M.TECH CSE Syllabus 2021
M.TECH CSE Syllabus 2021
Motto:
VISION :
“TO MAKE EVERY MAN A SUCCESS AND NO MAN A FAILURE”
MISSION
VALUE STATEMENT
MISSION
M1.To educate the students with basic foundation blocks of core and allied disciplines of
Computer Science and Engineering.
M3. To sculpt strong personal, technical, research, entrepreneurial, and leadership skills.
M4. To inculcate knowledge in lifelong learning, professional ethics and contribution to the
society.
PEO I Excel in their professional career by applying advanced knowledge and/or pursue
higher education including research by applying the knowledge of Computer Science and
Engineering.
PEO II Asses the industry requirements and provide tangible solutions with social
consciousness and ethical values.
PROGRAM OUTCOMES (ALIGNED WITH GRADUATE ATTRIBUTES) (PO)
PO3 Problem Solving: Think laterally and originally, conceptualize and solve engineering
problems, evaluate a wide range of potential solutions for those and arrive at feasible,
optimal solutions after considering public health and safety, cultural, societal and
environmental factors in the core areas of expertise.
PO4 Research Skill: Extract information pertinent to unfamiliar problems through literature
survey and experiments, apply appropriate research methodologies, techniques and
tools, design, conduct experiments, analyze and interpret data, demonstrate higher
order skill and view things in a broader perspective, contribute individually / in group(s)
to the development of scientific of scientific / technological knowledge in one or more
domains of engineering.
PO5 Usage of modern tools: Create, select, learn, and apply appropriate techniques,
resources, and engineering and IT tools, including prediction and modeling, to complex
engineering activities with an understanding of the limitations.
PO8 Communication: Communicate with engineering community, and with society at large,
regarding complex engineering activitiesconfidentially an effectively, such as, being
able to comprehend and write effective reports and design documentation by adhering
to appropriate standards, make effective presentations, and give and receive clear
instructions.
PO9 Life-Long Learning:Recognize the need for, and have the preparation and ability to
engage in life-long learning independently, with a high level of enthusiasm and
commitment to improve knowledge and competence continuously.
P10 Ethical Practices and Social Responsibility: Acquire professional and intellectual
integrity, professional code of conduct, ethics of research and scholarship,
consideration of the impact of research outcomes on professional practices and an
understanding of responsibility to contribute to the community for sustainable
development of society.
P11 Independent and Reflective Learning: Observe and examine critically the outcomes of
one’s actions and make corrective measures subsequently, and learn from mistakes
without depending on external feedback
PSO1 To impart knowledge in Advanced Operating System, Advance Data Base Technology,
Advanced Data Structures & Algorithms for analyzing and the solving complex problem.
PSO2 To develop the skill set of the students especially in Data Science and Engineering,
Software Engineering and Information Security.
PSO3 To inculcate the analytical knowledge in the students for innovative system design
using modern tools and techniques.
M.Tech - COMPUTER SCIENCE AND ENGINEERING
SEMESTER – I
PRACTICAL
Total 20 29
SEMESTER – II
PRACTICAL
7 PC CSA3751 Seminar 0 0 3 2 0 2
Total 20 25
SEMESTER - III
PRACTICAL
Internship/Mini Project 2 0
Total 13 27
SEMESTER - IV
PRACTICAL
Total 12 24
M.Tech - COMPUTER SCIENCE AND ENGINEERING
DEPARTMENT ELECTIVES(GENERAL)
ELECTIVE I
COURSE
SL. COURSE
CATEGOR NAME OF THE COURSE L T P C S TCH
NO CODE
Y
ELECTIVE II
COURSE
SL. COURSE
CATEGOR NAME OF THE COURSE L T P C S TCH
NO CODE
Y
ELECTIVE III
COURSE
SL. COURSE
CATEGOR NAME OF THE COURSE L T P C S TCH
NO CODE
Y
COURSE
SL. COURSE
CATEGOR NAME OF THE COURSE L T P C S TCH
NO CODE
Y
Course This course serves as an introduction to the world of Statistical models. It describes how
Description to use forecasting methods to support managerial, financial, and operational.
REFERENCE BOOKS
1 K.S.Trivedi.John , “Probability and statistics with reliability, Queuing and computerScience
Application”, Second edition, Wiley&Son, 2016
2 Levin Richard and Rubin Davids, “Statistics for Management “, Pearson Publications,2016
3 Robert Stine, Dean Foster,“Statistical for Business: Decision Making and Analysis”. Pearson
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
Course This course serves as an introduction to the world of Advanced Data Structures and algorithms.
Description And used to Estimate time and space complexities for a given algorithm.
Prerequisites: 1.FundamentalsofDataStructures2.DesignandAnalysisofAlgorithm
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 2 2 2 1 2 3 3 3 1 1 2 1 - -
CO-2 - 2 2 2 2 2 2 2 2 2 3 3 - - 3
CO-3 1 2 3 3 3 1 2 2 2 1 1 - - 2 -
CO-4 2 1 3 2 2 2 2 2 2 2 2 2 1 2 -
CO-5 - - 3 2 2 2 2 2 2 2 3 3 - 1 3
Abstract DataTypes-Time and Space Analysis of Algorithms-Big Oh and Theta Notations- Average,
best- and worst-case analysis-Simple recurrence relations–Mappings.
Suggested Activities: Find the time and space complexities of the following algorithms CO-1
Suggested sources:
https://nptel.ac.in/courses/106105164/https://nptel.ac.in/courses/106105085/18
Min-maxheaps-Heaps-Leftistheaps-Binomialheaps-Fibonacciheaps-Skewheaps-Lazy-
binomialheaps.
CO-2
Suggested Activities:ImplementthefollowingHeapstructuresusingC, C++, Java or Python
BTL-2
1. Max-min Heap 2. Binomial Heap 3. Fibonacci Heap
Suggested Activities: Implement the following tree structures using C, C++, Java or Python CO-3
3.8-queensproblem
4.Palindrome Partitioning
Suggested Source:
https://nptel.ac.in/courses/106106131/15https://nptel.ac.in/courses/106102011/7
Parallel Algorithms: Basic Techniques- Work & Efficiency - Distributed Computation - Heuristic
&Approximation Approaches.
1.HillClimbing
CO-5
2.SimulatedAnnealing
BTL-2
3.ParticleSwarmOptimization
4.GeneticAlgorithm
TEXT BOOKS
1 ThomasH.Coremen,CharlesE.Leiserson,RonaldL.Rivest,CliffordStein,"Introductiontoalgorithms",
Third edition, MIT press,2013
REFERENCE BOOKS
1
E. Horowitz, S.Sahni and Dinesh Mehta, Fundamentals of Data structures in C++, UniversityPress,
2009.
2 E.Horowitz,S.SahniandS.Rajasekaran,ComputerAlgorithms/C++,SecondEdition,UniversityPress, 2007.
3 Mark Allen Weiss, "Data Structures and Algorithm Analysis in C", Third Edition,
PearsonEducation, Asia.2007.
4 AnanthGrama,AnshulGupta,GeorgeKarypis,VipinKuma,“IntroductiontoParallelComputing“, Second
Edition, Addison Wesley, 2003
E BOOKS
OmidBozorg-Haddad,MohammadSolgi,HugoA.Loáiciga,“Meta-heuristicandEvolutionaryAlgorithms
1
for Engineering Optimization 1st Edition”, Wiley , 2017
https://onlinecourses.nptel.ac.in/noc18_cs51/
COURSE TITLE MACHINE LEARNING CREDITS 3
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
Course This course serves as an introduction to Machine learning and to understand real time
Description applications.
