm for P and NP class Problems. (S3,A2)
       Divide and Conquer: Binary Search – Analysis - Greedy Method: Prim’s Algorithm – Analysis - Dynamic
Programming strategies: Computing Binomial Co-efficient – Analysis - Backtracking: Eight Queen’s Problem- Analysis -
Branch and Bound- 0 / 1 Knapsack Problem
        Searching algorithms - Priority queues - Binary heaps - Binomial heaps - Dictionaries - Hash tables - String
Matching - Introduction to string-matching problem- Naïve algorithm - Rabin Karp - Knuth Morris Pratt - Boyer-Moore
algorithms and complexity analysis- Data compression algorithms - Huffman compression -Lempel-Ziv compression
        Probabilistic Algorithm - Numerical probabilistic algorithms - Monte Carlo algorithms-Las Vegas algorithms -
Parallel algorithms: Introduction - Complexity measure for a parallel algorithmparallel searching algorithm - parallel
sorting algorithm - parallel algorithm for matrix manipulation
       The class P and NP: NP- Completeness Problem, NP-Hard Problems - Approximation Algorithms: Introduction-
approximation factor- Polynomial Time Approximation Scheme (PTAS) - Fully Polynomial Time Approximation
Scheme (FPTAS) - Approximation algorithms: Travelling Salesman Problem – knapsack problem - Bin packing- subset
sum problem
                                                                                               TOTAL: 45 PERIODS
REFERENCES
1. Dave, Dave Parag Himanshu, “Design and Analysis of Algorithms”, 2nd Edition, Pearson Education India, 2007.
2. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein, “Introduction To Algorithms “, 3rd
Edition, MIT Press, 2008.
3. Sara Baase, "Computer Algorithms: Introduction to Design and Analysis, Second Edition", Addison-Wesley, 2008.
4. Banachowski. L, Kreczmar. A, Wojciech. R, “Analysis of Algorithms and Data Structures”, 2nd Edition, Addison
Wesley, 2006.
5. Anany Levitin, “Introduction to the Design and Analysis of Algorithms”, 2nd Edition, Pearson Education,
2011.
        HICET – Department of Computer Science and Engineering
                                                                                               Instructional
 Unit                                      Description
                                                                                                  Hours
        INTRODUCTION
        Introduction- Historical Development – Cloud Computing Architecture – The
   I    Cloud Reference Model – Cloud Characteristics –Cloud Deployment Models:                      09
        Public, Private, Community, Hybrid Clouds- Cloud Delivery Models: IaaS,
        PaaS, SaaS – Open Source Private Cloud Software: Eucalyptus, Open Nebula,
        Open Stack.
        VIRTUALIZATION
        Data Center Technology – Virtualization – Characteristics of Virtualized
  II    Environments - Taxonomy of Virtualization Techniques – Virtualization and                    09
        Cloud Computing –Pros and Cons of Virtualization – Implementation Levels
        of Virtualization – Tools and Mechanisms: Xen, VMWare, Microsoft Hyper-
        V, KVM, Virtual Box
        CLOUD COMPUTING MECHANISM
        Cloud Infrastructure Mechanism: Cloud Storage, Cloud Usage Monitor,
        Resource Replication – Specialized Cloud Mechanism: Load Balancer, SLA
  III   Monitor, Pay-per-use Monitor, Audit Monitor, Failover System, Hypervisor,                    09
        Resource Cluster, Multi Device Broker, State Management Database –
        Cloud Management Mechanism: Remote Administration System, Resource
        Management System, SLA Management System, Billing Management
        System
        HADOOP AND MAP REDUCE
        Apache Hadoop – Hadoop Map Reduce –Hadoop Distributed File System-
  IV    Hadoop I/O- Developing a Map Reduce Application – Map Reduce Types                           09
        and Formats – Map Reduce Features– Hadoop Cluster Setup –Administering
        Hadoop.
        SECURITY IN THE CLOUD
        Basic Terms and Concepts – Threat Agents – Cloud Security Threats –Cloud
  V     Security Mechanism: Encryption, Hashing, Digital Signature, Public Key                       09
        Infrastructure, Identity and Access Management, Single Sign-on, Cloud
        Based Security Groups, Hardened Virtual Server Images.
                                                               Total Instructional Hours             45
Course       CO1:    Articulate the main concepts, key technologies, strengths and limitations of cloud
Outcome              computing
             CO2:    Identify the architecture, infrastructure and delivery models of cloud computing.
             CO3:    Explain the core issues of cloud computing such as security, privacy and interoperability.
             CO4:    Choose the appropriate technologies, algorithms and approaches for the related issues.
             CO5:    Facilitate Service Level Agreements (SLA).
                     HICET – Department of Computer Science and Engineering
REFERENCE BOOKS:
R1: Thomas Erl, Zaigham Mahood, Ricardo Puttini, “Cloud Computing, Concept, Technology &
    Architecture”, Prentice Hall, 2013.
R2: Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi, “Mastering Cloud Computing”, Tata
    McGraw-Hill,2013.
R3: Toby Velte, Anthony Velte, Robert C. Elsenpeter, “Cloud Computing, A Practical Approach”, Tata
    McGraw-Hill Edition, 2010.
R4: Arshdeep Bahga, Vijay Madisetti, “Cloud Computing: A Hands-On Approach”, Universities
    Press(India) Private Limited, 2014.
R5: Tom White, “Hadoop: The Definitive Guide”, O’Reilly Media, 4th Edition, 2015.
     James E Smith and Ravi Nair, “Virtual Machines”, Elsevier, 2005.
      Course Objective
                         1. To understand the concepts of Machine Learning.
                         2. To appreciate supervised learning and their applications.
                         3. To appreciate the concepts and algorithms of unsupervised learning.
                         4. To understand the theoretical and practical aspects of Probabilistic Graphical
                            Models.
                         5. To appreciate the concepts and algorithms of advanced learning.
                                                                                                  Instructional
 Unit                                          Description
                                                                                                     Hours
      I    INTRODUCTION
          Machine Learning–Types of Machine Learning –Machine Learning process- preliminaries,             8
          testing Machine Learning algorithms, turning data intoProbabilities,
           and Statistics for Machine Learning- Probability theory – Probability Distributions –
           Decision Theory. Illustrative Programs: Simple Decision Tree.
 II       SUPERVISED LEARNING
          Linear Models for Regression – Linear Models for Classification- DiscriminantFunctions,
          Probabilistic Generative Models, Probabilistic Discriminative Models –
          Decision Tree Learning – Bayesian Learning, Naïve Bayes – Ensemble Methods, Bagging,          15
          Boosting, Neural Networks, Multi-layer Perceptron, Feed- forward Network,
          Error Back propagation - Support Vector Machines .
