BE IT Syllabus 2012 Course Final 15 6 15 PDF
BE IT Syllabus 2012 Course Final 15 6 15 PDF
BE IT Syllabus 2012 Course Final 15 6 15 PDF
Faculty of Engineering
Syllabus
B.E. (Information Technology) 2012 Course
(With effect from Academic Year 2015 - 16)
PROGRAM OUTCOMES
The students in the Information Technology course will attain:
1. an ability to apply knowledge of computing, mathematics including discrete mathematics as
well as probability and statistics, science, and engineering and technology;
2. an ability to define a problem and provide a systematic solution with the help of conducting
experiments, as well as analyzing and interpreting the data;
5. an ability to use the techniques, skills, and modern engineering technologies tools, standard
processes necessary for practice as a IT professional;
7. an ability to analyze the local and global impact of computing on individuals, organizations and
society;
8. an ability to understand professional, ethical, legal, security and social issues and
responsibilities;
10. an ability to engage in life-long learning and continuing professional development to cope up
with fast changes in the technologies/tools with the help of electives, professional
organizations and extra-curricular activities;
13. an ability to apply design and development principles in the construction of software systems of
varying complexity.
SEMESTER I
Elective I Elective II
414456 A : Soft Computing 414457 A : Business Intelligence
414456 B : Usability Engineering 414457 B : Service Oriented Architecture
414456 C : Modern Compilers 414457 C : E&M Governance
414456 D : Parallel Algorithms and Design 414457 D : Geo Informatics Systems
414456 E : Cloud Computing 414457 E : Natural Language Processing
SEMESTER II
SEMESTER - I
Course Objectives :
1. Understand the essentials of information security.
2. Learn the algorithms for implementing security
3. To provide an understanding of principal concepts, major issues, technologies, and basic
approaches in information security
Course Outcomes :
The learning outcomes are:
Students shall be able to understand what are the common threats faced today
What is the foundational theory behind information security
What are the basic principles and techniques when designing a secure system
How today's attacks and defenses work in practice
How to assess threats for their significance and
How to gauge the protections and limitations provided by today's technology
Text Books
1. BruiceSchneier, Applied Cryptography- Protocols, Algorithms and Source code in C, 2nd
Edition, Wiely India Pvt Ltd, ISBN 978-81-265-1368-0
2. Nina Godbole, SunitBelapure, Cyber Security- Understanding Cyber Crimes, Computer
Forensics and Legal Perspectives, Wiely India Pvt.Ltd.,ISBN- 978-81-265-2179-1
3. Bernard Menezes, Network Security and Cryptography, Cengage Learning, ISBN-978-81-315-
1349-1
Reference Books
1. Nina Godbole, Information Systems Security, Wiley India Pvt. Ltd, ISBN -978-81-265-1692-6
2. Willaim Stallings, Computer Security : Principles and Practices, Pearson Ed. ISBN :978-81-317-
3351-6
3. Mark Merkow, Information Security-Principles and Practices, Pearson Ed. 978-81-317-1288-
7
4. CK Shyamala et el., Cryptography and Security, Wiley India Pvt. Ltd, ISBN 978-81-265-2285-9
5. Berouz Forouzan, Cryptography and Network Security, 2 edition, TMH, ISBN :9780070702080
Course Objectives :
1. Based on user requirements, create a requirement model using UML class notations
and use-cases.
2. Create an OO design of a system from the requirements model in terms of a high-
level design description, and low-level models of structural organization and dynamic
behavior using relevant UML diagrams.
3. Comprehend the importance of GOF design patterns by implementing few simple design
patterns.
4. Validate software implementation for its correctness and quality using appropriate testing.
Course Outcomes :
Students will be able to
1. understand the usage of various UML diagrams to build a model
2. prepare an object oriented model in business domain of an application.
3. prepare an object oriented model in solution domain.
4. apply object oriented principles in the design of software system.
5. get started on study of GOF design patterns.
6. understand different types of software testing.
Text Books
1. Michael R Blaha, James Rumbaugh, Object Oriented Modeling and Design with UML, Second
Edition, Pearson Education System.
2. Dennis, Wixom, Tegarden, System Analysis and design - an Object oriented approach with
UML, 5th Edition, Wiley publication.
3. M G Limaye, Software Testing Principle, Techniques and Tools, TMH.
Reference Books
1. Grady Booch, Object oriented analysis and design with application, third edition, Pearson
Education.
2. Dan Pilone, UML 2.0 in a Nutshell, OReilly.
3. Grady Booch, James Rumbaugh, Ivor Jacobson, The Unified Modeling Language User Guide,
Second Edition, Addison Wesley Object Technology Series.
4. Jim Arlow, UML 2 and the Unified Process: Practical Object Oriented Analysis and design,
Second Edition, , Addison Wesley Object Technology Series.
5. Erich Gamma and others, Design Patterns: Reusable elements of object oriented software,
Pearson Education Series.
6. Hasan Gomma, Software Modeling and Design, Cambridge University Press India.
Course Objectives :
1. Understanding Human learning aspects.
2. Understanding primitives in learning process by computer.
3. Understanding nature of problems solved with Machine Learning.
Course Outcomes :
1. Students will be able to model the learning primitives.
2. Students will be able to build the learning model.
3. Student will be able to tackle real world problems in the domain of Data Mining, Information
Retrieval, Computer vision, Linguistics and Bioinformatics.
Text Books
1. Peter Flach: Machine Learning: The Art and Science of Algorithms that Make Sense of Data,
Cambridge University Press, Edition 2012.
2. Hastie, Tibshirani, Friedman: Introduction to Statistical Machine Learning with Applications in
R, Springer, 2nd Edition-2012.
