R22-M.tech Curriculum and Syllabus
R22-M.tech Curriculum and Syllabus
R22-M.tech Curriculum and Syllabus
and Technology
M.Tech IT (R22)
Sl.
Course code Course Name Classification L T P C
No
SEMESTER I
1 CS624001 Applied Mathematics PC 3 1 0 4
2 IT626001 Advanced Operating Systems PC 3 0 0 3
Advanced Data Structures
3 CS624003 and Algorithms PC 3 0 0 3
4 CS624004 Cryptography and Hashing PC 3 0 0 3
5 Programme Elective -I PE 3 0 0 3
6 AP620004 Research Methodology IC 3 0 0 3
7 CS624501 Technical Seminar-I EEC 2 0 0 1
8 CS624101 Data Structures Laboratory PC 0 0 4 2
9 English for Manuscript Writing IM 2 0 0 0
SEMESTER II
10 IT626002 Big Data Analytics PC 3 0 0 3
Digital Image Processing Tools
11 CS624005 and Techniques PC 3 0 0 3
12 CS624007 Cloud Computing Technologies PC 3 0 0 3
13 CS624008 Internet Security PC 3 0 0 3
14 Programme Elective -II PE 3 0 0 3
15 Programme Elective -III PE 3 0 0 3
16 CS624102 Image Processing Laboratory PC 0 0 4 2
17 Literature reading skills IM 2 0 0 0
SEMESTER III
18 Programme Elective-IV PE 3 0 0 3
19 Programme Elective-V PE 3 0 0 3
20 Institute Elective IE 3 0 0 3
21 CS624301 Project Phase - I EEC 0 0 8 8
SEMESTER IV
Project Phase - II & Journal
22 CS624302 Publication EEC 0 0 12 12
23 CS624502 Technical Seminar-II EEC 2 0 0 1
Subject Total
Sl. No Code Subject Name L T P C Periods
Programme Elective -I [Sem-I]
1 CS624201 Advanced Database Technologies 3 0 0 3 45
2 IT626201 Web Technology 3 0 0 3 45
3 IT626202 Unix Internals 3 0 0 3 45
4 IT626203 Wireless Sensor Networks 3 0 0 3 45
5 CS624203 Artificial Intelligence 3 0 0 3 45
Institute Elective
Subject Total
Sl. No Code Subject Name L T P C Periods
1 IT626901 Modern Sensor Technology 3 0 0 3 45
Decision Support and Intelligent 3 0 0 3 45
2 IT626902 Systems
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
CS624001/ Applied mathematics
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 1 0 4
L T P C
3 0 0 3
Course Objective:
1. To learn the fundamentals of Operating Systems..
2. To gain knowledge on Distributed operating system concepts.
3. To gain insight on to the distributed resource management components.
4. To know the components and management aspects of Real time,
Mobile operating systems
5. To learn about the Linux system and Management.
Pre-requisites, if any: Basic Knowledge of about computer operating system
Unit 1 FUNDAMENTALS OF OPERATING SYSTEMS
Overview – Synchronization Mechanisms – Processes and Threads - Process Scheduling –
Deadlocks: Detection, Prevention and Recovery – Models of Resources – Memory
Management Techniques.
Unit 2 DISTRIBUTED OPERATING SYSTEMS
Issues in Distributed Operating System – Architecture – Communication Primitives –
Lamport’s Logical clocks – Causal Ordering of Messages – Distributed Mutual Exclusion
Algorithms – Centralized and Distributed Deadlock Detection Algorithms – Agreement
Protocols.
Unit 3 DISTRIBUTED RESOURCE MANAGEMENT
Distributed File Systems – Design Issues - Distributed Shared Memory – Algorithms for
Implementing Distributed Shared memory–Issues in Load Distributing – Scheduling
Algorithms – Synchronous and Asynchronous Check Pointing and Recovery – Fault
Tolerance – Two-Phase Commit Protocol – Nonblocking Commit Protocol – Security and
Protection.
Unit 4 REAL TIME AND MOBILE OPERATING SYSTEMS
Basic Model of Real Time Systems - Characteristics- Applications of Real Time Systems –
Real Time Task Scheduling - Handling Resource Sharing - Mobile Operating Systems –
Micro Kernel Design - Client Server Resource Access – Processes and Threads - Memory
Management - File system.
Unit 5 LINUX SYSTEM AND MANAGEMENT
Linux System: Design Principles - Kernel Modules - Process Management Scheduling -
Memory Management - Input-Output Management - File System - Interprocess
Communication. iOS and Android: Architecture and SDK Framework - Media Layer -
Services Layer - Core OS Layer - File System.
COURSE OUTCOMES VS PROGRAM OUTCOMES MAPPING
Entercorrelationlevels1,2&3defineas:1-low,2- medium,&3-high
Course Outcomes
At the end of the Course the students will be able to,
CO Outcomes Bloom’s Level
CO1 know the basics of operating systems. B2
CO2 know the concepts of Distributed operating Systems. B1
CO3 Understand the Concept of Distributed Resource B2
management.
CO4 Learn about the Concept of Real time and mobile B3
operating systems.
CO5 Understand the concept of Linux and management. B2
Text Books
Reference Books
L T P C
3 0 0 3
Course Objective:
Co-po Mapping
Program
Specific
Program Outcomes
Course Outcome
Outcom s
es P PS PS
PO PO PO PO PO PO PO PO PO PO1 PO1
O O O
1 2 3 4 5 6 7 8 9 0 1
12 1 2
CO 1 3 3 2 2 1 - - - - - - - 3 -
CO 2 3 3 3 3 - - - - - - - - 2 -
CO 3 3 3 3 3 - - - - - - - - - 2
CO 4 3 3 3 3 - - - - - - - - - 1
CO 5 3 2 2 2 - - - - - - - - - 2
Enter correlation levels 1, 2 & 3 define as: 1-low, 2- medium, & 3-high
Text Books
1. S.Sridhar, “Design and Analysis of Algorithms”, Oxford University Press, 1st
Edition, 2014.
2. Adam Drozdex, “Data Structures and algorithms in C++”, Cengage Learning, 4th
Edition, 2013.
3. Ellis Horowitz, SartajShani, SanguthevarRajasekaran, “Fundamentals Of Computer
Algorithms”. India, Misc, 2010.
Reference Books
1. T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein, "Introduction to
algorithms", Second Edition, Prentice Hall of India Ltd
2. Mark Allen Weiss, “Data Structures and Algorithms in C++”, Pearson Education, 3rd
Edition, 2009
3. Alfred V. Aho, John E. Hopcroft, Jeffrey D. Ullman, “Data Structures and
Algorithms”, Pearson Education, Reprint, 2006.