          Illustrative Programs: Solving Regression & Classification using Decision Trees,
          Root Node Attribute Selection for Decision Trees using Information Gain,
          Bayesian Inference in Gene Expression Analysis, Pattern Recognition Application
           using Bayesian Inference, Bagging in Classification, Bagging,
          Boosting applications using Regression Trees.
V         ADVANCED LEARNING
          Sampling-Basic Sampling methods, Monte Carlo, Gibbs Sampling – Computational
          Learning Theory – Mistake Bound Analysis – Reinforcement learning –
          Markov Decision processes, Deterministic and Non-deterministic Rewards and Actions,         15
          Temporal Difference Learning Exploration. Illustrative Programs: Dimensionality
          Reduction Algorithms in Image Processing applications, Using Weka tool for SVM
          classification for chosen domain application.
REFERENCE BOOKS:
R1: Christopher Bishop, “Pattern Recognition and Machine Learning” Springer, 2007.
R2: Stephen Marsland, “Machine Learning – An Algorithmic Perspective”, Chapman andHall, CRC
    Press, Second Edition, 2014
R3: Kevin P. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012.
R4: Ethem Alpaydin, “Introduction to Machine Learning”, MIT Press, Third Edition, 2014.
R5: Tom Mitchell, “Machine Learning”, McGraw-Hill, 1997.
            Write a Java program that implements Kruskal’s algorithm to generate minimum cost spanning
   11.      tree.
   12.      Write a Java program that implements KMP algorithm for pattern matching.
                                                                                Total Instructional Hours 60
Course        CO1:      Students will be able to choose appropriate advanced data structure for given problem.
Outcome       CO2:      Students will be able to calculate complexity.
              CO3:      Students will be able to select appropriate design techniques to solve real world problems.
              CO4:      Students will able to apply the dynamic programming technique to solve the problems.
              CO5:      Students will be able to select a proper pattern matching algorithm for given problem
                                                                                              Instructional
 Unit                                      Description
                                                                                                 Hours
        INTRODUCTION TO BIG DATA
        Introduction to Big Data-Big Data enabling Technologies- Hadoop Stack for Big
   I                                                                                               9
        Data-Hadoop Distributed File System-Hadoop Map Reduce 1.0- Hadoop Map
        Reduce 2.0-Map Reduce examples.
        BIG DATA PLATFORM
        Parallel Programming with spark-Introduction to Spark- Spark Built-in Libraries-
  II                                                                                               9
        Design of Key Value stores-Data placement Strategies-CAP Theorem-Consistency
        Solutions-Design of Zookeeper-CQL(Cassandra Query Language)
        BIG DATA STREAMING PLATFORMS FOR FAST DATA
        Introduction to Big Data Streaming Platforms for Fast Data-Introduction to Big Data
  III   Streaming Systems-Big Data Pipelines for Real-Time computing -Design of HBase-             9
        Spark Streaming and Sliding Window Analytics- Sliding Window Analytics-
        Introduction to Kafka.
        MACHINE LEARNING
        Big Data Machine Learning-Machine Learning Algorithm K-Means Using Map
  IV    Reduce for Big Data Analytics -Parallel K-Means Using Map Reduce On Big Data               9
        Cluster Analysis-Decision Trees for Big Data Analytics-Big Data Predictive
        Analytics .
        BIG DATA APPLICATIONS
        Introduction to Big Data Applications (Graph Processing-Introduction to Pregel-
  V                                                                                                9
        Parameter Servers-PageRank Algorithm in Big Data-Spark GraphX & Graph
        Analytics-Case Study: Flight Data Analysis Using Spark GraphX
                                                                Total Instructional Hours          45
TEXT BOOK :
T1:     Bart Baesens, Analytics in a Big Data World: The Essential Guide to Data Science and its
            Applications, Wiley, 2014
REFERENCE BOOKS:
R1: https://nptel.ac.in/courses/106/104/106104189/
R2: Dirk Deroos et al., Hadoop for Dummies, Dreamtech Press, 2014.
R3: Chuck Lam, Hadoop in Action, December, 2010.
                                                                                                 Instructional
 Unit                                       Description
                                                                                                    Hours
        INTRODUCTION
   I    Definitions - Foundations - History - Intelligent Agents-Problem Solving-                       9
        Searching -Heuristics -Constraint Satisfaction Problems - Game playing.
Course      CO1:      Students will gain deep understanding of the basic artificial intelligence techniques.
Outcome     CO2:      Students will apply their knowledge to design solutions to different problems.
            CO3:      Students will have the ability to design and develop an intelligent system for a selected
                      application.
            CO4:      An ability to work individually or as a member with responsibility to function on
                      multidisciplinary teams.
            CO5:      Ability to understand and apply computational platforms and software tools for
                      Information Technology applications
                       HICET – Department of Computer Science and Engineering
TEXT BOOKS:
T1: Stuart Russell and Peter Norvig, “Artificial Intelligence - A Modern Approach”,2nd Edition, Prentice
    Hall, 2002
 REFERENCE BOOKS:
 R1: Michael Wooldridge, “An Introduction to Multi Agent System”, John Wiley, 2002.
 R2: Patrick Henry Winston, Artificial Intelligence, 3rd Edition, AW, 1999.
 R3: Nils.J.Nilsson, Principles of Artificial Intelligence, Narosa Publishing House, 1992
                                                                                                  Instructional
Unit                                       Description
                                                                                                     Hours
        MULTIPROCESSOR ISSUES
 III    Symmetric and Distributed Shared Memory Architectures – Cache Coherence                          9
        Issues – Performance Issues – Synchronization Issues – Models of Memory
        Consistency – Interconnection Networks – Buses, Crossbar and Multi-stage
        Interconnection Networks.
        MULTICORE ARCHITECTURES
        Homogeneous and Heterogeneous Multi-core Architectures – Intel Multicore
IV                                                                                                       9
        Architectures – SUN CMP architecture – IBM Cell Architecture. Introduction
        to Warehouse-Scale computers, Cloud Computing – Architectures and Issues
        – Case Studies.
Course       CO1:      Identify the limitations of ILP and the need for multicore architectures.
Outcome      CO2:      Discuss the issues related to multiprocessing and suggest solutions.
             CO3:      Point out the salient features of different multicore architectures and how they exploit
                       parallelism.
             CO4:      Point out the various optimizations that can be performed to improve the memory
                       hierarchy design.
