Curriculum
Curriculum
Curriculum
CURRICULUM
Course
Sl.no Course Title L T P C
Code
SEMESTER 1
21
SEMESTER 2
5 Program Elective-1 3 0 0 3
23
SEMESTER 3
24
SEMESTER 4
4 Technology Elective -1 3 0 0 3
5 Program Elective-2 3 0 0 3
21
SEMESTER 5
4 Technology Elective – 2 3 0 0 3
5 Program Elective - 3 3 0 0 3
19
SEMESTER 6
1 CAD8205 Project 12
Technology Electives
Mobile Applications
Cloud Technology
Information Security
4 CADY404 R Programming 3 0 0 3
3 CADY003 E-commerce 3 0 0 3
Semester III
Semester IV
SEMESTER V
38 CADY082 Bio-Informatics 3 0 0 3
SEMESTER I
MAC6185 DISCRETE MATHEMATICS L T P C
3 1 0 4
OBJECTIVES:
Acquire knowledge on Set theory, Logical connectives and normal forms.
To familiarize students with applications of Formal language and
Algebraic Theory to Computer Science problems
Compute problems on Permutations and Combinations, Algebraic
structures, logical connectives, truth tables, normal forms.
Analyze and derive conclusion on Proofs by contradiction, kernal of
homomorphism, Cosets and Lagrange’s theorem, Normal subgroups,
Rings and Fields
MODULE IILOGIC 12
Total Hours: 60
REFERENCES:
OUTCOMES:
OBJECTIVES:
To gain experience about structured programming
To understand various features in C
Teach the syntax and semantics of C language as well as data types
offered by the language.
Develop the programming ability in students using the programming
constructs Loop, functions, arrays, structures and unions.
Identify and practice the object-oriented programming concepts and
techniques
Practice the use of C++ classes and class libraries
Develop applications using Object Oriented Programming concepts
TEXT BOOKS:
OUTCOMES:
REFERENCE BOOKS:
1. Stallings W, Computer Organization and Architecture, 6th edition. Parson
Education, 2003.
2. Mano M.M. Computer System Architecture, 3rd edition. PHI, 1993.
3. Yarbrough JM, Digital Logic – Applications and Design, Thomas Lernig,
1997.
4. Heuring VP, and Jordan HF, Computer Systems Design and Architecture,
Pearson
OUTCOMES
On completion of this course, students will be able to
solve basic binary math operations using the computer.
demonstrate programming proficiency using the various addressing
modes and data transfer instructions of the target computer.
apply knowledge of the processor’s internal registers and operations by
use of a PC based microprocessor simulator.
write assembly language programs and run their program on the training
boards.
design electrical circuitry to the processor I/O ports in order to interface
the processor to external devices.
write assembly language programs and download the machine code that will
provide solutions to the real - world control problems.
CAD6103 DATABASE MANAGEMENT SYSTEMS L T P C
3 0 0 3
OBJECTIVES:
Provide an introduction on database and its operations.
Understand the fundamentals of relational systems including data
models, database architectures and database manipulations.
To teach how to construct simple and moderately advanced database
queries using structured Query Language.
To teach the concept of a database transaction, handling deadlocks,
paging, concurrency control, backup and recovery systems.
explore the origins of NoSQL databases and the characteristics that
distinguish them from traditional relational database management
systems.
MODULE I INTRODUCTION 09
Database Systems vs. File Systems - View of Data - Data Models-Database
Languages -Transaction Management - Database Systems Structure - History
of Database Systems - Database Systems Applications - Entity Relationship
Model.
Total Hours: 45
TEXT BOOK:
1. Abraham Silberschatz, HentryF.Korth and S.Sudharssan, “Database
System Concepts”, 4th Edition, Tata McGraw Hill, 2002.
REFERENCES:
2. Raghu Ramakrishnan & Johannes Gerhrke, “Data Base Management
Systems”, McGraw Hill International Edition, 2000.
OUTCOMES:
On completion of this course, students will be able to
describe the concepts of data storage and indexing, transaction
management, query evaluations and optimization techniques.
list the importance of DBMS and differentiate how DBMS is better
than traditional File Processing Systems.
analyze the basic structure of Database and recognize the different
views of the database.
formulate data retrieval queries in SQL for real time scenario.
construct and normalize conceptual data models
handle the deadlocks that occurs in the system.
list the differences between a relational database and a non-relational
(NoSQL) database
MODULE I INTRODUCTION 09
Building a network – Requirements – Network Architecture – OSI – Internet –
Direct Link Networks – Hardware building blocks – Framing – Error detection –
Reliable transmission.
Total Hours: 45
TEXT BOOK:
1. Larry L. Peterson & Bruce S. Davie, “Computer Networks - A systems
Approach”, 2nd Edition, Harcourt Asia/Morgan Kaufmann, 2000.
REFERENCES:
1. James F. Kurose and Keith W. Ross, “Computer Networking - A Top
Down Approach featuring the Internet”, 1st Edition, Addison Wesley
Publishing Company, 2001.
2. William Stallings, “Data and Computer Communications”, 5th Edition,
PHI, 1997.
3. Andrew S. Tanenbaum, “Computer Networks”, Tata Mcgraw Hill, 3 rd
Edition, 2001.
OUTCOMES:
At the end of the course, the students will be able to
Identify and describe the layers of the OSI and TCP/IP.
list the applications of network
make effective use of networking topologies
illustrate how networks work in practice
identify the requirements for different network architecture
evaluate the performance of each of the protocols.
Summarize the features of an emerging paradigm software defined
networking (SDN) in computer networking.
L T P C
CAD6105 C AND C++ PROGRAMMING LAB 0 0 4 2
OBJECTIVES:
Brief on Data Types, Operators, Statements, Loops, Functions, Array,
Pointers, Structures.
Make the students write programs using various programming constructs.
Understand and solve logical & mathematical problems through C++
language.
Design and develop solutions to intermediate level problems.
Develop their skills in software development using a procedural language.
Get programming skill in object-oriented technology with the usage of
C++.
LIST OF PROGRAMS
1. Display the following:
i. Floyd’s triangle
ii. Pascal Triangle
2. Generate the following series of numbers:
i. Armstrong numbers between 1 to 100
ii. Prime numbers between 1 to 50
iii. Fibonacci series up to N numbers
3. Manipulate the strings with following operations.
i. Concatenating two strings
ii. Reversing the string
iii. Finding the substring
iv. Replacing a string
v. Finding length of the string
4. Find the summation of the following series:
i. Sine
ii. Cosine
iii. Exponential
5. Create the sales report for M sales person and N products using two
dimensional array.
6. Simulate following Banking operations using functions.
i. Deposit
ii. Withdrawal
iii. Balance Enquiry
OUTCOMES:
On completion of this course, students will be able to
design and debug programs involving different data types, decision
structures and loops.
apply the in-built functions and customized functions for solving the
problems.
handle the exceptions that raise in the program.
write, read and manipulate the data stored in files to deal with various real
time problems
work in a team to analyze engineering problems and develop
C++programs for solving these problems.
reuse the code and write the classes which work like built-in types
CAD6106 DBMS LAB L T P C
0 0 4 2
OBJECTIVES:
• Learn how to create tables which are fundamental storage blocks of data.
• Learn how to place constraints on data that is entered on tables to
ensure data integrity.
• Learn how to add, change and remove data from tables.
• Learn how to select a subset of the data you want to see from the
collection of tables and data.
• Learn how to combine table and group multiple rows of data in table.
LIST OF PROGRAMS
OUTCOMES:
On completion of this course, students will be able to
apply iterative programming at database level.
write programming blocks with conditional structure, assignment
structure, loop structure, etc.
use exception Handling, Transaction oriented programs, Stored
procedures, functions, packages, etc.
implement cursors which would allow row wise access of data.
use triggers which would allow you define pre and post actions when
something change in the database tables.
SEMESTER II
OBJECTIVES:
To develop an understanding and awareness of how issues such as
content, information architecture, motion, sound, design, and technology
merge to form effective and compelling interactive experiences for a wide
range of audiences and end users.
To be familiar with various software programs used in the creation and
Implementationofmulti-media(interactive,motion/animation,presentation, etc.).
To enable students to be practically sound in area of 2D, 3D and animation.
To develop real time multimedia applications with user friendly environment.
MODULE IINTRODUCTION 09
Overview of Graphics System - Bresenham technique – Line Drawing and Circle
Drawing Algorithms - DDA - Line Clipping - Text Clipping.
MODULE II 2D TRANSFORMATIONS 09
Two dimensional transformations – Scaling and Rotations - Interactive Input
methods - Polygons - Splines – Bezier Curves - Window view port mapping
transformation.
Total Hours: 45
REFERENCES:
OUTCOMES:
On completion of this course, students will be able to
attain the complete knowledge in graphics & multimedia domain.
show their proficiency while working with Graphics and multimedia
software’s and tools.
create interactive graphics applications in C++ using one or more graphics
application programming interfaces.
design and develop a user-friendly multimedia application.
write programs that demonstrate 2D and 3D transformations
L T P C
CAD6202 PROBABILITY AND STATISTICS 3 1 0 4
OBJECTIVES:
Knowledge about the basic concepts of one dimensional and two-
dimensional Random Variables.
Knowledge on various probability axioms and theorems, probability
distributions.
To apply Estimation theory, Correlation, Regression and testing of
hypothesis for real life problems.
To enable the students to apply the concepts of multivariate
normal distribution and principle components analysis and
evaluate on the results
Total Hours: 60
REFERENCES:
1. Jay L. Devore, “Probability and Statistics for Engineering and the
Sciences”, Thomson and Duxbury, 2002.
2. Richard Johnson. “Miller & Freund’s Probability and Statistics for
Engineer”, Prentice – Hall, Seventh Edition, 2007.
3. Richard A. Johnson and Dean W. Wichern, “Applied Multivariate
Statistical Analysis”, Pearson Education, Asia, Fifth Edition, 2002.
4. Gupta S.C. and Kapoor V.K. “Fundamentals of Mathematical Statistics”,
Sultan and Sons, 2001.
5. Dallas E Johnson, “Applied Multivariate Methods for Data Analysis”,
Thomson and Duxbury press, 1998.
OUTCOMES:
On completion of this course, students will be able to
apply fundamental concepts in Exploratory data analysis
demonstrate an understanding of the basic concepts of probability
and random variables
analyze and choose among the probability distributions for
application to a specific real life problem
apply inferential methods relating to the means of Normal Distributions.
demonstrate an appreciation of one—way analysis of variance (ANOVA)
interpret and analyze data that may be displayed in a two—way table
CAD6203 ALGORITHM ANALYSIS AND DATA L T P C
STRUCTURES 3 1 0 4
OBJECTIVES:
to learn about different kinds of data structures that are suited to
different kinds of applications
to manage huge amounts of data efficiently,
to understand the suitable applications of tree and graph data structure
Total Hours: 60
TEXT BOOK:
1. TanenbaumA.S, Langram Y, Augestein M.J, “Data Structures using C”
Pearson Education, 2004.
REFERENCES:
1. Robert Kruse & Clovis L. Tondo “Data Structures and Program Design in
C”, Prentice Hall, 2nd edition, 1991.
2. Weiss “Data Structures and Algorithm Analysis in C”, Addison Wesley,
2nd Edition, 1997.
3. R.F.Gilberg, B.A.Forouzan, “Data Structures”, Second Edition, Thomson
India Edition, 2005.
4. K.S.Easwarakumar, Object Oriented Data Structures using C++, Vikas
5. Publishing House pvt.Ltd., 2000.
6. SaraBaaseandA.VanGelder, “Computer Algorithms”, Third Edition,
Pearson Education, 2000.
7. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction
to algorithms", Second Edition, Prentice Hall of India Ltd, 2001.