Reference Books
1. C. M. Bishop : Pattern Recognition and Machine Learning, Springer 1st Edition-2013.
2. Ethem Alpaydin : Introduction to Machine Learning, PHI 2nd Edition-2013.
3. Parag Kulkarni : Reinforcement and Systematic Machine Learning for Decision Making, Wiley-
IEEE Press, Edition July 2012.
Course Objectives :
1. Understanding differential behavior of Human and Intelligence Systems.
2. Understanding nature of problems solved with Soft Computing.
3. Understanding components of Soft Computing.
Course Outcomes :
1. Students will be inspired to solve complex real-world problems.
2. Students will correlate human-like processing in problem solving with current technologies in
various domains like Bio Informatics, Multimedia Systems, Big Data Analytics, etc.
3. Student will be able to tackle problems of interdisciplinary nature.
Text Books
1. Fakhreddine O. Karray, Clarence De Silva, 'Soft Computing and Intelligent systems design'
Pearson Education, ISBN 978-81-317-2324-1.
2. B. K. Tripathy, J. Anuradha, 'Soft Computing: advances and applications', Cengage learning,
ISBN-13: 978-81-315-2619-4.
Reference Books
1. S. N. Sivanandam, S. N. Deepa, Principles of Soft Computing, Wiley publications, 2nd Edition.
2. J. S. R. Jang, C. T. Sun, E. Mizutani, 'Neuro-Fuzzy and Soft Computing- A computational
approach to Learning and Machine Intelligence' PHI,
3. David E. Goldberg , Genetic Algorithms - Pearson Education, 2006
4. Satish Kumar, "Neural Networks - A Classroom Approach", Tata McGraw,Hill
Course Objectives :
1. To introduce the need for human-computer-interaction study or human-centered software
design.
2. To explain usability engineering lifecycle for designing a user-friendly software.
3. To familiarize information, interaction and GUI design process for enhancing user-experience.
4. To develop usability evaluation skills for software testing.
5. To explain industry standards for designing and evaluating use-interfaces.
6. To make aware of the current trends in usability engineering.
Course Outcomes :
At the end of this course, student should be able to:
1. Justify the need to study human-computer-interaction or human-factors while designing
software.
2. Discuss the process of designing user-friendly software based on usability engineering
guidelines.
3. Apply interaction design and UI design process in enhancing user-experience of an application.
4. Conduct usability evaluation of user-interfaces or software applications.
5. Discuss industry standards for designing and evaluating user-interfaces.
6. Discuss current trends in usability engineering
Text Books
Reference Books
Web-links
1. http://www.usabilitybok.org/
2. http://www.usability.gov/
3. http://www.webmonkey.com/2010/02/information_architecture_tutorial/
4. http://www.measuringu.com/
5. http://user.medunigraz.at/andreas.holzinger/holzinger%20de/usability%20holzinger.html
Course Objectives :
1. To develop an awareness of the function and complexity of modern compilers.
2. To introduce the major concept areas of language translation and compiler design
3. To give students hands-on experience with crafting a simple compiler, working on a sizeable
software engineering project, using modern software tools, and most importantly correlating
theory.
Course Outcomes :
1. Understand the performance characteristics of modern processors
2. Be familiar with compiler architecture and implementation.
3. Be familiar with register allocation.
4. Be exposed to compiler optimization.
Text Books
Reference Books
Course Objectives :
1. To study the parallel architecture of the processor.
2. To study various parallel algorithmic strategies and their comparison with traditional
algorithmic strategies.
3. To study the analysis of parallel algorithms in terms of time and space complexity.
4. To classify the parallel algorithm in complexity class.
5. To understand the recent applications of Parallel algorithms.
Course Outcomes :
At the end of this course, students will be able to:
1. Explain key concepts in parallel computational models.
2. Describe parallel algorithms, architectures and applications.
3. Implement different parallel algorithms, techniques and architectures.
4. Explain graph algorithms.
5. Understand dynamic programming strategy and its applications.
Text Books
1. Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar "Introduction to Parallel
Computing", Second Edition, Addison Wesley, 2003. ISBN: 0-201-64865.
2. M.J. Quinn, "Designing Efficient Algorithms for Parallel Computer" by Mc Graw Hill.
3. S.G.Akl, "The Design and Analysis of Parallel Algorithms", PHI, 1989.
Reference Books
Course Objectives :
1. To know the emerging trends in Cloud Computing.
2. To have thorough knowledge of Virtualization Technologies and Cloud architecture.
3. To integrate security in cloud applications.
4. To have systematic knowledge of Ubiquitous Computing.
Course Outcomes :
1. Understand and Familiar with the basic concepts of cloud computing.
2. Understand how to build large scale distributed systems and cloud applications.
3. Comprehend the importance of cloud security.
4. Understand Ubiquitous Computing and applications.
Text Books
1. Barrie Sosinsky, Cloud Computing Bible, Wiley
2. Gautham Shroff, Enterprise Cloud Computing, Cambridge.
3. Stefan Poslad, Ubiquitous Computing: Smart Devices, Environments and Interactions by John
Wiley & Sons, 2011.
4. A.Shrinivasan, J.Suresh, Cloud Computing: A practical approach for learning and
implementation, Pearson.
Reference Books
1. Rajkumar Buyya, J.Broberg, A. Goscinski, Cloud Computing Principles and Paradigms, Wiley.
2. Ronald Krutz,Cloud Security: Comprehensive guide to Secure Cloud Computing, Wiley
Publishing.
3. Anthony T. Velte, Cloud Computing: Practical Approach, McGraw Hill.
4. Tim Mather, Cloud Security and Privacy, OREILLY.
Course Objectives :
1. This course focuses on how to design and build a Business Intelligence solution.
2. Students will also learn how to design and build a data warehouse within the context of student
BI projects.