             CO5:      Point out the salient features of vector, GPU and domain specific architectures.
                     HICET – Department of Computer Science and Engineering
REFERENCE BOOKS:
R1: John L. Hennessey and David A. Patterson, “Computer Architecture – A Quantitative Approach”,
    Morgan Kaufmann / Elsevier, 5th edition, 2012.
R2: Darryl Gove, “Multicore Application Programming: For Windows, Linux, and Oracle Solaris”,
    Pearson, 2011.
R3: David B. Kirk, Wen-mei W. Hwu, “Programming Massively Parallel Processors”, Morgan
    Kauffman, 2010.
R4: Wen–mei W.Hwu,“GPU Computing Gems”, Morgan Kaufmann / Elsevier, 2011.
                                                                                                    Instructional
Unit                                           Description
                                                                                                       Hours
         INTRODUCTION TO DESIGN PATTERN
         What is a Design Pattern?, Design Patterns in Smalltalk MVC, Describing Design
  I       Patterns, The Catalogue of Design Patterns, Organizing The Cato log, How Design                 9
          Patterns solve Design Problems, How to Select a Design pattern, How to Use a
          Design Pattern.
         A CASE STUDY OF DESIGN PATTERN
         A Case Study: Designing a Document Editor, Design Problems , Document
         Structure, Formatting , Embellishing the User Interface, Supporting Multiple
 II      Look-and-Feel Standards, Supporting Multiple Window Systems, User                                9
         Operations Spelling Checking and Hyphenation, Summary, Creational
         Patterns, Abstract Factory, Builder , Factory Method, Prototype, Singleton,
         Discussion of Creational Patterns
         STRUCTURAL PATTERN PART-I & II
 III     Structural Pattern Part-I, Adapter, Bridge, Composite. Structural Pattern Part-II,               9
          Decorator, Facade, Flyweight, Proxy.
         BEHAVIORAL PATTERNS PART: I & II
IV       Behavioral Patterns Part: I, Chain of Responsibility, Command, Interpreter, Iterator.            9
          Behavioral Patterns Part: II, Mediator, Memento, Observer, Discussion of
          Behavioral Patterns.
         BEHAVIORAL PATTERNS PART:III
 V       Behavioral Patterns Part: III, State, Strategy, Template Method, Visitor, Discussion             9
         of Behavioral Patterns. What to Expect from Design Patterns, A Brief History, The
         Pattern Community, An Invitation, A Parting Thought
                                                                   Total Instructional Hours              45
TEXT BOOKS:
T1:    Design Patterns By Erich Gamma, Pearson Education
REFERENCE BOOKS:
R1: Patterns in JAVA Vol-I (or) Vol-II By Mark Grand, Wiley Dream Tech.
R2: Java Enterprise Design Patterns Vol-III By Mark Grand Wiley Dream Tech
                                                                                              Instructional
Unit                                       Description
                                                                                                 Hours
         INTERMEDIATE REPRESENTATION OF PROGRAMS AND ANALYSIS
         Structure of an Optimizing Compiler – Compiler Construction tools – LIR, MIR,
  I      HIR, DAG, SyntaxTree and Postfix. Analysis: Control Flow Analysis, Iterative Data             9
         Flow Analysis, Static Single Assignment – A Linear Time Algorithm for Placing φ-
         Nodes, Basic Block Dependence, Alias Analysis. Introduction to LLVM –
         Compiling a language
         LOCAL AND LOOP OPTIMIZATIONS
         Early Optimizations: Constant-Expression Evaluation – Scalar Replacement
         of Aggregates – Algebraic Simplifications and Re-association – Value
         Numbering – Copy Propagation – Sparse Conditional Constant Propagation.
 II      Redundancy Elimination: Common – Subexpression Elimination – Loop-                            9
         Invariant Code Motion – Partial-Redundancy Elimination – Redundancy
         Elimination and Reassociation – Code Hoisting. Loop Optimizations:
         Induction Variable Optimizations – Unnecessary Bounds Checking
         Elimination. LLVM pass –LLVM Test Infrastructure.
         PROCEDURE OPTIMIZATION AND SCHEDULING
         Procedure Optimizations: Tail-Call Optimization and Tail-Recursion
         Elimination – Procedure Integration – In-Line Expansion – Leaf-Routine
         Optimization and Shrink Wrapping. Code Scheduling: Instruction Scheduling
         – Speculative Loads and Boosting – Speculative Scheduling – Software
 III     Pipelining – Trace Scheduling – Percolation Scheduling. Control-Flow and                      9
         Low-Level Optimizations: Unreachable-Code Elimination – Straightening –
         If Simplifications – Loop Simplifications –Loop Inversion Un-switching –
         Branch Optimizations – Tail Merging or Cross Jumping – Conditional Moves
         – Dead-Code Elimination – Branch Prediction – Machine Idioms and
         Instruction Combining. LLVM API procedure optimization.
         INTER PROCEDURAL OPTIMIZATION
         Symbol table Runtime Support – Interprocedural Analysis and Optimization:
         Interprocedural Control- Flow Analysis – The Call Graph – Interprocedural
IV       Data-Flow Analysis – Interprocedural Constant Propagation – Interprocedural                   9
         Alias Analysis – Interprocedural Optimizations – Interprocedural Register
         Allocation – Aggregation of Global References. LLVM – Interprocedural
         Analyses.
         OPTIMIZING FOR MEMORY
         Register Allocation: Register Allocation and Assignment – Local Methods – Graph
 V         Coloring Priority Based Graph Coloring. Computations on Iteration Spaces-                   9
           Optimization for the Memory Hierarchy: Impact of Data and Instruction Caches –
           Instruction-Cache Optimization – Scalar Replacement of Array Elements – Data-
           Cache Optimization – Scalar vs. Memory-Oriented Optimizations. Software
                     HICET – Department of Computer Science and Engineering
Course     CO1:      Identify the different optimization techniques that are possible for a sequence ofcode.
Outcome    CO2:      Design performance enhancing optimization techniques.
           CO3:      Manage procedures with optimal overheads.
           CO4:      Understand modern programming language features and constructs.
           CO5:      Learn to work on a larger software project
CO6:
REFERENCE BOOKS:
R1: Steven.S. Muchnick, Advanced Compiler Design and Implementation, Morgan Kaufman Publishers,
    1997.
R2: Alfred V. Aho, Monica S. Lam, Ravi Sethi, Jeffrey D. Ullman, “Compilers: Principles, Techniques,
    and Tools”, Addison Wesley, Second Edition, 2007.