CO-1 - 3 2 2 1 2 2 3 3 2 3 2 - 2 3
CO-2 - 2 2 3 1 2 2 3 3 2 3 2 - 2 -
CO-3 3 2 2 1 2 2 3 3 2 3 2 - 2 - 1
CO-4 2 - 2 1 2 2 3 3 2 3 2 - 2 - 2
CO-5 - - 3 - 2 1 2 2 3 3 2 3 2 - 2
Learning - Types of machine learning - Supervised learning - The brain and the neurons, Linear
Discriminants -Perceptron - Linear Separability -Linear Regression - Multilayer perceptron –
Examples of using MLP - Back propagation of error. CO-1
Suggested Activities: Design a Multilayer Perceptron for Rain Forecasting system BTL-2
Suggested sources: Enrico C, Simon W, Jay R, Machine Learning Techniques for Space Weather,
Elsevier, 2018
Suggestedsources: L.M.Rasdi,SimulatedAnnealingAlgorithmforDeepLearning,Procedia
ComputerScience,Volume:72,2015.
TEXT BOOKS
1
Ethem Alpaydin, "Machine Learning: The New AI”, MIT Press, 2016.
2 Shai Shalev-Shwartz, Shai Ben-David, "Understanding Machine Learning: From Theory to
http://www.cs.huji.ac.il/~shais/UnderstandingMachineLearning/index.html
1
http://www.mlyearning.org/
2
MOOC
1 https://www.coursera.org/learn/machine-learning
2 https://www.my-mooc.com/en/categorie/machine-learning
23 ACM, LEARNING
Version 1.0 Approval Details BTL-2
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
Prerequisites: nil
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 2 1 1 1 2 3 2 3 2 3 2 - 3 2
CO-2 - 2 2 3 1 1 2 3 3 2 3 2 - 2 -
CO-3 3 2 2 1 2 2 3 3 2 3 2 - 2 - 1
CO-4 2 - 2 1 2 2 3 3 2 3 2 - 2 - 2
CO-5 - - 3 - 2 1 2 2 3 3 2 3 2 - 2
research problem. Approaches of investigation of solutions for research problem, data BTL-2
collection, analysis, interpretation, Necessary instrumentations
Scope of Patent Rights. Licensing and transfer of technology. Patent information and
databases. Geographical Indications. Administration of Patent System. New CO-5
TEXT BOOKS
E BOOKS
https://www.modares.ac.ir/uploads/Agr.Oth.Lib.17.pdf
1
https://drive.google.com/file/d/0Bwk5FIsI0ctxNXBvU2dGVlJhSTg/view?usp=drivesdk
2
MOOC
1 https://www.coursera.org/browse/physical-science-and-engineering/research-
methods
2 https://www.ccrm.in/register.html
CSA3781 COURSE
COURSE CODE PC L-T-P-S 0- 0- 6- 0
CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 3 3 3 3 - 2 - - 3 3 3 2 3 3 2
CO-2 3 3 3 3 - 2 - 3 3 3 3 2 3 3 2
CO-3 3 3 3 3 3 - - 3 3 - 3 2 3 3 3
CO-4 3 3 3 3 3 - - 3 3 - 3 2 3 3 3
CO-5 3 3 3 3 3 2 - 3 3 - 3 2 3 3 3
COURSE COURSE
CSA3706 PC L-T-P-S 3- 0- 0- 0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
First
Second Periodical
Periodical Practical Component ESE
Assessment
Assessment
The objective of this course is to define and clarify the cloud technologies that can be
Course
used to deploy cloud-based applications and services. It also explains how they differ in
Description
their implementation and usage. Any enterprise may implement any of the cloud
deployment models and use the cloud services as per their needs.
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 3 3 - - 3 - - - 2 - - 1 1 1 -
CO-2 3 3 - - -3 - - - - 2 - - 1 1 -
CO-3 3 3 - - 3 1 - - - - - - 1 1 -
CO-4 3 3 - - 3 - - - - - - 2 1 1 -
CO-5 3 2 3 - 2 - - - - - - 3 1 1 -
1. The MOOC course will be selected as per the HOD instruction The students must
register for the selected MOOC Course. Faculty will be assigned to assist for
assignment completion.
2. At the end of the course will be directly transferred to the student’s coursework.
3. For all other courses the concurrence from a faculty member to set the
CO1, CO2,
question paper and evaluate the performance of the student should be obtained.
CO3, CO4,
4. All the internal examination will be conducted. The candidate will have to appear
CO5 /BTL4
for the
5. end semester examinations.
6. At the end of the online & contact courses, the student should submit the course
completion certificate(s) with grades/marks for record in his/her course work.
MOOC
https://www.mooc-list.com/course/cloud-computing-applications-part-1-cloud-systems-
1.
and-infrastructure-coursera
2. https://www.mooc-list.com/course/cloud-computing-concepts-part-2-coursera
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 3 2 2 1 1 2 3 3 2 3 2 - 2 3
CO-2 - 2 2 3 1 1 2 3 3 2 3 2 - 2 -
CO-3 3 2 2 3 2 1 3 3 2 3 2 - 2 - 1
CO-4 2 - 2 3 2 2 3 3 2 3 2 - 2 - 2
CO-5 - - 3 - 2 1 2 2 3 3 2 3 2 - 2
Deadlock handling strategies in distributed systems – issues in deadlock detection and resolution –
control organizations for distributed deadlock detection – centralized and distributed deadlock
CO-2
detection algorithms – hierarchical deadlock detection algorithms. Agreement protocols – introduction-
BTL-2
the system model, a classification of agreement problems, solutions to the Byzantine agreement
problem, applications of agreement algorithms.
MODULE4:MULTIPROCESSOROPERATINGSYSTEM (12)
PRACTICES
3. ImplementationofmultiplesleepingbarbersproblemforsynchronizationindistributedOS
6. ImplementationoftransactionsandconcurrencyinDatabaseoperatingsystem.
TEXT BOOKS
1 Mukesh Singhal, Niranjan G.Shivaratri, "Advanced concepts in operating systems", TMH, 2011
REFERENCE BOOKS
1
Abraham Silberschatz, Peter B. Galvin, G. Gagne, “Operating System Concepts”, Ninth Edition, Addison
Wesley Publishing Co.,2013.
2 Andrew S.Tanenbaum, "Modern operating system", PHI, 3rd edition,2008
E BOOKS
https://books.google.co.in/books/about/Advanced_Concepts_In_Operating_Systems.html?id=nel4vdeLcqkC
1
http://www.cs.iit.edu/~sun/pdfd/cs550-lec1.pdf
2
MOOC
1 https://www.coursera.org/learn/practical-machine-learning
2 https://www.coursera.org/learn/python-machine-learning
CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-4
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 3 2 2 1 1 2 3 3 2 3 2 - 2 3 -
CO-2 2 2 3 1 1 2 3 3 2 3 2 - 2 - -
CO-3 2 2 3 2 1 3 3 2 3 2 - 2 - 1 2
CO-4 1 2 2 2 2 3 3 2 3 2 - 2 - 2 1
CO-5 - 3 - 2 1 2 2 3 3 2 3 2 - 2 -
Introduction to Neuro – Fuzzy and Soft Computing – Fuzzy Sets – Basic Definition and
Terminology – Set-theoretic Operations – Member Function Formulation and
parameterization – Fuzzy Rules and Fuzzy Reasoning – Extension Principle and Fuzzy
Relations – Fuzzy If-Then Rules – Fuzzy Reasoning – Fuzzy Inference Systems – Mamdani
CO-1
Fuzzy Models – Sugeno Fuzzy Models – Tsukamoto Fuzzy Models – Input Space
Partitioning and Fuzzy Modeling. BTL-2
Suggested Activities: Apply fuzzy logic and reasoning to handle uncertainty and solve
engineering problems.