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
CS624004: Cryptography and Hashing
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To introduce the fundamental concepts and techniques in cryptography and
network security
2. To illustrate the working principles of various Symmetric Ciphers.
3. To explore knowledge on Asymmetric Ciphers.
4. To study system boot and the Init process.
5. To learn the various Hash function.
6. To realize the Construction.
Text Books
1. William Stallings, “Cryptography and network Security”, Pearson, Sixth edition, 2013.
2. Alan G. Konheim, “Computer security & cryptography”, John Wiley & Sons, 2007.
3. Josef Pieprzyk Babak Sadeghiyan ,”Design of hashing Algoritms “,Springer-Verlag 1993
Reference Books
1. Charles P. Pfleeger, Shari Lawrence Pfleeger, “Security in computing”, Prentice Hall of
India, Third Edition, 2006.
2. Wade Trappe, Lawrence C Washington, “Introduction to Cryptography with
coding theory”, Pearson, Second edition, 2007.
3. Behrouz A.Forouzan, “Cryptography and Network Security”, Tata McGraw Hill, 2010.
4. W. Mao, “Modern Cryptography – Theory and Practice”, Pearson Education,
Second Edition, 2007
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
Course Code L T P C
AP620004 RESEARCH METHODOLOGY 3 0 0 3
Course Category: Institutive core Course Type: Theory
Course Objective(s): The students should be made:
Impart knowledge on basics of research methodology
Explore knowledge in technical writing in an efficient manner
Understand research problem formulation and analyses the research related information
Understand the importance of IPR
Apply the knowledge of IPR in various research projects
Course Outcomes: (COs):
At the end of the course, the student will be able to,
Understand that today’s world is controlled by Computer, Information Technology, but tomorrow
CO 1 world will be ruled by ideas, concept, and creativity.
Correlate the results of any research article with other published results. Write are viewarticle in
CO 2
the field of engineering
Understand research problem formulation & Analyze research related information and
CO 3
Follow research ethics
CO 4 Appreciate the importance of IPR and protect their intellectual property.
Understand that PR protection provides an incentive to inventors for further research work and
CO 5 investment in R & D, which leads to creation of new and better products, and in turn brings about,
economic growth and social benefits
UNIT I RESEARCH PROCESS 9
Research ethics - Research process: characteristics and requirements, Types of research, Research process: eight
step model - formulating research problem, conceptualizing research design, constructing instrument for data
collection, Selecting a sample, writing a research proposal, collecting data, processing data, writing research
report.
UNIT II RESEARCH WRITING 9
Effective literature studies approaches - technical document structuring - how to write report and research paper -
format of research proposal - developing research proposal - presentation and assessment by a review committee.
UNIT III DESIGN OF EXPERIMENTS 9
Strategy of Experimentation - Typical applications of experimental design - Guidelines for designing
experiments - Basic statistical concepts - Statistical concepts in experimentation - Regression approach to
analysis of variance.
UNIT IV INTELLECTUAL PROPERTY 9
Patents, Industrial designs and IC layout Designs, Trade Marks and Copyright, Geographical Indications, IPR
management: 5Cs model of managing IP, Emerging issues in IPR.
UNIT V ROADMAP FOR PATENT CREATION 9
Types of patent - Parts of a patent document - Terminologies and codes used in patent document - Patent
searching and analysis – Indicators for patentability - IP identification tool – public patent data base – Transfer
and infringement of patent rights – Patent commercialization.
TEXT BOOKS:
1. Ranjit Kumar, Research Methodology- A step by step guide for beginners, Pearson
Education, Australia, 2005.
2. Ann M. Korner, Guide to Publishing a Scientific paper, Bioscript Press 2004.
3. T. Ramappa, “Intellectual Property Rights Under WTO”, S. Chand, 2008
REFERENCE(S)
1. Kothari, C. R. Research Methodology - Methods and Techniques, New Age Internationalpublishers, New
Delhi, 2004.
2. Robert P. Merges, Peter S. Menell and Mark A. Lemley, “Intellectual Property in NewTechnological Age”,
Aspen Publishers, 2016
WEB REFERENCES
https://www.youtube.com/watch?v=tBXznU_TPJo
https://www.youtube.com/watch?v=y-r6ICNqZt4
https://www.youtube.com/watch?v=k3lUo0XYG3E
https://www.youtube.com/watch?v=n6jk_r5Qc14
https://www.youtube.com/watch?v=8NDpujstgNE
CO PO MAPPING :
PROGRAM
COURSE
PROGRAMS OUTCOMES SPECIFIC
OUTCOMES
OUTCOMES
PO PO PO PSO PSO
CO’s PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9
10 11 12 1 2
CO-1 1 2 1 2 3 1 2 2 1 2
CO-2 2 3 1 3 2 2 2 1 2 2
CO-3 2 2 2 3 3 1 2 1 2
CO-4 3 3 1 1 3 3 2 1 2 2
CO-5 1 1 1 3 3 2 1 1 3 2
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of COMPUTER SCIENCE AND ENGINEERING
CS624101: DATA STRUCTURES LABORATORY
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
0 0 4 2
Course Objective:
1. To acquire the knowledge of using advanced tree structures.
2. To learn the usage of heap structures.
3. To understand the usage of graph structures and spanning trees.
4. To learn about Huffman Coding
Course Outcomes
At the end of the Course the students will be able to,
L T P C
3 0 0 3
Course Objective:
1. To gain knowledge about the competitive advantages of big data analytics.
2. To understand about the big data frameworks.
3. To understand about the features of Data Analysis.
4. To learn about the Stream Computing.
5. To gain knowledge on Hadoop related tools such as HBase, Cassandra, Pig,
and Hive for big data analytics.
Entercorrelationlevels1,2&3defineas:1-low,2- medium,&3-high
Course Outcomes
At the end of the Course the students will be able to,
CO Outcomes Bloom’s Level
CO1 To know, how to leverage the insights from big data B1
analytics
CO2 Know the concepts of Hadoop frame work. B1
CO3 Know the concepts of Data Analysis. B2
CO4 Analyze data by utilizing various statistical and data B4
mining approaches.
CO5 Understand the various NoSql alternative database B3
models
Text Books
1. David Loshin, "Big Data Analytics: From Strategic Planning to Enterprise
Integration with Tools, Techniques, NoSQL, and Graph", 2013.
Reference Books
1. Michael Berthold, David J. Hand, ―Intelligent Data Analysis‖, Springer, Second
Edition, 2007.
2. Michael Minelli, Michelle Chambers, and Ambiga Dhiraj, "Big Data, Big Analytics:
Emerging Business Intelligence and Analytic Trends for Today's Businesses", Wiley,
2013.
3. P. J. Sadalage and M. Fowler, "NoSQL Distilled: A Brief Guide to the Emerging
World of Polyglot Persistence", Addison-Wesley Professional, 2012.
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
CS624005: Digital Image Processing Tools and
Techniques (Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To provide the basic knowledge of Digital Image Processing.
