B.tech CSE 2019 Scheme Syllabi v0.9
B.tech CSE 2019 Scheme Syllabi v0.9
B.tech CSE 2019 Scheme Syllabi v0.9
Sub. Sub.
Subject Name L T P C Subject Name L T P C
Code Code
EO2001 Economics 3 0 3 0 BB0025 Value, Ethics and Governance 2 0 0 2
MA2101 Engineering Mathematics – III 2 1 3 0 MA2201 Engineering Mathematics – IV 2 1 0 3
CS2101 Data Communications 3 1 4 0 CS2201 Operating Systems 3 1 0 4
CS2102 Computer System Architecture 3 1 4 0 CS2202 Relational Database Management Systems 3 1 0 4
CS2103 Data Structures & Algorithms 3 1 0
4 CS2203 Computer Organization 3 1 0 4
II
CS2104 Object Oriented Programming 3 1 0
4 *** *** Open Elective – I 3 0 0 3
CS2130 Data Structures & Algorithms Lab 0 0 2
1 CS2230 Operating Systems Lab 0 0 2 1
CS2131 CS2231 Relational Database Management Systems
Object Oriented Programming Lab 0 0 2 1 0 0 2 1
Lab
CS2232 Web Technology Lab 0 0 2 1
17 5 4 24 16 4 6 23
Total Contact Hours (L + T + P) 25 Total Contact Hours (L + T + P) + OE 23+3= 26
FIFTH SEMESTER SIXTH SEMESTER
CS3101 Artificial Intelligence & Soft Computing 3 1 0 4 BB0026 Organization and Management 3 0 0 3
CS3102 Design & Analysis of Algorithms 3 1 0 4 CS3201 Software Engineering 3 1 0 4
CS3103 Automata Theory & Compiler Design 3 1 0 4 CS3202 Information Systems Security 3 1 0 4
CS3104 Computer Networks 3 1 0 4 CS3203 Data Science and Machine Learning 3 0 0 3
CS31XX Program Elective – I 3 0 0 3 CS32XX Program Elective – II 3 0 0 3
III
*** **** Open Elective – II 3 0 0 3 *** **** Open Elective – III 3 0 0 3
CS3130 Design & Analysis of Algorithms Lab 0 0 2 1 CS3230 Software Engineering Lab 0 0 2 1
CS3131 Artificial Intelligence & Soft Computing Information Systems Security Lab
0 0 2 1 CS3231 0 0 2 1
Lab
CS3132 Computer Networks lab 0 0 2 1 CS3270 Minor Project 0 0 6 3
18 4 6 25 18 2 10 25
Total Contact Hours (L + T + P) + OE 25+3=28 Total Contact Hours (L + T + P) + OE 25+3=28
SEVENTH SEMESTER EIGHTH SEMESTER
CS41XX Program Elective – III 3 0 0 3 CS4270 Major Project 12
CS41XX Program Elective – IV 3 0 0 3
CS41XX Program Elective – V 3 0 0 3
IV
CS41XX Program Elective – VI 3 0 0 3
CS41XX Program Elective – VII 3 0 0 3
CS4170 Industrial Training 0 0 2 1
15 0 2 16 12
Total Contact Hours (L + T + P) 15+ 2 = 17
III SEMESTER
EO2001: ECONOMICS [3 0 0 3]
Introduction: Definition, nature and scope of economics, introduction to micro and macroeconomics;
Microeconomics: Consumer behaviour, cardinal and ordinal approaches of utility, law of diminishing
marginal utility, theory of demand and supply, law of demand, exceptions to the law of demand,
change in demand and change in quantity demanded, elasticity of demand and supply, Indifference
curve, properties, consumer equilibrium, Price and income effect; Production: Law of production,
production function, SR and LR production function, law of returns, Isoquant curve, characteristics,
Isocost, producer’s equilibrium; Cost and revenue analysis: Cost concepts, short run and long- run
cost curves, TR,AR,MR; Various market situations: Characteristics and types, Break-even analysis;
Macro Economics: National Income, Monetary and Fiscal Policies, Inflation, demand and supply of
money, consumption function and business cycle.
