Professional Documents
Culture Documents
UG 4-1 R19 CSE Syllabus
UG 4-1 R19 CSE Syllabus
2019-20
IV Year – II SEMESTER
UNIT V
Bayesian Learning: Probability theory and Bayes rule. Naive Bayes learning algorithm.
Parameter smoothing. Generative vs. discriminative training. Logisitic regression. Bayes nets
and Markov nets for representing dependencies.
Instance-Based Learning: Constructing explicit generalizations versus comparing to past specific
examples. k-Nearest-neighbor algorithm. Case-based learning.
Text Books:
1) T.M. Mitchell, “Machine Learning”, McGraw-Hill, 1997.
2) Machine Learning, Saikat Dutt, Subramanian Chandramouli, Amit Kumar Das, Pearson,
2019.
Reference Books:
1) Ethern Alpaydin, “Introduction to Machine Learning”, MIT Press, 2004.
2) Stephen Marsland, “Machine Learning -An Algorithmic Perspective”, Second Edition,
Chapman and Hall/CRC Machine Learning and Pattern Recognition Series, 2014.
3) Andreas C. Müller and Sarah Guido “Introduction to Machine Learning with Python: A
Guide for Data Scientists”, Oreilly.
e-Resources:
1) Andrew Ng, “Machine Learning Yearning” https://www.deeplearning.ai/machine-learning-
yearning/
2) Shai Shalev-Shwartz , Shai Ben-David, “Understanding Machine Learning: From Theory
to Algorithms” , Cambridge University Press
https://www.cse.huji.ac.il/~shais/UnderstandingMachineLearning/index.html
R-19 Syllabus for CSE. JNTUK w. e. f. 2019-20
L T P C
IV Year –I SEMESTER
3 0 0 3
Open Elective –II
Note: The student has to take any one open elective course offered in the other departments (or)
SWAYAM/NPTEL courses offered by other than parent department. (12 week minimum).
Given below are some of the courses offered by NPTEL/SWAYAM
UNIT V
Mobile Wireless Short Range Networks and Mobile Internet: Wireless networking and wireless
LAN, Wireless LAN (WLAN) architecture, IEEE 802.11protocol layers, Wireless application
protocol (WAP)-WAP1.1 architecture, wireless datagram protocol (WDP), Wireless Transport
Layer Security (WTLS), wireless transaction and session layers, wireless application
environment.
Text Books:
1) Mobile Computing, 2nd edition, Raj kamal, Oxford,2011
2) Mobile Computing, Technology Applications and Service Creation, 2 nd Edition, Asoke K
Talukder, Hasanahmed, Roopa R Yavagal, McGraw Hill,2017
Reference Books:
1) “Principles of Mobile Computing,” 2nd Edition, UWE Hansmann, Lother Merk, Martin S.
Nocklous, Thomas Stober, Springer.2003
e-Resources:
1) https://nptel.ac.in/noc/courses/noc16/SEM2/noc16-cs13/
R-19 Syllabus for CSE. JNTUK w. e. f. 2019-20
UNIT IV
Machine Learning: Modeling, Overfitting and Underfitting, Correctness, The Bias-Variance
Tradeoff, Feature Extraction and Selection, k-Nearest Neighbors, Naive Bayes, Simple Linear
Regression, Multiple Regression, Digression, Logistic Regression
UNIT V
Clustering: The Idea, The Model, Choosing k, Bottom-Up Hierarchical Clustering.
Recommender Systems: Manual Curation, Recommending What’s Popular, User-Based
Collaborative Filtering, Item-Based Collaborative Filtering, Matrix Factorization
Data Ethics, Building Bad Data Products, Trading Off Accuracy and Fairness, Collaboration,
Interpretability, Recommendations, Biased Data, Data Protection
IPython, Mathematics, NumPy, pandas, scikit-learn, Visualization, R
Textbooks:
1) Joel Grus, “Data Science From Scratch”, OReilly.
2) Allen B.Downey, “Think Stats”, OReilly.
Reference Books:
1) Doing Data Science: Straight Talk From The Frontline, 1st Edition, Cathy O’Neil and
Rachel Schutt, O’Reilly, 2013
2) Mining of Massive Datasets, 2nd Edition, Jure Leskovek, Anand Rajaraman and Jeffrey
Ullman, v2.1, Cambridge University Press, 2014
3) “The Art of Data Science”, 1st Edition, Roger D. Peng and Elizabeth matsui, Lean
Publications, 2015
4) “Algorithms for Data Science”, 1st Edition, Steele, Brian, Chandler, John, Reddy,
Swarna, springers Publications, 2016
e-Resources:
1) https://github.com/joelgrus/data-science-from-scratch
2) https://github.com/donnemartin/data-science-ipython-notebooks
3) https://github.com/academic/awesome-datascience
R-19 Syllabus for CSE. JNTUK w. e. f. 2019-20
UNIT I
XML technology family : XML, benefits, Advantages of XML over HTML, EDI, Databases,
XML based standards, Structuring with schemas, DTD, XML Schemas, XML processing, DOM,
SAX, presentation technologies, XSL, XFORMS, XHTML, Transformation, XSLT, XLINK,
XPATH, XQuery.