2. To Know the various image enhancement techniques.
3. To understand the various concepts of image segmentation.
4. To Learn about compression techniques.
5. To extract features for image analysis and also illustrate 3D image
visualization
Entercorrelationlevels1,2&3defineas:1-low,2- medium,&3-high
Course Outcomes
At the end of the Course the students will be able to,
CO Outcomes Bloom’s Level
CO1 Understand the basic Concepts of Digital Image B2
Processing and its equivalent open source tools
CO2 Apply different Algorithm by utilizing Enhancement B3
Techniques
CO3 Learn and apply different Segmentation Techniques in B2
an Image Processing
CO4 Explore the possibility of applying various B3
Compression Techniques in an Image processing
applications
CO5 Analyze different Feature extraction approaches to B4
image processing applications
Text Books
1. Rafael C. Gonzalez and Richard E. Woods, Digital Image Processing, Third Ed.,
PrenticeHall, 2008.
Reference Books
1. William K. Pratt, Digital Image Processing, John Wiley, 4th Edition, 2007
2. Anil K. Jain, Fundamentals of Digital Image Processing, Prentice Hall of India, 1997
3. Sonka, Fitzpatrick, Medical Image Processing and Analysis, 1st Edition, SPIE,2000.
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
CS624007: Cloud Computing Technologies
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To understand the concept of cloud and utility computing.
2. To understand the various issues in cloud computing.
3. To familiarize themselves with the lead players in cloud.
4. To appreciate the emergence of cloud as the next generation computing paradigm.
5. To be able to set up a private cloud.
Unit 1 INTRODUCTION
Introduction - Historical Development - Cloud Computing Architecture – The Cloud
Reference Model – Cloud Characteristics – Cloud Deployment Models: Public, Private,
Community, and Hybrid Clouds - Cloud Delivery Models: IaaS, PaaS, SaaS – Open Source
Private Cloud Software: Eucalyptus, Open Nebula, Open Stack.
Unit 2 VIRTUALIZATION
Data Center Technology - Virtualization - Characteristics of Virtualized Environments -
Taxonomy of Virtualization Techniques – Virtualization and Cloud Computing – Pros and
Cons of Virtualization - Implementation Levels of Virtualization - Tools and Mechanisms:
Xen, VMWare, Microsoft Hyper-V.
Unit 3 CLOUD COMPUTING MECHANISM
Cloud Infrastructure Mechanism: Cloud Storage, Cloud Usage Monitor, Resource
Replication – Specialized Cloud Mechanism: Load Balancer, SLA Monitor, Pay-per-use
Monitor, Audit Monitor, Failover System, Hypervisor, Resource Cluster, Multi Device
Broker, State Management Database – Cloud Management Mechanism: Remote
Administration System, Resource Management System, SLA Management System, Billing
Management System.
Unit 4 HADOOP AND MAP REDUCE
Apache Hadoop – Hadoop Map Reduce – Hadoop Distributed File System- Hadoop
I/ODeveloping a Map Reduce Application - Map Reduce Types and Formats - Map Reduce
Features– Hadoop Cluster Setup – Administering Hadoop.
Unit 5 SECURITY IN THE CLOUD
Basic Terms and Concepts – Threat Agents – Cloud Security Threats – Cloud Security
Mechanism: Encryption, Hashing, Digital Signature, Public Key Infrastructure, Identity and
Access Management, Single Sign-on, Cloud Based Security Groups, Hardened Virtual Server
Images
Course Outcomes
CO-PO Mapping
Program
CO’s
Program Outcomes Specific
No
Objectives
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 - - - - - - - - - - - 2 -
CO2 - - - 2 - - - - - 2 - - - 2
CO3 - - 3 - - - - - - 2 - - - 2
CO4 - - - 2 - - - - - - - - - 2
CO5 - - - - 2 - - - - - - 2 - 2
Text Books
1. Thomas Erl, Zaigham Mahood, Ricardo Puttini, “Cloud Computing, Concept, Technology
and Architecture”, Prentice Hall, 2013.
Reference Books
1. Toby Velte, Anthony Velte, Robert C. Elsenpeter, “Cloud Computing, A Practical
Approach”, Tata McGraw-Hill Edition, 2010.
2. Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi, “Mastering Cloud Computing”,
Tata McGraw-Hill, 2013.
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
CS624008: Internet Security
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To study the fundamental concepts of classical encryption techniques and
Crypt Analysis.
2. To understand the principles of secret keys management.
3. To acquire the concepts of IP Security and its applications
4. To study the concepts of Transport layer security and its applications
5. To learn the working principle of Email and public key distribution
Text Books
1. Richard E.Smith, Internet Cryptography, 6th Edition, Pearson, 2011
Reference Books
1. Tim Speed, Juanita Ellis, “Internet Security”, Elsevier, 2006.
2. Uyless Black, “Internet Security Protocols – Protecting IP Traffic”, Pearson Education,
2001
3. Wade Trappe, Lawrence C Washington, “Introduction to Cryptography with coding
theory”, 2nd edition, Pearson, 2007.
4. William Stallings, Cryptography and Network Security, 6th Edition, Pearson Education,
March 2013.
5. Bruce Schneier and Neils Ferguson, ―Practical Cryptography‖, First Edition,
WileyDreamtech India Pvt Ltd, 2003
6. W. Mao, “Modern Cryptography – Theory and Practice”, Pearson Education, Second
Edition, 2007.
7. Douglas R Simson ―Cryptography –Theory and practice‖, First Edition, CRC Press,1995
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
CS624102: IMAGE PROCESSING LABORATORY
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
0 0 4 2
Course Objective:
1. To learn Image Processing Techniques
2. To display various Images in Image Processing
3. To implement Various Segmentation Techniques in Image Processing
4. To implement Image restoring techniques .
5. To implement slicing technique for image enhancement
Pre-requisites, if any: Knowledge in Image Processing
LIST OF EXPERIMENTS
1. Display of Grayscale Images Image, Negative of an Image (Binary & Gray Scale)
2. Implementation of Relationships between Pixels.
3. Implementation of Transformations of an Image .
4. Implementation of image restoring techniques
5. Implementation of Image Intensity slicing technique for image enhancement
6. Implementation of Canny edge detection Algorithm
7. Implement the Algorithm for Edge detection using Operators
8. Implementation of Segmentation using watershed transform.
9. Implementation of Histogram Equalization Algorithm.
10. Implementation of Non-linear Filtering Techniques.
11. Implement the Algorithm for Edge detection using Operators.
12. Implementation of Filtering in frequency domain
L T P C
3 0 0 3
Course Objective:
1. To know the fundamental Concepts of Database Management.
2. To define a good database design
3. To define query processing using views
4. To explain the importance of security in statistical databases
5. To state the principle of design of distributed database management system
Unit 1 Overview
Overview of a Database Management Systems – Evolution of Database Management
Systems – Basics of the Relational Model – Design of Relational Database Schemas – High
level Database Models: Design principles – Algebraic and Logical Query Languages –
Database Language SQL – SQL in a Server Environment – Semi-structured Data Model –
Data Mining – Information Integration.
Unit 2 Query Processing and Evaluation
Query Processing: An Introduction: optimization – measure of query cost – select operation –
sorting – Join operation: Nested loop – Block nested loop – Indexed nested loop – merge join
– hash join – complex join – other operations – Representation and Evaluation of Query
Expression – Creation of Query Evaluation Plans – View and Query Processing.