R3: Y.N.Srikant, Priti Shankar, “The Compiler Design Handbook – Optimizations and Machine Code
    Generation”, CRC Press, Second Edition, 2008.
R4: Andrew W. Appel, Jens Palsberg, “Modern Compiler Implementation in Java”, Cambridge
    University Press, Second Edition, 2002.
R5: Keith Cooper, Linda Torczon, “Engineering a Compiler”, Morgan Kaufmann, Second Edition, 2011.
R6: Randy Allen and Ken Kennedy, Optimizing Compilers for Modern Architectures: A Dependence
    based Approach, Morgan Kaufman, 2001.
REFERENCE BOOKS:
R1: Mukesh Singhal and Niranjan G. Shivaratri, “Advanced Concepts in Operating Systems – Distributed,
    Database and Multiprocessor Operating Systems”, Tata MC Graw-Hill, 2001
R2: Rajib Mall, “Real-Time Systems: Theory and Practice”, Pearson Education India, 2006.
R3: Karim Yaghmour, “Embedded Android”, O’Reilly, First Edition, 2013.
R4: Nikolay Elenkov, “Android Security Internals: An In-Depth Guide to Android’s Security
    Architecture”, No Starch Press, 2014.
                                                                                                Instructional
 Unit                                       Description
                                                                                                   Hours
        DEVELOPMENT LIFE CYCLE PROCESSES
        Overview of software development life cycle – introduction to processes –
   I    Personal Software Process (PSP) – Team software process (TSP) – Unified                       9
        processes – agile processes – choosing the right process Tutorial: Software
        development using PSP
        REQUIREMENTS MANAGEMENT
        Functional requirements and quality attributes – elicitation techniques – Quality
        Attribute Workshops (QAW) – analysis, prioritization, and trade-off –
  II    Architecture Centric Development Method (ACDM) – requirements                                 9
        documentation and specification – change management – traceability of
        requirements Tutorial: Conduct QAW, elicit, analyze, prioritize, and document
        requirements using ACDM
        ESTIMATION, PLANNING, AND TRACKING
        Identifying and prioritizing risks – risk mitigation plans – estimation techniques –
        use case points – function points – COCOMO II – top-down estimation – bottom-
  III                                                                                                 9
        up estimation – work breakdown structure – macro and micro plans – planning
        poker – wideband delphi – documenting the plan – tracking the plan – earned
        value method (EVM) Tutorial: Estimation, planning, and tracking exercises
        CONFIGURATION AND QUALITY MANAGEMENT
        identifying artifacts to be configured – naming conventions and version control –
        configuration control – quality assurance techniques – peer reviews – Fegan
  IV                                                                                                  9
        inspection – unit, integration, system, and acceptance testing – test data and test
        cases – bug tracking – causal analysis Tutorial: version control exercises,
        development of test cases, causal analysis of defects
        SOFTWARE PROCESS DEFINITION AND MANAGEMENT Process
        elements – process architecture – relationship between elements – process
  V     modeling – process definition techniques – ETVX (entry-task-validation-exit) –                9
        process baselining – process assessment and improvement – CMMI – Six Sigma
        Tutorial: process measurement exercises, process definition using ETVX
                                                                    Total Instructional Hours         45
REFERENCE BOOKS:
R1: Pankaj Jalote, “Software Project Management in Practice”, Pearson, 2002.
R2: Chris F. Kemerer, “Software Project Management – Readings and Cases”, McGraw Hill, 1997.
R3:   Watts S. Humphrey, “PSP: A self-improvement process for software engineers”, Addison- Wesley, 2005.
R4: Watts S. Humphrey, “Introduction to the Team Software Process”, Addison-Wesley, 2000.
R5:   Orit Hazzan and Yael Dubinsky, “Agile software engineering”, Springer, 2008.
R6:   James R. Persse, “Process Improvement Essentials”, O’Reilly, 2006.
R7:    Roger S. Pressman, “Software Engineering – A Practitioner’s Approach”, Seventh Edition, McGraw Hill,
      2010.
                                                                                                  Instructional
 Unit                                        Description
                                                                                                     Hours
        IMAGE PROCESSING FUNDAMENTALS
        Introduction – Elements of visual perception, Steps in Image Processing Systems –
   I    Digital Imaging System - Image Acquisition – Sampling and Quantization – Pixel                  9
        Relationships – File Formats – colour images and models - Image Operations –
        Arithmetic, logical, statistical and spatial operations.
        IMAGE ENHANCEMENT AND RESTORATION
        Image Transforms -Discrete and Fast Fourier Transform and Discrete Cosine
  II    Transform ,Spatial Domain - Gray level Transformations Histogram Processing                     9
        Spatial Filtering – Smoothing and Sharpening. Frequency Domain: Filtering in
        Frequency Domain – Smoothing and Sharpening filters – Homomorphic Filtering.,
        Noise models, Constrained and Unconstrained restoration models.
        IMAGE SEGMENTATION AND MORPHOLOGY
        Detection of Discontinuities – Edge Operators – Edge Linking and Boundary
        Detection – Thresholding – Region Based Segmentation – Motion Segmentation,
  III   Image Morphology: Binary and Gray level morphology operations - Erosion,                        9
        Dilation, Opening and Closing Operations Distance Transforms- Basic
        morphological Algorithms. Features – Textures - Boundary representations and
        Descriptions- Component Labeling – Regional descriptors and Feature Selection
        Techniques.