References:
1. H.L Ahuja, Macroeconomics Theory and Policy, (20e) S. Chand Publication.
2. Peterson H C et.al., Managerial Economics, (9e), Pearson, 2012.
3. P L Mehta, Managerial Economics, Sultan Chand & Sons, New Delhi, 2012.
4. G J Tuesen & H G Tuesen, Engineering Economics, PHI, New Delhi, 2008.
5. J. L. Riggs, D. D. Bedworth, S. U. Randhawa, Engineering Economics, Tata McGraw Hill, 2018.
References:
1. C. L. Liu, Elements of Discrete Mathematics, (2e), Mc Graw Hill, New Delhi, 2007.
2. J. P. Trembaly and R. Manohar, Discrete Mathematics Structures with application to computer
science, Tata Mc Graw Hill, 2012.
3. E. S. Page and L. B. Wilson, An Introduction to Computational Combinatorics, Cambridge Univ.
Press, 1979.
4. N. Deo, Graph theory with Applications to computer science, PHI, 2012.
References:
1. B. Forouzan, Data Communication & Networking, (5e), McGraw Hill Education, 2013.
2. W. Stallings, Data and Computer Communications, (10e), Pearson Education,2018.
References:
1. M. Morris Mano, Computer System Architecture, (3e), Pearson, 2017.
2. C. Hamacher, Z. Vranesic, S. Zaky, Computer Organization and Embedded Systems, (6e),
McGraw Hill, 2012.
3. J. P. Hayes, Computer Architecture and Organization, (3e), McGraw Hill TMH, 2012.
References:
1. A. S. Tannenbaum, J. Augenstein, Data Structures using C, Pearson India, 2018.
2. E. Horowitz, S. Sahni, Fundamentals of Data Structures in C, (2e), Universities Press, 2008.
3. A. Forouzan, R. F. Gilberg, A Structured Programming Approach Using C, (3e), Cengage
Learning, 2006.
P a g e 4 | 29
CS2104: OBJECT ORIENTED PROGRAMMING [3 1 0 4]
The History and Evolution of object-oriented technology: benefits of object-oriented programming
(OOP), application of object-oriented programming (OOP), introduction to object-oriented
programming language like Java, C# and C++. Programming Fundamentals: Control flow
statements, operators, datatypes, Type conversion, Wrapper Classes, Arrays. Introduction to
classes: Class fundamentals, declaring objects, Assigning Object reference variables, Introduction
to methods, Constructors, Method Overloading, objects as parameters, argument passing, returning
objects, recursion, access control, final, nested and inner classes. I/O Basics: Reading Console
Input, Writing Console Output, Files handling. Inheritance: base and derived class, multilevel
hierarchy, access modifier in inheritance, method overriding, abstract classes. Exception Handling:
Exception types, creating exception, Try Catch construct, Throw and throws keyword. Multithreaded
programming: Creating and running threads, synchronise methods, inter thread communication,
suspending, resuming, and stopping thread.
References:
1. M. Weisfeld, The object-oriented thought process, (4e), Pearson, 2013.
2. H. Schildt, The Complete Reference Java, (10e), Oracle Press, 2018.
3. C. Horstmann, Core Java Volume I—Fundamentals, (10e), Prentice Hall, 2006.
4. H. Schildt, The Complete Reference C++, (4e), Mcgraw Hill, 2003.
References:
1. A. S. Tannenbaum, J. Augenstein, Data Structures using C, Pearson India, 2018.
2. E. Horowitz, S. Sahni, Fundamentals of Data Structures in C, (2e), Universities Press, 2008.
3. A. Forouzan, R. F. Gilberg, A Structured Programming Approach Using C, (3e), Cengage
Learning, 2006.
References:
1. H. Schildt, The Complete Reference Java, (10e), Oracle Press, 2018.
2. C. Horstmann, Core Java Volume I—Fundamentals, (10e), Prentice Hall, 2006.
3. H. Schildt, The Complete Reference C++, (4e), Mcgraw Hill, 2003.
P a g e 5 | 29
IV SEMESTER
References:
1. Professional Module of ICSI.
2. Ghosh B.N., Business Ethics & Corporate Governance, (1e) McGraw Hill, 2011.
3. Mandal S.K., Ethics in Business & Corporate Governance, (2e), McGraw Hill, 2012.
4. Ray C.K., Corporate Governance, Value & Ethics, Vaya Education of India, 2012.
5. Chatterjee Abha, Professional Ethics, (2e) Oxford Publications.
References:
1. P. L. Meyer, Introduction to probability and Statistical Applications, (2e), Oxford and IBH
publishing, 1980.