Unit 3 Relational Database Design
Overview – Basics of the Relational Model – Features of Good Database Design – Enhanced
ER Tools – Functional Dependency: Theory and Normalization –Multivalued Dependency –
Fourth Normal Forms – Join Dependency – Fifth Normal Form – Inclusion Dependency –
Template Dependency - Domain Key Normal Form – Modeling Temporal Data
Unit 4 Transaction Management and Recovery
Introduction – Transaction Processing – Enhanced Lock Based Protocol – Timestamp Based
Protocol: Multiple Granularity – Multi Version Schemas: Multi Version Timestamp Ordering
– Multi Version Two Phase Locking – Weak Levels of Consistency – Concurrency in Index
Structures – Failure Classification – Recovery Algorithms – Buffer Management – Advanced
Recovery Techniques – Remote Backup Systems.
Unit 5 Database Security and Authorization
Introduction – Database Security: Scenario – Levels of Database Security: Server Security –
Database Connections – Table Access Control – Restricting Database Access – Access
Control: Granting permissions – Removing permissions – Statistical Database Security –
Multilevel Security – Audit trails in Database – Vendor Specific E-security.
COURSE OUTCOMES VS PROGRAM OUT COMES MAPPING
Entercorrelationlevels1,2&3defineas:1-low,2- medium,&3-high
Course Outcomes
At the end of the Course the students will be able to,
CO Outcomes Bloom’s Level
CO1 Understand the fundamental Concepts of Database B2
CO2 Learn about Query Processing and Evaluation B5
CO3 Know & Discuss Relational Database Design B2
CO4 Understand the concept of Transaction and Analyze the B3
Algorithms to give Recovery Techniques
CO5 Understand the High Levels of Data Security & Access B3
Control
Text Books
1. Hector-Garcia Molina,Jeffery D.Ullman,Jenifer Wisdom,”Database System –
The Complete Book” StandfordUniveristy,Pearson Prentice Hill,2nd Edition.
2.Dr.Radyanbi Tibor “Advanced Database Management Systems” Tartalom Publication.
Reference Books
1. Silberschatz, Korth and Sudarshan “Database System Concepts”7th Edition.
2. Data base Management Systems, Raghurama Krishnan, Johannes Gehrke, TATA
McGraw Hill 3rd Edition.
3. Jef Van Loon “Database Security Concepts and Challenges” Pearson,5th Edition.
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
IT626201: WEB TECHNOLOGY
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. Understand the fundamentals of object-oriented programming in Java
2. Understand the appropriate roles of subtyping and inheritance, and use them effectively.
3. Implement polymorphic code and handle runtime errors using exception handling
4. Implement polymorphic code and handle runtime errors using exception handling
5. Create user interface applications using GUI components and to understand the event
handling principles.
CO2 Understand the appropriate roles of subtyping and inheritance, and use understand
them effectively.
CO3 Implement polymorphic code and handle runtime errors using exception Apply
handling
CO4 To identify the generic classes and methods to implement an application Analyze and
Use streams to store and retrieve data from database/files Apply
CO-PO Mapping
Program
Course ProgramOutcomes Specific
Outcomes Outcomes
PO PO PO PO PO PO PO PO PO PO PO PO PSO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2
CO1 3 2 2 1 2 2 2
CO2 3 2 2 1 2 2 2
CO3 3 2 2 2 2 2 2
CO4 3 2 2 1 2 2 2
CO5 3 2 2 2 2 2 2
Entercorrelationlevels1,2&3defineas:1-low,2- medium,&3-high
Text Books
1. ATimothy Budd, “An Introduction to Object-Oriented Programming”,
Third Edition, PearsonEducation,2008.
2. Paul Deitel and Harvey Deitel, “Java How to Program (Early Objects)”,
Tenth Edition,PearsonPrenticeHall2014.
3. Jesse Feiler, Managing the Web Based Enterprise[Morgan Kaufmann]
4. Chuck Musciano & Bill Kennedy, HTML & XHTML [SPD]
Reference Books
L T P C
3 0 0 3
Course Objective:
1. To introduce the architecture of the Unix Operating System
2. To understand the buffer structure, the inodes representation and super block.
3. To cover various system calls and its usage.
4. To study system boot and the Init process.
5. To introduce process states, signals and process scheduling.
6. To understand memory management and I/O sub system.
Reference Books
1. Maurice J. Bach, “The Design of the Unix Operating System”, Fourth Edition, Pearson
Education, 2015.
2. Uresh Vahalia, “Unix Internals: The New Frontiers”, Pearson Education, 2008.
3. S. J. Leffler, M. K. Mckusick, M. J. .Karels and J. S. Quarterman., “The Design
AndImplementation of the 4.3 BSD Unix Operating System”, Addison Wesley,
1998.
4. Prabhat K. Andleigh, “ Unix System Architecture” Prentice Hall, 1990.
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
IT626203: Wireless Sensor Networks
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
CO-PO Mapping
Program
Program Outcomes Specific
CO’s Objectives
NO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 - 2 - - - - - - - - - - 1 -
CO2 - - - 2 - - - - - 2 - - - 0
CO3 2 - - - - - 2 - - - - - - 0
CO4 - - - 2 - - - - - - - - - 0
CO5 - - - - 2 - - - - - - 2 - 0
Text Books
1. Holger Karl & Andreas Willig, “Protocols and Architectures for Wireless Sensor
Networks”, John Wiley, 2014.
Reference Books
1. KazemSohraby, Daniel Minoli, &TaiebZnati, “Wireless Sensor Networks
Technology, Protocols and Applications”, John Wiley, 2011.
2. Anna Hac, “Wireless Sensor Network Designs”, John Wiley, 2003
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
CS624203: Artificial Intelligence
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To gain knowledge about the basics of artificial intelligence.
2. To understand the basics of Problem solving problems.
3. To understand about the knowledge representation
4. To learn about the features of intelligent agents.
5. To learn about the details of applications of AI.
Unit 1 Introduction
Introduction–Definition - Future of Artificial Intelligence – Characteristics of Intelligent
Agents– Typical Intelligent Agents – Problem Solving Approach to Typical AI problems.
Unit 2 Problem Solving methods
Problem solving Methods - Search Strategies- Uninformed - Informed - Heuristics - Local
Search Algorithms and Optimization Problems - Searching with Partial Observations -
Constraint Satisfaction Problems – Constraint Propagation - Backtracking Search - Game
Playing - Optimal Decisions in Games – Alpha - Beta Pruning - Stochastic Games.
Unit 3 Knowledge Representation
First Order Predicate Logic – Prolog Programming – Unification – Forward Chaining-
Backward Chaining – Resolution – Knowledge Representation - Ontological Engineering-
Categories and Objects – Events - Mental Events and Mental Objects - Reasoning Systems
for Categories - Reasoning with Default Information.
Unit 4 Software Agents
Architecture for Intelligent Agents – Agent communication – Negotiation and Bargaining –
Argumentation among Agents – Trust and Reputation in Multi-agent systems.
Unit 5 Applications
AI applications – Language Models – Information Retrieval- Information Extraction –
Natural Language Processing - Machine Translation – Speech Recognition – Robot –
Hardware – Perception – Planning – Moving.