3. Students can develop their own projects within collaborative teams or be assigned an existing
data source to develop a project.
4. To ensure success during the implementation phase, students will plan for and gather business
requirements, as well as design the data warehouse in order to develop an effective BI plan.
Course Outcomes :
1. Design and implement OLTP, OLAP and Warehouse concepts.
2. Design and develop Data Warehouse using Various Schemas & Dimensional modelling.
3. Use the ETL concepts, tools and techniques to perform Extraction, Transformation, and Loading of
data.
4. Report the usable data by using various reporting concepts, techniques/tools, and use charts,
tables for reporting in BI.
5. Use Analytics concepts like data mining, Exploratory and statistical techniques for predictive
analysis in Business Intelligence.
6. Demonstrate application of concepts in BI.
Text Books
Reference Books
1. William Inmon, Building the Data Warehouse, Wiley publication 4th edition.
2. Efrem G. Mallach, Decision Support And Data Warehouse Systems, 1st Edition Publisher: Tata
McGraw-Hill Education,. ISBN-10: 0072899816.
3. Efraim Turban, Ramesh Sharda, Dursun Delen, David King, Business Intelligence, ISBN-10:
013610066X Publisher: Prentice Hall.ISBN-13: 9780136100669.
4. Dorian Pyle, Business Modeling and Data Mining, Elsevier Publication MK.
Course Objectives :
1. Understand the concepts of Service Oriented Architecture along with the evolution of SOA.
2. Be aware of the key issues facing many organizations, especially dealing with integration
among systems and providing architectural abstractions to them.
3. Integrate SOA technologies with Web Services paradigms.
4. Know related technologies and implementation basics of SOA.
Course Outcomes :
1. Students will be able to know the importance of SOA.
2. Students will be able to know SOA primitives.
3. Students will be able to analyze quality web services.
4. Students will be able to design and develop web services.
Text Books
Reference Books
Course Objectives :
1. To understand What E-Commerce and M-Commerce is.
2. To study application of E-Commerce and M-Commerce.
3. To learn business models and governance structures in E & M Governance.
4. To study the effects of Information Technology on E & M Governance.
5. To learn mobile commerce technologies and to apply the same on E-Markets.
Course Outcomes :
At the end of this course, students will be able to:
1. Explain what E & M Governance is.
2. Understand the consequences of E-Commerce and M-Commerce.
3. Describe E-Procurements and E-Business Networks.
4. Define E-Commerce and M-Commerce services for consumers and businesses.
5. Understand E & M Governance standards and service development technology in M-
Commerce.
Text Books
Reference Books
1. Henry Chan, Raymond Lee, Tharam Dillon, Elizabeth Chang, E-Commerce: Fundamentals and
Applications, ISBN: 978-0-471-49303-7, Publisher: Wiley
2. David Whiteley, E-Commerce: Strategy, Technologies and Applications, Tata McGraw Hill
3. Ravi Kalakota, Andrew Whinston, Frontiers of Electronic Commerce, Addison Wesley Denial
Amor The E Business revolution, Addison Wesley
4. Sokol, From EDI to Electronic Commerce: A Business Initiative, TMH
5. Bajaj Nag, E Commerce : The Cutting Edge of Business, TMH
6. Bharat Bhasker, Electronic Commerce Framework, Technologies and Applications, ISBN-13:
978-1-25-902634-3, McGraw Hill Education.
Course Objectives :
1. To understand geographical Information system and its applications.
2. To understand sensing mechanism of different satellites.
Course Outcomes :
1. Students will understand basics of Remote Sensing & GIS.
2. Students will able to analyze GIS data and GIS applications.
Text Books
Reference Books
Course Objectives :
1. Understand the core concepts of Natural language processing and levels of language analysis.
2. Learning state of art NLP research areas such as parsing algorithms, ambiguity resolution and
machine translation.
Course Outcomes :
1. Automatic processing and information extraction of human language using computer.
2. Learn applications of Natural Language Processing such as Information extraction, semantic
web search, machine translation, text summarization, spam detection.
(word error rate) WER etc. Automatic text summarization, Sentiment Speech Recognition, Semantic
web search, Automatic text Clustering.
Text Books
Reference Books
Course Objectives :
1. To Understand the Security issues in networks and Applications software.
2. To understand the machine learning principles and analytics of learning algorithms.
Course Outcomes :
1. The students will be able to implement and port controlled and secured access to software
systems and networks.
2. The students will be able to build learning software in various domains.
Contents
PART A : Cyber Laws and Information Security
Section A Programming
1. Write program in C++ or Java to implement RSA algorithm for key generation and
cipher verification
2. Develop and program in C++ or Java based on number theory such as Chinese
remainder or Extended Euclidean algorithm. ( Or any other to illustrate number
theory for security)
3. Write program in C++ or Java to implement Diffie Hellman key exchange
algorithm.
Students should submit the term work in the form of a journal. Each assignment has to be well
documented with problem definition, theory and code documentation. Staff in charge will assess the
assignments continuously and grade or mark each assignment on completion date, declared for each
assignment.
Note: Oral examination will be based on the term work submitted by the student and the associated
theory of the subject.
Reference Books
1. William Stallings, Computer Security: Principles and Practices, Pearson Ed. ISBN: 978-81-317-
3351-6.
2. Mark Merkow, Information Security-Principles and Practices, Pearson Ed. 978-81-317-1288-
7.