2. Miller, Freund and Johnson, Probability and Statistics for Engineers, (8e), PHI, 2011.
3. Hogg and Craig, Introduction to mathematical statistics, (6e), Pearson education, 2012.
4. S. M. Ross, Introduction to Probability and Statistics for Engineers and Scientists, Elsevier,
2010.
P a g e 6 | 29
References:
1. Silberschatz, P. B. Galvin, G. Gagne, Operating System Concepts, (9e), Wiley, 2014.
2. A.S. Tanenbaum, H. Bos, Modern Operating Systems, (4e), Pearson, 2015.
3. W. Stallings, Operating Systems: Internals and Design Principles, (9e), Pearson, 2018.
References:
1. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts, (6e), McGraw Hill, 2013.
2. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems, (6e), Addison-Wesley, 2010.
3. R. Ramakrishnan, J. Gehrke, Database Management Systems, (3e), McGraw Hill, 2014.
4. I. Bayross, SQL, PL/SQL The Programming Language of Oracle, (4e), BPB Publications, 2010.
5. C. J. Date, An Introduction to Database Systems, (8e), Prentice Hall of India, 2006.
References:
1. D. A. Patterson, J. L. Hennessy, Computer Organization and Design: The Hardware and Software
Interface, (5e), Elsevier, 2017.
2. J. L. Hennessy, D. A. Patterson, Computer Architecture: A Quantitative Approach, (6e), Morgan
Kaufmann Publishers, 2019.
3. W. Stallings, Computer Organization and Architecture –Designing for Performance, (9e), Pearson,
2013.
P a g e 7 | 29
CS2230: OPERATING SYSTEMS LAB [0 0 2 1]
Introduction to the command line, managing physical storage, Install and configure software,
components, and services, establish network connections and control firewall restrictions, Monitor and
manage running processes, Manage and secure files and file systems, administer users and groups,
Review the system log files and journal for issues, troubleshoot problems and analyse systems with Red
Hat Insights, remotely manage systems with SSH and the Web Console.
Install Red Hat Enterprise Linux using scalable methods, Access security files, file systems, and
networks, execute shell scripting and automation techniques, manage storage devices, logical volumes,
and file systems, manage security and system access, Control the boot process and system services,
running containers System Calls: File and process, I/O Redirection, IPC using Pipe and Signals. PThread
API: Multithreaded programs, Synchronization programs using PThreads and Semaphores, CPU
Scheduling, Deadlock, Memory Management. Creating a Virtual Machine: Virtual Machine Files and
Snapshots, Virtual Machine Cloning and Exporting.
References:
1. W. R. Stevens, S. A. Rago, Advanced Programming in the UNIX Environment, (3e), Addison Wesley,
2013.
2. S. Das, Unix Concepts and Applications, (4e), McGraw Hill, 2006.
3. K. A. Robbins, S. Robbins, Unix Systems Programming: Communication, Concurrency, and
Threads, (2e), Prentice Hall, 2004
4. https://www.redhat.com/en/services/training/rh124-red-hat-system-administration-i
References:
1. I. Bayross, Teach yourself SQL & PL/SQL using Oracle 8i & 9i with SQLJ, BPB Publications, 2010.
2. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts, (6e), McGraw Hill, 2013.
3. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems, (6e), Addison-Wesley, 2010.
P a g e 8 | 29
socks, Angularjs, NodeJS, JSON, Bootstrap. All above will be facilitated using Web/Mobile application
projects assigned to the students.
References:
1. R. Connolly, R. Hoar, Fundamentals of Web Development, Pearson Education India, 2015.
2. R. Nixon, Learning PHP, MySQL & JavaScript with jQuery, CSS and HTML5, (5e), O’Reilly
Publications, 2018.
3. L. Welling, L. Thomson, PHP and MySQL Web Development, (5e), Pearson Education, 2017.
4. N. C. Zakas, Professional JavaScript for Web Developers, (3e), Wrox/Wiley India, 2019.
5. D. S. Mcfarland, JavaScript & jQuery: The Missing Manual, (3e), O’Reilly/Shroff Publishers &
Distributors Pvt Ltd, 2014.