OUTCOMES:
At the completion of this course, the student will able to
compare and contrast various sorting and searching techniques
apply suitable shortest path algorithm in appropriate applications
manage the storage by using proper storage management technique
Identify the strengths and weaknesses of different data structures
choose the appropriate data structure and algorithm design method
for a specified application.
determine which algorithm or data structure to use in different
scenarios
L T P C
CAD 6204 OPERATING SYSTEMS
3 0 0 3
OBJECTIVES:
MODULE I INTRODUCTION 07
Definition of OS-Mainframe System - Desktop Systems-Multi processor
System-Distributed-Clustered-Real time Systems-Handheld Systems-Operating
System Structure-System Components-Services-System Calls-System
Programs-System Design and Implementation.
REFERENCES:
1. Milankovic M., Operating System Concepts and Design, 2 nd Edition,
McGraw Hill, 1992.
2. P.C.Bhatt, An Introduction to Operating Systems-Concepts and Practice,
Prentice Hall of India, 2004.
3. H.M.Deitel, An Introduction to Operating Systems, 2nd Edition, Pearson
Education, 2002.
OUTCOMES:
On completion of this course, students will be able to
summarize the functions and objectives of operating systems
evaluate the design issues associated with operating systems.
compare and contrast scheduling mechanisms
analyze the memory management issues.
comprehend synchronization, deadlocks and multithreading.
illustrate the file system structure.
CAD6205 ALGORITHM ANALYSIS ANDDATA L T P C
STRUCTURES LAB 0 0 4 2
OBJECTIVES:
ALGORITHM ANALYSIS:
DATA STRUCTURES:
1. Represent the given sparse matrix using one dimensional array and
linked list.
2. Create a Stack and do the following operations using arrays and linked lists
(i) Push (ii) Pop (iii) Peep
3. Create a Queue and do the following operations using arrays and linked
lists
(i) Add (ii) Remove
4. Implement the operations on singly linked list, doubly linked list and
circular linked list.
5. Create a binary search tree and do the following traversals
(i) In-order (ii) Pre order (iii) Post order
6. Implement the following operations on a binary search tree.
(i) Insert a node (ii) Delete a node
7. Sort the given list of numbers using heap and quick sort.
8. Perform the following operations in a given graph
(i)Depth first search (ii) Breadth first search
9. Find the shortest path in a given graph using Dijkstra algorithm
OUTCOMES:
On completion of this course, students will be able to
analyze the complexity of a given algorithm.
apply various data structure such as stacks, queues, trees , linked list
and graphs to solve various computing problems
compare, contrast, and choose appropriate algorithmic design
techniques to provide solution to the problem.
develop program that implements kruskal’s algorithm, prims, binary
search, all types of sorting, greedy algorithm and backtracking
technique.
construct optimal binary search tree using dynamic programming
technique.
find the solution for the n-queens problem and implement traveling
salesman problem using dynamic programming.
L T P C
CAD6206 OPERATING SYSTEMS LAB
0 0 4 2
OBJECTIVES
To understand the main components of an operating system(OS) and to
study about the process management and scheduling.
To understand various issues in Inter Process Communication (IPC) and the
role of OS in IPC.
To understand the concepts and implementation Memory management
policies and virtual memory.
To understand the working of an OS as a resource manager, file system
manager, process manager, memory manager and I/O manager and
methods used to implement the different parts of OS
To study the need for special purpose operating system with the advent of
new emerging technologies.
LIST OF EXPERIMENTS:
1. Basics of UNIX commands.
2. Shell programming
3. Implementation of CPU scheduling. a) Round Robin b) SJF c) FCFS d)
Priority
4. Implement Semaphores
5. Write a program to perform priority scheduling.
6. Write a program to implement CPU scheduling for Round Robin.
7. Write a program for page replacement policy using a) LRU b) FIFO c)
Optimal.
8. Write a program to implement first fit, best fit and worst fit algorithm for
memory management.
9. Write a program to implement reader/writer problem using semaphore.
10. Write a program to implement Banker’s algorithm for deadlock avoidance.
11. Implement Bankers algorithm for Dead Lock Avoidance
12. Implement an Algorithm for Dead Lock Detection
13. Implement Threading & Synchronization Applications
14. Multiprogramming-Memory management- Implementation of Fork(), Wait(),
Exec() and Exit() System calls
15. Simulate all File allocation strategies a) Sequenced b) Indexed c) Linked.
OUTCOMES:
Students will able to:
1. Describe the important computer system resources and the role of operating
system in their management policies and algorithms.
2. Understand the process management policies and scheduling of processes
by CPU
3. Evaluate the requirement for process synchronization and coordination
handled by operating system 4. Describe and analyze the memory
management and its allocation policies.
4. Identify use and evaluate the storage management policies with respect to
different storage management technologies.
5. Identify the need to create the special purpose operating system.
CAD6207COMMUNICATION SKILLS L T P C
LABORATORY 0 0 2 1
OBJECTIVES:
Total Hours: 25
REFERENCES :
OUTCOMES:
On completion of this course, students will be able to
organise ideas relevantly and coherently.
engage in debates.
participate in group discussions and face interviews.
write project and technical reports.
write formal letters and deliver oral presentations
take part in social and professional communication.
SEMESTER III
CAD7101 OBJECT ORIENTED SOFTWARE ENGINEERING L T P C
3 0 1 4
OBJECTIVES:
To introduce the basic concepts of software engineering and software life
cyclemodels.
To provide an insight into the concepts of modelling and notations of the
different UML diagrams.
To expose the techniques for requirement gathering design and specification.
To emphasize the importance of testing.
To state the basic strategy behind planning a project and tracking its
progress.
To learn about the software configuration management
Total Hours: 15
TEXT BOOKS:
1. Stephan R. Schach, "Object oriented and classical software engineering", 8th
Edition, Tata McGraw Hill, 2010.
2. Bernd Bruegge, "Object oriented software engineering", 3rd Edition, Pearson
Education, 2009.
REFERENCES:
1. Timothy C. Lethbridge, Robert Laganiere, "Object-Oriented Software
Engineering - A practical software development using UML and Java", 3rd Edition,
Tata McGraw-Hill, 2006.
2. S.K.Kataria, Rajiv Chopra, "Object Oriented Software Engineering", 3rd Edition,
2013.
OUTCOMES:
Students who complete this course will be able to:
Compare the different life cycle models and select appropriate one for a real
time project.
Illustrate the different UML diagram using various tools.
Identify the different roles, responsibilities and artifacts produced during the
different phases of software development process.
Analyze the testing, risk and change management strategies.
Demonstrate the ability to communicate effectively in writing.
Analyze programming language concepts, particularly object-oriented
concepts.
CAD7102 INTERNET AND JAVA PROGRAMMING L T P C
3 0 0 3
OBJECTIVES:
To learn basic internet concepts, fighting against spam, conferencing
on the internet, planning and creating website.
To learn the fundamentals of Java and to introduce encapsulation,
polymorphism, and the Java language mechanism (classes and
objects) to implement it.
To develop Java computer programs that perform various problem-
solving algorithms.
To develop the programming skills to use the object-oriented
programming methodology to produce quality computerbased
solutions to real problems.
To work with collection of API and develop fast programs.
Overview – Web Security, Privacy, and site-blocking – Audio and Video on the
web – Creating and Maintaining the Web – Web site creation concepts – Web
Page Editors – Optimizing Web Graphics – Web Audio Files – Forms,
Interactivity, and Database-Driven Web sites – File Transfer and downloading–
FTP – Peer to Peer – Downloading and Installing software.
MODULE III JAVA FUNDAMENTALS 08
Java features – Java Platform – Java Fundamentals – Expressions, Operators,
and Control Structures – Classes, Packages and Interfaces – Exception Handling.
MODULE IV PACKAGES 12
AWT package – Layouts – Containers – Event Package – Event Model – Painting–
Garbage Collection - Multithreading – Language Packages.
Total Hours: 45
TEXT BOOKS:
1. Margaret Levine Young, “Internet and WWW”, 2nd Edition, Tata McGraw
Hill, 2002. (Unit 1 & 2)
2. Herbert Schildt, The Complete Reference – Java 2 , 4th Edition, Tata
McGraw Hill, 2001. (Unit 3, 4 & 5)
REFERENCES:
1. Keyur shah, “Gateway to Java Programmer Sun Certification”, Tata
McGraw Hill 2002.
2. Deitel&Deitel, Java How to Program, Prentice Hall 1999.
OUTCOMES:
On completion of this course, students will be able to
list the various applications of internet and able to create , maintain
and block the website.
identify classes, objects, members of a class and the relationships
among them needed for a specific problem.
compare and contrast the interfaces and abstract classes.
handle the exceptions and illustrate the life cycle of thread.
update and retrieve the data from the databases using SQL
develop distributed applications using RMI
develop programs using the AWT packages and collection framework
L T P C
MAC6186 RESOURCE MANAGEMENT TECHNIQUES 3 1 0 4
OBJECTIVES
Constructing a mathematical representation of the problem under
study.
Deriving a solution using any of the appropriate mathematical
models namely linear programming models, transportation and
assignment models, integer programming models, scheduling by
pert and cpm, queuing models.
Analyze the alternatives and produce an optimal solution for the
existing problem.
REFERENCES:
1. A.M.Natarajan, P.Balasubramani, A.Tamilarasi, “Operations Research”,
Pearson Education, Asia, 2005.
2. Prem Kumar Gupta, D.S. Hira, “Operations Research”, S.Chand&
Company Ltd, New Delhi, 3rd Edition, 2003.
OUTCOMES:
On completion of this course, students will be able to
construct a real world problem into a mathematical problem.
identify the appropriate model to solve the problem.
explore the alternative models and justify on the selected model for
representation.
analyze and provide a optimal solution.
construct the network and analyze the resources in network scheduling
CAD7103 CLOUD COMPUTING L T P C
3 0 0 3
OBJECTIVES
OUTCOMES:
On completion of this course, students will be able to
• Understand the systems, protocols to support cloud computing.
• Identify the architecture and infrastructure of cloud computing.
• Design applications by integrating cloud services.
CAD7104 MOBILE APPLICATION DEVELOPMENT L T P C
3 0 0 3
OBJECTIVES:
To impart knowledge on mobile app paradigm, IOS components and
services.
To impart knowledge on controls and gestures , creating universal
applications run on iPhone and iPad
To teach how to Install and use appropriate tools for Android
development, including IDE, device emulator, and profiling tools.
Design and develop mobile app using android
REFERENCES:
1. Android Application Development Cookbook, by Wei-Meng Lee, John
Wiley and Sons, 2013.
2. Beginning Android 4, by Grant Allen, Apress, 2011.
OUTCOMES:
On completion of this course, students will be able to
List the differences between mobile apps and desktop apps
create Universal applications that run on both iPhone and iPad
Handle touch events, work with Table View and access user photos
and camera through an application.
use the development tools in the Android development environment
apply the Java programming language to build Android apps
develop UI-rich apps using all the major UI components
Implement the design using Android SDK
Deploy mobile applications in Android and iPone marketplace for
distribution
CAD7105 INTRODUCTION TO DATA SCIENCE L T P C
3 0 0 3
COURSE OBJECTIVES
Students will develop relevant programming abilities.
Students will demonstrate proficiency with statistical analysis of data.
Students will develop the ability to build and assess data-based models.
Students will execute statistical analyses with professional statistical software.
Students will demonstrate skill in data management.
MODULE I 9
Introduction: What is Data Science? - Big Data and Data Science hype – and
getting past the hype - Why now? – Datafication - Current landscape of
perspectives - Skill sets needed. Statistical Inference - Populations and samples -
Statistical modelling, probability distributions, fitting a model.
MODULE II 9
Exploratory Data Analysis - Getting and Cleaning data Statistical Inferences -
Summarizing and Visualizing the Data.
MODULE III
Mathematical Tools for Data Science - Statistics Inferences and Probability - Linear
Algebra.
MODULE IV 9
Machine Learning in Data Science Supervised, unsupervised, reinforcement and
deep learning, Naives Bayesian Algorithm, K means, K nearest Neighbourhood
algorithms.
MODULE V 9
Data Visualization - Basic principles, ideas and tools for data visualization.