3. CK Shyamalaet el., Cryptography and Security, Wiley India Pvt. Ltd, ISBN 978-81-265-2285-9.
4. BerouzForouzan, Cryptography and Network Security, 2 edition, TMH, ISBN: 9780070702080.
REFERENCE : 1) Open source software-WEKA or R 2) JAVA 6.1 or more ( for RJava Package)
Subject teachers are advised to frame proper assignment statements from the following list.
LIST OF ASSIGNMENTS:
4) Unsupervised Learning
Implement K-Means Clustering and Hierarchical clustering on proper data set of
your choice. Compare their Convergence.
5) Dimensionality Reduction
Principal Component Analysis-Finding Principal Components, Variance and Standard
Deviation calculations of principal components.
Reference Books
1. Open source software-WEKA or R.
2. JAVA 6.1 or more ( for RJava Package).
3. Dr. Mark Gardener, Beginning R The Statistical Programming Language, ISBN: 978-81-265-
4120-1, Wiley India Pvt. Ltd.
4. Jason Bell, Machine Learning for Big Data Hands-On for Developers and Technical
Professionals, ISBN: 978-81-265-5337-2-1, Wiley India Pvt. Ltd.
Term work:
Staff in-charge will suitably frame the above assignments and flexibility may be incorporated. Students
will submit term work in the form of journal. Each assignment has to be well documented with
problem definition, code documented with comments. Staff in-charge will assess the assignments
continuously and grade or mark each assignment on completion date.
All the assignments should be conducted on Latest version of Open Source Operating Systems, tools
and Multi-core CPU supporting Virtualization and Multi-Threading.
Course Objectives :
1. Prepare an analysis model of a system using UML 2 diagrams.
2. Implement an appropriate design pattern to solve a design problem.
3. Understand a test driven development approach for coding.
4. Understand Object Oriented Software Development life cycle activities.
Course Outcomes :
1. Students will be able to identify classes and collaboration from requirements.
2. Students will be able to prepare analysis and design model and implement.
3. Students will be able to use the test driven development approach in implementation.
4. Students will be able to experience Object Oriented Software Development life cycle activities.
Contents
The laboratory will be in form of assignments. Each assignment will have a laboratory pre work.
Following are the guidelines to conduct the laboratories.
1. Purpose: Understanding the implementation details of relationships among classes
Lab pre work: Prepare a class diagram from the given problem description using UML2.0
notations.
Laboratory work: Implement the class diagram with a suitable object oriented language.
2. Purpose: Implementation of a design model
Lab pre work: Prepare a design model from analysis model in the form of UML 2 class diagram.
Laboratory work: Implement the design model with a suitable object oriented language
3. Purpose: Implementation of a state model from the given description.
Lab pre work: Prepare a state model from the given problem description and draw a state
diagram using UML2 notations
Laboratory work: Implement the state model with a suitable object oriented language
4. Purpose: Preparing an interaction model from the given details
Prepare a use case model, sequence model and activity model from the given description using
UML 2 notations.
5. Purpose: Implement a Strategy design pattern
Map the participants for the strategy design pattern from a given problem description and
implement with a suitable object oriented language
6. Purpose: Implement a State design pattern
Map the participants for the state design pattern from a given problem description and
implement with a suitable object oriented language
7. Purpose: Understand the concept of Test driven Development
Implement a design level class diagram (given as an input) with Test Driven Development
approach.
8. Objective: Understand and implement the Concept of a reusable component
Implement a reusable component in form of jar file (or in equivalent form for other OO
languages). Use this component in a separate client implementation by importing the
component as a jar file (or equivalent form for other OO language).
Reference Books
All the assignments should be conducted on Latest version of Open Source Operating Systems, tools
and Multi-core CPU supporting Virtualization and Multi-Threading.
Course Objectives :
1. The practical implementation of theoretical knowledge gained during the study from FE to TE.
2. The student should be able implement their ideas/real time industrial problem/ current
application of their engineering branch which they have studied in curriculum.
3. To build confidence in the student what he has learnt theoretically.
4. The dependent study of the state of the art topics in a broad area of his/her specialization.
Course Outcomes :
At the end of this course the student should be able to show preparedness to study independently in
chosen domain of Information Technology and programming languages and apply to variety of real
time problem scenarios.
Contents
Project Based Seminar (PBS) helped students to gather, organize, summarize and interpret technical
literature with the purpose of formulating a project proposal in third year as part of course 314456 :
Seminar& Technical Communication Laboratory. They also submitted a technical report summarizing
state-of-the-art on an identified topic.
B.E. Projects can be two types: Projects based on implementation of any application oriented
problem, which will be more or less experimental in nature, and the others will be based on some
innovative/ theoretical work.
In Project Phase-I the student will undertake same project over the academic year, which will involve
the analysis, design of a system or sub system in the area identified earlier in the field of Information
Technology and Computer Science and Engineering. In some cases; if earlier identified project is not
feasible; a new topic must be formulated in consultation with the guide and project coordinator.
The project will be undertaken preferably by a group of 3-4 students who will jointly work and
implement the project. The group will select a project with approval from a committee formed by the
department of senior faculty to check the feasibility and approve the topic.
Review Committee:
The Head of the department/Project coordinator shall constitute a review committee for project work
for project group; project guide would be one member of that committee by default. There shall be at
least two reviews in semester-I and semester-II by the review committee. The students or project
group shall make presentation on the progress made by them before the committee. The record of the
remarks/suggestions of the review committee should be properly maintained and should be made
available at the time of examination.
Each student/group is required to give presentation as part of review for 10 to 15 minutes followed by
a detailed discussion.
Semester - I
Review 1: Finalization of scope the objectives and scope of the project should be finalized in second
week of their academic semester. Should finalize list of required hardware, software or other
equipment for executing the project, test environment/tools.