6. Z. R. A. Boehm, Murach's HTML5 and CSS3, (4e), Murach's/Shroff Publishers & Distributors Pvt
Ltd, 2018.
V SEMESTER
References:
1. S. Russell, P. Norvig, Artificial Intelligence: A Modern Approach, (3e) PHI, 2011.
2. E. Rich, K. Knight, S. B. Nair, Artificial Intelligence, (3e), Tata McGraw Hill, 2009.
3. G. F. Luger, Artificial Intelligence-Structures and Strategies for Complex Problem Solving, (6e),
Addison-Wesley Pearson Education, 2012.
References:
1. E. Horowitz, S. Sahni, S. Rajasekaran, Fundamental of Computer Algorithms, (2e), Universities
Press, 2007.
2. T. H. Cormen, C. E. Leiserson, R.L. Rivest and C. Stein, Introduction to Algorithms, (3e), MIT press,
2009.
References:
1. P. Linz, An Introduction to Formal Languages and Automata, (6e), Jones and Bartlett Student
Edition, 2016.
2. A. V. Aho, J. Ullman, M. S. Lam, R. Sethi, Compilers: Principles, Techniques and Tools, (2e),
Pearson Education, 2015.
3. M. Sipser, Introduction to the Theory of Computation, (3e), Cengage Learning, 2014.
4. J. C. Martin, Introduction to Languages and the Theory of Computation, (4e), McGraw Hill, 2010.
References:
1. B. A. Forouzan, TCP/IP Protocol Suite, (4e), TMH, 2010.
2. A. S. Tanenbaum, Computer Networks, (5e), Pearson, 2010.
References:
1. T. M. Cover, J.A. Thomas, Elements of Information Theory, Wiley, (2e), 2006.
2. M. Kelbert, Y. Suhov, Information Theory and Coding by Example, Cambridge University Press,
2013.
3. D. Stinson, Combinatorial Designs: Constructions and Analysis, Springer, 2003.
4. P. J. Cameron , J. H. Lint, Designs, Graphs, Codes and their Links, Cambridge University Press,
2010.
References:
1. R. Buyya, J. Broberg, A. Goscinski , Cloud Computing Principles and Paradigms , Wiley Publishers,
2013.
2. B. Sosinsky, Cloud Computing Bible, Wiley, 2011.
3. M. Miller, Cloud Computing: Web-based Applications that change the way you work and collaborate
online, Pearson, 2008.
4. D. S. Linthicum, Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide,
Addision Wesley Information Technology Series, 2010.
5. T. Velte, A. T. Velte, R. Elsenpeter, Cloud Computing: A Practical Approach, McGraw Hill, 2017.
References:
1. Dinov, ID., Data Science and Predictive Analytics: Biomedical and Health Applications using R,
Springer, 2018.
2. A. Bari, M. Chaouchi, T. Jung, Predictive analytics for dummies, (2e), Wiley, 2016.
3. Jeffrey Strickland, Predictive analytics using R, Simulation educators, Colorado Springs, 2015
4. Daniel T. Larose, Chantal D. Larose, Data Mining and Predictive analytics, (2e), Wiley, 2015.
5. Max Kuhn and Kjell Johnson, Applied Predictive Modelling, (1e), Springer, 2013
P a g e 11 | 29
References:
1. E. Horowitz, S. Sahni, S. Rajasekaran, Fundamental of Computer Algorithms, (2e), Universities
Press, 2007.
2. T. H. Cormen, C. E. Leiserson, R.L. Rivest, C. Stein, Introduction to Algorithms, (3e), MIT press,
2009.
References:
1. Denis Rothman, Artificial Intelligence by Example, Packt, 2018.
2. A. K. Mackworth, D. L. Poole, Artificial Intelligence: Foundations of Computational Agents, (2e)
Cambridge University Press, 2017.
3. I. Bratko, PROLOG: Programming for Artificial Intelligence, (3e), Pearson Publication, 2011.
References:
1. B. A. Forouzan, TCP/IP Protocol Suite, (5e), Tata McGraw Hill, 2013.
2. A. S.Tanenbaum, Computer Networks, (5e), Pearson Education, 2010.
VI SEMESTER
References:
1. Koontz, Harold, Cyril O’Donnell, and Heinz Weihrich, Essentials of Management, (1e)
Tata McGraw-Hill, New Delhi, 1978.