Examples of inspiring (industry) projects. creation of own visualization of a
complex dataset. Data Science and Ethical Issues - Discussions on privacy,
security, ethics.
TEXT BOOK
Cathy O’Neil and Rachel Schutt. Doing Data Science, Straight Talk From The
Frontline. O’Reilly. 2014.
Additional references and books related to the course:
Jure Leskovek, Anand Rajaraman and Jeffrey Ullman. Mining of Massive
Datasets. v2.1, Cambridge University Press. 2014. (free online)
Kevin P. Murphy. Machine Learning: A Probabilistic Perspective. ISBN
0262018020. 2013.
Foster Provost and Tom Fawcett. Data Science for Business: What You Need
to Know about Data Mining and Data-analytic Thinking. ISBN 1449361323.
2013.
Trevor Hastie, Robert Tibshirani and Jerome Friedman. Elements of Statistical
Learning, Second Edition. ISBN 0387952845. 2009. (free online)
COURSE OUTCOMES
The outcome of this course is that the student
Will possess the following data science skills and abilities:
Identify and assess the needs of an organization for a data science task.
Collect and manage data to devise solutions to data science tasks
Interpret data science analysis outcomes.
Effectively communicate data science-related information effectively in various
formats to appropriate audiences.
Transform findings from data resources into actionable business strategies
L T P C
CAD7106 ADVANCED TECHNOLOGY LAB
0 0 4 2
(Cloud/Mobile/Data Science)
OBJECTIVES:
• Understand the mobile programming aspects, design and
implementation on android platforms.
• Develop and deploy mobile applications for the Android operating system
using basic and advanced phone features.
• Understand some basic concepts of R programming
• Expose on some fundamental concepts of cloud computing
R PROGRAMMING LAB
Basic R programs using Array, Data frame, Matrix, Vector, List and Factors.
OUTCOMES:
On completion of this course, students will be able to
Describe the components and structure of a mobile development frameworks
(Android SDK and Eclipse Android Development Tools (ADT)) and learn how
and when to apply the different components to develop a working system.
Implement R programming in data science.
Deploy cloud computing technologies in real time projects.
CAD7107 PROGRAMMING IN JAVA L T P C
0 0 4 2
OBJECTIVES:
to develop the programming skills using the object oriented
programming
methodology to produce quality computer based solutions to
real problems.
to utilize the advance features of Java technology.
demonstrate the use of Application Programming Interface (API)
and develop programs
to develop good multithreaded programs
JAVA PROGRAMMING:
1. Program to illustrate the use of overloading and overriding.
2. Program to implement the concept of inheritance.
3. Program to illustrate the use of multi-threading.
4. Program to implement the concept of Interfaces and packages.
5. Generate the program using exceptions handling mechanism.
6. Implement the file operations.
7. Program using Applets.
8. Program to handle Mouse Events, Keyboard Events and work with GUI
components.
9. Program using JDBC.
OUTCOMES:
On completion of this course, students will be able to
apply basic control structures, arrays, looping statement and various
class libraries in developing program.
write Java programs using object-oriented programming techniques
inheritance, polymorphism, interface, constructors and abstract class.
create package for real time applications like bank transaction,
employee processing etc.
construct multithreaded programs and handle exceptions
write programs using graphical user interface (GUI) components and
various event handling methods.
implement file operations and connect with database using JDBC.
SEMESTER IV
L T P C
CAD7201 ADVANCED WEB DESIGN AND
3 0 0 3
DEVELOPMENT
OBJECTIVES:
To make use of the Internet related technologies.
To analyse advantages and use of different types of CSS.
To design static and interactive web pages by embedding Java Script
code in HTML and Use Java Script to validate user input.
To teach the importance of functional programming to improve web
applications
To Know how to embed media—such as audio or video—into a web
page
To apply the basics of PHP and connect with MySQL database.
Total Hours: 45
TEXT BOOKS:
1. Developing Web Application, Wiley India Publication, Ralph Moseley,
Wiley India, 2007.
REFERENCE BOOKS:
1. Beginning PHP5, Apache, Mysql Web Development, Wrox,
Elizabeth Naramore, Michael K. Glass, 2005.
2. PHP Bible, Wiley Publication, Tim Converse, Joyce Park, 2002.
3. Web Enabled Commercial Application Development Using HTML,
DHTML, PERL, Java Script, BPB Publications, Ivan Bayross, 2005.
4. Beginning Ajax, Wrox, Chris Ullman, Lucinda Dykes, 2007.
5. Beginning JavaScript 2nd Edition, Wrox, Nicholas C. Zakas, 2004.
OUTCOMES:
On completion of this course, students will be able to
differentiate web and website and summarize the importance of web
languages in the development of website.
apply JavaScript, HTML and CSS3 effectively to create interactive and
dynamic websites
build web applications using PHP and submit the form using GET or
POST method.
create layout in websites using Div tags and incorporate pre-designed
elements into them.
develop server side code using PHP and able to connect and manipulate
the MySQL database.
L T P C
CAD7202 XML AND WEB SERVICES
3 0 0 3
OBJECTIVES:
To describe the role of XML in enterprises.
To teach the importance of various supporting technologies in XML.
To describe the role of SOAP in building web services, the basics of
the SOAP protocol, and the structure of a SOAP document.
To impart knowledge on UDDI registries and WSDL in creating web-
services clients.
To cover the basics of XML, Schemas, WSDL, and Web Services
concepts.
MODULE IINTRODUCTION 09
Role of XML – XML and The Web – XML Language Basics – SOAP – Web
Services – Revolutions Of XML – Service Oriented Architecture (SOA).
REFERENCES:
1. Ramesh Nagappan, Robert Skoczylas and Rima Patel Sriganesh,
“Developing Java Web Services”, Wiley Publishing Inc., 2004.
2. Sandeep Chatterjee, James Webber, “Developing Enterprise Web
services”, Pearson Education, 2004.
3. McGovern, et al., “Java Web Services Architecture”, Morgan Kaufmann
Publishers, 2005.
OUTCOMES:
On completion of this course, students will be able to
list the importance of XML
differentiate the various technologies of XML and their working.
assess the role played by SOAP and web services
recognize the need for XML security.
build effective XML documents.
build DTD documents to validate XML.
build Schema documents to validate XML.
CAD7203 MACHINE LEARNING TECHNIQUES L T P C
3 1 0 4
COURSE OBJECTIVES
To introduce both the traditional approach to machine learning using symbolic
representations and manipulations,
To understand the knowledge representations and problem-solving
techniques.
To impart knowledge on machine learning techniques and its associated
computing techniques and technologies.
To learn different model parameters for different machine learning techniques.
To describe the application of thesemachine learning techniques in data
mining.
MODULE I 12
Introduction- overview of machine learning- Different forms of learning- Generative
6 learning- Gaussian parameter estimation- maximum likelihood estimation- MAP
estimation- Bayesian estimation- bias and variance of estimators- missing and
noisy features- nonparametric density estimation- applications- software tools.
MODULEII 12
Classification Methods-Nearest neighbour- Decision trees- Linear Discriminant
Analysis - Logistic regression-Perceptrons- large margin classification- Kernel
methods- Support Vector Machines. Classification and Regression Trees.
MODULE III 12
Graphical and sequential models- Bayesian networks- conditional independence
Markov random fields- inference in graphical models- Belief propagation- Markov
models- Hidden Markov models- decoding states from observations- learning HMM
parameters.
MODULEIV 12
Clustering Methods-Partitioned based Clustering - K-means- K-medoids;
Hierarchical Clustering - Agglomerative- Divisive- Distance measures; Density
based Clustering - DBScan; Spectral clustering.
MODULE V 12
Neural networks- the perceptron algorithm- multilayer perceptron’s- back
propagationnonlinear regression- multiclass discrimination- training procedures-
localized network structure- dimensionality reduction interpretation.
Total Hrs. : 60
COURSE OUTCOMES
On completion of this course, students will be able to
• Identify the characteristics of datasets and compare the trivial data and
big data for various applications.
• Select and implement machine learning techniques and computing
environment that are suitable for the applications under consideration.
• Solve problems associated with batch learning and online learning, and
the big data characteristics such as high dimensionality, dynamically growing
data and in particular scalability issues.
• Recognize and implement various ways of selecting suitable model
parameters for different machine learning techniques.
• Integrate machine learning libraries and mathematical and statistical
tools with modern technologies like hadoop and map reduce.
REFERENCES:
1. T. Hastie, R. Tibshirani and J. Friedman, “Elements of Statistical Learning”,
Springer, 2009.
2. E. Alpaydin, “Machine Learning”, MIT Press, 2010.
3. K. Murphy, “Machine Learning: A Probabilistic Perspective”, MIT Press, 2012.
4. C. Bishop, “Pattern Recognition and Machine Learning, Springer”, 2006.
5. Shai Shalev-Shwartz, Shai Ben-David, “Understanding Machine Learning: From
Theory to Algorithms”, Cambridge University Press, 2014.
6. John Mueller and Luca Massaron, “Machine Learning For Dummies“, John Wiley
& Sons, 2016.
CAD7204 WEB DESIGN AND DEVELOPMENT LAB L T P C
0 0 4 2
OBJECTIVES:
To provide the student with the fundamental knowledge and skills to
become a proficient web programmer
Impart the knowledge of developing static and dynamic web page
using HTML, CSS and JavaScript.
To learn how to perform validation using JavaScript
To impart designing online application and access database using
MYSQL
OBJECTIVES:
• to provide the knowledge necessary to build and validate XML.
• to equip the students with XML, a core technology in Web Services.
• to understand the background of the underlying technologies.
• to cover the basics of XML, Schemas, WSDL, and Web Services
concepts
LAB EXCERCISES:
1. Create an XML document to store an address book.
2. Create an XML document to store information about books and
create the DTD files.
3. Create an XML schema for the book’s XML document from exercise.
4. Create an XML document to store resumes for a job web site and
create the DTD file.
5. Present the book’s XML document using cascading style sheets (CSS).
6. Write an XSLT program to extract book titles, authors, publications,
book rating from the book’s XML document and use formatting.
7. Use Microsoft DOM to navigate and extract information from the book’s
XML document.
8. Use Microsoft DSO to connect HTML form or VB form to the book’s XML
document and display the information.
9. Create a web service for temperature conversion with appropriate
client program.
10. Create a web service for currency conversion (at five currencies) with
appropriate client program.
OUTCOMES:
On completion of this course, students will be able to
build effective XML documents.
build DTD documents to validate XML.
build Schema documents to validate XML.
describe services using WSDL.
build and consume Web services.
specify the role of web services in commercial applications.
understand the principles of web service provision.
understand the use of Java for implementing web services.
CAD7206 SOFT SKILLS AND PERSONALITY L T P C
DEVELOPMENT 0 0 2 1
OBJECTIVES:
Attitude Control and Quick Personal Self Esteem Improvement
Interview Motivation and Developing Personal Confidence using NLP
Effective Answering and Maintaining Fluent Communication
Positive Body Language
Effective Resume Creation
Leadership Skills, Team Player Skills and Career Plan to HR
MODULE I MOTIVATION 05
Awareness of Real World Industry and Situations - Conscious Self-Awareness
- Practical Visualizations - Neuro- Linguistic Programming Basics - Developing
Self Esteem and Self-Motivation - Confident Goal Setting - Positive Attitude
Development and Positive Thinking - Developing Inner Achievement Mindset.
Total Hours: 18
REFERENCES :
1. Charles Faulkner and Steve Andreas, "NLP: The New Technology of
Achievement", Harper Paperbacks publishers, 1996.
2. Sarvesh Gulati, "Corporate Soft Skills", Rupa and Co publishers.
3. P.K.Dutt, G.Rajeevan and C.L.N. Prakash, “A Course in Communication
Skills”, Cambridge University Press, India 2007.
OUTCOMES:
On completion of this course, students will be able to
understand the significance of soft skills in the working environment
communicate effectively and present their concepts in a more confident
manner.
engage in debates and participate in group discussions.
recognize the different leadership styles
take part in social and professional communication.
develop self-motivation, raised aspirations and belief in one’s own abilities,
defining and committing to achieving one’s goals.