UNIT II
Architecting Web Services: Business motivations for web services, B2B, B2C, Technical
motivations, limitations of CORBA and DCOM, Service-oriented Architecture (SOA),
Architecting web services, Implementation view, web services technology stack, logical view,
composition of web services, deployment view, from application server to peer to peer, process
view, life in the runtime.
UNIT III
Web Services Building Blocks: Transport protocols for web services, messaging with web
services, protocols, SOAP, describing web services, WSDL, Anatomy of WSDL, manipulating
WSDL, web service policy, Discovering web services, UDDI, Anatomy of UDDI, Web service
inspection, Ad-Hoc Discovery, Securing web services.
UNIT IV
Implementing XML in E-Business: B2B – B2C Applications, Different types of B2B interaction,
Components of e-business XML systems, ebXML, RosettaNet, Applied XML in vertical
industry, web services for mobile devices.
UNIT V
XML Content Management and Security: Semantic Web, Role of Meta data in web content,
Resource Description Framework, RDF schema, Architecture of semantic web, content
management workflow, XLANG, WSFL, Securing web services.
Text Books:
1) Ron Schmelzer et al. “ XML and Web Services”, Pearson Education, 2002.
Reference Books:
1) Keith Ballinger, “. NET Web Services Architecture and Implementation”, Pearson
Education, 2003.
2) David Chappell, “Understanding .NET A Tutorial and Analysis”, Addison Wesley, 2002.
3) Kennard Scibner and Mark C.Stiver, “ Understanding SOAP”, SAMS publishing.
R-19 Syllabus for CSE. JNTUK w. e. f. 2019-20
L T P C
IV Year –I Semester
3 0 0 3
CYBER SECURITY & FORENSICS
Course Objectives:
x Able to identify security risks and take preventive steps
x To understand the forensics fundamentals
x To understand the evidence capturing process
x To understand the preservation of digital evidence
Course Outcomes:
At the end of the course, student will be able to
x Enumerate the computer forensics fundamentals
x Describe the types of computer forensics technology
x Analyze various computer forensics systems
x Illustrate the methods for data recovery, evidence collection and data seizure
x Identify the Role of CERT-In Security
UNIT I
Introduction to Cybercrime: Introduction, Cybercrime: Definition and Origins of the Word,
Cybercrime and Information Security, Cybercriminals, Classifications of
Cybercrime, Cyberstalking, Cybercafe and Cybercrimes, Botnets. Attack Vector, Proliferation of
Mobile and Wireless Devices, Security Challenges Posed by Mobile Devices, Attacks on
Mobile/Cell Phones, Network and Computer Attacks.
UNIT II
Tools and Methods : Proxy Servers and Anonymizers, Phishing, Password Cracking, Keyloggers
and Spywares,Virus and Worms, Trojan Horses and Backdoors, Steganography, Sniffers,
Spoofing, Session Hijacking Buffer over flow, DoS and DDoS Attacks, SQL Injection, Buffer
Overflow, Attacks on Wireless Networks, Identity Theft (ID Theft), Foot Printing and Social
Engineering, Port Scanning, Enumeration.
UNIT III
Cyber Crime Investigation: Introduction, Investigation Tools, eDiscovery, Digital Evidence
Collection, Evidence Preservation, E-Mail Investigation, E-Mail Tracking, IP Tracking, E-Mail
Recovery, Hands on Case Studies. Encryption and Decryption Methods, Search and Seizure of
Computers, Recovering Deleted Evidences, Password Cracking.
UNIT IV
Computer Forensics and Investigations: Understanding Computer Forensics, Preparing for
Computer Investigations. Current Computer Forensics Tools: Evaluating Computer Forensics
Tools, Computer Forensics Software Tools, Computer Forensics Hardware Tools, Validating and
Testing Forensics Software, Face, Iris and Fingerprint Recognition, Audio Video Analysis,
Windows System Forensics, Linux System Forensics, Graphics and Network Forensics, E-mail
Investigations, Cell Phone and Mobile Device Forensics.