        IMAGE ANALYSIS AND CLASSIFICATION
        Image segmentation- pixel based, edge based, region based segmentation. Active
  IV    contour models and Level sets for medical image segmentation, Image                             9
        representation and analysis, Feature extraction and representation, Statistical, Shape,
        Texture, feature and statistical image classification
        IMAGE REGISTRATION AND VISUALIZATION
        Rigid body visualization, Principal axis registration, Interactive principal axis
  V     registration, Feature based registration, Elastic deformation based registration,               9
        Image visualization – 2D display methods, 3D display methods, virtual reality
        based interactive visualization
                                                                    Total Instructional Hours           45
REFERENCE BOOKS:
R1: Alasdair McAndrew, ―Introduction to Digital Image Processing with Matlab‖, Cengage Learning 2011,India
                                                                                               Instructional
Unit                                      Description
                                                                                                  Hours
       INTRODUCTION TO DATA WAREHOUSING
       Evolution of Decision Support Systems- Data warehousing Components –
  I    Building a Data warehouse, Data Warehouse and DBMS, Data marts,                               9
       Metadata, Multidimensional data model, OLAP vs OLTP, OLAP operations,
       Data cubes, Schemas for Multidimensional Database: Stars, Snowflakes and
       Fact constellations
       DATA WAREHOUSE PROCESS AND ARCHITECTURE
       Types of OLAP servers, 3–Tier data warehouse architecture, distributed and
       virtual data warehouses. Data warehouse implementation, tuning and testing
 II    of data warehouse. Data Staging (ETL) Design and Development, data                            9
       warehouse visualization, Data Warehouse Deployment, Maintenance,
       Growth, Business Intelligence Overview- Data Warehousing and Business
       Intelligence Trends - Business Applications- tools-SAS
       INTRODUCTION TO DATA MINING
       Data mining-KDD versus data mining, Stages of the Data Mining Process-
       task primitives, Data Mining Techniques -Data mining knowledge
 III   representation – Data mining query languages, Integration of a Data Mining                    9
       System with a Data Warehouse – Issues, Data preprocessing – Data cleaning,
       Data transformation, Feature selection, Dimensionality reduction,
       Discretization and generating concept hierarchies-Mining frequent patterns-
       association-correlation
       CLASSIFICATION AND CLUSTERING
        Decision Tree Induction - Bayesian Classification – Rule Based
       Classification – Classification by Back propagation – Support Vector
       Machines – Associative Classification – Lazy Learners – Other Classification
IV     Methods – Clustering techniques – Partitioning methods- k-means-                              9
       Hierarchical Methods – distance based agglomerative and divisible clustering,
       Density-Based Methods – expectation maximization -Grid Based Methods –
       Model-Based Clustering Methods – Constraint – Based Cluster Analysis –
       Outlier Analysis
       PREDICTIVE MODELING OF BIG DATA AND TRENDS IN DATA
       MINING
       Statistics and Data Analysis – EDA – Small and Big Data –Logistic
 V     Regression Model - Ordinary Regression Model-Mining complex data objects                      9
       – Spatial databases – Temporal databases – Multimedia databases – Time
       series and sequence data – Text mining – Web mining – Applications in Data
       mining
                    HICET – Department of Computer Science and Engineering
REFERENCE BOOKS:
R1: Jiawei Han, Micheline Kamber, “Data Mining: Concepts and Techniques”, Morgan Kaufmann, Third
    edition, 2011.
R2: Alex Berson, Stephen J. Smith, “Data Warehousing, Data Mining & OLAP”, Tata McGraw Hill,
    Tenth Reprint, 2007.
R3: G. K. Gupta, “Introduction to Data Mining with Case Studies”, Eastern Economy Edition, Prentice
    Hall of India, Third Edition, 2014.
R4: Ian.H.Witten, Eibe Frank and Mark.A.Hall, “Data Mining: Practical Machine
    Learning Tools and Techniques”, Morgan Kaufmann, Third edition, 2011
R5: Bruce Ratner, “Statistical and Machine - Learning Data Mining: Techniques for
    Better Predictive Modeling and Analysis of Big Data”, CRC Press, Second Edition,
    2012
R6: Mehmed kantardzic, “Data mining: Concepts, Models, Methods, and Algorithms”, Wiley-
    Blackwell, Second Edition, 2011.
R7: Ian Witten, Eibe Frank, “Data Mining: Practical Machine Learning Tools and Techniques”,
    ThirdEdition, Morgan Kaufmann, 2011.
R8: George M Marakas, “Modern Data Warehousing, Mining and Visualization: Core Concepts”,
    Prentice Hall, 2002.
                                                                                             Instructional
Unit                                      Description
                                                                                                Hours
       BASICS OF NEURAL NETWORKS
       Basic concept of Neurons – Perceptron Algorithm – Feed Forward and Back
       Propagation Networks.
  I    Suggested Activities: Discussion of role of Neural Networks, External learning –            9
       Boltzmann Machine and Perceptron, Practical – Installation of Tensor Flow and
       Keras.
       Suggested Evaluation Methods: Tutorial – Perceptron,Assignment problems on
       backpropagation networks, Quizzes on Neural Networks.
Course     CO1:             Understand the role of Deep learning in Machine Learning Applications.
Outcome    CO2:             To get familiar with the use of TensorFlow/Keras in Deep Learning Applications.
           CO3:             To design and implement Deep Learning Applications.
           CO4:             Critically Analyse Different Deep Learning Models in Image Related Projects.
           CO5:             To design and implement Convolutional Neural Networks, To know about
                            applications of Deep Learning in NLP and Image Processing.
REFERENCE BOOKS:
R1: Ian Good Fellow, Yoshua Bengio, Aaron Courville, “Deep Learning”, MIT Press, 2017.
R2: Francois Chollet, “Deep Learning with Python”, Manning Publications, 2018.
R3: Phil Kim, “Matlab Deep Learning: With Machine Learning, Neural Networks and Artificial
    Intelligence”, Apress , 2017.
R4: Ragav Venkatesan, Baoxin Li, “Convolutional Neural Networks in Visual Computing”, CRC Press,
    2018.
R5: Navin Kumar Manaswi, “Deep Learning with Applications Using Python”, Apress,
    2018
R6: Joshua F. Wiley, “R Deep Learning Essentials”, Packt Publications, 2016.
REFERENCE BOOKS:
R1: Jyh-Shing Roger Jang, Chuen-Tsai Sun, EijiMizutani, “Neuro-Fuzzy and Soft Computing”, Prentice-
    Hall of India, 2002.
R2: KwangH.Lee, “First course on Fuzzy Theory and Applications”, Springer, 2005.
R3: George J. Klir and Bo Yuan, “Fuzzy Sets and Fuzzy Logic-Theory and Applications”, Prentice Hall,
    1996.
                    HICET – Department of Computer Science and Engineering
R4: James A. Freeman and David M. Skapura, “Neural Networks Algorithms, Applications, and
    Programming Techniques”, Addison Wesley, 2003.
R5: David E.Goldberg, “Genetic Algorithms in Search, Optimization and Machine Learning”, Addison
    Wesley, 1989.
R6: Mitchell Melanie, “An Introduction to Genetic Algorithm”, MIT Press, 1996
R7: S.N.Sivanandam, S.N.Deepa, “Introduction to Genetic Algorithms”, Springer, 2008
    edition
T1:           Daniel Jurafsky, ―Speech and Language Processing: An Introduction to Natural Language
              Processing, Computational Linguistics and Speech‖, Pearson Publication, 2014.