MODULE2:OPTIMIZATION (12)
Suggested Activities: Develop the application based on Genetic Algorithm and Ant
Colony optimization
Suggested sources:
http://in.mathworks.com/help/fuzzy/adaptive-neuro-fuzzy-inference-systems.html
Suggested Activities: Prepare the students for developing intelligent modeling, CO-5
https://towardsdatascience.com/introductory-guide-to-artificial-intelligence-
11fc04cea042
TEXT BOOKS
2 N.P.Padhy, “Artificial Intelligence and Intelligent Systems”, Oxford University Press, 2006
REFERENCE BOOKS
1 SamirRoy”IntroductiontoSoftcomputing“NeuroFuzzyandGeneticAlgorithms”,Firstedition,Pearson
Publishers, 2015.
2 J.S.R.Jang, C.T.Sun and E.Mizutani, “Neuro-Fuzzy and Soft Computing”, Pearson, 2004.
4 DavisE.Goldberg,“GeneticAlgorithms:Search,OptimizationandMachineLearning”,AddisonWesley, 2009.
5 S. Rajasekaran and G.A.V.Pai, “Neural Networks, Fuzzy Logic and Genetic Algorithms”, PHI,2003.
E BOOKS
https://stimelstep.firebaseapp.com/15/Introduction-to-Soft-Computing-Neuro-Fuzzy-and-Genetic
1
Algorithms.pdf
http://www.a-zshiksha.com/forum/viewtopic.php?f=147&t=61593
2
MOOC
1 https://www.class-central.com/tag/soft-computing
2 https://www.class-central.com/course/nptel-introduction-to-soft-computing-10053
COURSE ADVANCED DATA BASE TECHNOLOGY CREDITS 4
TITLE
23 ACM, LEARNING
Version 1.0 Approval Details BTL-5
06.02.2021 LEVEL
ASSESSMENT SCHEME
First
Second Periodical Seminar/ Assignments/ Surprise
Periodical Attendance ESE
Assessment Project Test / Quiz
Assessment
Course This course serves as an introduction to Advanced Data Base Technology and to learn advanced
Description data models and emerging databases.
PO - PO-2 PO-3 PO PO-5 PO-6 PO-7 PO-8 PO-9 PO - PO- PO- PSO- PSO- PSO-
CO
1 -4 10 11 12 1 2 3
CO-1 3 2 2 1 1 2 2 3 2 3 2 - 2 3 -
CO-2 2 2 3 1 2 2 2 3 2 3 2 - 2 - 2
CO-3 2 2 3 2 2 3 3 2 3 2 - 2 - 1 1
CO-4 1 2 2 2 1 2 3 2 3 2 - 2 - 2 1
CO-5 - 3 - 2 1 2 2 3 3 2 3 2 - 2 -
Concepts for Object Databases: Object Identity – Object structure – Type Constructors –
Encapsulation of Operations – Methods – Persistence – Type and Class Hierarchies –
Inheritance – Complex Objects – Object Database Standards, Languages and Design: ODMG
Model – ODL – OQL – Object Relational and Extended – Relational Systems: Object
CO-2
Relational features in SQL/Oracle – Case Studies.
BTL-2
Suggested Activities: Assignments and Case Study
Active Databases: Syntax and Semantics (Starburst, Oracle, DB2)- Taxonomy- Applications- CO-3
Design Principles for Active Rules- Temporal Databases: Overview of Temporal Databases- BTL-3
TSQL2- Deductive Databases: Logic of Query Languages – Datalog- Recursive Rules- Syntax
and Semantics of Datalog Languages- Implementation of Rules and Recursion- Recursive
Queries in SQL- Spatial Databases- Spatial Data Types- Spatial Relationships- Spatial Data
Structures-Spatial Access Methods- Spatial DB Implementation.
Suggested sources:
https://www.cse.iitb.ac.in/~cs6212011/.../Intelligent%20Database%20Systems.ppt
https://www.techwalla.com/articles/what-is-a-web-database
https://www.ibm.com/cloud/learn/what-is-cloud-database
TEXT BOOKS
1 ApproachtoDesign,Implementation,andManagement”,SixthEdition,PearsonEducation,2015.
REFERENCE BOOKS
1
Ramez Elmasri & Shamkant B.Navathe, “Fundamentals of Database Systems”, Seventh Edition ,Pearson Education ,
2016.
2 Tamer Ozsu M., Patrick Ualduriel, “Principles of Distributed Database Systems”, Second Edition,Pearson Education,
2003.
4 Peter Rob and Corlos Coronel, “Database Systems – Design, Implementation and Management”,Thompson
Learning, Course Technology, 9th Edition, 2011.
E BOOKS
http://aries.ektf.hu/~hz/pdf-tamop/pdf-xx/Radvanyi-hdbms-eng2.pdf
1
https://dsinghpune.wordpress.com/advanced-database-management-system/
2
MOOC
1 https://www.coursera.org/learn/distributed-database
2 https://nptel.ac.in/courses/106106093/38
COURSE TITLE SEMINAR CREDITS 2
23 ACM,
Version 1.0 Approval Details 06.02.20 LEARNING LEVEL BTL-3
21
ASSESSMENT SCHEME
Second
First Review Third Review Model Evaluation ESE
Review
In this course, students will develop the scientific and technical reading, writing and
Course Description presentation skills they need to understand and construct research articles.
1. To develop the skills in doing literature survey, technical presentation and report
preparation
2. To Selecting a subject, narrowing the subject into a topic
Course Objective
3. To Link the papers and preparing a draft of the paper.
4. To Stud the papers and understanding the authors contributions and critically
analysing each paper.
Prerequisites: Nil
CO PO- PO- PO- PO- PO- PO- PO- PO- PO- PO- PO- PO- PSO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 -1 -2 -3
CO-1 1 2 3 - 3 - - - - - - 3 - - 3
CO-2 1 2 3 - - - - - - - - - - - 3
CO-3 1 2 3 - - - - - - - - - - - 3
CO-4 1 2 3 - - - - - - - - - - - 3
GUIDELINES
1. For seminar, a student under the supervision of a faculty member, shall collect the literature
on a topic and critically review the literature and submit it to the department in a report
form and shall make an oral presentation before the Departmental Academic Committee
consisting of Department PG Coordinator, Supervisor and two other senior faculty members
of the department.
2. Each student will make a seminar presentation using audio/visual aids for a duration of 20-25
minutes and submit the seminar report prepared in Latex only
CO1/BTL3
3. For Seminar there will be only internal evaluation.
4. Out of the total allocated marks distribution of marks shall be 30% for the report, 50% for
presentation and 20% for the queries.
5. A candidate has to secure a minimum of 50% of marks to be declared successful.
6. If the student fails to fulfill minimum marks, the student has to reappear during the
supplementary examinations.