2. Robbins, Stephen P, and Mary Coulter, Management, Prentice Hall, (2e) New Delhi, 1997.
3. E. S. Buffa and R. K. Sarin, Modern Production / Operations Management, (8e), Wiley, 1987
P a g e 12 | 29
4. H. J. Arnold and D. C. Feldman, Organizational Behavior, McGraw – Hill, 1986.
5. Aswathappa K, Human Resource and Personnel Management, Tata McGraw Hill, 2005.
6. William Wether & Keith Davis, Human Resource and Personnel Management, McGraw Hill, 1986.
References:
1. R. Pressman, Software Engineering: A Practitioners Approach, (8e), McGraw Hill Pubs, 2019.
2. M. Walls, Building a Dev Ops Culture, O’Reilly Publications, 2013.
3. J. Joyner, Dev Ops for Beginners, Dev Ops Software Development Method guide for software
developers and IT professionals, Mihails Konoplovs, 2015.
References:
1. B. A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security, (2e), Mc-Graw Hill, 2008.
2. W. Stallings, Cryptography and Network Security: Principles and Practice, (5e), Prentice Hall,
2010.
3. J. Pieprzyk, T. Hardjono, J. Seberry, Fundamentals of Computer Security, Springer International
Edition, 2003.
4. A. J. Menezes, P. C. V. Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, CRC Press.
References:
1. G. James, D. Witten, T Hastie, R Tibshirani, An introduction to statistical learning with applications
in R, Springer, 2013.
2. J. Han, M. Kamber, J. Pei, Data Mining concepts and techniques, (2e), Morgan Kaufmann- Elsevier,
2011.
3. T. Hastie, R. Tibshirani, J. Friedman, The Elements of Statistical Learning, (2e), Springer, 2009.
4. K. Murphy, Machine Learning: A Probabilistic Perspective, MIT Press, 2012.
5. T. M. Mitchell, Machine Learning, (Indian Edition), MacGraw Hill, 2017.
6. C. Bishop, Neural Networks for Pattern Recognition, Oxford University Press, 2019
References:
1. N. Daswani, C. Kern, A. Kesavan, Foundations of Security, What Every Programmer Needs to Know,
Apress, 2007.
2. J. C. Foster, V. T. Liu, Writing Security Tools and Exploits, Syngress Publishing, 2006.
3. J. Ericson, Hacking: The Art of Exploitation, (2e), No Starch Press, 2008.
4. C. Anley, J. Heasman, F. Linder, G. Richarte, The Shellcoder’s Handbook: Discovering and
Exploiting Security Holes, (2e), Addison-Wiley, 2011.
References:
1. B. Jackson, K. Saurabh, Cloud Computing, (2e), Wiley India, 2012.
2. V. Joysula, M. Orr, G. Page, Cloud Computing: Automating the Virtualized Data Center, Cisco
Press, 2012.
3. R. K. Buyya, Cloud Computing: Principles and Paradigms, Wiley Press, 2011.
4. M. Miller, Cloud Computing, (8e), Que Publishers, 2008.
5. Course materials from EMC² Education Services.
P a g e 14 | 29
CS3242: IMAGE PROCESSING AND PATTERN ANALYSIS [2 1 0 3]
Image representation and properties: image processing and computer vision, image processing steps,
image digitization, digital image properties, metrics, histograms, entropy, sampling and quantization,
image file formats, basic relationships between pixels, physics of color, human perception, color spaces,
image sensing and acquisition, monochromatic and color camera. image enhancements: grayscale
transformations, brightness interpolation, histogram processing, using arithmetic/logic operations,
smoothing spatial filters, sharpening spatial filters, canny edge detection, detection of corners (interest
points). mathematical transforms: linearity, convolution, linear integral transform, Fourier transform, DFT,
DCT, wavelet transform, SVD, PCA, smoothing frequency-domain filters, sharpening frequency domain
filters. Data structure for image analysis: matrices, chains, topological data structures, relational
structures, pyramid, quadtree. image restoration: various noise models, image restoration using spatial
domain filtering. estimating the degradation function, inverse filtering, wiener filtering. image
segmentation and representation: grey level features, edges and lines, similarity, correlation,
thresholding, template matching, edge-based segmentation, region-based segmentation, representation
scheme, evaluation issues, mean shift segmentation, graph cut segmentation. shape representation and
description: contour-based Analysis, Connected Component Analysis, chain code, b-spline
representation, region-based, moments, convex hull. image understanding: scale invariant feature
transform (SIFT), histograms of oriented gradient (HOG), image morphology, dilation and erosion,
skeleton.