COURSE OUTCOMES VS PROGRAM OUTCOMES MAPPING
Entercorrelationlevels1,2&3defineas:1-low,2- medium,&3-high
Course Outcomes
At the end of the Course the students will be able to,
CO Outcomes Bloom’s Level
CO1 Know the basics of Artificial intelligence. B1
CO2 Know the concepts of problem Solving methods. B1
CO3 To learn the concept of Knowledge Representation in B2
AI.
CO4 Understand the characteristics of Software agents. B3
CO5 To analyze about the applications of AI. B4
Text Books
Reference Books
L T P C
3 0 0 3
Course Objective:
1. To identify the components of IoT.
2. To analyze various protocols of IoT.
3. To design portable IoT using appropriate boards.
4. To design business Intelligence and Information Security for WoT.
5. To develop schemes for the applications of IOT in real time scenarios.
Text Books
1. HonboZhou,”The Internet of Things in the Cloud: A Middleware Perspective” -
CRC Press 2012.
Reference Books
1. Luigi Atzori, Antonio Lera, Giacomo Morabito, “The Internet of Things: A Survey”,
Journal on Networks, Elsevier Publications, October, 2010.
2. 2. Olivier Hersent, David Boswarthick, Omar Elloumi, “The Internet of Things – Key
applications and Protocols”, Wiley, 2012.
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
IT626204: Deep Learning
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
Unit 1 INTRODUCTION
Introduction to machine learning- Linear models (SVMs and Perceptrons, logistic regression)
- Intro to Neural Nets: What a shallow network computes- Training a network: loss
functions, back propagation and stochastic gradient descent- Neural networks as universal
function approximates
Unit 2DEEP NETWORKS
History of Deep Learning- A Probabilistic Theory of Deep Learning- Back propagation and
regularization, batch normalization- VC Dimension and Neural Nets-Deep Vs Shallow
Networks Convolutional Networks- Generative Adversarial Networks (GAN), Semi-
supervised Learning
Unit 3 DIMENTIONALITY REDUCTION
Linear (PCA, LDA) and manifolds, metric learning - Auto encoders and dimensionality
reduction in networks - Introduction to Convnet - Architectures – AlexNet, VGG, Inception,
ResNet - Training a Convnet: weights initialization, batch normalization, hyperparameter
optimization
Unit 4 OPTIMIZATION AND GENERALIZATION
Optimization in deep learning– Non-convex optimization for deep networks- Stochastic
Optimization Generalization in neural networks- Spatial Transformer Networks- Recurrent
networks, LSTM - Recurrent Neural Network Language Models- Word-Level RNNs & Deep
Reinforcement Learning - Computational & Artificial Neuroscience
Unit 5 CASE STUDY AND APPLICATIONS
Image net- Detection-Audio Wave Net-Natural Language Processing Word2Vec - Joint
Detection BioInformatics- Face Recognition- Scene Understanding- Gathering Image
Captions
Course Outcomes
At the end of the Course the students will be able to,
CO-PO Mapping
Program
Program Outcomes Specific
CO’s NO Objectives
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 - - - - - - - - - - - -
CO2 - - - 2 2 - - - - 2 - - - -
CO3 - - 2 2 - - - - - 2 - - - -
CO4 - - - 2 2 - - - - - - - - -
CO5 - - - - 2 - - - - - - 2 - -
Text Books
1. Cosma Rohilla Shalizi, Advanced Data Analysis from an Elementary Point of View, 2015.
Reference Books
1. Deng & Yu, Deep Learning: Methods and Applications, Now Publishers, 2013.
2. Ian Goodfellow, YoshuaBengio, Aaron Courville, Deep Learning, MIT Press, 2016.
3. Michael Nielsen, Neural Networks and Deep Learning, Determination Press, 2015
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
IT626205: Network Security
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To introduce principal concepts, major issues, technologies, and basic approaches
in Network security.
2. To review various algorithms on key management.
3. To explain the principles of various authentication mechanism
4. To understand the key management and distribution system.
5. To familiarize the ability to examine and analyze various attacks and web security.
Pre-requisites, if any: Basic knowledge in network
Unit 1 INTRODUCTION
An Overview of Computer Security Concepts – OSI Security Architecture - Security Attacks
– Security Services –Security mechanisms- Cipher model – Substitution Techniques –
Transposition Techniques – Encryption Algorithms - Confidentiality
Unit 2 ALGORITHMS FOR SECURITY
Data Encryption Standard-Block cipher principles-block cipher modes of operation-
Advanced Encryption Standard (AES)-Triple DES - Blowfish-RC5 algorithm - Public key
cryptography: Principles of public key cryptosystems-The RSA algorithm-Key management -
Diffie Hellman Key exchange- Elliptic curve arithmetic-Elliptic curve cryptography.
Unit 3 HASH FUNCTIONS AND DIGITAL SIGNATURES
Authentication requirement – Authentication function – MAC – Hash function – Security of
hash function and MAC –MD5 - SHA - HMAC – CMAC - Digital signature and
authentication protocols – DSS – ELGamal DSS – Schnoor DSS Scheme-RSA-PSS Digital
signature algorithm.
Unit 4 KEY MANAGEMENT AND DISTRIBUTION
Symmetric Encryption – Symmetric Decryption – Distribution of public keys – X.509
Certificates – Public key Infrastructure – User Authentication protocol – Remote user
Authentication principles – Kerberos-Federated Identity management-Personal Identity
verification.
Unit 5 BRIEF SURVEY OF INTERNET SECURITY
Transport level Security – Web security – SSL – Transport Layer Security – HTTPS 506 –
Secure Shell SSH – Wireless Network Security – IEEE 802.11 Wireless LAN – WAP End to
End Security – Electronic Mail Security – PGP – S/MIME –Domain keys identified mail- IP
Security – Policies – Internet Key Exchange.
COURSE OUTCOMES VS PROGRAM OUT COMES MAPPING
Entercorrelationlevels1,2&3defineas:1-low,2- medium,&3-high
Course Outcomes
At the end of the Course the students will be able to,
CO Outcomes Bloom’s Level
CO1 Have fundamental knowledge on Network security K2
CO2 Know about the various network security algorithms. K2
CO3 Understand the hash functions and digital signatures for K2
network security.