SEMESTER V
CAD8101 PYTHON PROGRAMMING L T P C
3 0 0 3
OBJECTIVES
To establish proficiency in fundamentals of writing Python scripts
To learn the concepts of file I/O and handling of errors and exceptions
To discover the features of python structures and flow control
To use and manipulate several core data structures: Lists,
Dictionaries, Tuples, and Strings.
OUTCOMES
On Completion of the course the students will be able to
List the string and math built in functions.
Handle the file-system with python scripts
Classify and Design functions, modules and classes.
Demonstrate the use of the built-in data structures 'list' and 'dictionary'.
Perform file operations like open, create ,read, write and close the file.
Create class, inherit the class, overload the methods and handle
regular expressions.
CAD8102 IOT and BIG DATA L T P C
3 0 0 3
OBJECTIVES:
To understand the fundamentals of Internet of Things
To learn the functions of protocols of different layers.
To bring together several key technologies used in manipulating, storing,
and analyzing big data.
To make the student understand details of Hadoop.
OUTCOMES:
OBJECTIVES:
Learn Syntax and Semantics and create Functions in Python.
Handle Strings and Files in Python.
Understand Lists, Dictionaries and Regular expressions in Python.
Implement Object Oriented Programming concepts in Python
Build Web Services and introduction to Network and Database Programming in
Python
OUTCOMES:
Examine Python syntax and semantics and be fluent in the use of Python flow
control and functions.
Demonstrate proficiency in handling Strings and File Systems.
Create, run and manipulate Python Programs using core data structures like
Lists,
Dictionaries and use Regular Expressions.
Interpret the concepts of Object-Oriented Programming as used in Python.
Implement exemplary applications related to Network Programming, Web
Services and Databases in Python.
L T P C
CAD8104 MINI PROJECT
0 0 4 2
GUIDELINES
The students undertake individual application project based on their interest level.
The projects must be approved by the project coordinators.
Students must maintain a lab record and update the project progress on a
weekly basis.
Must demonstrate during lab hours and update the project progress on a
weekly basis.
Must submit a detailed project report as per the common template for a
ProjectViva-voce examination.
Monthly review will be conducted and evaluated by the coordinators.
The Project coordinators verify and validate the information presented in the project
report. The split-up of marks is as follows:
1. Internal Assessment
2. External Examination
3. Viva Voce
INTERNAL ASSESSMENT
Internal Evaluator must evaluate Internal Project work based on the following
criteria:
Project Scope, Objectives and Deliverables
Software Requirement analysis, design, coding and testing skills
Report writing and presentation skill
EXTERNAL EXAMINATION
The examiners make individual assessment based on the following criteria.
Software Requirement Specifications
Project Demonstration
Project Report
Viva Voce
VIVA VOCE
Confidence level, Programming knowledge, Professional approachand
Communication Skill
TOTAL MARKS
1. Internal Evaluation: 75 %
2. External Evaluation: 25 % -
COURSE OBJECTIVES
ERP and Customer Relationship Management e-business model –XML, EDI and
E-Business Integration– E-market technology solutions-E-procurement – E-
Business networks and Supply chains-Middleware-Remote procedure calls-
Remote method invocation-Message oriented middleware and Transaction
oriented middleware.
Total Hours 45
REFERENCE BOOKS
COURSE OUTCOMES
OBJECTIVES:
To learn the need for security and privacy in Mobile and Wireless Networks.
To impart knowledge on mobile cellular systems and its architecture.
To understand the operational process involved in secured wireless
networks like LAN, Bluetooth and Zigbee.
To provide basic knowledge on different key management techniques.
To emphasize on various security challenges in RFID technology.
MODULE I - INTRODUCTION 5
Security and Privacy for Mobile and Wireless Networks: Introduction- State of the
Art- Areas for Future Research- General Recommendation for Research.
Pervasive Systems: Enhancing Trust Negotiation with Privacy Support: Trust
Negotiation- Weakness of Trust Negotiation- Extending Trust Negotiation to
Support Privacy
REFERENCES
1. Kia Makki, Peter Reiher, “Mobile and Wireless Network Security and Privacy “,
Springer, ISBN 978-0-387-71057-0, 2007.
2. C. Siva Ram Murthy, B.S. Manoj, “Adhoc Wireless Networks Architectures and
Protocols”, Prentice Hall, x ISBN 9788131706885, 2007.
3. NoureddineBoudriga, ”Security of Mobile Communications”, ISBN
9780849379413, 2010.
4. Kitsos, Paris; Zhang, Yan , “RFID Security Techniques, Protocols and System-
On-Chip Design “, ISBN 978-0-387-76481-8, 2008.
5. JohnyCADhe, Joshua Wright and Vincent Liu,” Hacking Wireless Exposed:
Wireless Security Secrets & Solutions “, second edition, McGraw Hill, ISBN: 978-0-
07-166662-6, 2010.
OUTCOMES:
On completion of this course, students will be able to
Identify the issues and challenges faced by Mobile and Wireless Networks.
Describe the functions and architecture of mobile cellular systems.
Compare and analyse the functions of secured wireless networks.
Analyse the solutions for security threats in wireless mobile networks using
public key management techniques.
Depict the process of RFID technology and its security enhancement.
OBJECTIVES:
REFERENCES
1. Gregory Kipper, “Wireless Crime and Forensic Investigation”, Auerbach
Publications, 2007.
2. Iosif I. Androulidakis, “ Mobile phone security and forensics: A practical
approach”, Springer publications, 2012.
3. Andrew Hoog, “ Android Forensics: Investigation, Analysis and Mobile Security
for Google Android”, Elsevier publications, 2011.
4. Angus M.Marshall, “ Digital forensics: Digital evidence in criminal investigation”,
John – Wiley and Sons, 2008.
OUTCOMES:
On completion of this course, students will be able to
Describe the different types of networks and its functions.
Illustrate the architecture and framework of secured mobile systems.
Compare the working model of android devices.
Depict the various methodologies for device handling and identification in
digital devices.
Analyse and compare the digital forensics techniques in real time
environment.
REFERENCES:
1. William von Hagen, Professional Xen Virtualization, WroxPublications,January,
2008.
2. Chris Wolf , Erick M. Halter, Virtualization: From the Desktop to the Enterprise,
APress 2005.
3. Kumar Reddy, Victor Moreno, Network virtualization, Cisco Press, July, 2006.
4. James E. Smith, Ravi Nair, Virtual Machines: Versatile Platforms for Systems
and Processes, Elsevier/Morgan Kaufmann, 2005.
5. David Marshall, Wade A. Reynolds, Advanced Server Virtualization:VMware and
Microsoft Platform in the Virtual Data Center, Auerbach Publications, 2006.
OUTCOMES:
Understanding the principles of virtualization.
To learn the architectures and models of virtualization.
To learn the Service Oriented Architecture (SOA).
To learn and practice the Cloud programming models and frameworks.
CADY202CLOUD ARCHITECTURES L T P C
3 0 0 3
Course Objectives
To provide the terminology used in cloud computing.
To provide the core concepts used in cloud computing.
To understand the business trends in cloud computing
To equip the student with the core responsibilities of a cloud architect.
REFERENCES
1. Gautam Shroff, “Enterprise Cloud Computing Technology Architecture
Applications”, Cambridge University Press; 1 edition, [ISBN: 978- 0521137355],
2010.
2. Toby Velte, Anthony Velte, Robert Elsenpeter, “Cloud Computing, A Practical
Approach” McGraw-Hill Osborne Media; 1 edition [ISBN: 0071626948], 2009.
3. Dimitris N. Chorafas, “Cloud Computing Strategies” CRC Press; 1 edition [ISBN:
1439834539],2010.
COURSE OUTCOMES
To understand common reasons why SaaS solutions are selected over
traditional software purchases
To understand common reasons why PaaS Solutions are selected over
traditional application deployment solutions
To learn how global infrastructurefacilitates cloud computing
CADY203CLOUD STORAGE INFRASTRUCTURES L T P C
3 0 0 3
Course Objectives
To identify storage and content delivery components
To Compare object storage and block storage
List compute components commonly used for cloud computing
To provide the infrastructure of the AWS
REFERENCES
1. Greg Schulz, “Cloud and Virtual Data Storage Networking”, Auerbach
Publications [ISBN: 978-1439851739], 2011.
2. Marty Poniatowski, “Foundations of Green IT” Prentice Hall; 1 edition [ISBN:
978-0137043750], 2009.
3. EMC, “Information Storage and Management” Wiley; 2 edition [ISBN: 978-
0470294215],2012.
4. Volker Herminghaus, Albrecht Scriba, “Storage Management in Data Centers”
Springer; editioN [ISBN: 978-3540850229]. 2009.
5. Klaus Schmidt, “High Availability and Disaster Recovery” Springer; edition
[ISBN: 978-3540244608], 2006.
Course Outcomes
To learn the storage and content delivery components.
Describe the security of data-at-rest.
L T P C
CADY204 CLOUD SECURITY
3 0 0 3
Course Objectives
To identify the different components of cloud security.
To describe perimeter security.
To describe key management.
To describe data security
To describe firewalls
To provide distributed denial of services detection and mitigation
strategies.
REFERENCES
1. Tim Mather, SubraKumaraswamy, ShahedLatif, “Cloud Security and Privacy: An
Enterprise Perspective on Risks and Compliance” O'Reilly Media; 1 edition [ISBN:
0596802765], 2009.
2. Ronald L. Krutz, Russell Dean Vines, “Cloud Security” [ISBN: 0470589876],
2010.
3. John Rittinghouse, James Ransome, “Cloud Computing” CRC Press; 1 edition
[ISBN: 1439806802], 2009.
4. J.R. ("Vic") Winkler, “Securing the Cloud” Syngress [ISBN: 1597495921] 2011.
5. Cloud Security Alliance, “Security Guidance for Critical Areas of Focus in Cloud
Computing” 2009.
6. Vmware “VMware Security Hardening Guide” White Paper, June 2011 .
7. Cloud Security Alliance 2010, “Top Threats to Cloud Computing” Microsoft 2013.
8. Timothy Grance; Wayne Jansen;NIST “Guidelines on Security and Privacy in
Public Cloud Computing”, 2011.
9. Evelyn Brown NIST “Guide to Security for Full Virtualization Technologies”,
2011.
COURSE OUTCOMES
To understand the chain of custody guarantee.
To understand the ad hoc audits and exception notifications.
To understand the policy-based compliance reporting.
OBJECTIVES:
To deliver a better understanding into cryptography, its application to network
security, threats/vulnerabilities to networks and countermeasures.
To study the various classical and symmetric encryption techniques.
To introduce different asymmetric encryption techniques and remote user
authentication principle.
To enrich the knowledge on Digital Signature Standard and provide solutions
for their issues
To learn cryptographic techniques for secure (confidential) communication of
two parties over an insecure (public) channel.
TEXTBOOKS:
1. Digital Forensics with Open Source Tools. Cory Altheide and Harlan Carvey,
ISBN: 978-1-59749-586-8, Elsevier publication, April 2011
2. Computer Forensics and Cyber Crime: An Introduction (3rd Edition) by Marjie T.
Britz, 2013.
REFERENCE BOOKS:
Network Forensics: Tracking Hackers Through Cyberspace, Sherri Davidoff,
Jonathan Ham,Prentice Hall, 2012
Guide to Computer Forensics and Investigations (4th edition). By B. Nelson,
A. Phillips, F. Enfinger, C. Steuart. ISBN 0-619-21706-5, Thomson, 2009.
Computer Forensics: Hard Disk and Operating Systems, EC Council,
September 17, 2009
Computer Forensics Investigation Procedures and response, EC-Council
Press, 2010
EnCase Computer Forensics., 2014
File System Forensic Analysis. By Brian Carrier. Addison-Wesley
Professional, March 27, 2005.