7. There shall be no semester end examinations for the seminar.
REFERENCE BOOKS
1. NYIF ,”Technical Analysis: A Personal Seminar”, Prentice Hall Press (10 March 2005)
E BOOKS
1. https://link.springer.com/book/10.1007%2F978-94-6300-524-1
COURSE TITLE PROJECT PHASE –I CREDITS 8
CSA3782 COURSE
COURSE CODE PC L-T-P-S 0- 0- 24- 0
CATEGORY
ASSESSMENT SCHEME
Prerequisites: NIL
CO, PO AND PSO MAPPING
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 2 - - 1 - 3 - - - - - - - 3
CO-2 - - 1 - - - - 2 - 2 - - - 2 -
CO-3 - - - - - 1 - - 2 - - - 2 - -
CO-4 2 - - - - - - 2 - - - 1 - - 3
CO-5 - - 3 - - - - - - - - - - 2 -
GUIDELINES (12)
evaluation will be based on the project report and a viva voce examination on the CO3, CO4,
5. Project should be for two semesters based on the completion of required number
of credits as per the academic regulations.
6. Carried out inside or outside the university, in any relevant industry or research
institution.
7. Publications in the peer reviewed journals / International Conferences will be an
added advantage
COURSE TITLE PROJECT PHASE –II CREDITS 12
CSA3783 COURSE
COURSE CODE PC L-T-P-S 0- 0- 24- 0
CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
Seminar/
First Periodical Second Periodical Surprise Test
Assignments/ Attendance ESE
Assessment Assessment / Quiz
Project
Prerequisites: NIL
PO PO- PO- PO- PO- PO- PO- PO- PO- PO PO- PO- PSO- PSO- PSO-
CO
-1 2 3 4 5 6 7 8 9 -10 11 12 1 2 3
CO-1 - 2 - - 1 - 3 - - - - - - - 3
CO-2 - - 1 - - - - 2 - 2 - - - 2 -
CO-3 - - - - - 1 - - 2 - - - 2 - -
CO-4 2 - - - - - - 2 - - - 1 - - 3
CO-5 - - 3 - - - - - - - - - - 2 -
Course This course serves as an introduction to Advanced Data Communications and to Apply the
Description different routing protocols to find the shortest path.
REFERENCE BOOKS
1 Willam Stallings,“HighSpeedNetworksandInternets-PerformanceandQualityofService”,2nd Ed.,
PearsonEducation.
2 Andrew S. Tanenbaum, “Computer Networks”, 4th Ed., Pearson Education.
3 James F. Kurose, Keith W. Ross, “Computer Networking: A Top-Down Approach featuring the
Internet”, 3rd edition,Pearson Education, 2005.
4 William Stallings, “Data and Computer Communications”, 9th Ed., Pearson Education.
MOOC
1 https://www.coursera.org/learn/data-communication-network-services
COURSE TITLE WIRELESS SENSOR NETWORKS CREDITS 3
COURSE COURSE
CSA3722 PE L-T-P-S 2-0-2-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Seminar/
Second Periodical Surprise Test /
Periodical Assignments/ Attendance ESE
Assessment Quiz
Assessment Project
The course covers the fundamentals of sensor networks, communication characteristics and
Course
deployment mechanisms, MAC layer, network layer and transport layer and middleware and
Description
security issues
1. To learn the basic concepts of wireless sensor network
2. To know how to use the simulation tools
Course
3. To understand the wireless sensor network protocols and layers
Objective
4. To know how to design deployment scheme
5. To know how to design energy efficient routing protocol
Upon completion of this course, the students will be able to
Network layer protocols-Data dissemination and processing, multichip and cluster based
routing protocols- Energy efficient routing- Geographic routing, Transport layer- Transport
CO-4
protocol Design issues- Performance of Transport Control Protocols.
BTL-3
Practical component: Modify Transport Protocol for effective QoS
Suggested Readings: Routing Table of a network.
MODULE 5: MIDDLEWARE AND SECURITY ISSUES (12)
Middleware and Application layer -Data dissemination, Data storage, Query processing,
Security - Privacy issues, Attacks and Countermeasures. CO-5
Practical component: Develop a real world WSN application BTL-3
Suggested Readings: Security threats
TEXT BOOKS
Holger Karl & Andreas Willig, (2005 ). Protocols And Architectures for Wireless Sensor
1.
Networks, John Wiley,
N. P. Mahalik. (2007). Sensor Networks and Configuration: Fundamentals, Standards,
2.
Platforms, and Applications, Springer Verlag.
REFERENCE BOOKS
Waltenegus Dargie, Christian Poellabauer. (2007), Fundamentals of Wireless Sensor Networks,
1.
Theory and Practice, Wiley Series on wireless Communication and Mobile Computing.
Kazem Sohraby, Daniel manoli. (2010). Wireless Sensor networks- Technology, Protocols and
2.
Applications, Wiley InterScience Publications.
3. Bhaskar Krishnamachari. (2005). Networking Wireless Sensors, Cambridge University Press.
C.S Raghavendra, Krishna M.Sivalingam, Taieb znati. (2004). Wireless Sensor Networks,
4.
Springer Science.
E BOOKS
1. https://www.intechopen.com/books/smart-wireless-sensor-networks
https://www.springer.com/cda/content/document/cda_downloaddocument/9781447155041
2.
-c2.pdf?SGWID=0-0-45-1427120-p175382017
MOOC
1. https://nptel.ac.in/courses/106105160/21
2. https://www.upf.edu/en/web/mooc-upf/-/hands-on-wireless-sensor-networks
COURSE TITLE INFORMATION SECURITY ARCHITECTURE CREDITS 3
COURSE COURSE
CSA3723 PE L-T-P-S 2-0-2-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-5
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Seminar/
Second Periodical Surprise Test /
Periodical Assignments/ Attendance ESE
Assessment Quiz
Assessment Project
The course covers the basics of Information Security, security investigation, analysis, logical
Course
design and physical design
Description
Need for Security, Business Needs, Threats, Attacks, Legal, Ethical and Professional Issues
CO-2
Practical component: Design a Secure Business Model
BTL-3
Suggested Readings: Information Security threats and vulnerabilities
Blueprint for Security, Information Security Policy, Standards and Practices, ISO 17799/BS
7799, NIST Models, VISA International Security Model, Design of Security Architecture,
CO-4
Planning for Continuity.
BTL-5
Practical component: To prepare a blueprint for security design of an organisation
Suggested Readings: Network policies
This Course covers the core principles, Agile Development and tools, software requirements,
Course
software development process and design Concepts, quality management and software
Description
process management
1. To understand the software life cycle models
2. To understand the software requirements
Course 3. To ensure good quality software
Objective 4. To apply principles of software development
5. To equip students with the knowledge and tools and techniques of engineering
practices
Upon completion of this course, the students will be able to
1. To apply the software engineering lifecycle by demonstrating competence in
communication, planning, analysis, design, construction, and deployment
2. An ability to work in one or more significant application domains
Course 3. Work as an individual and as part of a multidisciplinary team to develop and deliver
Outcome quality software
4. Demonstrate an understanding of and apply principles in Multidisciplinary
environment based on economic and financial terms.
