Professional Documents
Culture Documents
Approved Syllabus - 6th Semester (2015-2019)
Approved Syllabus - 6th Semester (2015-2019)
Course Outcome: After completion of this course, students will be able to:
i) Apply artificial intelligence techniques, including search heuristics, knowledge representation, planning and
reasoning
ii) Describe the key components of the artificial intelligence (AI) field, search strategies.
iii) Compare minimax search and alpha-beta pruning in game playing.
iv) Describe and list the key aspects of planning in artificial intelligence.
v) Differentiate the key aspects of evolutionary computation, including genetic algorithms and genetic
programming.
vi) Describe the key aspects of machine learning.
vii) Design and implement appropriate solutions for search problems (such as playing two-person games) and for
planning problems (such as determining a sequence of actions for a robot).
NOTE: Eight questions are to be set in all by the examiners taking at least two questions from each unit.
Students will be required to attempt five questions in all selecting at least one question from each unit. Each
question shall carry equal marks.
Unit I
Introduction: Historical Foundation, The Turing Test, Overview of AI application area.
Problem r e p r e s e n t a t i o n : State space representation of problems, problem reduction
representation, Truth maintenance systems, AI Programming in PROLOG.
Unit II
Knowledge r e p r e s e n t a t i o n : Logical representation scheme, propositional and predicate
Calculus, syntax and semantic, inference rules, unification and resolution, procedural representation
scheme, production system, definition, different types of production system, network representation
scheme, semantic networks, conceptual graphs, conceptual dependencies. Structured representation
schema, scripts frames and objects.
Unit III
Strategies f o r state space search: Data driven and goal driven search, uninformed search, depth first,
breadth first, depth first search with iterative deepening, heuristic search, admissibility, monotonicity
and informed ness, heuristics in games, control of search.
Unit IV
Expert Systems: overview of expert system technology, expert system architecture, managing and
representing uncertainty in expert system, MYCIN, a case study, MYCIN’s knowledge base, MYCIN’s
control structure, knowledge acquisition, designing for explanation, tools for building expert systems.
Text Books:
1. Artificial Intelligence by George F . Luger, W i l l i a m A . Stubblefield, the Benjamin/Cummings
Publishing Company, Inc.
2. Introduction to artificial Intelligence and Expert System by Dan W. Patterson, PHI.
Reference Books:
1. Introduction to Artificial intelligence by Eugene Charniak, Drew McDermott Addison Wesley-2000.
2. Principles of Artificial Intelligence by Nils J. Nilsson, Narosa publishing House.
3. Introduction to Expert Systems by Jackson Peter, 3rd ed. (Addison Wesley-2000)
1
(For Batch 2015-2019)
Course Outcome: After completion of this course, students will be able to:
i. Driving the need for network security.
ii. Compare and contrast symmetric and asymmetric encryption systems and their vulnerability to
attack, and explain the characteristics of hybrid systems.
iii. Explain the role of third-party agents in the provision of authentication services.
iv. Understand the concept of malicious software and their counter measures.
v. Identify types of firewall implementation suitable for differing security requirements.
vi. Understand the working of SSL and SET protocol for E-Commerce applications.
NOTE: Eight questions are to be set in all by the examiners taking at least two questions from each unit.
Students will be required to attempt five questions in all selecting at least one question from each unit. Each
question shall carry equal marks.
Unit I
Introduction: Principal of Security, Basic Security Components, Security Threats.
Cryptography: Cryptosystem, Type of Cryptography, Cryptographic Principles, Substitution and
Transposition Ciphers, Block Cipher, Cipher Block, Cipher Modes of Operation, Stream Cipher. Secret-Key
Algorithms: DES, Breaking DES, AES.
Public-Key Algorithms RSA.
Unit II
Authentication Protocols: Digital Signatures, Message Digest, MD5, SHA , HMAC, PKI, KDC protocols,
Diffie-Hellman Key Exchange, Needham Schroeder protocol, Passwords- Technology and Administration,
Kerberos, PGP, S/MIME, IPsec, VPN
Unit III
Operating System Security: Access Control, Security Models: Introduction to Discretionary v/s Mandatory
Access Control, Bell-La-Padula model, Biba model, Chinese Wall model.
