BDBC Content
BDBC Content
BDBC Content
Tech in
Blockchain & Big Data
Elective 1 3-0-0-6
Elective 2 3-0-0-6
Elective 3 3-0-0-6
Minor Project 0-0-20-20
BLOCKCHAIN ELECTIVES
Course Objectives:
1. To provide an understanding of computer architecture, operating systems, and
computer networks
2. To develop skills in assembly language programming, control unit design, and
network configuration
3. To explore advanced concepts of distributed networked systems, such as
virtualization and fault tolerance
Course Outcomes:
TEXTBOOKS :
Course Objectives:
Course Outcomes:
1. Students will be able to analyze the complexity of an algorithm and make decisions
about which algorithms are best suited for a given problem.
2. Students will be able to design algorithms using a variety of techniques, including
backtracking, dynamic programming, and greedy algorithms, and apply them to
solve problems in various domains.
3. Students will be able to apply approximation algorithms to optimization problems,
and understand the tradeoffs between approximation quality and runtime.
4. Students will be able to implement and analyze algorithms using programming
languages such as Python and Java, and use this knowledge to develop and
evaluate algorithms for real-world applications.
TEXTBOOKS :
1. Thomas H Cormen, Charles E Lieserson, Ronald L Rivest and Clifford
Stein,Introduction to Algorithms, MIT Press, 2009.
2. Jon Kleinberg and Éva Tardos, Algorithm Design, Pearson, 2005.
3. David P. Williamson and David B. Shmoys, The Design of Approximation
Algorithms, Cambridge University Press, 2010.
4. Jeff Erickson, Algorithms, 2019.
Course Objectives:
Course Outcomes:
Introduction to Bitcoin
Bitcoin Protocol and Architecture
Byzantine Generals Problem and Fault Tolerance
Mining Mechanism and Incentives
Distributed Consensus and Merkle Trees
Transactions, Fees, and Anonymity in Bitcoin
Public and Private Blockchains
Double Spending Problem and Solutions
Privacy in Blockchains
Legal Considerations for Bitcoin and Cryptocurrencies
Text Books
1. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven
Goldfeder, Bitcoin and Cryptocurrency Technologies: A Comprehensive
Introduction, Princeton University Press, July 2016.
2. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology,
decentralization, and smart contracts explained”, 2nd Edition, Packt Publishing Ltd,
March 2018.
3. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction by Arvind
Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder,
Princeton University Press, 2016, ISBN 9780691171692
Course Objectives:
1. To emphasize the underlying principles of Relational Database Management
System.
2. To model and design advanced data models to handle threat issues and
countermeasures.
3. To implement and maintain the structured, semi-structured and unstructured data
in an efficient
4. database system using emerging trends.
Course outcomes:
1. Design and implement database depending on the business requirements and
considering various
2. design issues.
Select and construct appropriate parallel and distributed database architecture and
formulate the
3. cost of queries accordingly.
4. Understand the requirements of data and transaction management in mobile and
spatial database
5. and differentiate those with RDBMS.
Categorize and design the structured, semi-structured and unstructured
databases.
6. Characterize the database threats and its countermeasures.
7. Review cloud, streaming and graph databases.
8. Comprehend, design and query the database management system.
Lab(14 hours)
Experiment 1: Modeling a scenario into ER/EER Model using ERD Plus, ER Win, or
Oracle SQL developer.
Experiment 2: Creating applications with RDBMS
Experiment 3: Partitioning a database and comparing execution speed with/without
parallelism.
Experiment 4: Creating an XML document and validating it against an XML Schema/DTD.
Experiment 5: Representing football games results in XML, DTD, and XQuery.
Experiment 6: Implementing parallel join and parallel sort algorithms.
Experiment 7: Creating a distributed database scenario and fragmenting the database.
Experiment 8: Importing a spatial dataset into Postgresql (PostGIS) and querying the
database.
Experiment 9: Investigation of spatial analysis techniques using Toxic Release Inventory
data.
Experiment 10: Visualizing and interpreting results of sample datasets from the healthcare
domain.
TEXT BOOKS:
1. Avi Silberschatz, Hank Korth, and S.Sudarshan,”Database System Concepts”, 6th
Ed.McGraw Hill, 2010.
2. Ramez Elmasri B.Navathe: “Fundamentals of database systems”, 7th
edition,Addison Wesley,2014
REFERENCE BOOKS:
1. S.K.Singh, “Database Systems: Concepts, Design Applications”, 2nd
edition,Pearson education, 2011.
2. Joe Fawcett, Danny Ayers, Liam R. E. Quin: “Beginning XML”, Wiley India Private
Limited 5th Edition, 2012.
3. Thomas M. Connolly and Carolyn Begg “Database Systems: A Practical Approach
to Design, Implementation, and Management”, 6th edition, Pearson India, 2015
Course objectives:
Course outcomes:
1. Understand the concepts and principles of Big Data and its ecosystem.
2. Design and implement Big Data frameworks using distributed processing systems.
3. Apply various data storage and processing techniques for handling large-scale
datasets.