Review 2: Finalization of SRS High level design, planning with CPM/PERT chart etc in the sixth week
of their academic semester.
Semester II
Review 3: Implementation Status and testing document.
Review 4 : Final Project Demonstration, Project Report and proper Result analysis
1. This committee will be responsible for evaluating the timely progress of the projects and
communicating the progress report to the students.
2. As far as possible Students should finalize the same project title taken for Project Based
Seminar (PBS).
3. Review committee should conduct Feasibility Review in first week after commencement of
the term. Review committee should finalize the scope of the project.
4. If change in project topic is unavoidable then the students should complete the process of
project approval by submitting synopsis along with the review of important papers. This new
project topic should be approved by review committee.
Term Work:
1. The term work will consist of a report prepared by the student on the project allotted to them.
2. They should use appropriate tools for the preparation of the report like project planning, UML
diagram, testing tools, referencing tools etc.
Report Structure
Contents
List of Abbreviations
List of Figures
List of Graphs
List of Tables
1. Introduction and aims/motivation and objectives
2. Literature Survey
3. Problem Statement
4. Project Requirements
5. System Analysis Proposed Architecture/ high level design of the project
6. Verification Validation
7. Project Plan
8. Conclusion
References
Appendices
A. Base Paper(s)
Evaluation Guidelines:
A panel of examiner will evaluate the viability of project / project scope. The panel will also verify that
all the suggestions/comments in the review document are taken care and accordingly allot the term
work marks. Oral examination in the form of presentation will be based on the project work
completed by the candidates. Preliminary report must also be presented during the oral examination.
SEMESTER - II
Course Objectives :
1. To understand the fundamentals of distributed environment in complex application.
2. To get comprehensive knowledge of the architecture of distributed systems.
3. To make students aware about security issues and protection mechanism for distributed
environment.
Course Outcomes :
1. Understand the principles and desired properties of distributed systems on which the internet
and other distributed systems are based.
2. Understand and apply the basic theoretical concepts and algorithms of distributed systems in
problem solving.
3. Recognize the inherent difficulties that arise due to distributed-ness of computing resources.
4. Identify the challenges in developing distributed applications.
Coordination and Agreement: Introduction, Distributed mutual exclusion, Elections, Coordination and
Agreement in Group Communication, Consensus.
Replication: Introduction, System Model and the role of Group Communication, Fault-tolerant
Services.
Case Study: Coda.
Text Books
1. George Coulouris, Jean Dollimore, Tim Kindberg, & Gordon Blair, Distributed Systems
Concept and Design, 4th Edition, Publisher: Pearson.
2. Andrew S. Tanenbaum & Maarten van Steen, Distributed Systems Principles and
Paradigms, 2nd Edition, Publisher: PHI.
3. P. K. Sinha,Distributed Operating Systems Concepts and Design, Publisher: PHI.
Reference Books
1. Sunita Mahajan, Seema Shah, Distributed Computing, 2nd Edition, Publisher: Oxford
University Press.
2. Advanced concepts in Operating Systems, Mukesh Singhal & N.G.Shivaratri, TMH.
3. Randay Chow, Theodore Johnson, Distributed Operating System and Algorithm Analysis,
Publisher: Pearson (LPE).
4. Abhijit Belapurkar, Anirban Chakrabarti, Harigopal Ponnapalli, Niranjan Varadarajan, Srinivas
Padmanabhuni, Srikanth Sunderrajan , " Distributed System Security: Issues, Processes and
solutions", ISBN: 978-0-470-51988-2, Feb 2009, Publisher: Willey online Library.
Course Objectives :
1. To learn and understand Database Modeling, Database Architectures.
2. To learn and understand Object Oriented Databases.
3. To learn and understand web database language, XML, JDOQL.
4. To learn NoSQL Databases (Open source) and big data analytics.
5. To learn Web data and mining.
6. To learn current trends in databases.
Course Outcomes :
1. Understanding of Advances in Database Architectures for Big data.
2. Master the basics of web and object oriented database using XML and JDOQL.
3. Master the basic concepts of NoSQL Databases.
4. Understand how analytics and big data affect various functions now and in the future.
5. Appreciate the impact of analytics and big data on the information industry and the
external ecosystem for analytical and data services.
6. Understanding of current trends in databases.
Text Books
1. Raghu Ramkrishanan, Johannes Gehrke 4th Edition Database Management Systems
2. Avi Silberschatz , Henry F. Korth , S. Sudarshan, Database System Concepts, Sixth
Edition, ISBN-13: 978-93-3290-138-4, MCGraw Hill
Reference Books
1. Shio Kumar Singh, Database Systems Concepts Design and Applications, ISBN- 978-81-
317-6092-5, Pearson
2. Mario Piattini, Oscar Diaz Advanced Database Technology and Design- online book.
3. J. Han, M. Kamber Data mining: concepts and techniques. Morgan Kaufmann.
4. Bing Liu, Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data, Springer.
5. Big Data Black Book, DT Editorial Services, Wiley-Dreamtech Press, ISBN-
9789351197577, May 2015.
6. http://nosql-database.org/
Prerequisites:Computer Networks.
Course Objectives :
1. To understand the fundamentals involved in technologies of Mobile computing.
2. To study GSM Architecture and Services.
3. To learn about different architectures of mobile application development.
4. To know recent and future trends in mobile computing.
Course Outcomes :
1. Students will gain knowledge of GSM architecture.
2. Students will be able to understand mobility management.
3. Students will be able to understand working of wireless architectures and their applications.
4. Students will be able to understand recent trends and emerging technologies.
Note: Instructor should design at least 08 assignments of sufficient complexity on Mobile application
Development (Unit VI) and 04 study assignments on Units I to V.