CO4 Analyze the key management and distribution system. K4
CO5 Analyze the Internet security. K4
Reference Books
L T P C
3 0 0 3
Course Objective:
1. Learn different definitions of software quality
2. Know different notions of defects and classify them
3. Understand the basic techniques of data collection and how to apply them
4. Learn software metrics that define relevant metrics in a rigorous way.
5. Gain confidence in ultra-high reliability.
Text Books
1. John D. Musa, ―Software Reliability Engineering‖, Tata McGraw Hill, 1999
Reference Books
1. John D. Musa, Anthony Iannino, KazuhiraOkumoto, ―Software Reliability –
Measurement, Prediction, Application, Series in Software Engineering and
Technology‖, McGraw Hill, 1987
2. Norman Fenton, James Bieman, ―Software Metrics: A Rigorous and Practical
Approach‖, 3rd edition, CRC Press, 2015 25 IF5191 AD
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
IT626205: Human Computer Interaction
Techniques (Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To know how to analyze and consider user‟s need in the interaction system
2. To understand various interaction design techniques and models
3. To understand the theory and framework of HCI
4. Understand and analyze the cognitive aspects of human – machine interaction
Pre-requisites, if any: User Interface Design
Unit 1 INTRODUCTION
Foundation – Human – Computer – Interaction – Paradigms – What is HCI – Components –
Cognitive Framework – Perception and Representation – Attention and Memory Constraint –
Knowledge and Mental Model – Interface Metaphors – Input – Output
Unit 2 DESIGN PROCESS
Interaction Styles – Interaction Design Basics – HCI in the Software Process – Design Rules
- Designing Windowing Systems - User Support and On-Line Information - Designing For
Collaborative Work and Virtual Environments - Principles and User-Centred Design -
Methods for User-Centred Design
Unit 3 IMPLEMENTATION AND EVALUATION PROCESS
Implementation issues – Implementation Support - Evaluation techniques – Universal Design
– User Support
Unit 4 MODELS
Cognitive models – Communication and collaboration models: Models of the system –
Models of the System – Modeling Rich Interaction.
Unit 5 APPLICATIONS
Socio – organization issues and stakeholder requirements - Ubiquitous Computing - Context
– aware User Interfaces - Hypertext, multimedia and the World Wide Web
Course Outcomes
At the end of the Course the students will be able to,
CO Outcomes Bloom’s Level
CO1 Develop good design for human machine interaction Understand
system
CO2 Design new interaction model to satisfy all types of Remember
customers
CO3 Evaluate the usability and effectiveness of various Evaluate
products
CO4 To know how to apply interaction techniques for systems Apply
CO-PO Mapping
Program
Program Outcomes Specific
CO’s Objectives
NO
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 - 2 - 2 - - - - - - - - 2 -
CO2 2 2 - 2 - - - - - 2 - - - 2
CO3 - - 2 3 - - - - - - - - - 2
CO4 2 - - 2 2 - - - - - - - - 2
Text Books
1. Alan Dix, Janet Finlay, Gregory D.Abowd, Russell Beale, “Human Computer Interaction”,
Third Edition, Pearson Education, 2004
Reference Books
1. Dix, Finlay, Abowd and Beale. “Human – Computer Interaction”, Second edition,
Prentice Hall,1998.
2. J. Preece, Y. Rogers, H. Sharp, D. Benyon, S. Holland and T. Carey. “Human – Computer
Interaction”, Addison Wesley, 1994.
3. John M.Carrol, “Human Computer Interaction in the New Millenium”, Pearson
Education, 2002.
PROGRAMME
ELECTIVE -III [SEM-II]
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
IT626207: Advanced Computer Graphics and
Animations (Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To learn the output primitives like line, circle and ellipse using algorithms.
2. To study the 2-D transformations and clipping.
3. To explore 3-D object representations and transformations.
4. To explore graphics programming using OpenGL.
5. To enable the students to understand various 3-D modeling and animation tools.
Unit 1 INTRODUCTION
Applications of Computer Graphics - Overview of Graphics Systems - Input Devices -
Output Primitives: Points and Lines - Line Drawing Algorithms - Mid-Point Circle and
Ellipse Algorithms - Attributes of Output Primitives: Line, Curve, Color, Area-Fill,
Character, Bundled Attributes - Antialiasing.
Unit 2TWO-DIMENSIONAL CONCEPTS
Two-Dimensional Geometric Transformations - Two-Dimensional Viewing - Two-
Dimensional Point – Cohen Sutherland Line Clipping - Sutherland-Hodgeman Polygon
Clipping - Weiler-Atherton Polygon Clipping - Text Clipping - Exterior Clipping.
Unit 3 THREE-DIMENSIONAL CONCEPTS
Three-Dimensional Display Methods - Three-Dimensional Object Representations: Polygon -
Quadric Surfaces – Splines – Bezier curves and surfaces – Octree – BSP trees – Visualization
of Datasets. Three-Dimensional Transformations: Translation – Rotation – Scaling –
Reflection - Shearing - Composite transformation
Unit 4 GRAPHICS PROGRAMMING WITH OPENGL
Drawing 3D Scenes – Perform Transformations - Colors And Light - Adding Texture and
Shadows - Using Shading Models. Understanding 3D Modeling and Animation Tools like 3D
Studio Max, Maya, Blender.
Unit 5 Animation
Multimedia I/O Technologies − Digital Voice and Audio − Video Image and Animation –
Full Motion Video−Storage and Retrieval Technologies- Animation Principles - Animation
Drawing - Animation Marketing and Management - Matte Painting.
Course Outcomes
At the end of the Course the students will be able to,
CO Outcomes Bloom’s Level
CO1 Develop the line, circle and ellipse drawing algorithms Create
CO2 Apply the two dimensional geometric transformations and Apply
2-D clipping
CO3 Represent 2-D objects and do geometric transformations Analyze
CO4 Perform clipping and Detecting the visible surfaces in 3-D Understand
objects
CO5 Apply transformation, texture, shadow and shading in 3-D Apply
objects using OpenGL and Animation
CO-PO Mapping
Program
Specific
Program Outcomes
Objectiv
es
CO’s PO PO PO PO PO PO PO PO PO PO1 PO1 PO1 PSO PS
COURSE OUTCOME
NO 1 2 3 4 5 6 7 8 9 0 1 2 1 O2
Develop the line, circle and
CO1 2 - - - - - - - - - - - 2 -
ellipse drawing algorithms
Apply the two dimensional
CO2 geometric transformations and 2- - 2 - - - - - - - 2 - - - 2
D clipping
Represent 2-D objects and do
CO3 - - 2 - - - - - - 2 - - - 2
geometric transformations
Perform clipping and Detecting
CO4 - - - 2 - - - - - - - - - 2
the visible surfaces in 3-D objects
Apply transformation, texture,
shadow and shading in 3-D
CO5 - - 2 - - - - - - - - 2 - 2
objects using OpenGL and
Animation
Text Books
1. Donald Hearn and M. Pauline Baker, “Computer Graphics C Version”, Second Edition,
Pearson Education, 2012.
Reference Books
1. James D. Foley, Andries Van Dam, Steven K. Feiner, John F. Hughes, “Computer
Graphics Principles and Practice”, Second Edition, Pearson Education 2007.