5. Demonstrate an ability to use the techniques and tools necessary for engineering
practice
Prerequisites: Nil
CO, PO AND PSO MAPPING
PO PO PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 -2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 3 - - 3 2 - 1 - 2 - - - 3 2
CO-2 2 3 3 2 1 2 1 1 2 1 - - 3 1
CO-3 2 1 2 2 3 2 - 2 - 1 3 3
-
CO-4 2 1 3 - 2 1 - - 3 1
1
CO-5 2 2 2 2 3 2 2 2 2 2 1 - 1 3 3
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION AND AGILE DEVELOPMENT (12)
Software and Software Engineering-Process Model-Agile Development- What is Agility? -Agile
Process-Extreme Programming-Adaptive Software Development-Scrum-Dynamic System
Development Method-Crystal-FDD-LSD-Agile Modelling- Agile Unified Process- Tool set for
Agile Process
CO-1
Practical component: Explore the tools related to Agile Development and develop a small
BTL-2
project using this technology
Suggested Readings: Compare the historic models with agile for a business requirement and
justify
Cloud Computing covers the concepts, technology and architecture of Cloud Computing,
Course
different cloud service providers, storage infrastructure and Cloud Management, concepts as
Description
cloud virtualization technology and cloud, SOA and infrastructure benchmarking
1. To understand the basics of Cloud services and deploy cloud application using cloud
platforms
2. To introduce Cloud Models and develop cloud-based applications
Course
3. To provide knowledge in different techniques of Cloud Analytics
Objective
4. To Illustrate the use of various cloud system design approaches
5. To evaluate various solutions for cloud computing
6. To be aware of Infrastructure Benchmarking
Upon completion of this course, the students will be able to
1. Develop and deploy cloud application using popular cloud platforms
2. Design and develop highly scalable cloud-based applications by creating and
configuring virtual machines on the cloud and building private cloud.
3. Explain and identify the techniques of big data analysis in cloud.
Course
4. Compare, contrast, and evaluate the key trade-offs between multiple approaches to
Outcome
cloud system design, and Identify appropriate design choices when solving real-world
cloud computing problems.
5. Write comprehensive case studies analysing and contrasting different cloud computing
solutions.
6. Understand and use Infrastructure Benchmarking
Prerequisites: CSB4218 - Operating Systems, CSB4217 - Computer Networks
CO, PO AND PSO MAPPING
PO PO PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 -2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 3 - - 1 2 - - 2 - - - 1 2
CO-2 3 1 2 2 - - 1 2
CO-3 3 1 1 1 - 2 - 1 3 3
-
CO-4 2 3 1 2 - 2 2 - 1 1 3
CO-5 2 2 3 1 2 2 - 1 2
CO-6 2 3 1 2 1
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION (12)
Introduction - Essentials - Benefits - Business and IT Perspective - Cloud and Virtualization -
Cloud Services Requirements - Cloud and Dynamic Infrastructure - Cloud Computing
Characteristics - Cloud Adoption. Cloud Models - Cloud Characteristics - Measured Service -
CO-1
Cloud Models - Security in a Public Cloud - Public versus Private Clouds - Cloud Infrastructure
BTL-2
Self Service.
Practical component: Develop Cloud security solutions
Suggested Readings: Case study on Open Source and Commercial Clouds
MODULE 2: CLOUD SERVICES AND SOLUTIONS (12)
Gamut of Cloud Solutions - Principal Technologies - Cloud Strategy - Cloud Design and
Implementation using SOA - Conceptual Cloud Model - Cloud Service Defined. Cloud
Solutions - Introduction - Cloud Ecosystem - Cloud Business Process Management - Cloud CO-2
Service Management - Cloud Stack - Computing on Demand (CoD) – Cloud sourcing. BTL-3
Practical component: Deploy cloud applications
Suggested Readings: On-demand self- service
MODULE 3: CLOUD OFFERINGS AND CLOUD MANAGEMENT (12)
Cloud Offerings - Information Storage, Retrieval, Archive and Protection - Cloud Analytics -
Testing under Cloud - Information Security - Virtual Desktop Infrastructure - Storage Cloud. CO-3
Cloud Management - Resiliency - Provisioning - Asset Management - Cloud Governance - High BTL-3
Availability and Disaster Recovery - Charging Models, Usage Reporting, Billing and Metering
Practical component: Deployment and Configuration options in Amazon
Suggested Readings: Data security and Storage
MODULE 4: CLOUD VIRTUALIZATION TECHNOLOGY (12)
Virtualization Defined - Virtualization Benefits - Server Virtua lization - Virtualization for x86.
Architecture - Hypervisor Management Software - Logical Partitioning (LPAR) - VIO Server -
Virtual Infrastructure Requirements - Storage virtualization - Storage Area Networks - CO-4
Network-Attached storage - Cloud Server Virtualization - Virtualized Data Center BTL-3
Practical component: Hands on virtualization using XenServer
Suggested Readings: Data virtualization
MODULE 5: CLOUD, SOA AND INFRASTRUCTURE BENCHMARKING (12)
SOA and Cloud - SOA Defined - SOA and IaaS - SOA-based Cloud Infrastructure Steps - SOA
Business and IT Services. OLTP Benchmark - Business Intelligence Benchmark - e-Business
Benchmark - ISV Benchmarks Cloud Performance Data Collection and Performance CO-5,6
Monitoring Commands Benchmark Tools BTL-3
Practical component: Build cloud infrastructure
Suggested Readings: The Business case for going to the Cloud.
TEXT BOOKS
Kumar Saurabh. (2011). Cloud Computing: Insights into New-Era Infrastructure, Wiley India Pvt.
1.
Ltd.
REFERENCE BOOKS
Thomas Erl, Zaigham Mahmood, and Ricardo Puttini. (2013). Cloud Computing Concepts,
1.
Technology & Architecture, Prentice Hall.
John Rhoton. (2013). Cloud Computing Explained: Implementation Handbook for Enterprises,
2.
Recursive Press.
George Reese. (2009). Cloud Application Architectures: Building Applications and Infrastructure
3.
in the Cloud (Theory in Practice), O’Reilly.
E BOOKS
1. https://www.manning.com/books/exploring-cloud-computing
MOOC
https://www.mooc-list.com/course/cloud-computing-applications-part-1-cloud-systems- and-
1.
infrastructure-coursera
2. https://www.mooc-list.com/course/cloud-computing-concepts-part-2-coursera
COURSE TITLE HUMAN COMPUTER INTERACTION CREDITS 3
COURSE COURSE
CSB3726 PE L-T-P-S 2-0-2-0
CODE CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Seminar/
Second Periodical Surprise Test /
Periodical Assignments/ Attendance ESE
Assessment Quiz
Assessment Project
Course This course provides an overview of the Human Computer Interaction, cognitive psychology,
Description developing user interfaces, testing and Evaluation Techniques
1. To understand the basic concepts of Human Computer Interaction
2. To know about the user’s capabilities
Course 3. To develop Human Computer Interfaces
Objective 4. To identify the techniques for Testing and Evaluating the Usability of Human Computer
Interaction
5. To learn about the advanced user Interaction
Upon completion of this course, the students will be able to
1. Relate Human Computer Interaction and summarize its importance.
Course 2. Identify the user’s capabilities and recommend guidelines for interfaces.
Outcome 3. Design Human Computer Interfaces and implement them.