UNIT V
Cyber Crime Legal Perspectives: Introduction, Cybercrime and the Legal Landscape around the
World, The Indian IT Act, Challenges to Indian Law and Cybercrime Scenario in India,
Consequences of Not Addressing the Weakness in Information Technology Act, Digital
R-19 Syllabus for CSE. JNTUK w. e. f. 2019-20
L T P C
IV Year –I Semester
0 0 2 1
UML LAB
Course Objectives:
x To know the practical issues of the different object oriented analysis and design concepts
x Inculcate the art of object oriented software analysis and design
x Apply forward and reverse engineering of a software system
x Carry out the analysis and design of a system in an object oriented way
Course Outcomes:
At the end of the course, student will be able to
x Know the syntax of different UML diagrams
x Create use case documents that capture requirements for a software system
x Create class diagrams that model both the domain model and design model of a software
system
x Create interaction diagrams that model the dynamic aspects of a software system
x Write code that builds a software system
x Develop simple applications
Note: For performing the experiments consider any case study (ATM/ Banking / Library
/Hospital management systems)
Experiment 1:
Familiarization with Rational Rose or Umbrella environment
Experiment 2:
a) Identify and analyze events
b) Identify Use cases
c) Develop event table
Experiment 3:
a) Identify & analyze domain classes
b) Represent use cases and a domain class diagram using Rational Rose
c) Develop CRUD matrix to represent relationships between use cases and problem domain
classes
Experiment 4:
a) Develop Use case diagrams
b) Develop elaborate Use case descriptions & scenarios
c) Develop prototypes (without functionality)
Experiment 5:
a) Develop system sequence diagrams and high-level sequence diagrams for each use case
b) Identify MVC classes / objects for each use case
c) Develop Detailed Sequence Diagrams / Communication diagrams for each use case showing
interactions among all the three-layer objects
Experiment 6:
a) Develop detailed design class model (use GRASP patterns for responsibility assignment)
b) Develop three-layer package diagrams for each case study
R-19 Syllabus for CSE. JNTUK w. e. f. 2019-20
Note: The marks are awarded based on: Selection of Area, Defining the problem, Submission of
the Abstract and Presentation of seminar.
R-19 Syllabus for CSE. JNTUK w. e. f. 2019-20
L T P C
IV Year –I Semester
3 0 0 0
IPR & PATENTS
Course Objectives:
x To know the importance of Intellectual property rights, which plays a vital role in
advanced Technical and Scientific disciplines
x Imparting IPR protections and regulations for further advancement, so that the students
can familiarize with the latest developments
Course Outcomes:
x IPR Laws and patents pave the way for innovative ideas which are instrumental for
inventions to seek Patents
x Student get an insight on Copyrights, Patents and Software patents which are instrumental
for further advancements
UNIT I
Introduction to Intellectual Property Rights (IPR): Concept of Property - Introduction to IPR –
International Instruments and IPR - WIPO - TRIPS – WTO -Laws Relating to IPR - IPR Tool
Kit - Protection and Regulation - Copyrights and Neighboring Rights – Industrial Property –
Patents - Agencies for IPR Registration – Traditional Knowledge –Emerging Areas of IPR -
Layout Designs and Integrated Circuits – Use and Misuse of Intellectual Property Rights.
UNIT II
Copyrights and Neighboring Rights: Introduction to Copyrights – Principles of Copyright
Protection – Law Relating to Copyrights - Subject Matters of Copyright – Copyright Ownership
– Transfer and Duration – Right to Prepare Derivative Works –Rights of Distribution – Rights of
Performers – Copyright Registration – Limitations – Infringement of Copyright – Relief and
Remedy – Case Law - Semiconductor Chip Protection Act.
UNIT III
Patents: Introduction to Patents - Laws Relating to Patents in India – Patent Requirements –
Product Patent and Process Patent - Patent Search - Patent Registration and Granting of Patent -
Exclusive Rights – Limitations - Ownership and Transfer –– Revocation of Patent – Patent
Appellate Board - Infringement of Patent – Compulsory Licensing –– Patent Cooperation Treaty
– New developments in Patents – Software Protection and Computer related Innovations
UNIT IV
Trademarks: Introduction to Trademarks – Laws Relating to Trademarks – Functions of
Trademark – Distinction between Trademark and Property Mark – Marks Covered under
Trademark Law - Trade Mark Registration – Trade Mark Maintenance – Transfer of rights -
Deceptive Similarities
Likelihood of Confusion - Dilution of Ownership – Trademarks Claims and Infringement –
Remedies – Passing Off Action.
UNIT V
Trade Secrets & Cyber Law and Cyber Crime: Introduction to Trade Secrets – General Principles
- Laws Relating to Trade Secrets – Maintaining Trade Secret – Physical Security – Employee
Access Limitation – Employee Confidentiality Agreements – Breach of Contract –Law of
R-19 Syllabus for CSE. JNTUK w. e. f. 2019-20