NIST Computer Forensic Tool Testing Program (www.cftt.nist.gov/)
Computer Forensics: Investigating Data and Image Files (Ec-Council Press
Series: Computer Forensics) by EC-Council (Paperback - Sep 16, 2009)
Digital Evidence and Computer Crime, Third Edition: Forensic Science,
Computers, and the Internet by Eoghan Casey, 2011
The Art of Memory Forensics: Detecting Malware and Threats in Windows,
Linux, and Mac Memory. Michael Hale Ligh, Andrew Case, Jamie Levy,
AAron Walters, ISBN: 978-1-118-82509-9, July 2014
Other Resources:
Computer Forensic Training Center Online http://www.cftco.com/
Computer Forensics World http://www.computerforensicsworld.com/
Computer Forensic Services http://www.computer-forensic.com/
Digital Forensic Magazine http://www.digitalforensicsmagazine.com/
The Journal of Digital Forensics, Security and Law http://www.jdfsl.org/
Journal of Digital Forensic Practice http://www.tandf.co.uk/15567281
DOJ Computer Crime and Intellectual Property Section -
http://www.usdoj.gov/criminal/cybercrime/searching.html
Electronic Crime Scene Investigation: A Guide for First Responders -
http://www.ojp.usdoj.gov/nij/pubs-sum/187736.htm and related publications at
http://nij.ncjrs.org/publications/pubs_db.asp
CERIAS Forensics Research
(http://www.cerias.purdue.edu/research/forensics/)
Scientific Working Group on Digital Evidence
(http://ncfs.org/swgde/index.html)
DoD Cyber Crime Center (http://www.dc3.mil)
National Criminal Justice Reference Service
http://www.ncjrs.gov/app/publications/alphalist.aspx
COURSE OBJECTIVES
Develop skills to both design and critique visualizations
Understand why visualization is an important part of data analysis
Understand the components involved in visualization design
Understand the type of data impacts the type of visualization
MODULE I INTRODUCTION 9
Introduction - Terminology - Basic Charts and Plots, - Multivariate Data
Visualization - Principles of Perception-Color, Design, and Evaluation.
Course Outcomes
Students will be able to prepare data for visualization
Students will be able to design visualizations
Students will be able to use web technology to create visualizations
REFERENCES
1. Ben Fry "Visualizing Data: Exploring and Explaining Data with the Processing
Environment" O'Reilly Media, 2007.
2. Scott Murray "Interactive Data Visualization for the Web" O'Reilly Media, 2012.
3. Edward Tufte "The Visual Display of Quantitative Information" 2001.
4. Few, S, Information dashboard design: The effective visual communication of
data Sebastopol: O’Reilly, 2006. 5. Provost, F. & Fawcett, T. (in-press). Towards
data science: Fundamental Principles of data mining and data-analytic thinking.
CADY402SOCIAL MEDIA ANALYTICS L T P C
3 0 0 3
OBJECTIVES:
To give an overview of social networks and its importance.
To understand the social network concepts and various methods of
analysis.
To expose and train on various tools and techniques for analyzing
and visualizing social media networks.
OUTCOMES:
On Completion of the course the students will be able to
understand the theories and concepts of social networks.
analyze the social networks by applying various methods of analysis,
tools and techniques.
Use advanced network analysis software to generate visualizations
and perform empirical investigations of network data.
Plan and execute network analytical computations
CADY403 HEALTHCARE ANALYTICS L T P C
3 0 0 3
OBJECTIVES
to know about creating and maintaining health care information systems
to understand the basic concepts of health care system.
to understand IT governance and assessment of health care
information system
MODULE I INTRODUCTION 09
Introduction to health care information – Health care data quality – Health care
information regulations, laws and standards.
Total Hours: 45
TEXT BOOKS:
1. Karen A Wager, Frances Wickham Lee, John P Glaser, “ Managing
Health Care Information Systems: A Practical Approach for Health Care
Executives”, John Wiley, 2 nd edition 2009.
2. Marion J. Ball, Charlotte Weaver, Joan Kiel ,”Healthcare Information
Management Systems: Cases, Strategies, and Solutions”, Springer, 2010, 3
rd edition
3. Rudi Van De Velde and Patrice Degoulet, “Clinical Information Sytems: A
Componenet based approach”, Springer 2005.
REFERENCE BOOKS
1. Kevin Beaver, Healthcare Information Systems, Second edition Best
Practices, CRC Press, 2002
2. Marion J. Ball Healthcare Information Management Systems: A Practical
Guide Springer-Verlag GmbH, 1995
OUTCOMES:
On completion of this course, students will be able to
Identify, Analyze the computing requirements of a problem and Solve
them using computing principles.
Design and Evaluate a computer based system, components and
process to meet the specific needs of applications.
Use current techniques and tools necessary for complex computing
practices.
Use suitable architecture or platform on design and implementation
with respect to performance
Develop and integrate effectively system based components into user
environment.
Apply the understanding of management principles with computing
knowledge to manage the projects in multidisciplinary environments.
CADY404 R PROGRAMMING L T P C
3 0 0 3
COURSE OBJECTIVE:
In this course the students will learn
how to program in R and how to use R for effective data analysis.
How to install and configure software necessary for a statistical programming
environment, Generic programming language concepts
Using R programming in Statistical Inferences
Machine learning using R
TEXTBOOK:
R Programming for Data Science Roger D. Peng 2015 Publisher LeanPub.
REFERENCE BOOKS:
Paul Teetor. R Cookbook: Proven recipes for data analysis, statistics, and
graphics. O'Reilly Media, Inc., 2011.
Norman Matloff. The art of R programming: A tour of statistical software
design.
No Starch Press, 2011.
Winston Chang. R graphics cookbook. O'Reilly Media, Inc., 2012.
Hadley Wickham and Garrett Grolemund. R for data science. (2016).
Phil Spector. Data manipulation with R. Springer Science & Business Media,
2008.
COURSE OUTCOMES:
By the end of the class, students learn to
• Use RStudio, read R documentation, and write R scripts.
• Import, export and manipulate data.
• Produce statistical summaries of continuous and categorical data.
• Produce basic graphics using standard functions, and produce more
advanced graphics using the lattice and ggplot2 packages.
• Perform common hypothesis tests, and run simple regression models in R
• Produce reports of statistical analyses in R Markdown.
CADY405 DECISION SUPPORT SYSTEMS L T P C
3 0 0 3
COURSE OBJECTIVES
Provide an overview of the foundations and key issues of managerial
decision making.
Describe and develop the components and structure of each DSS
components
Understand the different methodologies to develop decision support
systems.
Enable the student to appreciate the role and nature of Group Decision
Support Systems and related approaches such as Cognitive Mapping as a
means of structuring and supporting complex unstructured decision
problems with high levels of uncertainty.
Understand Enterprise Resource Packages, Supply Chain Management and
Customer relationship management systems.
TEXT BOOKS:
1. Efraim Turban. Jay E. Aronson, Ting-Peng Liang: Decision Support Systems
and Intelligent Systems, 7th Edition, Prentice-Hall of India, 2006.
REFERENCE BOOKS:
1. Sprague R.H. Jr and H.J. Watson: Decision Support Systems, 4th Edition,
Prentice Hall, 1996.
COURSE OUTCOMES :
Upon completion of this course student will be able to,
Illustrate different types of Decision Making strategies, frame work for decision
support.
Describe DSS characteristics, capabilities and configurations.
Explain DSS Development Methodology, DSS Technology Levels and Tools.
Analyze Group Decision Making, Communication and Collaboration,
Communication Support.
Describe the evolution of Executive and Enterprise Information Systems,
Executive‘s roles and information needs, Characteristics and capabilities of
Executive Support Systems.
OBJECTIVES
• To learn, how to develop models to predict categorical and continuous
outcomes, using such techniques as neural networks, decision trees, logistic
regression, support vector machines and Bayesian network models.
• To know the use of the binary classifier and numeric predictor nodes to automate
model selection.
• To advice on when and how to use each model. Also learn how to combine two
or more models to improveprediction
TEXT BOOK:
• Predictive & Advanced Analytics (IBM ICEPublication).
OUTCOMES:
The students will be able to:
• Understand the process of formulating business objectives, data
selection/collection, preparation and process to successfully design, build,
evaluate and implementpredictive models for a various businessapplication.
• Compare the underlying predictive modelingtechniques.
• Select appropriate predictive modeling approaches to identify cases to
progresswith.
• Apply predictive modeling approaches using a suitable package such as
SPSSModeler
GENERAL ELECTIVES
Total Hours: 45
TEXT BOOK:
1. Gordon B. Davis, Margrethe H. Olson, Management Information Systems:
Conceptual foundations, Structure and development –2ndEdition – Tata-
McGraw hill International book company, 2000.
REFERENCES :
1. E.Wainright Martin, Carol V. Brown, Danial W. DeHayes, Jeffrey A. Hoffer,
William C. Perkins, “Managing Information Technology” 3 rd Edition,
Prentice Hall International edition 1999.
2. Harold Koontz, Heinz Weihrich, “Essentials of Management”, 5th Edition,
Tata McGraw Hill 1998.
OUTCOMES:
On completion of this course, students will be able to
describe the various components of Computer based Information system
suitable for the business organization.
compare, contrast, and choose appropriate hardware, software,
database and networking suitable for the organizational Information
system.
Distinguish and analyze ethical problems that occur in business and
society
Apply leadership skills and competencies in business situations
Illustrate how current technologies and decision-support tools can be
utilized to the advantage of business operations.
develop various types of Information system suitable for organizational
levels and various functional units in the organization.
CADY002 ACCOUNTING AND FINANCIAL L T P C
MANAGEMENT 3 1 0 4
OBJECTIVES:
• To learn general accounting principles and accounting standards.
• To understand different cost analysis method.
• To introduce knowledge on budget and cash flow analysis.
• To learn investment and financial design model.
• To expose the concepts of working capital management.
Total Hours: 60
TEXTBOOKS:
1. S.N.Maheswari, “Financial and Management Accounting”, Sultan Chand
& Sons, 2003.
2. I.M.Pandey, “Financial Management”, Vikas Publications, 4th Reprint,
2002.
REFERENCES:
1. S.P.Iyengar, “Cost and Management Accounting”, Sultan Chand & Co.
2. I.M.Pandey, “Elements of Management Accounting” Vikas Publishing
House, 1999.
OUTCOMES:
On completion of this course, students will be able to
• prepare final accounts of a concern to find out the profit or loss
• List the objectives and functions of Financial Management
• analyze the firm by applying various ratios.
• Perform Computerized Accounting, Accounting Ratios Analysis,
Funds Flow Analysis and Cash Flow Analysis
• analyze the factors affecting a capital structure, working capital
and dividends.
CADY003 E-COMMERCE L T P C
3 0 0 3
OBJECTIVES:
The aim of this course is to make the students understand
• the scope of E-Commerce in the realm of modern business.
• the technologies used to develop and deliver E-Commerce applications.
• the marketing methods used in E-Commerce
• the legal and regulatory framework in which e-commerce must operate.
MODULE I INTRODUCTION 06
Networks and Commercial Transactions - Internet and Other Novelties -
Electronic Transactions Today - Commercial Transactions - Establishing Trust -
Internet Environment - Internet Advantage - World Wide Web.
REFERENCES :
1. Gareth Jones, “Organizational Theory, Design and Change”, Pearson
Education, 4th Edition, 2004.
2. Dave Chaffey, “E-business and E-Commerce” Pearson Education, 2nd
Edition, 2003.
OUTCOMES:
On completion of this course, students will be able to
• form the organizational structure
• improve leadership quality
• analyze, improve, design and develop processes to meet stakeholder
needs
• align technology, organization, and facilities with the business process
strategy and design
• apply their knowledge to manage projects effectively.
• identify, clarify and manage business benefits arising from process
change.
L T P C
CADY021GRID COMPUTING 3 0 0 3
OBJECTIVE:
• to provide insight into the architectural implications of Grid Computing
• to provide students with awareness of current issues in skills utilizing
current grid tools and technologies.
• identifying the weakness of existing tools and technologies and
proposing potential areas for improvement.