4. Test and Evaluate the Usability of Human Computer Interaction.
5. Formulate advanced user Interaction for real time applications
Prerequisites: Nil
CO, PO AND PSO MAPPING
PO PO PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 -2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 3 - - - - 2 - - - 1
CO-2 2 3 1 2 - - 2
CO-3 2 3 2 1 1 2 2 - 3
CO-4 2 2 1 3 1 2 2 - 1 1 2
CO-5 2 3 1 2 2 2 - 1 2 2
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION (12)
Course This course covers an overview of Cyber Crime, Cybercrime issues, Software Piracy and laws,
Description Cyber Crime Investigation and E-Mail Investigation
1. To understand the essential concepts of Cyber Crime
2. To Identify the cybercrime issues
Course 3. To understand the digital laws in cyber crime
Objective 4. To emphasize the importance of digital forensics tools
5. To learn the different techniques and procedures that enable them to perform a digital
investigation
Upon completion of this course, the students will be able to
1. Summarize the overview and categories of cyber crime
Course 2. List out the cybercrime issues
Outcome 3. Recall the digital laws in cyber crime
4. List and use the cybercrime tools and evidence
5. Apply recovering digital evidences and forensics
Prerequisites: Nil
CO, PO AND PSO MAPPING
PO PO PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 -2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 3 - 1 - - 2 1 1 - - 3
CO-2 3 2 1 1 1 2 2 - - 3 1
CO-3 3 2 1 2 1 2 2 2 - 3 1
CO-4 3 2 1 2 1 2 2 - 3 3
CO-5 2 2 3 2 1 2 1 2 2 - 1 3 3
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION (12)
Introduction: Introduction and Overview of Cyber Crime, Nature and Scope of Cyber Crime,
Types of Cyber Crime Social Engineering, Categories of Cyber Crime, Property Cyber Crime. CO-1
Practical component: Demonstrate using CyberCheckSuite BTL-2
Suggested Readings: Emerging digital crimes.
Cyber Crime Issues: Unauthorized Access to Computers, Computer Intrusions, white collar
Crimes, Viruses and Malicious Code Internet Hacking and Cracking, Virus Attacks. CO-2
Practical component: Develop a intrusion detection system BTL-3
Suggested Readings: Credit card and ATM frauds
CO-4 3 3 3 1 1 - - 2 - - - 1 - 2
-
CO-5 3 3 3 - - - - - 2 - - - 1 1 1
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: Performance of Computer Systems (12)
Performance of Computer Systems, Technology - Circuit speed (clock, MHz), Processor
technology (how many transistors on a chip), Organization - Type of processor (ILP),
Configuration of the memory hierarchy, type of I/O devices, Number of processors in the CO-1
system, Software - Quality of the compilers, Organization & quality of OS, databases, etc. BTL-2
Practical component: Design a computing Device for the given performance
Suggested Readings: Multicore processors
MODULE 2: Principles of Experimentation (12)
This course covers an overview of the intelligent system to solve real world problems,
Course
knowledge and reasoning, uncertain knowledge and reasoning, categories of Learning and
Description
Expert Systems
1. To have the ability to solve the real world applications
2. To be aware of the probabilistic learning models
Course
3. To determine the techniques for constraint satisfaction problems
Objective
4. To demonstrate the knowledge of the intelligent systems methodologies
5. To have the ability to develop an intelligent system for an application.
Upon completion of this course, the students will be able to
1. Apply the knowledge and reasoning in real world
2. Apply the probabilistic learning models
Course
3. Describe, analyze and apply techniques for constraint satisfaction problems
Outcome
4. Determine which type of intelligent system methodology would be suitable for a
given type of application problem
5. Develop an intelligent system for a selected application
Prerequisites: CSC4353 - Soft computing, CSB4303 - Artificial Intelligence
CO, PO AND PSO MAPPING
PO PO PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 -2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 3 3 3 2 1 - - - 2 - - - 1 - 1
CO-2 3 3 3 2 2 - - - 2 - - - 1 - 2
CO-3 3 2 2 2 2 - - 1 2 1 - - 1 - 3
1
CO-4 3 3 2 2 1 - 2 2 - 2 - - - 3
CO-5 2 2 2 2 1 3 - - 2 - - - 1 1 2
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: AI INTRODUCTION (12)
Introduction -Intelligent Agents -Problem Solving -Solving Problems by Searching - Beyond
Classical Search - Adversarial Search - Constraint Satisfaction Problems. CO-1
Practical component: BTL-2
Suggested Readings: Discuss the history and implications of Artificial Intelligence research
MODULE 2: KNOWLEDGE AND REASONING (12)
Logical Agents -First-Order Logic - Inference in First-Order Logic -Classical Planning - Planning
and Acting in the Real World -Knowledge Representation. CO-2
Practical component: BTL-3
Suggested Readings: Describe attributes of search techniques and the situations
MODULE 3: UNCERTAIN KNOWLEDGE AND REASONING (12)
Quantifying Uncertainty -Probabilistic Reasoning - Probabilistic Reasoning over Time -Making
Simple Decisions -Making Complex Decisions. CO-3
Practical component: BTL-3
Suggested Readings: Dealing with uncertainty
MODULE 4: LEARNING (12)
Learning from Examples - Knowledge in Learning - Learning Probabilistic Models –
Reinforcement Learning -Communicating, Perceiving, and Acting-Natural Language
CO-4
Processing - Natural Language for Communication- Perception.
BTL-3
Practical component:
Suggested Readings: Describe and apply techniques for automated learning
MODULE 5: EXPERT SYSTEM (12)
Defining Expert Systems – Expert system architecture-Robot Architectures
CO-5
Practical component:
BTL-3
Suggested Readings: Implement standard algorithms for intelligent system
TEXT BOOKS
Stuart Russel and Peter Norwig. (2012). Artificial Intelligence: A Modern Approach, Prentice
1.
Hall third edition.
REFERENCE BOOKS
Kevin Knight, Eline Rich B.Nair. (2012). Artificial Intelligence, McGraw Hill Education 3rd
1.
edition.
E BOOKS
1. https://www.amazon.in/INTRODUCTIONINTELLIGENCEebook/dp/B015DY3L5
MOOC
1. https://nptel.ac.in/courses/108104049/
2. https://www.edx.org/learn/artificial-intelligence
The aim of the course is to study the fundamental techniques for developing HPC applications, the
Course commonly used HPC platforms, the methods for measuring, assessing and analyzing the performance of
Description HPC applications, and the role of administration, workload and resource management in an HPC
management software.
1. Provide systematic and comprehensive treatment of the hardware and the software
high performance techniques involved in current day computing.
Course
2. Introduce the fundamentals of high-performance computing with the graphics
Objective
processing units and many integrated cores using their architectures and
corresponding programming environments.
3. Introduce the learner to fundamental and advanced parallel algorithms through the
GPU and MIC programming environments
4. Provide systematic and comprehensive treatment of the components in the pipeline
that extract instruction level parallelism.
5. Provide a strong foundation on memory hierarchy design and tradeoffs in both
uniprocessor and multiprocessors.
Upon completion of this course, the students will be able to
1. The learner will be able to design, formulate, solve and implement high performance
versions of standard single threaded algorithms
2. The learner will know and will be able to demonstrate the architectural features in the
Course
GPU and MIC hardware accelerators.
Outcome
3. The learner will be able to design programs to extract maximum performance in a
multicore, shared memory execution environment processor
4. The learner will be able to design and deploy large scale parallel programs on tightly
coupled parallel systems using the message passing paradigm
Prerequisites: Computer Architecture, Design and analysis of Algorithms
CO, PO AND PSO MAPPING
PO PO PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 -2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 3 3 3 2 1 - - - 2 - - - 1 - 1
CO-2 3 3 3 2 2 - - - 2 - - - 1 - 2
CO-3 3 2 2 2 2 - - 1 2 1 - - 1 - 3
1
CO-4 3 3 2 2 1 - 2 2 - 2 - - - 3
CO-5 2 2 2 2 1 3 - - 2 - - - 1 1 2
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: INTRODUCTION(9)
MODULE 2: HPCARCHITECTURE(9)
Key properties of HPC Architecture - Parallel Architecture family – Enabling Technology –
von- Neumann Sequential processor – Vector & Pipelining – Single instruction, Multiple data
array – Multi processors – heterogeneous Computer structures.