Malicious Code: Malicious software and its types, Life cycle of a Computer Virus, Virus Countermeasures,
TCP/IP Vulnerabilities, DoS and DDoS Attacks.
Unit IV
Firewall: Types of Firewall, Design Principal of Firewall, Firewall Limitation, DMZ.
Intrusion Detection System (IDS): IDS Models, IDS Architecture.
Internet Security: Secure Socket Layer (SSL), Secure Electronic Transaction (SET), 3-D secure protocol.
Text Books:
1. Network Security Architectures by Sean Convery, Published by Cisco Press, 2004.
2. Cryptography and Network Security by William Stalling, Pearson Education.
3. Security in Computing by Charels P. Pfleeger, Prentice Hall.
4. Inside Internet Security by Jeff Crume, Addison Wesley.
Reference Books:
1. Network security by Richard H. Baker, Mcgraw Hill International, 1996.
2. Applied Cryptography by B. Schneier, John Wiley, New York, 1996.
3. Network security by C. Kaufman, Prentice Hall International, 1998.
2
(For Batch 2015-2019)
Subject Code: CO 336 L T P C
Subject Name: Cloud Computing 3 - - 3.0
Time: 3Hrs. External Marks: 60 Internal Marks: 40 Total Marks: 100
Course Outcome: After completion of this course, students will be able to:
i) Understanding the systems, protocols and mechanisms to support cloud computing
ii) Develop applications for cloud computing
iii) Understanding the hardware necessary for cloud computing
iv) Define cloud computing and related concepts.
v) Understand the key dimensions of the challenges of Cloud Computing
vi) Understand the assessment of the economics , financial, and technological implications for selecting cloud
computing for an organization
vii) Describe the benefits of cloud computing.
NOTE: Eight questions are to be set in all by the examiners taking at least two questions from each unit.
Students will be required to attempt five questions in all selecting at least one question from each unit. Each
question shall carry equal marks.
Unit I
Overview of Cloud Computing: Brief history and evolution, History of Cloud Computing, Evolution of Cloud
Computing, Traditional Vs. cloud Computing, Why Cloud Computing, Cloud Service Models (IaaS, PaaS & SaaS),
Cloud Deployment Models (Public, Private, Hybrid and Community Cloud), Benefits and Challenges of Cloud
Computing.
Working with Private Cloud: Basics of Virtualization, Virtualization technologies, Server Virtualization, VM
Migration techniques, Role of Virtualization in Cloud Computing, Business cases for the need of Cloud Computing
environment, Private Cloud Definition, Characteristics of Private Cloud, Private Cloud Deployment Models, Private
Cloud Vendors, Private Cloud Building Blocks namely Physical Layer, Virtualization Layer, Cloud Management
Layer, Challenges to private Cloud, Virtual Private Cloud, Implementing Private Cloud ( one out of CloudStack,
OpenStack, Eucalyptus, IBM or Microsoft).
Unit II
Working with Public Clouds: What is Public Cloud, Why Public Cloud, When to opt for Public Cloud, Public Cloud
Service Models, and Public Cloud Players, Infrastructure as a Service Offerings, IaaS Vendors, PaaS Offerings, PaaS
vendors, Software as a Service, Implementing Public Cloud ( one out of AWS, Windows Azure, IBM or Rackspace).
Unit III
Overview of Cloud Security: Explain the security concerns in Traditional IT, Introduce challenges in Cloud
Computing in terms of Application Security and Network security, Security reference Model, Abuse and Nefarious
Use of Cloud Computing, Insecure Interfaces and APIs, Malicious Insiders, Shared Technology Issues, Data loss or
Leakage, account or Service Hijacking, Unknown Risk Profile, Introduce the different vendors offering Cloud Security
for Public and private clouds.
Overview of Multi-Cloud Management Systems: Explain concept of multi-cloud management, Challenges in
managing heterogeneous clouds, benefits and advantages of multi-cloud management systems, Implementing Multi-
Cloud Management System ( i.e. RightScale Cloud Management System).
Unit IV
Business Clouds: Cloud Computing in Business, Various Biz Clouds focused on industry domains (Retail, Banking
and Financial sector, Life Sciences, Social Networking, Telecom, Education), Cloud Enablers (Business Intelligence
on cloud, Big Data Analytics on cloud).