2. F. S. Hill, “Computer Graphics using OpenGL”, Second edition, Pearson Education 2003.
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
CS624211: Software Quality Assurance and Testing
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To understand the basics of testing, test planning &design and test team
organization
2. To study the various types of test in the life cycle of the software product.
3. To build design concepts for system testing and execution
4. To learn the software quality assurance ,metrics, defect prevention techniques
5. To learn the techniques for quality assurance and applying for applications.
Course Outcomes
CO-PO Mapping
Program
Program Outcomes Specific
Objectives
CO’s
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
NO
CO1 3 - 2 - 1 - - - - - - - 2 -
CO2 3 2 - - - - - - - 3 - - - 2
CO3 - - 3 2 - - - - - - - - - 2
CO4 - - - 2 2 - - - - - - - - 2
Text Books
Reference Books
L T P C
3 0 0 3
Course Objective:
1. To appreciate the need of Cognitive Computing Techniques.
2. To learn different types of sets which can handle imprecise data values
3. To develop systems which have learning capabilities.
4. To learn techniques to optimize the results and find the optima.
Pre-requisites, if any:
Reference Books
L T P C
3 0 0 3
Course Objective:
1. To Understand the knowledge about the current Web Development Process.
2. To Design the Ontological representation of social relationships.
3. To Analyze the Detecting Communities in Social Networks
4. To Understand the extraction and mining tools for Social networks
5. To Gain knowledge on Web personalization and Web Visualization of
Social networks
Entercorrelationlevels1,2&3defineas:1-low,2- medium,&3-high
Course Outcomes
At the end of the Course the students will be able to,
CO Outcomes Bloom’s Level
CO1 Apply knowledge for current Web development in the B4
era of Social Web.
CO2 Model, aggregate and represent knowledge for Semantic B4
Web.
CO3 Design extraction and mining tools for Social networks. B3
CO4 Develop personalized web sites and visualization for B3
Social networks.
CO5 Design Web personalization and Visualization for B3
Social networks
Text Books
1. Peter Mika, ―Social Networks and the Semantic Web‖, First Edition,
Springer 2007.
2. BorkoFurht, ―Handbook of Social Network Technologies and Applications‖,
1st Edition, Springer, 2010
Reference Books
1. Peter Mika, ―Social networks and the Semantic Web‖, Springer, 1st edition 2007.
2. Dion Goh and Schubert Foo, ―Social information Retrieval Systems:
Emerging Technologies and Applications for Searching the Web Effectively‖,
IGI Global Snippet, 2008.
PSN COLLEGE OF ENGINEERING AND TECHNOLOGY (Autonomous)
Tirunelveli – 627152
Department of Computer Science and Engineering
CS624215: Block Chain Technologies
(Under Regulation 2022)
(Applicable from the academic year 2022-23 onwards)
L T P C
3 0 0 3
Course Objective:
1. To learn the various cryptography primitives used in block chain.
2. To study the design principles of block chain.
3. To understand the various consensus algorithms.
4. To study the block chain in networking.
5. To learn the enhancements of block chain technologies.
CO-PO Mapping
Program
Program Outcomes Specific
CO’s NO Outcomes
PSO1 PSO2
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1 3 2 2 2
CO2 2 2 3 2 2
CO3 3 2 2
CO4 2 3
CO5 2 3 2
Text Books
1. Koshik Raj, “Foundations of Blockchain”, Packt Publishers, 2019
Reference Books
REFERENCE BOOKS:
1.Stephen Marsland, “Machine Learning: An Algorithmic Perspective”, CRC Press, 2011.
2.Richard O. Duda, Peter E. Hart, David G. Stork, ”Pattern Classification”, Second Edition.,
Wiley India, 2006.
3.Christopher M. Bishop, “Pattern Recognition and Machine Learning”, Springer (India)
Private Limited, 2013.
4.Ian H. Witten, Eibe Frank, “Data Mining: Practical Machine Learning Tools and
Techniques”, Second Edition, Elsevier India, 2011.
5.SergiosTheodoridis, KonstantinosKoutroumbas, “Pattern Recognition”, Fourth Edition.,
China Machine Press, 2009
6. William Gibson,” Pattern Recognition ”,Penguin, 2011
WEB RESOURCES:
1. https://www.v7labs.com/blog/pattern-recognition-guide
2. https://www.simplilearn.com/pattern-recognition-and-ml-article
IT626209 - PARALLEL COMPUTING
Course Category: Programme L T P C
Course Type: Theory 3 0 0 3
Elective
COURSE OBJECTIVES:
To study the scalability and clustering issues and the technology necessary for them.
To understand the technologies enabling parallel computing.
To study the different types of interconnection networks.
To study the different parallel programming models.
To study the software support needed for shared memory programming.
UNIT 1: INTRODUCTION 9
Mobile Application Model – Infrastructure andManaging Resources – Mobile Device Profiles
– Frameworks and Tools.
UNIT 2: USER INTERFACE 9
Generic UI Development - Multimodal and Multichannel UI –Gesture Based UI – Screen
Elements and Layouts – Voice XML.
UNIT 3: APPLICATION DESIGN 9
Memory Management – Design Patterns for Limited Memory – Work Flow for Application
development – Java API – Dynamic Linking – Plugins and rule of thumb for using DLLs –
Concurrency and Resource Management.
UNIT 4: MOBILE OS 9
Mobile OS: Android, iOS – Android Application Architecture – Android basic components –
Intents and Services – Storing and Retrieving data – Packaging and Deployment – Security
and Hacking.
UNIT 5: APPLICATION DEVELOPMENT 9
Communication via the Web – Notification and Alarms – Graphics and Multimedia: Layer
Animation, Event handling and Graphics services – Telephony – Location based services
TOTAL: 45 PERIODS
COURSE OUTCOMES: At the end of the course, the student will be able to
CO1: Know the features of the basics of mobile application development frameworks and
tools
CO2: Able to develop a UI for mobile application
CO3: Design mobile applications that manages memory dynamically
CO4: Build applications based on mobile OS like Android, iOs
CO5: Build location based services
CO-PO MAPPING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 2 3 2
CO2 2 2 2 2 3 2 3 3
CO3 2 2 2 3 2 2 2 3
CO4 2 2 2 2 2 2 2 3
CO5 2 3 2 2 3 3 2 2
1- low, 2 - medium, 3 - high, ‘-' no correlation
REFERENCE BOOKS:
1.Reto Meier, “Professional Android 4 Application Development”,Wiley, First Edition, 2014.
2.ZigurdMednieks, LairdDornin, G. Blake Meike, Masumi Nakamura, “Programming
Android”, O’Reilly, 2nd Edition, 2016.
3.Alasdair Allan, “iPhone Programming”, O’Reilly, First Edition, 2013.
4.Anubhav Pradhan, Anil V Deshpande, “ Mobile Apps Development”, First Edition, Wiley
India, 2013
5.Barry Burd,”Android Application Development All in one for Dummies”, First Edition,
Wiley India, 2011
6.Erik Hellman, “Android programming-Pushing the Limits”, First Edition, Wiley India Pvt
Ltd, 2014.
WEB RESOURCES:
1. https://www.ibm.com/topics/mobile-application-development
2. https://appicontemplate.com/
IT626211 - VIRTUAL AND AUGMENT
REALITY
Course Type: L T P C
Course Category: Programme Elective 3 0 0 3
Theory
COURSE OBJECTIVES:
To study about Fundamental Concept and Components of Virtual Reality
To study about Interactive Techniques in Virtual Reality
To study about Visual Computation in Virtual Reality
To study about Augmented and Mixed Reality and Its Applications
To know about I/O Interfaces and its functions.