Text Books
Reference Books
Prerequisites :
1. Knowledge of C++ or linear algebra.
2. Computer Graphics, Multimedia Systems.
3. Strong software Engineering Skills.
Course Objectives :
1. Provide solid grounding in three dimensional modeling mechanisms.
2. Introduce students to techniques in virtual reality, solid modeling and animation
3. To gain first-hand experience for accurate modeling, rendering, and simulation, and the
necessary data structures and algorithms.
4. To develop programming skills in 3D computer graphics.
5. Become acquainted with some advanced topics in computer graphics.
Course Outcomes :
At the end of this course students should be able to
1. Learn recent methods in rendering, modeling, and animation.
2. Understand the current models for the interaction of light and materials
3. Understand some areas of current computer graphics research.
4. Learn and use the production pipeline to create your own animation
Text Books
1. Donald Hearn & M. Pauline Baker, "Computer Graphics C version", 2nd Ed, Pearson
2. Education.
3. David F. Rogers, "Procedural Elements for Computer Graphics", 2nd Ed - Tata McGraw Hill Edition.
4. "OpenGL Programming Guide: The Official Guide to Learning OpenGL", Mason Woo, Jackie, Tom
Davis, Version 2.1, 6th Edition, Pearson Education, ISBN 978-81-317-2184-1.
Reference Books
Web-links
http://nptel.ac.in/syllabus/106106090/
http://studentnet.cs.manchester.ac.uk/ugt/COMP37111/syllabus
http://www.sci.tamucc.edu/~sking/Courses/COSC5328/syllabus.php
List of Practical
The lab course will be evaluated on the basis of five assignments framed by the faculty that primarily
involve programming systems for rendering, simulation and animation concepts. These assignments
need to be done individually by the students. Faculty can choose from the list below or frame new
assignments based on the theory contents.
Course Objectives :
1. To understand information retrieval process.
2. To understand concepts of clustering and how it is related to Information retrieval.
3. To deal Storage, Organization & Access to Information Items.
4. To evaluate the performance of IR system.
5. TO understand information sharing on semantic web.
6. To understand the various applications of Information Retrieval giving emphasis to multimedia
and distributed IR, web Search.
Course Outcomes :
1. Student should be able to understand the concept of Information retrieval.
2. Student should be able to deal with storage and retrieval process of text and multimedia data.
3. Student should be able to evaluate performance of any information retrieval system.
4. Student should be able to understand importance of recommender system.
5. Student should be able to understand concept of multimedia and distributed information
retrieval.
Text Books
1. Yates & Neto, "Modern Information Retrieval", Pearson Education, ISBN 81-297-0274-6.
2. C.J. Rijsbergen, "Information Retrieval", (www.dcs.gla.ac.uk).
3. Heiner Stuckenschmidt, Frank van Harmelen, Information Sharing on th Semantic
Web, Springer International Edition, ISBN 3-540-20594-2.
Reference Books
Course Objectives :
1. To understand importance of IT enabled services.
2. To encourage the use of Information Technology so as to enable students to improve their
skills, knowledge and job prospects and enable them to obtain employment in sunrise
industries.
3. To develop the ability to integrate various resources for optimization in the industry as well as
for strategic utilization of IT enabled services and functions.
Course Outcomes :
1. Students will be able to understand the process of IT Industry
2. Students will be able to understand Indian laws of IT industry
3. Student will be able to study current trends and services in IT industry
4. Student will be able to understand programming concept of IT Web services.
Text Books:
1. Sanjiva Shankar Dubey, IT strategy and Management, PHI.
2. K.Venkatesh, Marketing of Information Technology,TMH.
3. Steve Suehring, Timconverse, Joyoe Park , PHP 6 and MySQL Bible, Willey.
Reference Books:
1. Shiro Uesugi, IT Enabled Services, Springer; 2013 edition, 2013.
2. Sanjiva Shankar Dubey, IT Services Business Management: Concepts, Processes and
Practices, PHI, 2012.
3. Nikhil Treebhoohu, Promoting IT Enabled Services, Addison-Wesley, 2013.
Course Objectives :
1. To learn fundamental of computer network principles, services and architectures of various
networks.
2. To introduce a set of advanced technologies in networking.
3. To learn advanced routing protocols and router architecture.
4. To gain knowledge of QoS and congestion control in end-to-end data transfer.
5. To introduce with a set of advanced Wireless Network standards and research in network.
Course Outcomes :
After successful completion of this course students will be able to:
1. Apply basic principles in designing modern computer networks.
2. Use functionality of high speed networks in development of advanced network applications.
3. Use advanced routing architecture and protocols in networking.
4. Apply performance measures for routing in computer networks.
5. Use advanced wireless standards in designing wireless networks.
Increase/Multiplicative Increase, Slow Start, Fast Retransmit and Fast Recovery, Congestion Avoidance
Mechanisms: DECbit, RED, Source Based Congestion Avoidance, Traffic Policing, Quality of Service:
Application Requirements, RSVP, EE, AF. Data Presentation Formatting: Taxonomy, XDR, ASN, NDB,
Markup Languages, and Multimedia Data: Lossless Compression Techniques, Images Representation
and Compression, Video Compression, Transmitting MPEG over Network, Audio Compression.
Text Books
Reference Books
Prerequisites : Design and Analysis of Algorithms, Basic Concepts of Data Mining and Machine
Learning.
Course Objectives :
1. To introduce students with Synthesis of DNA and RNA, major databases and applications in
Bioinformatics along with classification schema.
2. Study of various data visualization and statistical techniques to discover new patterns in
protein structure, through Clustering and Classification.
3. Study of various Data Mining and Pattern Matching techniques for knowledge discovery in
Bioinformatics Databases through sequence alignment algorithms.