T2:           Steven Bird, Ewan Klein and Edward Loper, ―Natural Language Processing with Python‖, First
              Edition, O‘Reilly Media, 2009
REFERENCE BOOKS:
R1: Breck Baldwin, ―Language Processing with Java and LingPipe Cookbook‖, Atlantic Publisher, 2015.
R2: Richard M Reese, ―Natural Language Processing with Java‖, O‘Reilly Media, 2015.
R3: Nitin Indurkhya and Fred J. Damerau, ―Handbook of Natural Language Processing‖,
    Second Edition, Chapman and Hall/CRC Press, 2010
        HICET – Department of Computer Science and Engineering
                                                                                               Instructional
 Unit                                      Description
                                                                                                  Hours
        CLASSICAL ENCRYPTION AND BLOCKCIPHERS
        Classical Encryption – Substitution Cipher – One-time-pad Encryption – Block
   I                                                                                                 9
        Ciphers – DES – Key Recovery Attacks on Block Ciphers – Iterated-DES and
        DESX – AES – Limitations of Key- recovery based Security
        PSEUDO RANDOM FUNCTIONS AND SYMMETRIC ENCRYPTION
        Random Functions – Permutations – Pseudo Functions – Pseudo-random
  II    Permutations – Modelling Blockciphers – Security Against Key Recovery –                      9
        The Birthday Attack – Symmetric Encryption Schemes – Chosen Plaintext
        Attacks – Semantic Security – Security of CTR and CBC-Chosen Ciphertext
        Attack.
        HASH FUNCTIONS AND MESSAGE AUTHENTICATION
        Hash Function SHA1 – Collision resistant Hash Functions – Collision
  III   Finding Attacks – Onewayness of Collision resistant Hash Functions – MD                      9
        Transform – Syntax for message Authentication – PRF as a MAC Paradigm –
        CBC MAC – Universal-hashing Approach – Authenticated Encryption.
        NUMBER THEORY AND ASYMMETRIC ENCRYPTION
        Computational Number Theory – Number Theoretic Primitives – Diffie Hellman
  IV                                                                                                 9
        Problem – Asymmetric Encryption Schemes – Hybrid Encryption – ElGamal
        Scheme and its Variants – Homomorphic Encryption – Digital Signatures
        SECURITY PRACTICES AND ADVANCED TOPICS
        Electronic Mail Security – IP Security – Digital Cash – Schnorr’s
  V     Identification Protocol and Signature – Blind Signature – Distributed Ledger                 9
        and Bitcoin –– Secret Sharing – Shamir Threshold Scheme – Security in
        Routing – Mixnet
                                                                Total Instructional Hours           45
Course       CO1:            Demonstrate the various classical encryption techniques and the adversary
Outcome                      capabilities.
             CO2:            Apply computational secrecy and semantic security to find out the probability of
                             how strong are the security schemes.
             CO3:            Illustrate the various MAC and HASH functions and apply the Birthday attack
                             over Hash.
             CO4:            Apply number theory in public key encryption techniques.
             CO5:            Analyze the application of cryptography for secure E-Commerce and other secret
                             transactions.
                     HICET – Department of Computer Science and Engineering
REFERENCE BOOKS:
R1: MihirBellare and Phillip Rogaway, “Introduction to Modern Cryptography”, 2005.
R2: Jonathan Katz and Yehuda Lindell, “Introduction to Modern Cryptography ”,Chapman and
    Hall/CRC Press Second Edition,2015.
R3: Hans Delfts and Helmut Knebl, “Introduction to Cryptography – Principles and
    Applications”, Springer, Third Edition by,2015.
                                                                                              Instructional
 Unit                                      Description
                                                                                                 Hours
        INTRODUCTION TO R
        Introduction to R– Variables and Data types in R-Data Frames-Recasting and
   I    joining of data frames-Arithmetic, Logical and Matrix operations in R-advanced              9
        programming in R:Functions-Control structures-Data visualization in R basic
        graphics.
        LINEAR ALGEBRA AND STATISTICS
        Solving Linear Equations-Linear Algebra-Distances ,Hyper planes and Half space,
  II                                                                                                9
        Eigen values, Eigen vectors-Statistical Modeling-Random variables and probability
        Mass/Density functions-Sample Statistics-hypotheses Testing
        OPTIMIZATION
        Optimization for Data science-Unconstrained Multivariate Optimization-Gradient
  III   Descent (Learning Rule)- Multivariate Optimization with Equality constraints-               9
        Multivariate Optimization with Inequality constraints-Introduction to Data science-
        Solving Data Analysis problems –A Guided Thought process-
        REGRESSION
        Module: Predictive Modeling-Linear Regression-Model Assessment-Diagnostics to
  IV    Improve linear model Fit-Simple Linear Regression Model building- Simple Linear             9
        Regression Model Assessment -Multiple Linear Regression- assessing importance of
        different variables-subset selection
        CLASSIFICATION AND CLUSTERING
        Cross Validation- Multiple Linear Regression modeling Building and selection-
  V     Classification- Logistic Regression –Performance Measures- Logistic Regression              9
        implementation in R- K-Nearest Neighbors- K-Nearest Neighbors implementation in
        R-K-means Clustering-K-Means implementation in R
                                                                  Total Instructional Hours         45
REFERENCE BOOKS:
R1: Https://Nptel.Ac.In/Courses/106/106/106106179/
R2: Introduction To Linear Algebra - By Gilbert Strang.
R3: Applied Statistics And Probability For Engineers – By Douglas Montgomery
OBJECTIVES:
  1. Students should be able to understand.
  2. The difference between threat, risk, attack and vulnerability.
  3. How threats materialize into attacks.
  4. Where to find information about threats, vulnerabilities and attacks.
  5. Typical threats, attacks and exploits and the motivations behind them.
                                                            TOTAL : 45 PERIODS
                    HICET – Department of Computer Science and Engineering
OUTCOMES:
  1. Analytical skills
  2. Group / team working
  3. Innovation / creativity
  4. Problem solving skills
  5. Research
REFERENCES:
1. Charles P. Pfleeger Shari Lawrence Pfleeger Jonathan Margulies, Security in
Computing, 5th Edition , Pearson Education , 2015.