Future directions in Cloud Computing: Future technology trends in Cloud Computing with a focus on Cloud service
models, deployment models, cloud applications and cloud security, Migration paths for cloud, Selection criteria for
cloud deployment, Current issues in cloud computing leading to future research directions.
Text Books:
1. Cloud Computing: Principles and paradigms by Raj Kumar Buyya, James Broberg, Andrezei M. Goscinski.
2. Cloud Computing by Michael Miller, 2008.
3. Cloud Computing for dummies by Judith Hurwitz, Robin Bllor, Marcia Kaufman, Fern Halper, 2009.
4. Cloud Computing: A Practical Approach by Anthony T. Velte, Toby J. Velte and Robert Elsenpeter, McGraw Hill.
5. Handbook of Cloud Computing by Borko Furht, Armando Escalante (Editors), Springer, 2010.
3
Reference Books:
1. Cloud Computing: Implementation, management and security by Rittinghouse, John, W.
2. Cloud Computing Bible by Barrie Sosinsky, Wiley, 2011.
3. Cloud Computing Architected: Solution Design Handbook by Rhoton, John.
4. Cloud Security, a Comprehensive Guide to Secure Cloud Computing by Krutz, Ronald L. : Vines, Russell Dean.
4
(For Batch 2015-2019)
Unit I
Radio Propagation Characteristics, Models for Path loss, Shadowing & Multipath fading-delay spread,
Coherence bandwidth, Coherence Time, Doppler Spread Jake’s Channel model.
Unit II
Digital Modulation for Mobile radio, Analysis under fading channel, diversity techniques and Rake
demodulator. Introduction to Spread Spectrum Communication Multiple Access Techniques used in
Mobile Wireless Communications: FDMA/TDMA/CDMA.
Unit III
The Cellular concept, Frequency Reuse basic theory of hexagonal cell layout, spectrum efficiency,
FDM/TDM, Cellular System, channel allocation schemes, Handover Analysis, cellular CDMA, Soft
capacity, Erlang capacity comparison.
Unit IV
Wireless standards-GSM, IS-95, UMTS-IMT-2000, Signaling, Call Control, Mobility Management and
location Tracing.
5
(For Batch 2015-2019)
Unit I
Digital Data: Types of Digital Data, Structured, Semi-Structured, Unstructured.
Big Data: Introduction to Big Data Platform, Challenges of Conventional Systems, Big Data Analytics, Analytics 1.0,
Analytics 2.0, Analytics 3.0, Traditional BI Vs Big Data Environment, Big Data technology Landscape, NoSQL
Databases, NoSQL Vs RDBMS, New SQL.
Unit II
Streams Concepts: Stream Data Model and Architecture, Stream Computing, Sampling Data in a Stream,
Filtering Streams, Counting Distinct Elements in a Stream.
Hadoop: History of Hadoop, Hadoop 1.0 Vs Hadoop 2.0, The Hadoop Distributed File System, Components
of Hadoop, Analyzing the Data with Hadoop.
Unit III
Setting up a Hadoop Cluster: Cluster specification, Cluster Setup and Installation, Hadoop Configuration,
Security in Hadoop, Administering Hadoop, HDFS, Monitoring & Maintenance Hadoop, Benchmarks
Hadoop in the cloud.
Unit IV
Interacting with Hadoop Eco System: Hive, Pig, HBASE, Sqoop, Business Intelligence on Hadoop.
Text Books:
1. Hadoop: The Definitive Guide by Tom White, 3rd ed., O’reilly Media, 2012.
2. Understanding Big Data: Analytics for Enterprise Class Hadoop and Streaming Data by Chris Eaton,
Dirk DeRoos, Tom Deutsch, George Lapis, Paul Zikopoulos, McGraw-Hill Publishing, 2012.
Reference Books:
1. Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced
Analytics by Bill Franks, John Wiley & Sons.
2. Making Sense of Data by Glenn J. Myatt, John Wiley & Sons.
3. Big Data Glossary by Pete Warden, O’Reilly, 2011.
6
(For Batch 2015-2019)
Unit I
Introduction: Terminology, design for testability, objectives, principles, purpose of testing.
Testing Limitations: Theoretical foundations, impracticality of testing all data, impracticality of testing all paths, No
absolute proof of correctness.
Role of V&V in Software Evolution: Types of Products, requirements, specifications, designs,
implementations, changes, V&V objectives, correctness, consistency, necessity, sufficiency, performance.
Unit II
Testing Techniques and Strategies: Software technical reviews, Software testing, Levels of testing- module,
integration, system, regression, Testing techniques and their applicability-functional testing and analysis, structural
testing and analysis, error-oriented testing and analysis, hybrid approaches, integration strategies, transaction flow
analysis, stress analysis, failure analysis, concurrency analysis, performance analysis.
Unit III
Flow Graphs and Path Testing: Path Testing Basics, Path Predicates, Application of Path Testing.
Transaction Flow Testing: Generalizations, Transaction Flows, Transaction-Flow testing techniques,
Implementation Comments.
Data Flow Testing: Basics, Data flow model, Data flow testing strategies, Applications.
Unit IV
Software Testing and Regular Expression: Path products, path sums, Loops, Reduction procedure,
Applications, Approximate number of paths, The mean processing time of any routine, Regular expression and
Flow-anomaly detection, Formal language and its use for software testing.
7
(For Batch 2015-2019)
Course Outcome: After completion of this course, students will be able to:
i) Learn and understand line and screen text editors with regular expressions.
ii) Explain Unix file system including advanced file processing and practice pipelining and IO
redirecting.
iii) Learn to write complex shell scripts and cooperating processes.
iv) Learn and understand the installation and configuration of a Linux system.
v) Learn to manage user accounts, file systems, networking and system logs on Linux platform.
vi) Understand the integration of Linux with other operating environments
NOTE: Eight questions are to be set in all by the examiners taking at least two questions from each
unit. Students will be required to attempt five questions in all selecting at least one question
from each unit. Each question shall carry equal marks.
Unit I
UNIX Startup: User accounts, Accessing, starting and shutting processes, Logging in and Logging out,
Command line, Simple commands
Shell Programming: Unix file system, Unix files, i-nodes and structure and file system related commands, Shell as
command processor, Shell variables, Creating command substitution, Scripts, Functions, Conditionals,
Loops, Customizing environment
Unit II
Regular Expressions and Filters: Introducing regular expressions patterns, Syntax, Character classes,
Quantifiers, Introduction to egrep, sed, Programming with awk and perl.
Unit III
The C Environment: The C compiler, vi editor, Compiler options, Managing projects, Memory management, Use
of makefiles, Dependency calculations, Memory management - dynamic and static memory, Building and using
static and dynamic libraries, Using ldd, soname, Dynamic loader, Debugging with gdb.
Unit IV
Processes in Linux: Processes, Starting and stopping processes, Initialization processes, rc and init files, Job
control - at, batch, cron, time, Network files, Security, Privileges, Authentication, Password administration,
Archiving, Signals and signal handlers, Linux I/O system.
Text Books:
1. Linux Programming Bible by John Goerzen, IDG Books, New Delhi, 2000.
2. Your Unix - The Ultimate Guide by Sumitabha Das, TMH, 2000.
Reference Books:
1 . Professional Linux Programming by Mathew, vol. l & 2, Wrox-Shroff, 2001.
2. R u n n i n g L i n u x b y Welsh & Kaufmann, O'Reiley & Associates, 2000.
9
(For Batch 2015-2019)
NOTE: Eight questions are to be set in all by the examiners taking at least two questions from each unit.
Students will be required to attempt five questions in all selecting at least one question from each unit. Each
question shall carry equal marks.
Unit I
Basic of Python: features, history and version of python, application of pythons, The basic elements of
python, installation steps of python, variables, keywords, identifiers, literals, operators, comments, decision
making, branching programs, control structures, loops, break and continue statements, numbers, strings.
Python Lists: Accessing, Updating, Delete, Basic List Operations, Indexing, Slicing and Matrixes, Built-in
List Functions & Methods.
Unit II
Pythons Tuples: Accessing, Updating, Deleting, Basic tuples Operations, Indexing, Slicing and Matrixes,
Built-in tuple Functions & Methods, No Enclosing Delimiters. Python Dictionary: Accessing, Updating,
Deleting, Properties of Dictionary Keys, Built-in Dictionary Functions & Methods.
Date and time: time tuple, time module, calendar module.
Python functions, Modules, file input and output.
Unit III
Exceptions Handling: Standard Exceptions, Assertions in Python, Handling an Exception, The try-finally
Clause, User-Defined Exceptions.
Object Oriented: Object, Class, Attribute, Destroying Objects (Garbage Collection), Class Inheritance,
Overriding Methods, Base Overloading Methods, Overloading Operators, Data Hiding.
Regular Expressions: Matching versus Searching, Search and Replace, Regular Expression Patterns.
Unit IV
CGI Programming: Web Browsing, CGI Architecture Diagram, CGI Architecture Diagram, passing
information using GET and POST method, cookies, file uploading, Dialog box.
MYSQL Database Access: Create, Insert, Delete and update data into database, Commit and rollback
operation in database.
Network Programming: Client and Server socket programming.
Multithreading in python, XML Processing, GUI Programming (Tkinter)
Text Books:
1. John V Guttag, Introduction to Computation and Programming Using Python, Prentice Hall of India
2. R. Nageswara Rao, Core Python Programming, Dreamtech.
3. Wesley J. Chun, Core Python Programming, 2nd ed., Prentice Hall.
Reference Books:
1. Michael T. Goodrich, Roberto Tamassia, Michael H. Goldwasser, Data Structures and Algorithms in
Pyhon, Wiley.
2. Kenneth A. Lambert, Fundamentals of Python–First Programs, CENGAGE Publication.
3. Luke Sneeringer, Professional Python, Wrox.
10
(For Batch 2015-2019)
Time: 3 Hrs. External Marks: 60, Internal Marks: 40, Total Marks: 100
Course Outcome: After completion of this course, students will be able to:
i. Able to understand the concept of IP addressing i.e. CLSM and CIDR.
ii. Configure and Test the working of routing protocol.
iii. Understand the concept of VLAN and Inter-VLAN routing.
iv. Ability to understand the concept of wireless network and WAN Standard.
v. Install, operate and troubleshoot a small to medium size enterprise branch network with switching
technologies.
NOTE: Eight questions are to be set in all by the examiners taking at least two questions from each unit.
Students will be required to attempt five questions in all selecting at least one question from each unit. Each
question shall carry equal marks.
Unit I
Open System Interconnection (OSI) reference model, IP Protocol: IPv4 Header Format, Convert IP
addresses between decimal and binary. Default mask, subnet mask. Subnetting using Variable-Length
Subnet Mask (VLSM) and Classless Inter Domain Routing (CIDR), IP Forwarding, IPv6
Unit II
Introduction to Routing and Packet Forwarding, Static Routing, default static routes, Dynamic Routing
Protocols, Distance Vector Routing Administrative distances, Network discovery, Routing table
maintenance, Routing loops, RIP version 1, RIP version 2, EIGRP, Link State Routing Protocols: OSPF.
Unit III
LAN Architecture, Principle of Hierarchical Network Design, Functions of LAN Switches, IEEE802.3:
Design Issues, CSMA/CD, Switching and its types, VLAN: Types of VLAN, VLAN Trunking: Operations
and Trunking modes, Inter-VLAN Routing: implementation of Inter-VLAN routing using multilayer switch
and router on a stick.
Unit IV
Wireless LAN: Significance of WLAN, WLAN Architecture & Services, WLAN Infrastructure components,
Wireless LAN Topologies WLAN Standards: IEEE 802.11
Introduction to WAN: PPP: Architecture, Frame Structure, Management of PPP session, PPP Authentication
protocol, Frame Relay: Introduction, Virtual Circuits, Encapsulation, Topologies, Address Mapping.
11
(For Batch 2015-2019)
NOTE: Eight questions are to be set in all by the examiners taking at least two questions from each unit.
Students will be required to attempt five questions in all selecting at least one question from each unit. Each
question shall carry equal marks.
Unit I
Introduction and Concepts: Networks and Commercial Transactions, Internet and other novelties,
networks and electronic transactions today, Model for commercial transactions, Internet environment,
Internet advantage, Worlds Wide Web and other Internet Sales venues, Online commerce solutions.
ERP-an Enterprise Perspective: Production finance, Personnel disciplines and their relationships, Transiting
environment, MIS Integration for disciplines, Information / workflow, Network Structure, Client Server Integrator
System, Virtual Enterprise.
Unit II
ERP Resource Management Perspective: Functional and Process of Resource, Management, Introduction to basic
Modules of ERP System, HRD, Personnel Management, Training and Development, Skill Inventory, Material
Planning and Control, Inventory, Forecasting, Manufacturing, Production Planning, Production Scheduling,
Production Control, Sales and Distributions, Finance, Resource Management in global scenario.
Unit III
ERP Information System Perspective: Functional to OLAP (Online Analysis and Processing), TP, OAS,
KBS, MRP, BPR, SCM, REP, CRM and Information Communication Technology.
Unit IV
ERP Key Managerial Issues: Concept Selling, IT Infrastructure, Implication of ERP System on business
organization, Critical success factors in ERP System, ERP culture implementation issues, resistance to
change, ERP Selection issues, Return on Investment, Pre and post implementation issues.
Text Books:
1. Frontiers of Electronics Commerce by Ravi lalakota, Andrew Whinston, Addison Wesley.
2. Enterprise Resource Planning Concepts and practice by V.K. Garg and N.K. Venkita Krishna, PHI.
3. Enterprise Resource Planning by Ravi Shankar & S. Jaiswal, Galgotia.
Reference Books:
1. Enterprise Resource Planning by Alexis Leon, Second Edition, TMH.
2. ERP text & Cases by Rajesh Ray, TMH.
12
(For Batch 2015-2019)
Course Outcome: After completion of this course, students will be able to:
i. Learn and understand the terminology related to mobile application development
ii. Understand how Android applications work, their life cycle, manifest, Intents, and using external
resources
iii. Explain the differences between Android and other mobile development environments
iv. Learn to utilize the power of background services, threads, and notifications.
v. Learn to use Android's communication APIs for SMS, telephony, network management, and internet
resources (HTTP).
vi. Learn to build the Android applications
vii. Learn to secure, tune, package, and deploy Android applications.
NOTE: Eight questions are to be set in all by the examiners taking at least two questions from each unit.
Students will be required to attempt five questions in all selecting at least one question from each unit. Each
question shall carry equal marks.
Unit I
Getting started with Mobility: Mobility landscape, Introduction to mobile devices and mobile platforms,
Mobile app development, Overview of Android platform, Setting up the mobile app development
environment along with an emulators, A case study on Mobile app development.
Unit II
Building blocks of mobile apps: App user interface designing – Mobile UI resources (Layout, UI elements,
Draw-able, Menu), Activity-states and life cycle, Interaction amongst activities.
App functionality beyond user interface: Threads, Async task, Services- states and life cycle, Notifications,
Broadcast receivers, Telephony and SMS APIs.
Native data handling: on device file I/O, shared preferences, Mobile database such as SQLite, and enterprise
data access (via internet/intranet).
Unit III
Sprucing up mobile apps: Graphics and animations- custom views, Canvas, Animation APIs, Multimedia-
audio/video playback and record, Location awareness and native hardware access (Sensors such as
accelerometer and gyroscope).
Unit IV
Testing Mobile Apps: Debugging mobile application, White box testing, black box testing and test
automation of mobile apps using JUnit for android, Robotium and MonkeyTalk.
Taking apps to Market: Versioning, signing and packaging mobile apps, Distributing apps on mobile market
place.
Text Books:
1. Composing Mobile Apps: Learn, Explore, Apply Using Android by Anubhav Pradhan and Anil V.
Deshpande, Wiley India, 1st Edition.
2. Mobile Applications: Architecture, Design, and Development by Valentino Lee and Heather Schneider,
Hewlett-Packard Professional Books, 2004.
Reference Books:
1. Android Application Development All-in-one for Dummies by Barry Burd, Wiley, 1st Edition.
2. Teach Yourself Android application Development in 24 Hours by Carmen Delessio and Lauren Darcey,
SAMS Publication 3rd Edition.
13
(For Batch 2015-2019)
The students are required to develop a project during semester and final evaluation will be entirely based
upon his/her project work.
14