CO-2
Practical component:
BTL-3
Suggested Activity: Study about Xeon Phi Programming
Suggested sources: https://www.youtube.com/watch?v=NIqrWds0cy0
TEXT BOOKS
ThomasSterling,MatthewAnderson,MaciejBrodowicz,“HighPerformanceComputing:Modern Systems and
1.
Practices”, 1st Edition , Morgan Kaufman publishers, 2017
REFERENCE BOOKS
John L. Hennessy and David A. Patterson, Computer Architecture: A Quantitative Approach,Morgan Kaufmann.
1.
5th Edition 2011
JohnPaulShenandMikkoH.Lipasti,ModernProcessorDesign:FundamentalsSuperscalarProcessors,
2.
TataMcGraw-Hill. 2005
3. KaiHwangandBriggs,ComputerArchitectureandParallelProcessing,McGraw-Hill,2012
4. M.J.Flynn,ComputerArchitecture:PipelinedandParallelProcessorDesign,NarosaPublishingHouse,2008
This course unit introduces students to basic and advanced approaches to formally build verified
Course
trustworthy software systems, where trustworthy comprise five attributes: reliability, availability, safety,
Description
resilience and security.
1. Lean how and why (certain) software defenses can be bypassed
Course
2. Familiarize with exploit development techniques, in order to better understand the
Objective
boundaries of protection mechanisms and argue about their effectiveness
Upon completion of this course, the students will be able to
1. Explain software security fundamentals
Course 2. Do code review with a tool
Outcome 3. Perform Security Testing
4. Identify the Security Gap
5. Analyze the files both statically and dynamically
Prerequisites: Security Software Engineering
CO, PO AND PSO MAPPING
PO PO PO- PO- PO- PO- PO- PO- PO- PO - PO- PO- PSO- PSO- PSO-
CO
-1 -2 3 4 5 6 7 8 9 10 11 12 1 2 3
CO-1 3 3 3 2 1 - - - 2 - - - 1 - 1
CO-2 3 3 3 2 2 - - - 2 - - - 1 - 2
CO-3 3 2 2 2 2 - - 1 2 1 - - 1 - 3
1
CO-4 3 3 2 2 1 - 2 2 - 2 - - - 3
CO-5 2 2 2 2 1 3 - - 2 - - - 1 1 2
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE 1: SOFTWARESECURITYFUNDAMENTALS (9)
Defining a discipline: Security Problems in Software - The three pillars of software security -
CO-1
The rise of security engineering - Risk Management framework.
BTL-2
Suggested Activity:Study about the common security issues of software
Introduction to software security touch points -Code review with a tool CO-2
Suggested Activity:Identify the Seven Touchpoints for Software Security BTL-3
MODULE 3:SECURITYTESTING(9)
Software penetration Testing - Risk Based Security Testing - Abuse Cases - Software Security CO-3
meets security operations BTL-3
Suggested Activity:Experiment with any one of the Penetration Testing Software
MODULE 4:SOFTWARESECURITYGAP(9)
1. Gary R.McGraw, "Software Security : Building Security In", Addison Wesley, 2006
REFERENCE BOOKS
1. Sommerville, “Software Engineering”, Adison Wesley, 10th Edition, 2016
2. Pfleeger, “Software Engineering”, Prentice Hall, 4th Edition, 2010
Carlo Ghezzi, Mehdi Jazayari and Dino Mandrioli, “Fundamentals of Software Engineering”,Prentice Hall of
3.
India, 2th Edition, 2004
4. CraigLarman,“AgileandIterativeDevelopment:AManager’sGuide”,PearsonEducation,2009.
M.ShawandD.Garlan,“SoftwareArchitecture:PerspectivesonanEmergingDiscipline”,
5.
Prentice Hall of India Private Limited , New Delhi 2010
E BOOKS
1. https://www.amazon.com/Secure-Software-Design-Theodor-Richardson/.../14496263..
MOOC
1. ceur-ws.org/Vol-1977/paper3.pdf
2. https://pe.gatech.edu/courses/secure-software-development
COURSE TITLE SOFTWARE QUALITY MANAGEMENT CREDITS 3
COURSE
COURSE CODE CSA3732 DE L-T-P-S 3-0-0-0
CATEGORY
23 ACM, LEARNING
Version 1.0 Approval Details BTL-3
06.02.2021 LEVEL
ASSESSMENT SCHEME
First Second Seminar/
Surprise Test
Periodical Periodical Assignments/ Attendance ESE
/ Quiz
Assessment Assessment Project
This course introduces concepts, metrics, and models in software quality assurance.
Course The course covers components of software quality assurance systems before, during,
Description and after software development. It also discusses the standards and certifications
required to assess the Software Quality.
The course enables the students to
1. Learn the Software Quality challenges and to develop the Quality Plans.
2. Understand the Quality assurance components in the Project Life cycle.
Course
3. Know the Quality Infrastructure Components.
Objective
4. Acquire the knowledge in Quality Metrics.
5. Familiar with the standards and certifications required to assess the Software
Quality.
Upon completion of this course, the students will be able to
1. Relate to quality assurance plan
Course 2. Apply quality assurance tools & techniques in their project
Outcome 3. Explain the quality management principles
4. Apply Procedures and work instructions in software organizations
5. Describe the Quality certification Procedure and standards
Prerequisites: Software Engineering
CO, PO AND PSO MAPPING
PO- PO- PO- PO- PO- PO- PO- PO- PO- PO- PO- PS PS PS
CO
1 2 3 4 5 6 7 8 9 10 11 O-1 O-2 O-3
CO-1 2 3 3 2 1 2 3 2 1 1 2 1 3 1
CO-2 2 3 3 2 3 2 3 2 2 2 2 1 3 2
CO-3 3 2 2 2 1 2 3 2 2 1 2 1 3 1
CO-4 3 3 3 2 1 2 3 3 2 2 2 1 3 1
CO-5 3 1 2 1 1 1 2 3 2 1 1 1 3 1
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE1: INTRODUCTION (9)
The Software Quality Challenge - Software Quality Factors - Components of the
Software Quality Assurance System. Pre-Project Software Quality Components -
Contract Review - Development and Quality Plans CO-1
Suggested activities: Analyse the Importance of quality BTL-2
Suggested sources:https://www.springer.com/gp/computer-science/software-
engineering
MODULE 2: SOFTWARE QUALITY ASSURANCE COMPONENTS IN THE PROJECT LIFE CYCLE(9)
Integrating Quality Activities in the Project Life Cycle – Reviews - Software Testing –
Strategies – Software Testing –Implementation - Assuring the Quality of Software
Maintenance - Assuring The Quality of External Participants' Parts - Case Tools and their
CO-2
Affect on Software Quality.
BTL-3
Suggested activities: Develop quality assurance models
Suggested sources:www.software-quality-assurance.org/
Course This course offers the fundamentals of computer vision and various techniques in
Description feature detection, segmentation and recognition.
The blockchain technology course allows the students to explore the driving force
Course
behind the cryptocurrency Bitcoin. Along with the Decentralization, Cryptography,
Description
Bitcoins with its alternative coins, Smart contracts and outside of currencies.