2. George K.Kostopoulous, Cyber Space and Cyber Security, CRC Press, 2013.
3. Martti Lehto, Pekka Neittaanmäki, Cyber Security: Analytics, Technology and
Automation edited, Springer International Publishing Switzerland 2015
4. Nelson Phillips and Enfinger Steuart, ―Computer Forensics and Investigations‖,
Cengage Learning, New Delhi, 2009
                                                                                              Instructional
 Unit                                      Description
                                                                                                 Hours
        INTRODUCTION TO RESEARCH PAPER WRITING
        Planning and Preparation, Word Order, Breaking up long sentences, Structuring
   I                                                                                                06
        Paragraphs and Sentences, Being Concise and Removing Redundancy, Avoiding
        Ambiguity and Vagueness
        PRESENTATION SKILLS
  II    Clarifying Who Did What, Highlighting Your Findings, Hedging and Criticizing,               06
        Paraphrasing and Plagiarism, Sections of a Paper, Abstracts, Introduction
        TITLE WRITING SKILLS
        Key skills are needed when writing a Title, key skills are needed when
  III   writing an Abstract, key skills are needed when writing an Introduction, skills             06
        needed when writing a Review of the Literature, Methods, Results,
        Discussion, Conclusions, The Final Check
        RESULT WRITING SKILLS
  IV    Skills are needed when writing the Methods, skills needed when writing the                  06
        Results, skills are needed when writing the Discussion, skills are needed when
        writing the Conclusions
        VERIFICATION SKILLS
  V     Useful phrases, checking Plagiarism, how to ensure paper is as good as it                   06
        could possibly be the first- time submission
                                                                  Total Instructional Hours         30
Course       CO1:    Understand that how to improve your writing skills and level of readability
Outcome      CO2:    Learn about what to write in each section
             CO3:    Understand the skills needed when writing a Title
             CO4:    Understand the skills needed when writing the Conclusion
             CO5:    Ensure the good quality of paper at very first-time submission
REFERENCE BOOKS:
R1: Adrian Wallwork , English for Writing Research Papers, Springer New York Dordrecht Heidelberg
    London, 2011
R2: Day R How to Write and Publish a Scientific Paper, Cambridge University Press 2006
R3: Goldbort R Writing for Science, Yale University Press (available on Google Books) 2006
R4: Highman N, Handbook of Writing for the Mathematical Sciences, SIAM. Highman’s
    book 1998.
        HICET – Department of Computer Science and Engineering
REFERENCE BOOKS:
R1: Goel S. L., Disaster Administration And Management Text And Case Studies”,Deep & Deep
    Publication Pvt. Ltd., New Delhi,2009.
R2: NishithaRai, Singh AK, “Disaster Management in India: Perspectives, issues and strategies
    “’NewRoyal book Company,2007.
R3: Sahni, PardeepEt.Al. ,” Disaster Mitigation Experiences And Reflections”, Prentice Hall OfIndia,
    New Delhi,2001.
                                                                                                   Instructional
  Unit                                      Description
                                                                                                      Hours
         ALPHABETS
    I                                                                                                   06
         Alphabets in Sanskrit
   II    TENSES AND SENTENCES                                                                           06
         Past/Present/Future Tense - Simple Sentences
         ORDER AND ROOTS
   III                                                                                                  06
         Order - Introduction of roots
  IV     SANSKRIT LITERATURE                                                                            06
         Technical information about Sanskrit Literature
         TECHNICAL CONCEPTS OF ENGINEERING
   V     Technical concepts of Engineering-Electrical, Mechanical, Architecture,                        06
         Mathematics
                                                                Total Instructional Hours               30
REFERENCE BOOKS:
R1: “Abhyaspustakam” – Dr. Vishwas, Samskrita-Bharti Publication, New Delhi
   `
   BOS-Chairman                           Dean-Academics                   PRINCIPAL
                     HICET – Department of Computer Science and Engineering
                         1. Review existing evidence on there view topic to inform programme design and
                              policy
  Course                 2. Making under taken by the DfID, other agencies and researchers.
 Objective               3.Identify critical evidence gaps to guide the development.
                         4. Identify their Professional Development.
                         5. Improve the Research and Future Direction.
                                                                                            Instructional
 Unit                                        Description
                                                                                               Hours
       INTRODUCTION AND METHODOLOGY
       Aims and rationale, Policy background, Conceptual framework and
    I  terminology - Theories of learning, Curriculum, Teacher education -                       06
       Conceptual framework, Research questions - Overview of methodology and
       Searching.
       THEMATIC OVERVIEW
   II  Pedagogical practices are being used by teachers in formal and informal                   06
       classrooms in developing countries - Curriculum, Teacher education.
       EVIDENCE ON THE EFFECTIVENESS OF PEDAGOGICAL PRACTICES
       Methodology for the in depth stage: quality assessment of included studies -
       How can teacher education (curriculum and practicum) and the school
  III curriculum and guidance materials best support effective pedagogy? - Theory                06
       of change - Strength and nature of the body of evidence for effective
       pedagogical practices - Pedagogic theory and pedagogical approaches -
       Teachers’ attitudes and beliefs and Pedagogic strategies.
       PROFESSIONAL DEVELOPMENT
       Professional development: alignment with classroom practices and follow up
  IV support - Peer support - Support from the head teacher and the community -                  06
       Curriculum and assessment - Barriers to learning: limited resources and large
       class sizes
       RESEARCH GAPS AND FUTURE DIRECTIONS
   V   Research design – Contexts – Pedagogy - Teacher education - Curriculum and                06
       assessment - Dissemination and research impact.
                                                                  Total Instructional Hours      30
Course     CO1:      What pedagogical practices are being used by teachers informal and informal
Outcome              classrooms in developing countries?
           CO2:      What is the evidence on the effectiveness of these pedagogical practices, in what
                     conditions, and with what population of learners?
           CO3:      How can teacher education (curriculum and practicum) and the school curriculum
                     and guidance materials best support effective pedagogy?
           CO4:      How can teacher to develop their Professional development support effective pedagogy?
           CO5:      How can improve the Research and Future Direction using effective pedagogy.
                     HICET – Department of Computer Science and Engineering
REFERENCE BOOKS:
R1: Ackers J, HardmanF (2001) Classroom interaction in Kenyan primary schools, Compare, 31(2): 245-
    261.
R2: Agrawal M (2004)Curricular reform in schools: The importance of evaluation, Journal of Curriculum
    Studies, 36(3):361-379.
R3: Akyeampong K (2003) Teacher training in Ghana-does it count? Multi-site teacher education research
    project (MUSTER) country report 1.London:DFID
R4: Akyeampong K, Lussier K, Pryor J, Westbrook J (2013) Improving teaching and learning of basic
    maths and reading in Africa: Does teacher preparation count? International Journal Educational
    Development, 33(3): 272–282.
R5: Alexander RJ(2001) Culture and pedagogy: International comparisons in primary education. Oxford
    and Boston: Blackwell.