Experiments
1. Install and configure Hadoop, and develop a simple MapReduce program for word
count analysis.
2. Set up Apache Spark, create Resilient Distributed Datasets (RDDs), and write a
Spark application for data processing tasks.
3. Utilize Spark SQL and DataFrames to connect to databases, manipulate data, and
run SQL queries.
4. Explore Spark MLlib, implement a basic machine learning algorithm, and evaluate
its performance on a dataset.
5. Integrate Spark with visualization libraries to create insightful data visualizations.
6. Set up a cloud-based Hadoop or Spark environment, and deploy a sample big data
application.
7. Monitor and manage the deployed application using the cloud provider's
management console.
8. Gain proficiency in various aspects of big data processing, analysis, and
visualization using Hadoop and Spark frameworks.
REFERENCE BOOKS:
1. Mike Frampton, “Mastering Apache Spark”, Packt Publishing, 2015.
2. Tom White, “Hadoop: The Definitive Guide”, O’Reilly, 4th Edition, 2015.
3. Nick Pentreath, Machine Learning with Spark, Packt Publishing, 2015.
4. Mohammed Guller, Big Data Analytics with Spark, Apress, 2015
5. Donald Miner, Adam Shook, “Map Reduce Design Pattern”, O’Reilly, 2012
Course Name: Blockchain Credits: 3- Prerequisites: Fundamentals
No.: Components & Architecture 0-0-6 of Blockchain (Sem 1)
Course Objectives:
Course Outcomes:
1. Students will be able to explain the core concepts and components of blockchain
technology.
2. Students will be able to design and implement basic blockchain architectures and
understand the security and consensus mechanisms required for their
development.
3. Students will be able to analyze the use of blockchain in various sectors and
identify opportunities for its implementation.
4. Students will be able to develop secure cryptographic protocols on blockchain and
compare and contrast different blockchain ecosystems, such as Bitcoin,
Hyperledger, and Ethereum.
TEXT BOOKS:
1. "Blockchain Basics: A Non-Technical Introduction in 25 Steps" by Daniel Drescher,
Apress.
2. "Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money,
Business, and the World" by Don Tapscott and Alex Tapscott, Portfolio.
3. "The Basics of Bitcoins and Blockchains" by Antony Lewis, O'Reilly Media.
Course Objectives:
Course Outcomes:
1. Students will be able to describe the benefits and challenges of data virtualization
and how it differs from traditional data integration approaches.
2. Students will be able to create a virtual data layer using a popular data
virtualization tool and connect to various data sources, including relational
databases, big data systems, and cloud applications.
3. Students will be able to design effective dashboards using popular dashboard tools
and connect virtual data sources to create interactive visualizations.
4. Students will be able to identify and apply advanced techniques in data
virtualization and dashboard design, such as real-time data processing, self-
service analytics, and integration with big data platforms and blockchain.
TEXTBOOKS:
COURSE OBJECTIVES:
1. To understand the fundamentals of network and symmetric ciphers.
2. To apply asymmetric ciphers and data integrity algorithms.
3. To explore the basics of cryptocurrencies and use Ethereum programming
COURSE OUTCOMES:
Blockchain-based PKI
2-Factor authentication using blockchain
Blockchain-based DNS
Identity management
Blockchain-based DDoS protection
TEXT BOOKS
1. William Stallings, “Cryptography and Network security Principles and Practices”,
Pearson/PHI,2017.
2. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller and Steven
Goldfeder, “Bitcoin and Cryptocurrency Technologies: A Comprehensive
Introduction”, Princeton University Press, July, 2016.
REFERENCE BOOKS
1. William Stallings, Network Security Essentials (Applications and Standards),
Pearson Education, India,2017
2. Imran Bashir, “Mastering Blockchain: Distributed Ledger Technology,
Decentralization and Smart
3. Contracts Explained”, Second Edition, Packt Publishing, 2018.
E BOOKS
1. https://www.pearson.com/us/higher-education/product/Stallings-Cryptography-and-
Network-Security-
2. Principles-and-Practice-5th-Edition/9780136097044.html
3. https://www.lopp.net/pdf/princeton_bitcoin_book.pdf
4. https://www.blockchainexpert.uk/book/blockchain-book.pdf
MOOC
1. http://nptel.ac.in/courses/106105031/
SEMESTER 3
Course Objectives:
Summary Statistics
Correlation and Regression
Concept of R2 and Adjusted R2 and Partial and Multiple Correlation
Fitting of simple and Multiple Linear regression, Explanation and Assumptions of
Regression Diagnostics
Basic Concepts
Normal distribution-Area properties
Steps in tests of significance –large sample tests-Z tests for Means and
Proportions
Small sample tests –t-test for Means, F test for Equality of Variances, Chi-square
test for independence of Attributes
TEXT BOOKS:
1. Applied Statistics and Probability for Engineers , 6ed , (2016) ,Douglas C.
Montgomery George C. Runger, John Wiley & Sons
2. Time Series Analysis and Its Applications With R Examples (2017), by Shumway,
Robert H.,Stoffer, David S. Springer publications
REFERENCE BOOKS
1. Trevor Hastie and Robert Tibshirani , “The Elements of Statistical Learning: Data
Mining,
2. Inference, and Prediction”, Second Edition -Springer Series in Statistics, (2017.
3. Applications for Engineering and the Computing Sciences” Mcgraw Hill education,
2017.