• Justify the applicability, non-applicability of Grid technologies for a
specific Application
MODULE I INTRODUCTION 09
Grid Computing values and risks – History of Grid computing – Grid computing
model and protocols – overview of types of Grids.
REFERENCES :
1. Joshy Joseph, Craig Fellenstein, “Grid Computing”, Pearson Education,
2004. Foster, “Grid Blue print foe new computing”.
OUTCOMES:
On completion of this course, students will be able to
• summarize the key concepts of Grid computing.
• sketch the architecture of open grid services.
• list the needs of grid users and build computer grids.
• gain a basic knowledge of Data management and transfer in Grid
environments and Resource management.
• prepare for any upcoming Grid deployments and be able to get
started with a potentially available Grid setup.
• list the applications of grid computing.
CADY022 UNIX AND NETWORK PROGRAMMING L T P C
OBJECTIVES: 3 0 0 3
• Learn and get familiar with the UNIX operating system and UNIX
process environment. The creation, communication and execution of
process are studied with well-defined examples through this course.
• Infer the inter-process communication between similar and different
process through standard mechanisms such as pipes, message queue etc.,
• Provide a broad knowledge on client server communication using socket
across a network for reliable network programming.
MODULE II PROCESSES 09
Environment of a UNIX process – Process termination – command line
arguments - Process control – Process identifiers - Process relationships
terminal logins – Signals -threads.
MODULE IV SOCKETS 09
Introduction – transport layer – socket introduction - TCP sockets – UDP socket
- raw sockets – Socket options - I/O multiplexing - Name and address
conversions.
-
MODULE V APPLICATIONS 09
Debugging techniques - TCP echo client server - UDP echo client server -
Ping - Trace route - Client server applications like file transfer and chat.
Total Hours: 45
TEXT BOOKS:
1. W.Richard Stevens, Advanced programming in the UNIX environment,
Addison Wesley, 1999. (Unit 1,2 & 3)
2. W. Stevens, Bill Fenner, Andrew Rudoff, “Unix Network Programming”,
Volume 1, The Sockets Networking API, 3rd Edition, Pearson education,
Nov 2003. (unit 4 & 5)
REFERENCES:
1. MeetaGandhi,Tilak Shetty and Rajiv Shah – The ‘C’ Odyssey Unix –The
open Boundless C ,1st Edition, BPB Publications 1992.
OUTCOMES:
On completion of this course, students will be able to
• attain the complete knowledge in network communication in UNIX
platform.
• list the different types of networking and their functionality
• summarize the broad knowledge on network details of a system which is
configured as UNIX supported components.
• develop a socket programming for effective client-server communication
across a network.
CADY023 MULTIMEDIA SYSTEMS AND ALGORITHMS L T P C
3 0 0 3
OBJECTIVES
• learn the basic definitions of algorithmic complexity, and how to
analyze the complexity of algorithms.
• learn basic algorithmic tools used to design efficient algorithms.
• learn how to design efficient algorithms and to recognize
situations where this is not possible.
• understand the linear and non linear data structures available in
solving problems
• know about the sorting and searching techniques and its efficiencies
• get a clear idea about the various algorithm design techniques
• Use the data structures and algorithms in real time applications
• analyze the efficiency of algorithm
MODULE I INTRODUCTION 09
Definition - CD-ROM and multimedia-Multimedia applications: business –
schools-homes - public places and virtual reality. Introduction to making of
multimedia: hardware - software - creativity - and organization.
REFERENCE BOOKS:
1. Multimedia System Design – K. Andleigh and K. Thakkrar
2. Multimedia: Computing, Communication & Application – Ralf stein Metz
and Klara Nahrstsedt.
3. Advanced multimedia programming – Steve Rimmer
4. Multimedia Literacy – Fred T. Hofstetter MGHill
OUTCOMES:
On completion of this course, students will be able to
• Possess the knowledges of creativity skills with support of multimedia
tools
• Gain hands – on experience in image, sound and video editing and in
some aspects of multimedia authoring tools
• Design an interactive website for information services
• Analyze and evaluate various algorithms to draw geometrical shapes
• Attain the complete knowledge in graphics & multimedia domain
• Show their proficiency while working with Graphics and multimedia
software and tools.
L T P C
CADY024 NETWORK SECURITY
3 0 0 3
OBJECTIVE:
• to impart knowledge on building networks, network layer and
software defined networking
• to understand how network security is conceptualized and carried out
• to analyze both early and contemporary threats to network security
• to articulate informed opinion about issues related to network security
• to appreciate the challenges of network security
MODULE I INTRODUCTION 09
Building a network-Network Architecture-Network fundamentals - Network layer
Overview on Software Defined Networking.
Total Hours: 45
TEXT BOOK:
1. Stallings, Cryptography & Network Security - Principles & Practice,
Prentice Hall, 3rd Edition 2002.
REFERENCES:
1. Bruce, Schneier, Applied Cryptography, 2nd Edition, Toha Wiley &
Sons,1996.
2. Man, Young Rhee, “Internet Security”, Wiley, 2003.
3. Pfleeger&Pfleeger, “Security in Computing”, Pearson Education,
3rd Edition, 2003.
OUTCOMES:
On completion of this course, students will be able to
• master information security governance, and related legal and regulatory
issues,
• master understanding external and internal threats to an organization
• summarize the basics of network security and attacks.
• compare various public and private key encryption algorithms.
• illustrate Message Authentication functions and protocols
• identify the virus and worms
• list the firewalls design principles
CADY025 MICROPROCESSORS AND APPLICATIONS L T P C
3 0 0 3
OBJECTIVES:
• Introduce features and technology of microprocessor-based systems
• gain assembly language programming, interfacing of memory and peripheral
devices
• gain knowledge about the architecture, instruction set, programming,
addressing mode interfacing and applications of INTEL 8085, INTEL 8086
and INTEL 80386.
REFERENCES:
1. Walter A.Triebel, AvtarSingh,“the 8088and8086 Microprocessors
Programming, Interfacing, Software, Hardware and Applications”, PrenticeHall
of India Pvt. Ltd., 2002.
2. Barry B.Brey, ”The INTEL microprocessors 8086/8088, 80186, 80286,
80386 and 80486 Architecture, Programming and Interfacing,” Prentice
Hall of India, 2001.
OUTCOMES:
On completion of this course, students will be able to
• identify different types of memory and describe how each is used
• list microprocessor instruction groups and classify machine instructions
accordingly
• develop a program in assembly language for the INTEL 8085 and INTEL
8086.
• analyze (trace) the execution of assembly code programs
• design interfacing logic to connect external devices to microprocessor.
• design and develop a microprocessor based system for specific
applications.
L T P C
CADY026TCP/IP PROTOCOL SUITE 3 0 0 3
OBJECTIVES:
• to design, build and test a small TCP/IP Network, comprising of three
sub networks and two routers.
• to trace and rectify faults on the network.
MODULE I INTRODUCTION 10
Standards – Internet – History- OSI model – Protocol suite – Addressing –
Transmission media – Local Area and Wide Area Networks – Switching –
Connecting devices – IP addressing.
Total Hours: 45
TEXT BOOK :
1. Behrouz A. Forouzan, “TCP/IP Protocol Suite”, Tata McGraw Hill Edition
2000.
REFERENCE :
1. Douglas E. Comer, David L. Stevens, “Internetworking with TCP/IP –
Volume I, II and III”, Prentice - Hall of India Pvt. Ltd., 2nd Edition 1994.
OUTCOMES:
At the end of the course the student will be able to:
• identify the needs and the purpose of each of the protocols at each layer
• use and configure each of the common applications used with TCP/IP
• configure a router using static routing and RIP
• Control the server and place request to the server with the support
of protocols
• examine a TCP/IP trace at all levels, and diagnose network problems
CADY027 ADHOC NETWORKS L T P C
3 0 0 3
OBJECTIVES:
• Understand the fundamental concepts of infrastructure less wireless
network
• Learn and analyze the different types of ad hoc routing protocols.
• Impart knowledge on Providing QoS in Ad Hoc Wireless Networks.
MODULE I INTRODUCTION 09
Introduction-Fundamentals of Wireless Communication Technology - The
Electromagnetic Spectrum - Radio Propagation Mechanisms - Characteristics
of the Wireless Channel - IEEE 802.11a,b Standard – Origin Of Ad hoc: Packet
Radio Networks - Technical Challenges - Architecture of PRNETs -
Components of Packet Radios – Ad hoc Wireless Networks -What Is an Ad Hoc
Network? Heterogeneity in Mobile Devices - Wireless Sensor Networks - Traffic
Profiles - Types of Ad hoc Mobile Communications - Types of Mobile Host
Movements - Challenges Facing Ad Hoc Mobile Networks-Ad hoc wireless
Internet.
OBJECTIVES:
• to cover the basic theory and algorithms that are widely used in
digital image processing.
• to expose students with current technologies and issues that are
specific to image processing systems.
• to develop hands-on experience in using computers to process images
• to develop critical thinking about shortcomings of the state of the art
in image processing.
Total Hours: 45
TEXT BOOK:
1. Gonzalez.R.C& Woods. R.E., Digital Image Processing, II Ed., Pearson
Education, 2002.
REFERENCES:
1. Anil Jain.K, Fundamentals of Digital image Processing, Prentice Hall of
India, 1989.
2. Sid Ahmed, Image Processing, McGraw Hill, New York, 1995.
OUTCOMES:
On completion of this course, students will be able to
• describe how digital images are represented,
• manipulate, encode and process, with emphasis on algorithm
design, implementation and performance evaluation.
• analyze various techniques and mention the strength and weakness.
• develop small programs to perform image processing tasks.
• understand the design & specification of multi-dimensional digital
filters for image processing applications.
• gain proficiency in using simulation and design software tools, such
as those found in Matlab.
CADY042 DATA MINING AND DATA WAREHOUSING L T P C
3 0 0 3
OBJECTIVES:
• Provide an overview of data mining and warehousing.
• Introduce data mining techniques
• Offer adequate knowledge to work with data warehouse
• Learn the techniques that can be applied to numerous applications
MODULE I INTRODUCTION 09
Databases - Data Mining Functionalities - Steps In Data Mining Process -
Architecture of a Typical Data Mining Systems – Classification of Data Mining
Systems - Overview of Data Mining Techniques. Data Pre-processing: Data
Cleaning – Integration – Reduction – Transformation and Discretization.
MODULE V APPLICATIONS 09
Social Impacts of Data Mining - Data Mining for Financial Data, Retail and
Telecommunications, Science and Engineering, Mining WWW, Mining Text
Database – Mining Spatial Databases – Tools - An Introduction to DB Miner -
Case Studies
Total Hours: 45
TEXT BOOKS:
1. Jiawei Han, MichelineKamber, "Data Mining: Concepts and Techniques",
Morgan Kaufmann Publishers, 2002.
REFERENCES :
1. Alex Berson,Stephen J. Smith, “Data Warehousing, Data Mining,& OLAP”,
Tata McGraw- Hill, 2004.
2. UsamaM.Fayyad, Gregory Piatetsky - Shapiro, Padhrai Smyth and
RamasamyUthurusamy, "Advances In Knowledge Discovery and Data
Mining", The M.I.T Press, 1996.
3. Ralph Kimball, "The Data Warehouse Life Cycle Toolkit", John Wiley &
Sons Inc., 1998.
4. Sean Kelly, "Data Warehousing In Action", John Wiley & Sons Inc., 1997.
OUTCOMES:
On completion of this course students will be able to:
• recognize the key areas and issues in data mining
• make more effective use of data stored in databases.
• apply association rules, clustering and classification techniques to the
dataset to demonstrate some interesting rules or predict interesting
pattern from that.
• compare database and data warehouse.
• manage the data mining development process in an individual or team
context
• plan, design and deploy the necessary data mining technologies to
support a software system
L T P C
CADY043 SOFTWARE QUALITY MANAGEMENT 3 0 0 3
OBJECTIVES:
• To understand the fundamental concepts of software quality management.
• To acquire the knowledge in quality analysis tools and techniques.
• To have the exposure on software quality assurance, quality
measuresand quality control.
• To introduce philosophies and strategies to quality related issues
MODULE I INTRODUCTION 09
Software Process assessment overview - Assessment phases - Assessment
principles - Assessment conduct -Implementation consideration - Quality
management - Quality assurance plan - Considerations – Verification and
Validation.
REFERENCES :
1. TsumS.Chow, Software Quality Assurance a Practical Approach, IEEE
Computer Society press, 1985.
2. Richard E. Fairley, Software Engineering - A Practitioner’s approach,
McGraw Hill, 1982.
OUTCOMES:
At the end of this course, the students will be able to
• describe the various practices available to manage a software system.
• understand software quality management problems, general solutions,
technologies and standards.
• compare and contrast product quality and process quality.
• apply product and process quality control techniques.
• define, implement, and apply software (process) metrics apply software
quality management to software and software development processes
L T P C
CADY044 EMBEDDED SYSTEMS
3 0 0 3
OBJECTIVES:
• To provide a clear understanding on the basic concepts, building
blocks for Embedded System
• To teach the fundamentals of processes and scheduling policies.
• To teach how to program embedded systems in assembly language and
• To introduce on Embedded Process development Environment
TEXT BOOKS
1. Wayne Wolf, “Computers as Components: Principles of
Embedded Computer System Design”, Elsevier, 2006.
2. Michael J. Pont, “Embedded C”, Pearson Education, 2007.
REFERENCES:
1. Steve Heath, “Embedded System Design”, Elsevier, 2005.
2. Muhammed Ali Mazidi, Janice GillispieMazidi and Rolin D. McKinlay,
“The 8051Microcontroller and Embedded Systems”, Pearson Education,
Second edition, 2007.
OUTCOMES:
On completion of this course, students will be able to
• get exposure with different families and architectures of Embedded
System tools such as Microcontrollers, DSPs, FPGAs etc.
• analyze real-time scheduling algorithms and identify design flaws
• design any embedded system (h/ w or s/w or both) based on any of the
above tools
• become highly proficient in Embedded Software particularly in real-time
programming with Industry standard RTOS such as VxWorks and RT
Linux.
CADY045 BUSINESS INTELLIGENCE L T P C
3 0 0 3
OBJECTIVES:
• To give an overview of business and project planning.
• To introduce and explain the complexity of business intelligence decision
support projects
• To present a step-by-step guide for the entire Business Intelligence
project life cycle
• To impart knowledge of a complete development lifecycle including
activities, deliverables, roles, risks, responsibilities, Do’s and Don’ts,
entry and exit criteria for a successful Business Intelligence (BI) decision
support implementation.
REFERENCE:
1. Business Intelligence Strategy – A practical Guide for Achieving BI
Excellence, John Boyer, Bill Frank, Brian Green Tracy Harris and Kay
Van De Vanter, First Edition, IBM Corporation, 2010.
OUTCOMES:
On completion of this course, students will be able to
OUTCOMES
On completion of this course, students will be able to
• recognize the need for testing
• review various software development models like Waterfall Models,
Spiral Model, W Model and V Model
• perform various testing like black box testing, white box testing, gray box
testing and Experience Based Testing
• describe the various testing techniques
• work with various test tools
• apply the testing techniques in commercial environment
L T P C
CADY047 CONTENT MANAGEMENT SYSTEMS
3 0 0 3
OBJECTIVES
• To impart knowledge in installing CMS and how CMS differ from website
builder
• Provide knowledge on the core modules, using Smarty to build templates
with own functionality
• To train the students in using an open source content management
(CMS) tool – Joomla, A powerful and robust tool.
MODULE I INTRODUCTION 09
Content Management System (CMS) – Introduction - Getting Started - CMS
versus website builder – Creating Pages and Navigation.
Total Hours: 45
TEXT BOOKS:
1. CMS Made simple 1.5, Sofia Hauschildt, 2010
2. Joomla! 1.5: A User’s Guide – Barrie M. North Second Edition, Prentice
Hall.
OUTCOMES:
On completion of this course, students will be able to
• install CMS made simple (CMSMS), Converting other website templates
to work with CMSMS
• add a e-commerce functionality and a discussion of users and
permissions.
• develop a successful website powered by Joomla
• list the advanced use of CMS
• incorporate components, modules, plug-ins and languages.
CADY048ADVANCED PROGRAMMING TECHNIQUES L T P C
3 0 0 3
OBJECTIVES:
• Comprehend the concepts of C and C++
• Obtain the knowledge on advanced Java programming concepts like
interface, threads, Swings etc.
• Apply java programming concepts in writing network programs
• Apply and analyze issues in enterprise applications development.
MODULE I C FUNDAMENTALS 09
Fundamentals of C Programming – Control Statements – String - Arrays -
Functions - Pointers - Structures - File Structures - File Handling.
Total Hours: 45
TEXT BOOKS:
1. Elliotte Rusty Harold, “ Java Network Programming”, O’Reilly publishers
2000.
2. Ed Roman, “Mastering Enterprise Java Beans”, John Wiley & Sons Inc.,
1999.
3. Hortsmann& Cornell, “CORE JAVA 2 ADVANCED FEATURES, VOL II”,
Pearson Education, 2002.
REFERENCES:
1. Web reference: http://java.sun.com.
2. Patrick Naughton, “COMPLETE REFERENCE: JAVA2”, Tata McGraw-
Hill, 2003.
OUTCOMES:
On completion of this course, students will be able to
• apply the basic and advanced concepts of programming languages such
as C, C++ and Java in developing application.
• connect the java application with backend database and manipulate the
data stored in the database.
• invoke and execute the methods of the remote object using RMI
• summarize various Enterprise JavaBean (EJB) concepts including entity
beans, session beans, bean managed persistence (BMP), and container
managed persistence (CMP)
• perform database queries and updates using JDBC.
CADY049 INFORMATION AND STORAGE L T P C
MANAGEMENT 3 0 0 3
OBJECTIVES
• Describe and apply storage technologies
• Identify leading storage technologies that provide cost-effective IT
solutions for medium to large scale businesses and data centres.
• Describe important storage technologies’ features such as availability,
replication, scalability and performance
• Discuss the types of storage virtualization
• Understand logical and physical components of a storage infrastructure
Total Hours: 45
REFERENCES
OUTCOMES
After completion of this course, the students would be able to
• have a general knowledge of the different types of storage media for
digital data.
• understand computer terminology as it applies to data storage.
• differentiate between different types of data storage systems.
• select different data storage types appropriate for various GIS system
data.
• recognize the differences between the data in a GIS system and the
real world it represents.
• recognize the importance of data design in a GIS system.
L T P C
CADY050 SEMANTIC WEB 3 0 0 3
OBJECTIVES
• understand the need of semantic web in web services
• know the methods to discover, classify and build ontology for more
reasonable results in searching
• build and implement a small ontology that is semantically descriptive of
chosen problem domain
• implement applications that can access, use and manipulate the ontology
MODULE I INTRODUCTION 09
Introduction to the Syntactic web and Semantic Web – Evolution of the Web –
The visual and syntactic web – Levels of Semantics – Metadata for web
information - The semantic web architecture and technologies –Contrasting
Semantic with Conventional Technologies –Semantic Modeling - Potential of
semantic web solutions and challenges of adoption.
Total Hours: 45
REFERENCE BOOKS:
1. Michael C.Daconta, Leo J. Obart and Kevin J Smith, “Semantic Web – A
guide to the future of XML, Web Services and
KnowledgeManagement”,Wiley Publishers, 2003. Liyang Yu, “A
Developer's Guide to the Semantic Web”, Springer, First Edition, 2011
2. John Hebeler, Matthew Fisher, Ryan Blace and Andrew Perez-Lopez,
“Semantic Web Programming”,Wiley, First Edition, 2009.
3. Grigoris Antoniou, Frank van Harmelen, “A Semantic Web Primer”,
Second Edition (Cooperative Information Systems) (Hardcover), MIT
Press, 2008
4. Robert M.Colomb, “Ontology and the Semantic Web”, Volume 156
Frontiers in Artificial Intelligence and Applications (Frontier in Artificial
Intelligence and Applications), IOS Press, 2007.
5. Dean Allemang and James Hendler, “Semantic Web for the Working
Ontologist: Effective Modeling in RDFS and OWL, Morgan Kaufmann”,
Second Edition, 2011.
6. Michael C. Daconta, Leo J. Obrst and Kevin T. Smith, “The Semantic Web:
A Guide to the Future of XML,Web Services, and Knowledge
Management”,Wiley, First Edition 2003
OUTCOMES:
MODULE V ARCHITECTURE 09
Basic Architectural Concepts – The System Control Interfaces – Services –
Presentation Interface – Database Interface.
Total Hours: 45
TEXT BOOK:
REFERENCE:
1. Jose Antonio Fernandz, The SAP R/3 Handbook, TMH, 1998.
OUTCOMES:
On completion of this course, students will be able to
• List the steps and activities in the ERP life cycle;
• articulate the challenges associated with post-implementation and
management of ERP systems.
• evaluate the progress of an ongoing ERP implementation project.
• apply modern software including Oracle ERP system to plan and manage
resources in organizations.
• examine systematically the planning mechanisms in an enterprise
• identify all components in an ERP system and the relationships among
the components.
CADY052 SOFTWARE PROJECT MANAGEMENT L T P C
3 0 0 3
OBJECTIVES:
MODULE I INTRODUCTION 09
Introduction to Competencies - Product Development Techniques -
Management Skills - Product Development Life Cycle - Software Development
Process and models-The SEI CMM - International Organization for
Standardization.
TEXT BOOK :
REFERENCES :
OUTCOMES:
On completion of this course, students will be able to
• gain Knowledge to develop Quality Software Products.
• plan, organize and manage the various resources effectively to achieve.
• specific target in a software organization.
• list the tasks and activities involved in the software development.
• differentiate PERT and CPM in project management.
• handle Software projects effectively
L T P C
CADY071 UNIX INTERNALS 3 0 0 3
OBJECTIVES:
Total Hours: 45
TEXT BOOK :
1. Bach M.J., The Design of the Unix Operating System, Prentice Hall India,
1986.
REFERENCES :
1. Goodheart B., Cox.J., The Magic Garden Explained, Prentice Hall India,
1994.
2. Leffler S.J., Mckusick M.K., Karels M.J and Quarterman J.S., The Design
and Implementation of the 4.3 BSD Unix Operating System. Addison
Wesley, 1998.
OUTCOMES:
On completion of this course, students will be able to
• work with the basic functioning of UNIX operating systems.
• write shell programming and convert path name to an INODE.
• analyze the buffers and kernel representation, to understand the UNIX
system structure and system calls.
• compare the various memory management techniques like Swapping,
Segmentation and Demand Paging.
L T P C
CADY072 ADVANCED DATABASES 3 0 0 3
OBJECTIVES:
TEXT BOOK :
1. R. Elmasri and S.B. Navathe, Fundamentals of Database Systems,
Addison Wesley, 2000.
REFERENCES :
1. Gary W. Hanson and James V. Hanson, Database Management and
Design, Prentice Hall of India Pvt Ltd, 1999.
2. Alex Benson, Stephen Smith and Kurt Thearling, Building Data Mining
Applications for CRM, Tata McGraw-Hill, 2000.
OUTCOMES:
OBJECTIVES:
To understand the fundamental concepts of quality assurance, SQA
activities and SQA metrics.
To get an insight into the various quality control tools.
To explore the guidelines prescribed by the various quality standards
like CMMI.
To investigate the techniques and tools for Software testing.
MODULE I CONCEPTS 09
Concepts of Quality Control, Quality Assurance, Quality Management - Total
Quality Management; Cost of Quality; QC tools - 7 QC Tools and Modern
Tools; Other related topics - Business Process Re-engineering –Zero Defect,
Six Sigma, Quality Function Deployment, Benchmarking, Statistical process
control.