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 2 2 3 3
CO2 2 2 2 2 3 2 3 3
CO3 2 3 2 3 2 3 2 2 2
CO4 2 2 2 3 2 3 2 3
CO5 2 3 21- low, 2 - medium, 3 - high, ‘-' no correlation2
2 2 2 2
REFERENCE BOOKS:
1.Christos Faloutsos, “Searching Multimedia databases by Content”, Kluwer Academic
Publishers,2011.
2.V. S. Subramanian, “Principles of Multimedia Database Systems”, Harcourt India Pvt Ltd.,
2001.
3.Lynne Dunckley, “Multimedia Databases: An Object Relational Approach”, Pearson
Education, 2003.
4.S. Khoshafian, A. B. Baker, “Multimedia and Imaging Databases”, Elsevier, 1996.
5.C. Kingsley Nwosu, “Multimedia Database Systems: Design and Implementation
Strategies”, Kluwer Academic Publishers,2012.
6.R. Elmasri, S. B. Navathe, “Fundamentals of Database Systems”, Seventh edition, Pearson
Education,2017.
WEB RESOURCES:
1. https://researchguides.dartmouth.edu/c.php?g=59724&p=382829
2. https://www.tutorialspoint.com/Multimedia-Databases
PROGRAMME
ELECTIVE -V
CS624221 - MULTIMIDIA AND COMPRESSION
TECHNIQUES
Course Category: Programme L T P C
Course Type: Theory 3 0 0 3
Elective
COURSE OBJECTIVES:
To understand the basic ideas of compression algorithms related to multimedia
components
To learn the Text compression algorithms
To get the knowledge of Image compression algorithms
To know the features of Audio compression algorithms
To know the features of Video compression algorithms
UNIT 1: FUNDAMENTALS OF COMPRESSION 9
Introduction To multimedia – Graphics, Image and Video representations – Fundamental
concepts of video, digital audio – Storage requirements of multimedia applications – Need for
compression – Taxonomy of compression Algorithms - Elements of Information Theory –
Error Free Compression – Lossy Compression.
UNIT 2: TEXT COMPRESSION 9
Huffman coding – Adaptive Huffman coding – Arithmetic coding – Shannon-Fano coding –
Dictionary techniques – LZW family algorithms.
UNIT 3: IMAGE COMPRESSION 9
Image Compression: Fundamentals –– Compression Standards – JPEG Standard – Sub-band
coding – Wavelet Based compression – Implementation using Filters – EZW, SPIHT coders
– JPEG 2000 standards – JBIG and JBIG2 standards.
UNIT 4: AUDIO COMPRESSION 9
Audio compression Techniques – law, A-Law compounding – Frequency domain and
filtering – Basic sub-band coding – Application to speech coding – G.722 – MPEG audio –
progressive encoding – Silence compression, Speech compression – Formant and CELP
vocoders.
UNIT 5: VIDEO COMPRESSION 9
Video compression techniques and Standards – MPEG video coding: MPEG-1 and MPEG-2
video coding: MPEG-3 and MPEG-4 – Motion estimation and compensation techniques –
H.261 Standard – DVI technology – DVI real time compression – Current Trends in
Compression standards.
TOTAL: 45 PERIODS
COURSE OUTCOMES: At the end of the course, the student will be able to
CO1: Implement basic compression algorithms familiar with the use of MATLAB and its
equivalent open source environments
CO2: Design and implement the Text compression algorithms
CO3: Analyse different approaches of image compression algorithms in multimedia projects.
CO4: Analyse different approaches of audio compression algorithms in multimedia projects.
CO5: Design and implement the video compression algorithms
CO-PO MAPPING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 3 2 2 2 3 3 3
CO2 2 2 2 3 3 2 3 3
CO3 2 3 2 2 2 2 2 2
CO4 2 2 2 2 3 2 2 3
CO5 2 3 2 2 2 2 2 2
1- low, 2 – medium, 3 – high, ‘-‘ no correlation
REFERENCE BOOKS:
1.Cold McAnlis and AleksHaecky, “ Understanding Compression: Data Compression for
Modern Developers”, O’Reilly, 2016
2.Khalid Sayood: Introduction to Data Compression”, Morgan Kauffman Harcourt India,
Third Edition, 2010.
3.David Solomon, “Data Compression – The Complete Reference”, Fourth Edition, Springer
Verlog, New York, 2006.
4.Mark S. Drew, Ze-Nian Li, “Fundamentals of Multimedia”, PHI, 2009.
5.Raymond Westwater and BorkoFurht,” Real-time Video Compression: Techniques and
Algorithms”, Springer, 2013.
6.Yun Q.Shi, Huifang Sun, “Image and Video Compression for Multimedia Engineering,
Algorithms and Fundamentals”, CRC Press, 2003.
WEB RESOURCES:
1.https://www.analytixlabs.co.in/blog/data-compression-technique/
2.https://www.alibabacloud.com/knowledge/hot/digital-video-compression-techniques
IT626213 - REMOTE SENSING
Course Category: Programme L T P C
Course Type: Theory 3 0 0 3
Elective
COURSE OBJECTIVES:
To familiarize about the basic principles of remote sensing
To acquire knowledge about the motion of remote sensing satellites in the space
To expose the various types of sensors used for remote sensing
To gain knowledge about the generation of satellite data products
To extract useful information from satellite images
TOTAL: 45 PERIODS
COURSE OUTCOMES: At the end of the course, the student will be able to
CO1: Demonstrate an understanding of the theory of decisions and decision analysis
CO2: Demonstrate the different models used in the DSS
CO3: Design an information system using emerging tools and technologies for a given
business problem.
CO4: Describe the role of expert systems.
CO5: Illustrate the implementation, integration and impacts of Decision Support Systems
CO-PO MAPPING
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2
CO1 2 2 2 2 2 - - - - - - 2 - -
CO2 2 2 - - 2 - - - - - - 2 - -
CO3 2 2 2 - - - - - - - 2 - -
CO4 2 2 - - 2 - - - - - - 2 - -
CO5 2 2 2 2 2 - - - - - - 2 - -
1- low, 2 - medium, 3 - high, ‘-' no correlation
TEXT BOOKS:
1.Efraim Turban and Jay E Aronson, “Decision Support and Intelligent Systems”, Prentice
Hall, 9thEdition, 2010.
2.Elain Rich, Kevin Knight and Shivashankar B. Nair , “Artificial intelligence”, Tata
McGraw-Hill Publishing Company Limited, 3rd Edition, 2009.
Reference Books:
1.Daniel J. Power, “Decision Support Systems: Concepts and Resources for Managers”,
Greenwood Publishing Group, 1st Edition, 2002.
2.Quazi Khabeer, “Business Process Management and Decision Support Systems”, Alpha
Science International Limited, 1stEdition, 2013.
WEB RESOURCES:
1.https://www.researchgate.net/publication/277703502_Intelligent_Decision_Support_Syste
ms
2.https://www.intechopen.com/chapters/10951