SOURCE: https://chennai.vit.ac.in/files/M.Tech(CSE)-BigData_2021_2022.pdf
BLOCKCHAIN ELECTIVES:
Name: Blockchain
Course No.: Technologies: Credits: 3-0-0-6 Prerequisites: NIL
Platforms & Applications
Course Objectives:
Course Outcomes:
TEXTBOOKS/LEARNING RESOURCES:
1. Tom Serres, Bill Wagner and Bettina Warburg, Basics of Blockchain (1 ed.),
missing, 2019. ISBN 9781089919441.
Course Objectives:
1. Understand the basics of Blockchain Technology and its integration with Web
Development
2. Gain hands-on experience in developing blockchain-based web applications using
JavaScript and Python
3. Explore different server-side options and databases for building blockchain
applications
4. Learn about web security, continuous integration, and deployment of blockchain
applications on a production server.
Course Outcomes:
1. Ability to build blockchain-based web applications using JavaScript and Python
2. Understanding of server-side options and databases for building blockchain
applications
3. Proficiency in web security and deployment of blockchain applications on a
production server
4. Acquiring skills in using various web development tools and technologies for
building blockchain applications.
Web security basics for blockchain applications,Not trusting your clients for
blockchain applications
Why use HTTPS for blockchain applications,Integrating other software with the
server for blockchain applications
Developing frontend with React for blockchain applications
Concept of single-page applications for blockchain applications,Managing client-
side application state (Redux) for blockchain applications,Overview of other client
JS frameworks for blockchain applications
Development organization for blockchain applications
Using Git for blockchain application development
Concept of continuous integration for blockchain application development
Configuring a production web server with Ubuntu for blockchain applications
TEXTBOOKS/LEARNING RESOURCES:
Course Objectives:
Course Outcomes:
TEXTBOOKS:
1. "Blockchain and the Law: The Rule of Code" by Primavera De Filippi and Aaron
Wright, published by Harvard University Press.
2. “The Age of Cryptocurrency: How Bitcoin and Digital Money are Challenging the
Global Economic Order" by Paul Vigna and Michael Casey (St. Martin's Press,
2015)
3. "Blockchain Revolution: How the Technology Behind Bitcoin is Changing Money,
Business, and the World" by Don Tapscott and Alex Tapscott (Portfolio, 2016)
Course Objectives:
1. To understand the fundamentals of modern cryptography, including symmetric and
asymmetric ciphers, hash functions, and digital signatures.
2. To explore the mathematics behind modern cryptography, including modular
arithmetic, prime numbers, and finite fields.
3. To gain knowledge of widely-used cryptographic algorithms, including RSA, AES,
and SHA.
4. To learn about the practical application of cryptography in information security,
authentication, and data protection.
Course Outcomes:
Reference Textbooks:
Course Objectives:
Course Outcomes:
1. Students will be able to understand the purpose and potential of smart contracts in
various industries.
2. Students will be able to write smart contracts in Solidity and deploy them on the
Ethereum blockchain.
3. Students will be able to design and implement secure smart contracts, and avoid
common security issues.
4. Students will be able to apply best practices for auditing and testing smart
contracts.
TEXTBOOKS:
BIGDATA ELECTIVES
Course Objectives:
Course Outcomes:
Threat modeling and risk assessment for big data,Access control and
authentication mechanisms for big data systems
Data anonymization and privacy-preserving techniques for big data
Network security and data protection in distributed big data systems
Intrusion detection and prevention in big data environments,Best practices for
securing big data and compliance with data protection laws
Data modeling and schema design for security analysis in big data,Machine
learning and data mining techniques for security analysis in big data
Visualization and analytics tools for security analysis in big data,Data fusion and
correlation for security intelligence in big data
Case studies of security analysis in big data environments
Big data security testing and evaluation methodologies
Textbooks:
1. Big Data , Storage sharing and security , Fei Hu, CRC press
2. Privacy & Big data , by Mary E. Ludloff, Terence Craig. Released September 2011.
Publisher(s): O'Reilly Media, Inc.
Course Objectives:
Course Outcomes:
Textbooks:
Course Objectives:
Course Outcomes:
Course Outline:
Reference Textbooks:
Course Objectives:
Course Outcomes:
Students will apply data engineering concepts, principles, and tools to design and
implement a data pipeline and data warehousing solution for a real-world data
problem.
Textbook References: