BSC CS 2018 Admission Syllabus
BSC CS 2018 Admission Syllabus
BSC CS 2018 Admission Syllabus
UNIVERSITY OF KERALA
COMPUTER SCIENCE
SCHEME
Semester 1 Hrs per week
Course code Credits Course Name Lecture Tutorial Lab Total
EN1111.4 2 English I 3 - - 3
MM1131.10 3 Mathematics I 3 1 - 4
CS1121 3 Computer Fundamentals 3 1 - 4
& Organization
CS1131 3 Digital Electronics 3 - - 3
CS1141 3 Introduction to 3 - - 3
Programming
CS1142 3 C Programming Lab - - 4 4
CS1132 3 Digital Electronics Lab - - 4 4
TOTAL 20 15 2 8 25
MM1231.10 3 Mathematics II 3 1 - 4
CS1221 3 Environmental Studies 3 - - 3
CS1241 3 Data Structures in C 3 1 - 4
CS1242 3 Web Programming 3 - - 3
CS1243 3 Data Structures Lab - - 4 4
CS1244 3 Web Programming Lab - - 4 4
TOTAL 20 15 2 8 25
TOTAL 20 12 2 11 25
MM1131.10 3 Mathematics I 3 1 - 4
CS1121 3 Computer 3 1 - 4
Fundamentals and
Organization
CS1131 3 Digital Electronics 3 - - 3
CS1141 3 Introduction to 3 - - 3
Programming
CS1142 3 C Programming Lab - - 4 4
CS1132 3 Digital Electronics Lab - - 4 4
TOTAL 20 15 2 8 25
3. SYLLABUS
Module 1: Review of Basic Electronics:Diodes – half wave and full wave rectifiers. Zener diode,
Zener diode as a voltage regulator, Bipolar Junction Transistors, Transistor configurations- CE
characteristics, relation between transistor currents, Transistor biasing methods (CE configuration),
small signal CE amplifiers– graphical analysis of the small signal CE amplifier (frequency response,
bandwidth and gain in dB) . RC phase shift oscillator, Astable multi-vibrator (555 timer).
Module 2: Data Representation: Concept of number system bases – binary, decimal and hexadecimal
number systems and conversion between each, Binary arithmetic: Addition, subtraction 1s and 2s
complement system, multiplication. Codes: BCD, ASCII, Floating point representation
Module 3: Boolean Algebra:Boolean functions: AND, OR and NOT, NAND, NOR and XOR.
Truth tables, Combinational logic in Venn diagrams. Realization of other logic gates using NAND
and NOR. Laws of Boolean Algebra, DeMorgan’s theorems. Min terms, SOP expressions, Max
terms, POS expressions, Karnaugh maps. Flip flops – SR flip flop, JK flip flop, Master Slave, D and
T flip flops.
Module 4: Digital Circuits:Multiplexer, Full and half adders, Subtractors – half and full subtractors,
Comparators – 1 bit and 2 bit, Counters, Decoder and display, shift registers, de-multiplexer and
keyboard encoder.
4. REFERENCES
4.1 Core
B L Theraja –Basic Electronics-Chand Publications
4.2 Additional
M Morris Mano – Digital Logic and Computer Design-Pearson, 2013
Thomas L Floyd –Digital Fundamentals- Pearson, 2013
4.3 Assignments and Activities:Miscellaneous Topics: Advances in Electronics: Evolution of
Transistor Technology, Nano Technology, Molecular Electronics.
NB:- Activities and assignments are not meant for End_Semester_Examination
Module IV: Advanced features: Array & pointer relationship, pointer to arrays, array of pointers.
Strings: String handling functions; Structures and unions; File handling: text and binary files, file
operations, Functions for file handling, Modes of files
4. REFERENCES
4.1 Core
Ashok N. Kamthene, Programming in C, Pearson Education, Second edition
4.2 Additional
E. Balaguruswamy, Programming in ANSI C, McGrawhill, Sixth Edition
4.3 Assignments and Activities: Pre-processor directives: #include, #define, macros with
arguments, the operators# and ##, conditional compilations, multiple file programming; creating
header files, program verification, algorithm efficiency analysis; int86 functions and graphic
functions.
NB:- Activities and assignments are not meant for End_Semester_Examination
MM1231.10 3 Mathematics II 3 1 - 4
CS1221 3 Environmental Studies 3 - - 3
CS1241 3 Data Structures in C 3 1 - 4
CS1242 3 Web Programming 3 - - 3
CS1243 3 Data Structures Lab - - 4 4
CS1244 3 Web Programming Lab - - 4 4
TOTAL 20 15 2 8 25
Module II: Linked Lists: Concept of static versus dynamic data structures, implementation of linked
lists using pointers, operations on linked lists: insertion, deletion and traversing. Doubly linked lists
and circular linked lists, applications of linked lists.
Module III: Trees: Concept of linear versus non-linear data structures, various types of trees – binary,
binary search trees. Creating a binary search tree, traversing a binary tree (in-order, pre-order and
post-order), operations on a tree –insertion, deletion and processing, expression trees, implementation
using pointers, applications.
Module IV: Graphs, graph traversal- depth-first and breadth-first traversal of graphs, applications.
4. REFERENCES
4.1 Core
A.K.Sharma, Data Structures Using C, Pearson, Second edition, 2011
4.2 Additional
Nair A.S., Makhalekshmi,Data Structures in C, PHI, Third edition 2011.
4.3 Assignments and Activities:Multi-way search trees, B-trees, Huffman trees, case studies.
NB:- Activities and assignments are not meant for End_Semester_Examination
SEMESTER THREE
Semester 3 Hrs per week
Course Credits Course Name Lecture Tutorial Lab Total
code
CS1341 3 Programming Java 3 - - 3
CS1342 3 Software Engineering 3 1 - 4
CS1343 3 Operating Systems 3 - - 3
CS1344 2 Value Education 3 - - 3
CS1345 3 Database Management Systems 3 1 - 4
CS1346 3 Java Programming Lab - - 4 4
CS1347 3 DBMS Lab - - 4 4
TOTAL 20 15 2 8 25
Module III: Software Design: overview of the design process, How to characterise a good software
design, Cohesion and Coupling, Approaches to software design, Function oriented design:
Overview of SA/SD Methodology, Structured analysis, Developing the DFD model of a system,
Structured Design, User Interface design: Characteristics of a good user interface, Basic concepts,
Types of user interfaces
Module IV: Coding and Testing: Coding, Code review, Software documentation, Testing, Unit
testing, Black box testing, white box testing: Basic concepts, Debugging Integration testing, system
testing, Software Reliability and quality management: Software reliability, Software quality,
Software maintenance: Characteristics of software maintenance, Software reverse engineering,
Emerging Trends: Client Server Software, Client Server architectures, CORBA, Service Oriented
Architectures (SOA), Software as a Service.
4. REFERENCES:
4.1 Core
Rajib Mall, Fundamentals of Software Engineering, Fourth Edition, PHI
4.2 Additional
PankajJalote, An Integrated Approach to Software Engineering, Narosa
WamanS.Jawadekar, Software Engineering, McGraw hill, 2013
Software Engineering (Seventh edition), Ian Sommerville – Addison Wesley.
Software Engineering: A practitioners approach (Sixth Edition), Roger S Pressman-Mc
Graw Hill.
Journals and Magazines: (i) Software Development, CMP Media. (ii) Software Quality
Professional, ASQ.
4.3 Activities and Assignments: Preparing various documents, case studies, preparing test plans,
UML diagrams, Metrics for various development phases, Agile Programming Methodologies,
extreme Programming, Formal Methods, CASE Tools.
NB:- Activities and assignments are not meant for End_Semester_Examination
climate change. Disaster risk management – disaster relief – water, food, sanitation, shelter, health,
waste management.
Module IV: Organ Donation: History, ethical issues in organ donation and transplantation, types of
organ donation, How organ donation works, Legislation and global perspectives, Bioethical issues,
Political issues, religious view point, distribution, suicide, controversies, public service
announcements, how to become an organ donor, donation process, organ donation organization in
different countries.
4. REFERENCES
National Service Scheme – A Youth Volunteers Programme for Under Graduate
students as per UGC guidelines J.D.S.Panwar et al. Astral International. New Delhi.
“Army NCC cadet, Handbook specialized subjects”, Director General, 2013
NCC, National Cadet Corps, A Concise Handbook of NCC Cadets for ‘A’, ‘B’ &
‘C’Certificate Examinations”
Govt. of India Disaster Management act 2005
Govt. of India 2009, National Disaster Management Policy
Gupta Anil K, Sreeja S Nair, 2011, Environmental Knowledge for Disaster Risk
Management, NIDM, New Delhi
Organ Donation: Medline Plus
Organdonor.gov, “Timeline of Historical Events and Significant Milestones”, US
Government Information on Organ Donation and Transplantation
David Hamilton “History of Organ Transplanation”, University of Pittsburgh Press 2012
4.3 Assignments and Activities: Preparing various NSS activities reports, case studies, preparing
program plans, preparation of disaster management activities and collection different agency
reports, collection of different organ donation activity reports.
NB:- Activities and assignments are not meant for End_Semester_Examination
SEMESTER FOUR
4. REFERENCES
4.1 Core
A NagoorKani ,8086 Microprocessor and its applications, McGrawhill, Second edition
4.2 Additional
N. Madhivanan, Microprocessors, PC Hardware and Interfacing, PHI Edition
RS Goankar, Microprocessor Architecture, Programming and Applications with 8086,
Wiley Eastern Edition.
4.3 Assignments and Activities: Miscellaneous Topics: Features of core2, dual core and i series
Processors, RISC, CISC, Motherboard of IBM PC, Drives, Peripherals, I/O buses, Parallel, Serial
and USB ports.
The main design issues of transport protocols and the mechanism to control traffic flow
and congestion.
The concept of Information security policies
3. SYLLABUS
Module I: Introduction to networks – Data Communication – Data flow simplex, Half duplex, Full
duplex-Type of Connection – broadcast, Point–to-Point, multi-drop. Bandwidth- bit rate, baud rate.
Transmission media –Copper wires, fibre optics, Radio transmission, microwave, Satellite. Switching
- circuit, packet, message.
Module II: Network software - standards- Layering, packets, Layered PDUs, ISO-OSI model,
TCP/IP model – Comparison. Framing- bit oriented, byte oriented, Error correction – detection –
parity, hamming code, CRC. Flow control – stop and wait, sliding window, Error control - Stop &wait
ARQ, Go Back N ARQ, Piggybacking, pipelining, Ethernet, Multiple Access Protocols - pure- slotted
ALOHA, CSMA, CSMA/CD. LAN Standards, Token bus, Token ring, Interfacing devices – bridge,
hub, switch, router, gateway.
Module III: Internetworking- datagrams, fragmentation – Routing-Flooding, Distance vector
routing, Link state routing. Concepts of congestion control-leaky bucket algorithm. Process to
Process delivery -TCP, UDP, Application Layer -DNS, Remote login, file transfer protocol (FTP).
Module IV: Information Security: Network security – concepts and policies, cryptography -
encryption, ciphers, steganography, symmetric and public key encryption, RSA algorithm,
authentication methods, message digest, digital signatures, DSS, E-mail security, MIME, IP Security,
Web Security: Secure Socket layer. Malicious Software, viruses & anti-virus software, firewall.
Security and Law: - Regulations in India. Indian Copyright Act, Consumer Protection Act. Future
Trends – The Law of Convergence.
4. REFERENCES
4.1 Core
Brijendra Singh, Data Communication and Computer Networks, 3/e, PHI
Brijendra Singh, Cryptography & Network Security, PHI.
Panchaghare, V.K., Cryptography and Information Security, PHI
4.2 Additional
Behrouz A Forouzan, Data Communication and Computer networks, 4thed,McGraw
Hill
Achyut S Godbole, Data communications and networks, McGrawHill, Second
Tanenbaum, “computer-networks-a--4th-edition”
4.3 Assignments and Activities:AES, Blowfish algorithms, Kerberos, Comparison of PGP and/
SMIME. Study of common malicious software, Anti-viruses.Firewall, Trusted systems.Information
Technology Act2000/2008.
NB:- Activities and assignments are not meant for End_Semester_Examination
a function variable scope, calling a function returning values, setting default values for arguments,
passing variable reference, built in functions
Module II: Arrays: Creating arrays (associative & multidimensional), Array related functions.
Working with Objects, Working with string functions: Formatting strings, Using Date and Time
functions. Forms in PHP: Form elements, adding elements to a form, creating a simple input form,
combining HTML & PHP code on a single page, redirecting the user, creating a send mail form, File
upload form, working with files and directories.
Module III: Cookies: Introduction, different types of cookies, setting a cookie with PHP, deleting a
cookie, session function overview: starting a session, working with session variables, passing session
IDs in the query string, destroying sessions &unsetting variables, Working with images.
Module IV: Database concepts: Open source database software: MySQL features MySQL data
types: Numeric, date & time, string Table creation in MySQL: insert, select, where clause, ordering
the result, like operator Selecting Multiple tables: using join, using queries Modifying records: update
command, replace command, delete command date & time functions in MySQL Interacting with
MySQL using PHP: connecting to MYSQL ,Executing queries, Retrieving error messages, inserting
data with PHP, retrieving data with PHP
4. REFERENCES
4.1 Core
Julie C.Meloni, PHP, MySQL and Apache,Pearson Education
4.2 Additional
Ivan Byross, PHP for Beginners
4.3 Assignments and activities:sample programs which connects PHP and database, case studies.
NB:- Activities and assignments are not meant for End_Semester_Examination
4. EVALUATION
4.1 Criteria for external evaluation of Minor Project
External evaluation is done by an external examiner appointed by the University
The following components are to be assessed for the End Semester Evaluation of the Minor
Project:
Quality of documentation- 30 marks
Presentation of work- 25 marks
Viva - 25 marks
Total - 80 marks
4.2 Criteria for internal evaluation of Minor Project
Internal evaluation is be done by conducting a Viva by a team of evaluators comprising of the
concerned guides and/or Head of the Department. The following are the components for
internal evaluation of the Minor Project:
Presentation of the work-5 marks
Individual involvement & team work/ Attendance- 5marks
Timely submission and assessment of 2 interim reports -10 marks
Total - 20 marks
Programs to demonstrate PHP Array functions. array Search, Array Replace, Array
Replace Recursive, Array Sub String Search
Demonstrate the use of regular expression to compare two strings.
Extract Domain name from URL
Find the number of rows from a mysql database for your query.
Generate a Guestbook which will allow your website visitor to enter some simple data
about your website.
Develop a PHP program for Email Registration.
Develop a project for making Application form and performing Degree Admission On-
line.
Part B[Sample Questions]
Write a PHP script to find the factorial of a given number.
Write a PHP script to find the sum of digits of a given number.
Write a PHP script to find whether the given number is a prime or not.
Write a PHP script to demonstrate the use of break, continue statements using nested loops.
Write a PHP script to display the Fibonacci sequence with HTML page.
Write a PHP script to create a chess board.
Write a PHP script using built-in string function like strstr(), strops(), substr_count(), etc
Write a PHP script to transform a string to uppercase, lowercase letters, make a string’s first
character uppercase.
Write a PHP script that inserts a new item in an array in any position.
Write a PHP function to check whether all array values are strings or not.
Write a PHP script to count number of elements in an array and display a range of array
elements.
Write a PHP script to sort a multi-dimensional array set by a specific key.
Write a PHP script using a function to display the entered string in reverse.
Write a PHP script using function for sorting words in a block of text by length.
Write a PHP script for creating the Fibonacci sequence with recursive function.
Write a PHP script using pass by value and pass by reference mechanisms in passing
arguments to functions.
Write a PHP script to demonstrate the defining and using object properties.
Write a PHP script to demonstrate the inheritance.
Write a PHP script to demonstrate the object overloading with _get(), _set(), and _call().
Write a PHP script to demonstrate the overloading property accesses with _get() and _set().
Write a PHP script to demonstrate the object overloading with _get(), _set(), and _call().
Write a PHP script to demonstrate the overloading property accesses with _get() and _set().
Write a PHP script to demonstrate the use interfaces.
Write a PHP script using constructors and destructors.
Write a PHP application to handling HTML forms with PHP script.
Write a PHP script to create a file, write data into file and display the file’s data.
Write a PHP script to check and change file permissions, copying, renaming and deleting files.
Write a PHP application for connecting to MySQL and reading data from database table.
Write a PHP application for inserting, updating, deleting records in the database table.
Write a PHP application for student registration form.
SEMESTER FIVE
Semester 5 Hrs per week
Course code Credits Course Name Lecture Tutorial Lab Total
CS1541 3 Computer Graphics 3 - - 3
CS1542 3 System Software 3 1 - 4
CS1543 3 Programming Python 3 - - 3
Open Course 3 - - 3
CS1551.1 Digital Marketing
CS1551.2 2 Internet & WWW
CS1551.3 Cyber Security
Elective 3 1 - 4
CS1561.1 Multimedia Systems
CS1561.2 3 Mobile Computing
CS1561.3 Trends in Computing
CS1544 3 Computer Graphics Lab - - 4 4
CS1545 3 Python Programming Lab - - 4 4
TOTAL 20 15 2 8 25
CS1541: COMPUTER GRAPHICS
1. AIM
To introduce theoretical concepts behind computer graphics
To introduce the algorithms, tools and techniques for implementing the same.
2. OBJECTIVES
On completion of this course, students should be able to:
handle basic graphic primitives in C/C++ for developing 2D and 3D graphics
program basic scan-conversion algorithms
apply various transformations to 2D and 3D graphic objects
derive various projections of 3D objects
give realistic rendering to 3D wireframe objects
be familiar with current trends in computer graphics
3. SYLLABUS
Module I: Introduction: graphic data representation, concept of pixels, resolution, aspect ratio,
Raster scan display, Random Scan display, video adapter, frame buffer, display technology-CRT,
LCD, LED, smart devices (feature wise comparison only), Output Primitives: Straight Line, DDA
algorithm, Bresenham's Line Algorithm, Circle- Mid Point Circle Algorithm, polygon filling
algorithms- boundary fill, scan-line algorithm, Aliasing and Anti-aliasing.
Module II: Two dimensional Transformations: Translation, scaling, fixed point scaling, rotation,
reflection, transformation with respect to arbitrary points. Application of homogeneous coordinates
for uniform matrix operations, composite transformations, Windowing and clipping: Window to
viewport transformation, Clipping- Point clipping, Line Clipping, Cohen-Sutherland Line Clipping
algorithms, Polygon Clipping-Sutherland-hodge man algorithm.
Module III: 3D Concepts and Techniques: 3D display techniques, 3D Transformations, 3D
modelling schemes, Projection-parallel projections, perspective projection, Visible Surface
Detection- Hidden Surface removal Algorithms-scan line method, Z-buffer method.
Module IV: Colour Illumination methods: color models-RGB, HSI, CMYK, Illumination model
and light sources, Specular reflection, Intensity attenuation, shadow, Polygon Shading methods,
animation, morphing-tweening, warping (Concepts only) zooming, panning, rubber band lines
(concepts only)
4. REFERENCES
4.1 Core
Amarendra N Sinha and Arun D Udai, Computer Graphics, McGraw Hill publications
4.2 Additional
Donald Hearn, M. Pauline Baker, Computer Graphics (C Version) 2/e, Pearson
4.3 Assignments and activities: Studies on various algorithms, creation of sample programs for
implementing graphics algorithms, programs to implement the transformation algorithms. Case
studies on new trends in graphics and image processing. Tools.
NB:- Activities and assignments are not meant for End_Semester_Examination
2. OBJECTIVES
On the completion of this course, the student will be able to
Understand the concepts of python programming
Create new GUI based programming to solve industry standard problems
3. SYLLABUS
Module I: Introduction to Python - Features of Python - Identifiers - Reserved Keywords -
Variables Comments in Python – Input , Output and Import Functions - Operators – Data Types and
Operations – int, float, complex, Strings, List, Tuple, Set,Dictionary - Mutable and Immutable
Objects – Data Type Conversion - Illustrative programs: selection sort,insertion sort, bubble sort
Module II: Decision Making -conditional (if), alternative (if-else), if..elif..else -nested if - Loops
for,range() while, break, continue, pass; Functions: return values, parameters, local and global scope,
function composition, recursion; Strings: string slices, immutability, string functions and methods,
string module; Lists as arrays. Illustrative programs: square root, gcd, exponentiation, sum of an array
of numbers, linear search, binary search, bubble sort, insertion sort, selection sort
Module III: Built-in Modules - Creating Modules - Import statement - Locating modules -
Namespaces and Scope - The dir() function - The reload function - Packages in PythonFiles and
exception: text files, reading and writing files Renaming and Deleting files Exception handling
exceptions, Exception with arguments, Raising an Exception - User defined Exceptions - Assertions
in
Module IV: GUI Programming- Introduction – Tkinter Widgets – Label – Message Widget – Entry
Widget – Text Widget – tk Message Box – Button Widget – Radio Button- Check Button – Listbox-
Frames _ Toplevel Widgets – Menu Widget
4. REFERENCES
4.1 Core
“Taming PYTHON By Programming”, Jeeva Jose Khanna Publications
4.2 Additionals
Kenneth A. Lambert, “Fundamentals of Python: First Programs”, CENGAGE
Learning,2012.
Paul Gries, Jennifer Campbell and Jason Montojo, “Practical Programming: An
Introductionto Computer Science using Python 3”, Second edition, Pragmatic
Programmers,LLC,2013.
Timothy A. Budd, “Exploring Python”, Mc-Graw Hill Education (India) Private Ltd.
4.3 Assignments and activities:case studies on GUI based program developments, free software
foundation data collections, new graphic standards programs generations.
NB:- Activities and assignments are not meant for End_Semester_Examination
Module II: E-banking: approaches, devices, services, benefits, drawbacks, Electronic payment
systems-credit cards, debit cards, smart cards, credit accounts, cyber security, encryption, secret key
cryptography, public key cryptography, digital signatures, firewalls
Module III: Digital Marketing: Search Engine Optimization (SEO), Social Media, Content
Marketing; Email Marketing, Mobile Marketing. Challenges for Digital Marketing: Increased
Security Risk, Cluttered Market, Less Focus on Keywords, More Ad Blockers, Increased Ad Costs.
Module IV: Digital Marketing: Pay per Click-Search Engine Advertising, Advantages, Factors,
Conversion Rate Optimization (CRO); Digital Marketing- Web Analytic. Social Media Marketing:
Face book, Pinterest, Twitter, LinkedIn, YouTube, Google Adwords, Google Analytics; Issues and
Future enhancement of Digital Marketing.
4. REFERENCES:
4.1 Core
Ian Dodson-The art of Digital Marketing, Wiley
4.2 Additional
Puneet Singh Bhatia- Fundamentals of Digital Marketing, Pearson Education
4.3 Assignments and activities: Collection of current marketing tools, case studies, new trends.
NB:- Activities and assignments are not meant for End_Semester_Examination
To introduce the issues and methods of information security and its guidelines.
2. OBJECTIVES:
On completion of this course student shall:
Understand high-level overview of information security principles.
Understand different roles and responsibilities of security professionals
Understand cryptography and information system risk management.
Be aware of multiple security control families as well as benefits of each control family
3. SYLLABUS
Module 1: Introduction to Information systems: Modeling business process, components,
categories, Individuals in information system, Developing information systems; Information
Systems: threats, Information assurance, cyber security and security risk analysis;
Application security: Data Security considerations, security technology, intrusion detection
access control
Module 2: Security threats: Introduction to security threats, Network and services attack,
security threats to e-commerce
Module 3: Security Policies: Introduction, Why we need security policies, Security policy
development, Email security policies, Policy review process, corporate policy, sample
template of cyber security policy
Module 4: Information security standards: Why ISO, IT ACT 2000, copyright, Patent,
Intellectual property right, Cyber laws in India, Software Licensing, Semi conductor law and
patent law,
4. REFERENCES
Core: Fundamentals of Cyber security, MayankBhushan, BPB publication, First
Edition 2017
CS1561 ELECTIVE
CS 1561.1 MULTIMEDIA SYSTEMS
1. AIM
To introduce students to various multimedia elements along with the theoretical
underpinnings and to expose them to integration of these elements.
2. OBJECTIVES
By the end of this course, students should be:
Familiar with features of text, audio, images, video and active contents
Familiar with the file formats for the above elements
Aware of various application softwares used to process the above elements
Aware of various applications of multimedia
3. SYLLABUS
Module I: Concept of Multimedia, Hypertext, Hypermedia, History of multimedia, Multimedia
hardware: CD-ROM, DVD, Microphone, Speakers, Soundcards, Video Camera, MIDI, Applications
of multimedia in entertainment, education, health etc.
Module II: Graphic and image data representation, spatial and temporal resolution of images, grey
level and colour images, basic concepts, computer image processing (image synthesis, image
analysis, image recognition, image transmission), animations, image data compression, image file
formats (JPEG, MPEG).
Module III: Analog and digital video, basic concepts, computer video format, frame rates, sync,
resolution, colour video formats- NTSC,PAL and SECAM, analog video artifacts, video equipments,
digital video compression
Module IV: Sound/Speech processing: Basic Sound concepts- Computer representation of sound,
Audio formats, MIDI-basic concepts, devices, messages, software, Speech- generation, analysis,
transmission.
4. REFERENCES
4.1 Core
Ralf Steinmetz and KlaraNahrstedt,Multimedia Applications, Pearson Education
4.2 Additional
Malay K. Pakhira, Computer Graphics Multimedia and Animation, PHI, 2008.
Judith Jeffcoate, Multimedia in Practice: Technology & Applications, PHI
4.3 Assignment and activities: Multimedia on the mobile platform, Multi-media networks, Streaming
media, quality of service, Introduction to Macromedia Flash, Multimedia on Linux, Multimedia on
the web. Virtual Reality systems
NB:- Activities and assignments are not meant for End_Semester_Examination
4.3 Assignment and activities: Study of cloud computing, Migrating to cloud, revolutionary
development in edge computing, GPS application, Hadoop technology, Engineering, Industries,
government application of Big data
NB:- Activities and assignments are not meant for End_Semester_Examination
CBCS BSc Computer Science (Scheme and Syllabus 2018) 29
Career Related First Degree Programme in Computer Science
SEMESTER SIX
1. AIM
To get an entry level understanding of the concepts of data mining
2. OBJECTIVES
To get an understanding of the general properties of data in large databases
Understand a variety of real-world applications that require data mining
How to discover useful patterns and associations in huge quantities of data
3. SYLLABUS
Module I: Introduction:-Data, Information, Knowledge, KDD, types of data for mining, Application
domains, data mining functionalities/tasks. Data processing—Understanding data, pre-processing
data-Form of data processing, Data cleaning (definition and Phases only), Need for data integration,
Steps in data transformation, Need of data reduction
Module II: Data Warehouses-Databases, Data warehouses, Data Mart, Databases Vs Data
warehouses, Data ware houses Vs Data mart, OLTP OLAP, OLAP operations/functions, OLAP
Multi-Dimensional Models- Data cubes, Star, Snow Flakes, Fact constellation. Association rules-
Market Basket Analysis, Criteria for classifying frequent pattern mining, Mining Single Dimensional
Boolean Association rule-A priori algorithm
Module III: Classification- Classification Vs Prediction, Issues, Decision trees, Bayes classification-
Bayes Theorem, Naïve Bayesian classifier, K Nearest Neighbour method, Rule-Based classification
-Using IF…THEN rules for classification
Module IV: Cluster analysis: definition and Requirements, Characteristics of clustering techniques,
Types of data in cluster analysis, categories of clustering-Partitioning methods, K-Mean and K -
method only, outlier detection in clustering.
4. REFERENCES
4.1 Core:
Sunitha Tiwari & Neha Chaudary, Data Mining and Warehousing, Dhanpat Rai & Co.
4.2 Additional
Jiawei Han &Micheline Kamber& Jian Pei Data Mining Concepts & Techniques
Margaret H Dunham Data Mining-Introductory& Advanced Topics; Pearson
4.3 Assignment and activities: Mining web, temporal, text, multimedia, medical data and other
Applied Data mining areas; OLAP tools; Introduction to Rapid Miner and other free and open
source data mining tools.
NB:- Activities and assignments are not meant for End_Semester_Examination
IoT Challenges – Scale, Security, Privacy, Big data and data analytics. IoT Network Architecture
and Design: - Drivers Behind New Network Architectures, Comparing IoT Architectures, A
Simplified IoT Architecture, The Core IoT Functional Stack, IoT Data Management and Compute
Stack
Module II: Engineering IoT Networks: Smart Objects - Sensors, Actuators, and Smart Objects,
Sensor Networks, Connecting Smart Objects: Communications Criteria IoT Access Technologies
Module III: IP as the IoT Network Layer: Business Case for IP, Need for Optimization, Optimizing
IP for IoT, Profiles and Compliances, Application Protocols for IoT:Transport Layer, IoT
Application Transport Methods
Module IV: Securing IoT: A Brief History of OT Security, Common Challenges in OT Security,
How IT and OT Security Practices and Systems Vary, Formal Risk Analysis Structures: OCTAVE
and FAIR, The Phased Application of Security in an Operational Environment, Public Safety:
Overview of Public Safety, An IoT Blueprint for Public Safety, Emergency Response IoT
Architecture, IoT Public Safety Information Processing, School Bus Safety
4. REFERENCES
4.1 Core
David Hanes, “ IoT Fundamentals: Networking Technologies, Protocols and Use Cases
for the Internet of Things”, Cisco Press, Pearson, 2017.
4.2 Additionals
Graham meikle, “The internet of things”, polity press, 2017
Andrew Minteer, “Analytics for the internet of things: Intelligent analytics for your
intelligent devices”, Packt publishing, 2017
Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand, StamatisKarnouskos,
David Boyle, “From Machine-to-Machine to the Internet of Things: Introduction to a
New Age of Intelligence”, 1st Edition, Academic Press, 2014.
Peter Waher, “Learning Internet of Things”, PACKT publishing, BIRMINGHAM –
MUMBAI
Bernd Scholz-Reiter, Florian Michahelles, “Architecting the Internet of Things”, ISBN
978-3-642-19156-5 e-ISBN 978-3-642-19157-2, Springer
Introduction, Structures Used in Matching, Measures for Matching, Partial Matching, The RETE
Matching Algorithm.
Module IV: Natural Language Processing : Introduction, Overview of Linguistics, Grammars and
Languages, Basic Parsing Techniques, Semantic Analysis and Representation Structures, Natural
Language Generation, Natural Language Systems; Expert Systems : Introduction, Rule Based System
Architecture, Knowledge Acquisition and Validation, Knowledge System Building Tools.
4. REFERENCES
4.1 Core
Introduction to ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS, DAN W.
PATTERSON, PHI Learning 2014
4.2 Additional
Artificial Intelligence, Third Edition, Elaine Rich, Kevin Knight, Shivashankar B Nair,
McGraw Hill Education (India) PVT LTD
4.3 Assignment and activities:Generic Introduction to LISP and PROLOG, Critic of Artificial
Intelligence, Neural Network Models, Future of AI.
NB:- Activities and assignments are not meant for End_Semester_Examination
CS 1661: ELECTIVES
CS1661.1 GEOGRAPHICAL INFORMATION SYSTEMS
1. AIM
Introduce the fundamental concepts and applications of GIS
2. OBJECTIVES
Understand spatial data and principles of relational database model
An overview of the process of creating an integrated GIS
Use of GIS in decision making
3. SYLLABUS
Module I: Fundamentals: Defining GIS, Components of a GIS, Spatial Data, Maps and spatial data,
other sources of spatial data.
Module II: Data Models and Database Management: Spatial data models and data structures, why
database approach, Database Data Models, Creating a database, GIS database applications
Module III: Data Input, Editing and Analysis: Methods of Data Input, Data Editing, Measurements
in GIS, Queries, Buffering and Neighbourhood functions, Integrating data – Map Overlay.
Module IV: Output and Applications of GIS: Maps as output, Non-Cartographic output, Spatial
Multimedia, GIS and Spatial Decision Support, Computer methods for handling spatial data, GIS
applications, GIS users, GIS in the 21st century.
4. REFERENCES:
4.1 Core
Ian Heywood, Sarah Cornelius, Steve Carver – An Introduction to Geographical
Information Systems, Third Edition – Pearson Education
4.2 Additional:
Peter A. Burrough and Rachael A. McDonnell – Principles of Geographical Information
Systems, Oxford University Press
M.Anji Reddy, Remote Sensing and Geographical Information Systems, Third Edition,
BS Publications
C.P.Lo.AlbertK.W.Yeung, Concepts and Techniques of Geographic Information System-
Eastern Economy Edition
4.3 Assignment and activities: Issues in GIS – Data quality issues, Human and organizational
issues, GIS project design and management
NB:- Activities and assignments are not meant for End_Semester_Examination
1. AIM:
To provide students the knowledge of testing software
2. OBJECTIVES:
At the end of this course, the student will able to
Discuss the basic concept of testing
Explain the different types of testing
Describe the tools used for testing
3. SYLLABUS
Module I: Introduction: purpose of testing, testing and debugging, models for testing, types of
testing, types of bugs. Flow graphs and path testing:-Basic concept of path testing, predicates, path
predicates and achievable, path sensitizing, path instrumentation.
Module II: White box testing, static testing:-static testing by Humans, static analysis tools. Structural
testing, code coverage testing, code complexity testing, challenges in white box testing.
Module III: Black testing-Requirements based testing, positive and negative testing, Boundary value
analysis, Decision Table, equivalence partitioning, state based or Graph based testing, compatibility
testing, User Documentation testing, Domain testing.
Module IV: Test management and automation:-Introduction, Test planning, Test management, Test
process, Test reporting; Test automation. Testing tools
4. REFERENCES
4.1 Core
Software testing principles and practices, Pearson by Srinivasan Descikan,Gopalaswamy
Ramesh.
Basis Beizes,software. testing techniques,Dreamtech,Second edition
4.2 Additional
Edward Kit,Software Testing in the Real world, Pearson Education of India.
K.K Prasad, Software Testing Tools,Dreamtech.
4.3 Assignment and activities:case studies on different testing methodologies and comparison of
time complexities.
NB:- Activities and assignments are not meant for End_Semester_Examination
setting a cookie with PHP, deleting a cookie, session function overview: starting a session, working
with session variables, passing session IDs in the query string, destroying sessions &unsetting
variables
Module-IV: Database concepts: Open source database software: MySQL features MySQL data
types: Numeric, date & time, string Table creation in MySQL: insert, select, where clause, ordering
the result, like operator Selecting Multiple tables: using join, using queries Modifying records:
update command, replace command, delete command date & time functions in MySQL Interacting
with MySQL using PHP: connecting to MYSQL ,Executing queries, Retrieving error messages,
inserting data with PHP, retrieving data with PHP
4. REFERENCES
4.1 Core
Julie C.Meloni, PHP, MySQL and Apache, Pearson Education
Ivan Byross, HTML, DHTML, Javascript, Perl, BPB Publication
NB:- Activities and assignments are not meant for End_Semester_Examination
Computer Music Software for Indian Music, Heat Engines Simulation Software for eLearning,
Digital Water Marking Software etc.
(c) Research level project: These are projects which involve research and development and
maynot be as structured and clear cut as in the above case. Examples are Malayalam Character
Recognition, Neural Net Based Speech Recogniser, Biometric Systems, Machine Translation
System etc. These projects provide more challenging opportunities to students and can be
attempted.
If any student identifies proper support in terms of guidance, technology and references from
External organizations and also the supervisors are convinced of the ability of the student(s)to
take up the project, it shall be permitted. The methodology and reporting of such projects could
be markedly different from type (a) and is left to the proposer/external supervisor of the
projects.
3.3 Selection of Team: To meet the stated objectives, it is imperative that Major Project is
donethrough a team effort. Though it would be ideal to select the team members at random
(drawing lots) and this should be strongly recommended, due to practical considerations,
students may also be given the choice of forming themselves into teams preferably 3 in numbers
up to a maximum of 4 members (teams less than 3 members may be permitted in certain cases,
for valid reasons). A gender mix should also be strongly suggested. A team leader shall be
elected through drawing lots. Teams shall maintain team meeting minutes and ensure that every
team member has tasks assigned in writing. Team meeting minutes shall form a part of the
Project Report. Even if students are doing projects as groups, each one must independently take
up different modules of the work and must submit the reports also independently (though, in
such cases, some common materials is permissible).Evaluation will also be done independently.
3.4 Selection of Tools: No restrictions shall be placed on the students in the choice
ofplatforms/tools/languages to be utilized for their project work, though open source is strongly
recommended, wherever possible. No value shall be placed on the use of tools in the evaluation
of the project.
3.5 Selection of Organization & Guide: No restrictions shall be placed on the students in
thechoice of organization where project work may be done, in terms of locality, type
(public/private) etc. It is the duty of the Head of Institute/Principal of College to ensure that the
Aim, Objectives and full project guidelines are communicated to the external organization. The
guide should ideally be a post-graduate with minimum 2 years of work experience.
Students may also choose to do project in the college/institute (or partially in the
college/institute and partially in an external organization), especially product-based work, but
in such cases the supervisors must ensure that (i) industry practices are followed (ii) the students
undertake a planned visit to an IT industry with international operations to make up for the loss
of experience and (iii) the services of an external guide with industry experience is obtained.
3.6 Project Management: Head of Department /Institute should publish a list ofstudents,
projects topics, internal guide and external organization (if any) and teams agreed, before the
end of semester 5. Changes in this list may be permitted for valid reasons and shall be
considered favourably by Head of Department /Institute any time before commencement of the
project. Any request for change after commencement should considered by a committee of 3
teachers and their recommendation shall be accepted by Head of Department/ Institute.
Gantt-chart of proposed activities and a draft statement of project deliverables (which
maysubsequently be altered if justified) should be prepared before the commencement of the
project. The actual completion of each phase should be noted on the chart in the course of the
project work. Team meetings should document the progress of the project. Students should
submit a fortnightly report of progress which could be indication of percentage of completion
marked on the original Gantt-chart, with any notes attached. Students should ideally keep a
daily activity log sheet. Changes in the submitted documents are possible, as project
development is essentially an evolutionary process. The project guide must ensure that changes
are necessary due to the knowledge gained in succeeding phases of the project. The date
ofCompletion of a phase should be brought forward if the changes made are deemed to be errors
and not due to additional knowledge gained from a succeeding phase.
3.7 Documentation:
The following are the major guidelines: The final outer dimensions of the report shall be 21 cm
X 30 cm. The colour of the flap cover shall be light green. Only hard binding should be done,
with title of the Project and the words “< TITLE> BSc(CS) Project Report 2018" displayed on
the spine in 20 point, Bold, Times New Roman. It is highly recommended that Latex be used
for documentation.
• The text of the report should be set in 12 pt, Times New Roman, 1.5 Spaced.
• Headings should be set as follows: CHAPTER HEADINGS 20 pt, Times New Roman,
Bold, All Caps, Centered.
1. SECTION HEADINGS 12 pt, Times New Roman, Bold, All Caps, Left Adjusted.
Titles of Figures, Tables etc are done in 12 point, times New Roman, Italics, Centered.
<PROJECT TITLE>
<STUDENT NAME>
PROJECT REPORT
University of Kerala
2018
requirements for the award of the Degree of BSc (Computer Science) of the University of
Kerala”.
References shall be IEEE format (see any IEEE magazine or transaction). Take care in use of
italics and punctuation. While doing the project, keep note of all books you refer, in the correct
format, and include them in alphabetical order in your reference list. Eg: A book is cited as:
Kartalopoulos, S V Understanding Neural Networks and Fuzzy Logic, BPB Publishers, 1996,
pp. 21-27. (pp.21-27 indicates that pages 21-27 have been referred. If the whole book is being
referred, this may be omitted. If a single page is referred, say 7, it may be cited as p.7.
Report writing is NOT a hasty activity done after finishing the project. Students must try
to develop the report along with the work, so as to give it flesh and blood. Drafts should be
read, modified, spell checked and grammar checked at least thrice during the course of the
project and before a final printout is taken, the same may be got approved from the internal
guide.
The students should send two interim reports after the analysis and design phases of the project
to internal guides. This will also help the students in their report writing.
A soft copy of the complete documentation, including source code, should be maintained for
any clarification during assessments.
The Gantt chart, fortnightly progress reports recorded in team meeting minutes mentioned in
section 3.5 should appear as appendix to the project report.
Regarding the body of the report, as an indicative example, the following is given (though students
should not attempt to fit every kind of project report into this format):
– Organizational overview (of the client organization, where applicable)
– Description of the present system
– Limitations of the present system
– The Proposed system- Its advantages and features
– Context diagram of the proposed system.
– DFD of the proposed system with at least one additional level of Expansion
– Structure Chart/E-R diagrams of the System
– System flowchart
– Files or tables (for DBMS projects) list. Class names to be entered for each file in OO
systems.
– List of fields or attributes (for DBMS projects) in each file or table.
– File table that shows the files/tables used by each program and the files are read, written
to, updated, queried or reports were produced from them.
– Reports List with column headings and summary information for each report.
– System Coding and variable/file/table naming conventions
– System controls and standards
– Screen layouts for each data entry screen.
– Report formats for each report.
Program documentation is suggested on the following lines:
– Program id
– Program function explanation
– Program level pseudocode or flowchart.
– Data entry screen (reproduced from system documentation).
– Report layout (reproduced from system documentations)
– Decision tables, decision trees, with English Explanation where necessary.
– Program listing
– Test data
– Test results.
3.8 Methodology:
Wherever applicable, object oriented approach should be used for software development. The
project report should generally contain details of the following steps (though students should
notattempt to fit every kind of project into this format):
(a) Analysis
– Study of existing systems and its drawbacks
– Understanding the functionalities of the system in detail
– Preparation of requirements
– Conduct of Feasibility study
- Development of DFD/use case diagrams
(b) Design
– Design of each subsystems/modules
– Design of each classes
– Design of Algorithms for problem solving
– User interface /Input/ Output Design
– Any other steps if necessary
(c) Coding and Implementation
(d) Testing
(e) Security, Backup and Recovery Mechanisms
(f) On line help and User Manuals
(g) Upgradability Possibilities
3.9 Project IPR & Utilization: The intellectual property rights in all project work done by the
students shall vest with the University of Kerala, except in cases where some external organizations
seek undertaking from students to concede IPR in all work done in their organization or under their
guidance. Where possible, students should attempt to obtain at least a joint IPR for the University.
In cases where project works are of public utility, students shall be asked to publish their work
including source code and documentation, in so far as their rights are clear.
4. REFERENCES
4. 1 Core
S A Kelkar, Software Project Management, Prentice Hall of India
W Alan Randolph, Barry Z. Posner, Effective project planning and management, PHI
4.2 Additional
Greg Mandanis, Software Project Management Kit for Dummies, IDG
Books Joel Henry, Software Project management
Frederic P B, Mythical Man-month, Essays on Software Engineering, Addison
Wesley David Lamport, Latex: A document Preparation System, 2/e, Pearson Edn
5. EVALUATION
5.1 Criteria for external evaluation of Major Project
External evaluation is done by an external examiner appointed by the University
The following components are to be assessed for the End Semester Evaluation of the Major Project:
Quality of documentation- 30 marks
Presentation of work- 25 marks
Viva - 25 marks
Total - 80 marks
5.2 Criteria for internal evaluation of Major Project
Internal evaluation is be done by conducting a viva voce by a team of evaluators comprising of the
concerned guides and/or Head of the Department. The following are the components for internal
evaluation of the Major Project:
Presentation of the work-5 marks
Individual involvement & team work/ Attendance- 5marks
Timely submission and assessment of 2 interim reports -10 marks
Total - 20 marks