4. Analysis of various simulation tools in Bioinformatics for similarity search and study of
prediction algorithms.
5. Study of Protein Structure Modeling and Simulation, drug discovery process.
6. To introduce students with the overview of Systems Biology and Human Disease.
Course Outcomes :
After successful completion of this course student will able to:
1. Understand basic DNA and RNA structure, features and classification schema for databases,
applications in Bioinformatics.
2. Use various statistical concepts and visualization tools to discover new patterns in Protein
Structures and analyze randomness in data.
3. Explore the various Bioinformatics Databases for knowledge discovery given by Data Mining
and Pattern Matching techniques through study of various sequence alignment algorithms.
4. Offer appropriate solutions for similarity search through similarity search and prediction
algorithms.
5. Understand modeling and simulation in bioinformatics with the help of simulation and
statistical protocols, basic drug discovery process.
6. Gain awareness in field of Systems Biology and Human Disease.
Text Books
Reference Books
1. Orpita Bosu, Simminder Kaur Thukral Bioinformatics: Databases, Tools and Algorithms,
Oxford press.
2. David W. Mount,Bioinformatics: Sequence and Genome Analysis.
3. Matej, Oresic, A Systems Biology to Study Metabolic Syndrome, Chapter 2, Systems Biology in
Human Health and Disease, Springer International Publishing, Switzerland, 2014.
4. http://www.ncbi.nlm.nih.gov/pubmed/21928407.
5. http://www.ias.ac.in/pubs/splpubs/pjubileebook/379.pdf.
3. https://www.systemsbiology.org/sites/default/files/Hood_P4.pdf.
Course Objectives :
1. Understanding embedded system, processor & distributed embedded systems architecture.
2. Understanding Real Time system, Real time task scheduling & Real time operating system.
Course Outcomes :
1. Students should be able to design distributed embedded system for specific example.
2. Students should be able to schedule real time tasks as per the specific requirement.
Databases.
Text Books
1. Frank Vahid, Tony Givargis Embedded system design: a unified hardware/ software
introduction. Wiley publication.
2. C. Siva Ram Murthy and G. Manimaran, Resource Management in Real-Time Systems and
Networks, Prentice-Hall of India, 2005.
Reference Books
1. Raj Kamal, Embedded systems: Architecture, Programming and design; Tata McGraw Hill
2. Wayne Wolf, Computers as Components: Principles of Embedded Computing System Design,
Morgan Kaufman Publishers, 2001.
3. Jane.W.S. Liu Real-Time systems, Pearson Education Asia, 2000.
4. Rajib Mall, Real-Time Systems Theory and Practice, Pearson Education, India, 2007.
5. C.M. Krishna, Kang G. Shin, Real-Time Systems, ISBN-13: 978-0-07-070115-1, MC GrawHill
Education
Course Objectives :
1. To understand what Green IT is and How it can help improve environmental Sustainability
2. To understand the principles and practices of Green IT.
3. To understand how Green IT is adopted or deployed in enterprises.
Course Outcomes :
1. Students will be able to create awareness among stakeholders and promote green agenda and
green initiatives in their working environments leading to green movement.
2. This green movement will create new career opportunities for IT professionals, auditors and
others with special skills such as energy efficiency, ethical IT assets disposal, carbon footprint
estimation, reporting and development of green products, applications and services.
Text Book
Course Objectives :
1. To understand what Internet of Things is.
2. To get basic knowledge of RFID Technology, Sensor Technology and Satellite Technology.
3. To make students aware of resource management and security issues in Internet of Things.
Course Outcomes :
At the end of this course, students will be able to:
1. Explain what Internet of Thins is.
2. Describe key technologies in Internet of Things.
3. Understand wireless sensor network architecture and its framework along with WSN
applications.
4. Explain resource management in the Internet of Things.
5. Understand business models for the Internet of Things.
Text Books
1. Daniel Minoli, Building the Internet of Things with IPv6 and MIPv6: The Evolving World of
M2M Communications, ISBN: 978-1-118-47347-4, Willy Publications
2. Bernd Scholz-Reiter, Florian Michahelles, Architecting the Internet of Things, ISBN 978-3-
642-19156-5 e-ISBN 978-3-642-19157-2, Springer
3. Parikshit N. Mahalle& Poonam N. Railkar, Identity Management for Internet of Things, River
Publishers, ISBN: 978-87-93102-90-3 (Hard Copy), 978-87-93102-91-0 (ebook).
Reference Books
1. Hakima Chaouchi, The Internet of Things Connecting Objects to the Web ISBN : 978-1-
84821-140-7, Willy Publications
2. Olivier Hersent, David Boswarthick, Omar Elloumi, The Internet of Things: Key Applications and
Protocols, ISBN: 978-1-119-99435-0, 2nd Edition, Willy Publications
3. Daniel Kellmereit, Daniel Obodovski, The Silent Intelligence: The Internet of Things,.
Publisher: Lightning Source Inc; 1 edition (15 April 2014). ISBN-10: 0989973700, ISBN-13: 978-
0989973700.
4. Fang Zhaho, Leonidas Guibas, Wireless Sensor Network: An information processing
approach, Elsevier, ISBN: 978-81-8147-642-5.
In this subject, a student can opt for a subject from other branch of engineering (preferably Computer
Engineering and Electronics & Telecommunication). An institution may design the syllabus of a subject
in consultation with a software company/industry. This syllabus will be approved by the University
authorities and then students can opt for the same as an open elective.
Course Objectives :
1. To understand the fundamentals of distributed environment in complex application.
2. To get comprehensive knowledge of the architecture of distributed systems.
3. To make students aware about security issues and protection mechanism for distributed
environment.