The course will enable the students to
1. Understand how blockchain systems (mainly Bitcoin and Ethereum) work
Course 2. To securely interact with them
Objective 3. Design, build, and deploy smart contracts and distributed applications
4. Integrate ideas from blockchain technology into their own projects.
Prerequisites: Basic idea in Networking, finance, Supply chain, Cryptography, Network Security
CO, PO AND PSO MAPPING
PO PO PO PO PO PO PO PO- PO PO PO- PSO- PSO-
CO PSO-3
-1 -2 -3 -4 -5 -6 -7 8 -9 -10 11 1 2
CO-1 3 3 2 3 1 1 1 2 2 1 3 2 2 3
CO-2 3 3 2 3 1 1 1 2 2 1 3 2 2 3
CO-3 3 3 2 3 2 1 1 2 2 1 3 2 2 3
CO-4 3 3 2 3 1 1 1 2 2 1 3 2 2 3
CO-5 3 3 3 1 3 1 1 1 2 1 3 2 2 3
1: Weakly related, 2: Moderately related and 3: Strongly related
MODULE1: INTRODUCTIONTOBLOCKCHAIN (9)
History: Digital Money to Distributed Ledgers -Design Primitives: Protocols, Security, Consensus,
Permissions, Privacy: Blockchain Architecture and Design-Basic crypto primitives: Hash, Signature-
CO-1
Hashchain to Blockchain-Basic consensus mechanisms
BTL-2
Suggested Activity:
1. Study about blockchain tools in the Market
MODULE 2: CONSENSUS(9)
Requirements for the consensus protocols-Proof of Work (PoW)-Scalability aspects of Blockchain
consensus protocols: Permissioned Blockchains-Design goals-Consensus protocols for
CO-2
Permissioned Blockchains
BTL-2
Suggested Activity:
Implementing consensus algorithm
MODULE 3: HYPERLEDGERFABRIC(9)
Decomposing the consensus process-Hyperledger fabric components-Chaincode Design and
Implementation: Hyperledger Fabric II:-Beyond Chaincode: fabric SDK and Front End-Hyperledger
CO-3
composer tool
BTL-3
Suggested Activity:
Practice with simple experiment on Hyperledger
MODULE 4: USECASEI(9)
Blockchain in Financial Software and Systems (FSS): -Settlements, -KYC, -Capital markets-
Insurance- Use case II: Blockchain in trade/supply chain: Provenance of goods, visibility,
CO-4
trade/supply chain finance, invoice management/discounting
BTL-2
Suggested Activity:
Implement Digital Identity using smart contract
MODULE 5: USECASEII(9)
Blockchain for Government: Digital identity, land records and other kinds of record keeping CO-5
between government entities, public distribution system / social welfare systems : Blockchain BTL-3
Cryptography : Privacy and Security on Blockchain
Suggested Activity:
Implement a digital bank using Ethereum Blockchain
TEXT BOOKS
Mark Gates, “Blockchain: Ultimate guide to understanding blockchain, bitcoin,
1 cryptocurrencies, smart contracts and the future of money”, Wise Fox Publishing and Mark
Gates, 2017.
Salman Baset,LucDesrosiers,NitinGaur,PetrNovotny,AnthonyO'Dowd,Venkatraman
2 Ramakrishna, “Hands On Blockchain with Hyperledger: Building decentralized applications
with HyperledgerFabricandComposer”,2018.
Arshdeep Bahga,Vijay Madisetti,“Blockchain Applications:A Hands-On Approach”,
3
Vijay Madisetti publishers 2017.
REFERENCE BOOKS
1 Andreas Antonopoulos,“Mastering Bitcoin:Unlocking Digital Cryptocurrencies”
,O'ReillyMedia,Inc., 2014.
2 Melanie Swa, “Blockchain ”,O'Reilly Media, 2014
E BOOKS
1 Blockchain Applications- https://www.blockchain-books.com
MOOC
1. https://onlinecourses.nptel.ac.in/noc18_cs47/preview
2. https://www.udemy.com/blockchain-and-bitcoin-fundamentals/
MODULE 2: SYMMETRICCRYPTOGRAPHY(9)
Modular arithmetic-Euclid‟s algorithm- Congruence and matrices – Groups, Rings,
Fields- Finite fields- SYMMETRIC KEY CIPHERS: SDES – Block cipher Principles of DES –
Strength of DES – Differential and linear cryptanalysis – Block cipher design principles –
CO-2
Block cipher mode of operation – Evaluation criteria for AES – Advanced Encryption
BTL-3
Standard – Key distribution.
Suggested Reading:
http://cs.brown.edu/cgc/net.secbook/se01/handouts/Ch08-CryptoConcepts.pdf
MODULE 3: PUBLIC KEYCRYPTOGRAPHY (9)
Number Theory Concepts:Primes–PrimalityTesting–Factorization–
Euler‘stotientfunction, Fermat‘s and Euler‘s Theorem – Chinese Remainder Theorem –
Exponentiation and logarithm – ASYMMETRIC KEY CIPHERS:RSAcryptosystem–
CO-3
Keydistribution–Keymanagement–DiffieHellman keyexchange–ElGamalcryptosystem–
BTL-3
Ellipticcurvearithmetic-Ellipticcurvecryptography.
Suggested Reading:
http://www.facweb.iitkgp.ac.in/~sourav/PublicKeyCrypto.pdf
MODULE 4: AUTHENTICATION (9)
Authentication requirement–Authentication function–MAC–Hashfunction–Security of
hash function and MAC – SHA –Digital signature and authentication protocols – DSS-
Entity Authentication: Biometrics, Passwords, Challenge Response protocols- CO-4
Authentication applications – Kerberos,X.509 BTL-3
Suggested Reading:
https://searchsecurity.techtarget.com/definition/authentication
MODULE 5: E-MAIL SECURITY AND SYSTEM SECURITY (9)
Electronic Mail security – PGP, S/MIME – IP security – Web Security – SYSTEM SECURITY: CO-5
Intruders –Malicious software – viruses – Firewalls. BTL-2
Suggested Readings:
https://web.cs.hacettepe.edu.tr/~abc/teaching/bbm463/slides/NetSec.pdf
TEXT BOOKS
1. WilliamStallings,CryptographyandNetworkSecurity:PrinciplesandPractice,PHI7thEdition, 2016.
REFERENCE BOOKS
1 BehrouzA.Foruzan, Cryptography and Network Security, Tata McGraw Hill 2007.
2 CharlieKaufman,RadiaPerlman,andMikeSpeciner,NetworkSecurity:PRIVATE
CommunicationinaPUBLICWorld,PrenticeHall,ISBN0-13-046019-2
3 Bruce Schneier ,"Applied Cryptography", Wiley publications,2007.
E BOOKS
1 http://www.freebookcentre.net/special-books-download/Handbook-of-Applied-
Cryptography-(A.J.-Menezes,-P.C.-van-Oorschot,-S.A.-Vanstone)
MOOC
1. https://nptel.ac.in/courses/106105031/
This course introduces concepts, metrics, and models in software quality assurance.
Course The course covers components of software quality assurance systems before, during,
Description and after software development. It also discusses the standards and certifications
required to assess the Software Quality.
The course enables the students to
Course 1. Learn the Software Quality challenges and to develop the Quality Plans.
Objective 2. Understand the Quality assurance components in the Project Life cycle.
3. Know the Quality Infrastructure Components.
4. Acquire the knowledge in Quality Metrics.
5. Familiar with the standards and certifications required to assess the Software
Quality.