R6: Chavan M(2003) Read India: Amass scale, rapid, ‘learning to read’ campaign.
                                                                                                Instructional
 Unit                                      Description
                                                                                                   Hours
        HISTORY OF MAKING OF THE INDIAN CONSTITUTION &
   I    PHILOSOPHY OF THE INDIAN CONSTITUTION                                                         06
        History, Drafting Committee, (Composition & Working), Preamble, Salient Features
        CONTOURS OF CONSTITUTIONAL RIGHTS AND DUTIES
        Fundamental Rights, Right to Equality, Right to Freedom, Right against
  II    Exploitation, Right to Freedom of Religion, Cultural and Educational Rights, Right            06
        to Constitutional Remedies, Directive Principles of State Policy, Fundamental
        Duties.
        ORGANS OF GOVERNANCE
  III   Parliament, Composition, Qualifications and Disqualifications, Powers and                     06
        Functions, Executive, President, Governor, Council of Ministers, Judiciary,
        Appointment and Transfer of Judges, Qualifications, Powers and Functions
        LOCAL ADMINISTRATION
        District’s Administration head: Role and Importance Municipalities:
        Introduction, Mayor and role of Elected Representative, CEO, Municipal
  IV    Corporation. Pachayati raj: Introduction, PRI: Zila Pachayat. Elected officials               06
        and their roles, CEO Zila Pachayat: Position and role. Block level:
        Organizational Hierarchy(Different departments), Village level:Role of
        Elected and Appointed officials, Importance of grass root democracy
        ELECTION COMMISSION
  V     Election Commission: Role and Functioning. Chief Election Commissioner                        06
        and Election Commissioners - Institute and Bodies for the welfare of
        SC/ST/OBC and women.
                                                                  Total Instructional Hours           30
Course       CO1:    Discuss the growth of the demand for civil rights in India for the bulk of Indians
Outcome              before the arrival of Gandhi in Indian politics.
             CO2:    Discuss the intellectual origins of the framework of argument that informed the
                     conceptualization of social reforms leading to revolution in India.
             CO3:    Discuss the circumstances surrounding the foundation of the Congress Socialist
                     Party[CSP] under the leadership of Jawaharlal Nehru
             CO4:    The eventual failure of the proposal of direct elections through adult suffrage in the Indian
                     Constitution.
             CO5:    Discuss the passage of the Hindu Code Bill of 1956.
                      HICET – Department of Computer Science and Engineering
REFERENCE BOOKS:
R1: The Constitution of India,1950(Bare Act),Government Publication.
R2: Dr.S.N.Busi, Dr.B. R.Ambedkar framing of Indian Constitution,1st Edition, 2015.
R3:
    M.P. Jain, Indian Constitution Law, 7th Edn., Lexis Nexis,2014.
R4: D.D. Basu, Introduction to the Constitution of India, Lexis Nexis, 2015.
Course       CO1:    Students will understand the importance of value based living.
Outcome      CO2:     Students will gain deeper understanding about the purpose of their life.
             CO3:    Students will understand and start applying the essential steps to become good leaders.
             CO4:     Students will emerge as responsible citizens with clear conviction to practice values and
                     ethics in life.
             CO5:     Students will become value based professionals and building a healthy nation
                      HICET – Department of Computer Science and Engineering
REFERENCE BOOKS:
R1: Chakroborty, S.K.“Values and Ethics for organizations Theory and practice”, Oxford University
    Press, New Delhi
                                                                                             Instructional
 Unit                                      Description
                                                                                                Hours
        INTRODUCTION TO YOGA
   I                                                                                               10
         Definitions of Eight parts of yoga.(Ashtanga)
        DO`S AND DON’T’S IN LIFE
         Yam and Niyam - Do`s and Don’t’s in life - i) Ahinsa, satya, astheya,
  II                                                                                               10
        bramhacharya and aparigraha, ii) Ahinsa, satya, astheya, bramhacharya and
        aparigraha.
        ASAN AND PRANAYAM
  III   Asan and Pranayam - Various yog poses and their benefits for mind & body                   10
        - Regularization of breathing techniques and its effects-Types of pranayam
Course       CO1:    Develop healthy mind in a healthy body thus improving social health also
Outcome      CO2:    Improve efficiency
             CO3:    The student will apply forces and exert themselves using rarely used muscle groups
REFERENCE BOOKS:
R1: Yogic Asanas for Group Tarining-Part-I”:Janardan Swami Yoga bhyasi Mandal
R2: “Rajayoga or conquering the Internal Nature” by Swami Vivekananda, Advaita Ashrama
    (Publication Department), Kolkata
                                                                                                   Instructional
 Unit                                           Description
                                                                                                      Hours
             NEETISATAKAM-HOLISTIC DEVELOPMENT
             Neetisatakam-holistic development of personality - Verses- 19,20,21,22
   I                                                                                                     10
             (wisdom) - Verses- 29,31,32 (pride & heroism) – Verses- 26,28,63,65 (virtue)
             - Verses- 52,53,59 (dont’s) - Verses- 71,73,75,78 (do’s)
             DAY TO DAY WORK AND DUTIES
             Approach to day to day work and duties - Shrimad Bhagwad Geeta: Chapter 2-
  II                                                                                                     10
             Verses 41, 47,48 - Chapter 3-Verses 13, 21, 27, 35 Chapter 6-Verses 5,13,17,23, 35
             - Chapter 18-Verses 45, 46, 48.
             STATEMENTS OF BASIC KNOWLEDGE
             Statements of basic knowledge - Shrimad Bhagwad Geeta: Chapter2-Verses
  III        56, 62, 68 Chapter 12 -Verses 13, 14, 15, 16,17, 18 - Personality of role                   10
             model - shrimad bhagwad geeta - Chapter2-Verses 17, Chapter 3-Verses
             36,37,42 -Chapter 4-Verses 18, 38,39 Chapter18 – Verses 37,38,63
Course          CO1:      Study of Shrimad-Bhagwad-Geeta will help the student in developing his personality and
Outcome                   achieve the highest goal in life
                CO2:      The person who has studied Geeta will lead the nation and mankind to peace and
                          prosperity
                CO3:      Study of Neet is hatakam will help in developing versatile personality of students.
REFERENCE BOOKS:
R1: Gopinath, Rashtriya Sanskrit Sansthanam P, Bhartrihari’s Three Satakam, Niti-sringar-vairagya,
    New Delhi,2010
R2: Swami Swarupananda , Srimad Bhagavad Gita, Advaita Ashram, Publication Department, Kolkata,
    2016.