Total Hours: 45
TEXT BOOK :
1. Watts Humphery, “Managing Software Process", Addison - Wesley, 1998.
REFERENCES:
1. Philip B Crosby, "Quality is Free: The Art of Making Quality Certain",
Mass Market, 1992.
2. Roger Pressman, “Software Engineering ", Sixth Edition, McGraw Hill,
2005.
OUTCOMES:
At the end of this course, the students will be able to
apply software quality control tools.
identify the software quality attributes and explore the quality standards.
apply software testing techniques and identify the inputs and
deliverables of testing.
evaluate how new technologies impact software quality assurance and
the system’s development life cycle.
CADY074 SERVICE ORIENTED ARCHITECTURE L T P C
3 1 0 3
OBJECTIVES:
MODULE I INTRODUCTION 09
Roots of SOA – Characteristics of SOA - Comparing SOA to client-server and
distributed internet architectures – Anatomy of SOA- How components in an
SOA interrelate - Principles of service orientation.
Total Hours: 45
TEXT BOOK:
1. Thomas Erl, “Service-Oriented Architecture: Concepts, Technology, and
Design”, Pearson Education, 2005.
REFERENCES:
OUTCOMES:
On completion of this course, students will be able to
• recall the principles of service orientation.
• differentiate service composition, orchestration and Choreography.
• develop ASP.NET web services.
• apply the tools and technique for Service Oriented Architecture.
• build an SOA platform supported by J2EE and .NET
CADY075 C# AND .NET FRAMEWORKS L T P C
LEARNING OBJECTIVES: 3 0 0 3
• Teach the fundamental skills that are required to design and develop
object-oriented applications
• Train the students to program in C# and develop .NET applications using
C#.
• Access data using ADO.NET
• Utilize XML in the .NET environment to create Web Service-based
applications and components
MODULE I INTRODUCTION TO C# 09
Introducing C#, Understanding .NET, overview of C#, Literals, Variables, Data
Types, Operators, checked and unchecked operators, Expressions,
Branching, Looping, Methods, implicit and explicit casting, Constant, Arrays,
Array Class, Array List, String, String Builder, Structure, Enumerations, boxing
and unboxing.
Total Hours: 45
TEXT BOOKS:
1. S. ThamaraiSelvi and R. Murugesan “A Textbook on C# “, Pearson
Education, 2003.
2. Stephen C. Perry “ Core C# and .NET”, Pearson Education, 2006.
REFERENCES:
1. Jesse Liberty, “Programming C#”, Second Edition, O’Reilly Press, 2002.
2. Robinson et al, “Professional C#”, Fifth Edition, Wrox Press, 2002.
3. Herbert Schildt, “The Complete Reference: C#”, Tata McGraw Hill, 2004.
4. Andrew Troelsen, “C# and the .NET Platform”, A! Press, 2003.
5. Thuan Thai and Hoang Q. Lam, “.NET Framework Essentials”, Second
Edition, O’Reilly, 2002.
OUTCOMES:
On completion of this course, students will be able to
• List the major elements of the .NET frame work
• Analyze the basic structure of a C# application
• design, run and debug simple C# console applications
• implement methods, classes, encapsulation, constructors,
overloading, inheritance and polymorphism to develop C#
programs
• Design and develop windows and web based applications on .NET
• Access data from database with ADO.NET
L T P C
CADY076 PHP PROGRAMMING
3 0 0 3
OBJECTIVES:
• to learn how to build good web applications using PHP language.
• to install PHP and work with arrays and regular experiment.
• to handle the exceptions and file operations.
Total Hours: 45
TEXT BOOK:
1. Kevin Tatroe, Peter MacIntyre,RasmusLerdorf, “Programming PHP”,
Creating Dynamic Web Pages, O'Reilly Media, 3rd Edition, 2013.
REFERENCES:
1. http://php.net
2. http://www.tutorialspoint.com/php/index.html
OUTCOMES:
On completion of this course, students will be able to
• Design a web project to use real-time processing capabilities to
interact with a database.
• test and debug a php application
• apply the Model View controller pattern for web applications
• pass information from client browser to web server for transaction
processing
• able to send email directly from a script
work with Yii , a high-performance PHP framework for developing
Web 2.0 applications.
L T P C
CADY077ONLINE COMPUTER ADVERTISING
3 0 0 3
OBJECTIVES
provide an understanding of the Internet as an advertising and the
process of selling an online ad program
know the trends and issues concerning the current and evolving forms of
Internet-based advertising and brand communication media;
provide an overview of the processes and elements considered in the
Conceptualizing and production of integrated brand communication
campaigns
Learnhowonline ads are priced and delivered, along with key
measurement metrics
Total Hours: 45
TEXT BOOKS
1. Joe Plummer, Steve Rappaport, Taddy Hall, and Robert Barocci, The
Online Advertising Playbook, John Wiley & Sons, Inc. (Hoboken, New
Jersey), 2007
2. RobbinZeff and Brad Aronson (ZA book from here on), Advertising on
theInternet, 2ndedition, John Wiley & Sons, Inc. (New York, NY), 1999.
OUTCOMES
Students who complete this course will be able to
explore and discuss the important issues in the Internet brand
communications in general and advertising.
develop, promote, and manage Internet-based integrated
communication campaigns
list the problems with web measurement
Identify the steps involved in digital campaign planning
CADY078 WEB MINING L T P C
3 0 0 3
OBJECTIVES:
To provide students with a sound basis in Web data mining tasks and
techniques.
To ensure that students are able to implement and to use some of
the important Web mining algorithms.
To evaluate Web Mining techniques in their workplace.
TEXTBOOKS:
1. Data Mining Techniques for Marketing, Sales, and Customer
Relationship Management, Third Edition, by Michael Berry and
Gordon Linoff, John Wiley, 2011
2. Data Mining: Practical Machine Learning Tools and Techniques, by Ian
Witten and Eibe Frank, 3rd Ed., Morgan Kaufmann, 2011
3. Web Data Mining: Exploring Hyperlinks, Content, and Usage Data, by
Bing Liu, 2nd Edition, , Springer, 2011
4. Building an Intelligent Web: Theory & Practice, R. Akerkar& P. Lingras;
Jones & Bartlett, 2007.
5. Mining the Web, Discovering Knowledge from Hypertext Data, Soumen
Chakrabarti, Morgan Kaufmann Publishers, 2003
OUTCOMES:
OBJECTIVES
to learn how to take a systematic approach to develop a Digital
Marketing strategy
to designing an online marketing strategy integrated with overall
marketing objectives
to learn to use email marketing as an effective marketing channel
to learn all the essentials of mobile marketing
Total Hours : 45
REFERENCES:
1. Wayne L.Winston, Marketing Analytics: Data driven techniques and
Microsoft Excel
2. Calvin Jones : The best digital marketing campaigns in the world ,
Mastering The Art of Customer Engagement
3. Jan Zimmerman – Social media marketing all in one for dummies
4. Leon G.Schiffman –Consumer Behavior
5. Chaffey Et Al E marketing Excellence: Planning and Optimizing your
digital marketing , 4Ed
6. Alan CharlesworthDigital Marketing: A Practical Approach
OUTCOMES:
At the end of this course the students will be able to
List the advantages of digital marketing over traditional marketing.
Summarize how they can use digital marketing is used to increase
sales and grow their business
Work with digital marketing tool kit
Become familiar with the elements of the digital marketing plan
reach online target market and develop basic digital marketing
objectives
collect, process, and analyze consumer data to make informed
marketing decisions
develop marketing strategies based on product, price, place and
promotion objectives.
CADY080 INFORMATION RETRIEVAL L T P C
3 0 0 3
OBJECTIVES:
MODULE I INTRODUCTION 09
Introduction -History of IR- Components of IR – Issues –Open source Search
engine Frameworks – The impact of the web on IR – The role of artificial
intelligence (AI) in IR – IR Versus Web Search – Components of a Search
engine-Characterizing the web.
Total Hours: 45
TEXT BOOKS:
REFERENCES:
1. Stefan Buettcher, Charles L. A. Clarke, Gordon V. Cormack, Information
Retrieval: Implementing and Evaluating Search Engines, The MIT Press,
2010.
2. OphirFrieder “Information Retrieval: Algorithms and Heuristics: The
Information Retrieval Series “, 2nd Edition, Springer, 2004.
3. Manu Konchady, “Building Search Applications: Lucene, Ling Pipe”, and
First Edition, Gate Mustru Publishing, 2008
OUTCOMES:
On Completion of the course the students will be able to
Apply information retrieval models.
Design Web Search Engine.
Use Link Analysis.
Use Hadoop and Map Reduce.
Apply document text mining techniques.
CADY081 HUMAN COMPUTER INTERACTION L T P C
3 0 0 3
OBJECTIVES
Determine the need for computers and evaluate the use of computers,
identify the stages in software engineering that need to be modified
for effectiveness of interacting with computers,
discover the various models that can be used for designing systems,
evaluate the design techniques by applying the apt statistical
approach, and design dialogue for representation to computers
MODULE IV MODELS 09
Universal design principles – Multimodal systems – User Support –
Presentation and Implementation Issues – types – requirements – approaches
– Cognitive model – Hierarchical model – Linguistic model – physical and
device models – Socio-technical models – Communication and Collaboration
models – Task models – Task analysis and design.
MODULE V EXPERIMENTAL DESIGN AND STATISTICAL
ANALYSIS OF HCI 09
Basic Design structure – Single independent variable – multiple independent
variable – factorial design – split-plot design – random errors – experimental
procedure – Statistical analysis – T tests – Analysis of Variance test –
Regression– Chi-Square test – Survey – Probabilistic sampling – Non-
probabilistic sampling– developing survey questions
Total Hours: 45
TEXT BOOKS:
1. Alan Dix, Janet Finlay, Gregory Abowd, Russell Beale Human Computer
Interaction, 3rd Edition Prentice Hall, 2004.
2. Jonathan Lazar Jinjuan Heidi Feng, Harry Hochheiser, Research
Methods in Human Computer Interaction, Wiley, 2010. REFERENCE:.
3. The essential guide to user interface design, Wilbert O Galitz, Wiley
DreamaTech.
REFERENCES
1. Human – Computer Interaction. ALAN DIX, JANET FINCAY, GRE
GORYD, ABOWD, RUSSELL EALG, PEARSON.
2. Interaction Design PRECE, ROGERS, SHARPS. Wiley Dreamtech, 3.
User Interface Design, SorenLauesen , Pearson Education.
OUTCOMES
On completion of this course, students will be able to
Explain Computer components functions regarding interaction with
human
Demonstrate Understanding of Interaction between the human and
computer components.
Implement Interaction design basics
Use HCI in the software process
Apply Design rules
Use Evaluation techniques
L T P C
CADY082BIO-INFORMATICS 3 0 0 3
OBJECTIVES:
The aim of the course is to
improve the programming skills of the student
let the students know the recent evolution in biological science.
MODULE I INTRODUCTION 09
Introduction to molecular biology – the genetic material – gene structure –
protein structure – chemical bonds – molecular biology tools – genomic
information content.
MODULE II ALIGNMENTS 09
Data searches – simple alignments – gaps – scoring matrices – dynamic
programming – global and local alignments – database searches – multiple
sequence alignments Patterns for substitutions – estimating substitution
numbers– evolutionary rates – molecular clocks – evolution in organelles
Total Hours : 45
TEXT BOOK:
1. D. E. Krane and M. L. Raymer, “Fundamental concepts of Bioinformatics”,
Pearson Education, 2003.
REFERENCES:
1. Arthur M. Lesk, “Introduction to Bioinformatics”, Second Edition, Oxford
University Press, 2005.
2. T. K. Attwood, D. J. Parry-Smith, and S. Phukan, “Introduction to
Bioinformatics”, Pearson Education, 1999.
3. Vittal R. Srinivas, “Bioinformatics – A Modern Approach”, Prentice-Hall
of India Pvt.Ltd., 2005.
OUTCOMES:
On completion of this course, students will be able to
develop bioinformatics tools with programming skills.
apply computational based solutions for biological perspectives.
pursue higher education in this field.
practice life-long learning of applied biological science.