Course Outcomes :
After completion of the subject, the students will be able to:
1. Understand the principles on which the internet and other distributed systems are based.
2. Understand and apply the basic theoretical concepts and algorithms of distributed systems in
problem solving.
Contents
1. Design a distributed application using RMI for remote computation where client submits two
strings to the server and server returns the concatenation of the given strings.
2. Design a distributed application using RPC for remote computation where client submits an
integer value to the server and server calculates factorial and returns the result to the client
program.
3. Design a distributed application using Message Passing Interface (MPI) for remote
computation where client submits a string to the server and server returns the reverse of it to
the client.
4. Design a distributed application which consist of a server and client using threads.
5. Design a distributed application which consists of an agent program that program travels in the
network and performs a given task on the targeted machine. You may assign any task to the
agent e.g. to carry out the existing file opening and reading number of vowels present in that
file.
6. Design a distributed application using MapReduce which processes a log file of a system. List
out the users who have logged for maximum period on the system. Use simple log file from
the Internet and process it using a pseudo distribution mode on Hadoop platform.
7. Design and develop a distributed application to find the coolest/hottest year from the available
weather data. Use weather data from the Internet and process it using MapReduce.
8. Design and develop a distributed Hotel booking application using Java RMI.
A distributed hotel booking system consists of the hotel server and the client machines. The
server manages hotel rooms booking information. A customer can invoke the following
operations at his machine
i) Book the room for the specific guest
ii) Cancel the booking of a guest
1. Enquire the check in date for the specified customer/guest.
Term work:
Staff in-charge will suitably frame the above assignments and flexibility may be incorporated. Students
will submit term work in the form of journal. Each assignment has to be well documented with
problem definition, code documented with comments. Staff in-charge will assess the assignments
continuously and grade or mark each assignment on completion date.
All the assignments should be conducted on Latest version of Open Source Operating Systems, tools
and Multi-core CPU supporting Virtualization and Multi-Threading.
Reference Books
1. George Coulouris, Jean Dollimore, Tim Kindberg, & Gordon Blair, Distributed Systems
Concept and Design, 5th Edition, Publisher: Pearson, ISBN 978-13-214301-1.
2. Randay Chow, Theodore Johnson, Distributed Operating System and Algorithm Analysis,
Publisher: Pearson (LPE). ISBN 978-81-317-2859-8.
Course Objectives :
1. To learn and understand Database Modeling, Architectures.
2. To learn and understand Advanced Database Programming Frameworks.
3. To learn and understand web database language, XML, JDOQL.
4. To learn NoSQL Databases (Open source) such as Hive/ Hbase/ Cassendra/DynamoDB.
Course Outcomes :
1. Understanding of Advanced Database Programming Languages.
2. Master the basics of web and object oriented database languages and construct queries using
XML and JDOQL.
3. Master the basic concepts of NoSQL Databases.
4. Understand how analytics and big data affect various functions now and in the future.
5. Appreciate the impact of analytics and big data on the information industry and the external
ecosystem for analytical and data services.
Contents
1. Study and Configure Hadoop for Big Data
2. Study of NoSQL Databases such as Hive/Hbase/Cassendra/DynamoDB
3. Design Data Model using NoSQL Databases such as Hive/Hbase/Cassendra/DynamoDB
4. Implement any one Partitioning technique in Parallel Databases
5. Implement Two Phase commit protocol in Distributed Databases
6. Design Persistent Objects using JDO and implement min 10 queries on objects using JDOQL in
ObjectDB NOSQL DATABASE
7. Create XML, XML schemas , DTD for any database application and implement min 10 queries
using XQuery FLOWR expression and XPath
8. Design database schemas and implement min 10 queries using Hive/ Hbase/ Cassendra column
based databases
9. Design database schemas and implement min 10 queries using DynamoDBkeyValue based
databases
10. Implement Web Page ranking algorithm
11. Implement any one machine learning algorithm for classification / clustering task in BIG data
Analytics
12. Design and Implement social web mining application using NoSQL databases, machine learning
algorithm, Hadoop and Java/.Net
Instructor should maintain progress report of mini project throughout the semester from project group
and assign marks as a part of the term work
Instructor should frame Practical Assignments based on above mentioned list of assignments.
Submission of each Practical Assignment should be in the form of handwritten write-ups/ printout of
source code and output. Instructor should assign an assignment no. 12 to a group of 3 - 4 students
Practical Examination will be based on the all topics covered and questions will be asked to judge
understanding of practical performed at the time of practical examination
Group of students should submit the Report for assignment no. 12 which will be consist of Title of the
Project, Abstract, Introduction, scope, Requirements, Data Modeling , Database design, Algorithms,
Graphical User Interface, Source Code, Testing document, Conclusion.
All the assignments should be conducted on Latest version of Open Source Operating Systems, tools
and Multi-core CPU supporting Virtualization and Multi-Threading.
Reference Books
1. http://nosql-database.org/
2. Hadoop, OReilly Publications.
3. Silberschatz A., Korth H., Sudarshan S., "Database System Concepts", 6thEdition, McGraw Hill
Publishers, ISBN 0-07-120413-X.
4. http://www.objectdb.com/database/jdo
5. Data Mining: Concepts and Techniques by Jiawei Han, MichelineKamber, Jian Pei, Elsevier.
Course Objectives :
1. To expose students to product development cycle using industrial experience, use of state of
art technologies.
2. To encourage and expose students for participation in National/International paper
presentation activities and funding agency for sponsored projects.
3. Exposure to Learning and knowledge access techniques using Conferences, Journal papers and
anticipation in research activities.
Contents
Project Exhibition: All TE students must see all the projects in the exhibition