References:
1. M. Sonka, V, Hlavac, R. Boyle, Image Processing, Analysis and Machine Vision, (4e), Cengage
Learning India, 2015.
2. S. Jayaraman, S. Esakkirajan, T Veerakumar, Digital Image Processing, (2e), Tata McGraw Hill
Education, 2020.
3. R. C. Gonzalez, R. E. Woods, Digital Image Processing, (4e), Pearson Education, 2018.
4. Prateek Joshi, OpenCV with Python by Example, (1e) PACKT Publishing, 2018.
5. R. C. Gonzalez, R. E. Woods, S. Eddins, Digital Image Processing using MATLAB, (2e), Pearson
Education, 2017.
References:
1. R. Pressman, Software Engineering: A Practitioners Approach, (8e), McGrawHill Pubs, 2019.
2. M. Walls, Building a Dev Ops Culture, O’Reilly Publications, 2013.
3. J. Joyner, Dev Ops for Beginners, Dev Ops Software Development Method guide for software
developers and IT professionals, Mihails Konoplovs, 2015.
P a g e 15 | 29
References:
1. B. A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security, (2e), Mc-Graw Hill, 2008.
2. W. Stallings, Cryptography and Network Security: Principles and Practice, (5e), Prentice Hall, 2010.
3. J. Pieprzyk, T. Hardjono, J. Seberry, Fundamentals of Computer Security, Springer, 2003.
VII SEMESTER
References:
1. C. Altheide, H. Carvey, Digital Forensics with Open Source Tools, Syngress, 2011.
2. M.T. Britz, Computer Forensics and Cyber Crime: An Introduction, (3e), Kindle Edition, 2013.
3. S. Davidoff, J. Ham, Network Forensics: Tracking Hackers through Cyberspace, Prentice Hall, 2012.
4. B. Nelson, A. Phillips, F. Enfinger, C. Steua, Guide to Computer Forensics and Investigations,
Thomson, (4e), 2009.
P a g e 16 | 29
CS4142: CLOUD COMPUTING APPLICATIONS [3 0 0 3]
Cloud Based Applications: Introduction, Contrast traditional software development and development
for the cloud. Public v private cloud apps. Understanding Cloud ecosystems – what is SaaS/PaaS,
popular APIs, mobile; Desktop and Application: Cloud Application Architectures, Desktop virtualization,
Application virtualization, Web Application design, Cloud app, Benefits of cloud apps, cloud API, Cloud
apps vs. web apps, Cloud apps vs. desktop apps, Testing of cloud apps; Designing Code for the cloud:
Class and Method design to make best use of the Cloud infrastructure; Web Browsers and the
Presentation Layer- Understanding Web browsers attributes and differences. Building blocks of the
presentation layer: HTML, HTML5, CSS, Silverlight, and Flash. Web Development Techniques and
Frameworks: Building Ajax controls, introduction to JavaScript using jQuery, working with JSON, XML,
REST. Application development Frameworks e.g. Ruby on Rails, .Net, Java API's or JSF; Deployment
Environments – Platform As A Service (PAAS),Amazon, vmForce, Google App Engine, Azure, Heroku,
AppForce; Cloud Application Performance Management: Managing applications in the cloud, cloud
application migration, Resource vs. application performance , Private and public instances, Topology
discovery, First generation CAPM tools and problems, Second generation CAPM tools and
advantages, Cloud application performance components, Agents and applications, Internet as part of
the infrastructure, Hosted SaaS CAPM advantages, Root cause analysis challenges, case studies.
References:
1. G. Reese, Cloud Application Architectures, O’Reilly Media, Inc, 2009.
2. E. Pace, D. Betts, S. Densmore, R. Dunn, M. Narumoto, Developing Applications for the Cloud on
the Microsoft Windows Azure Platform, Microsoft Press, 2010.
3. V. Joysula, M. Orr, G. Page, Cloud Computing: Automating the Virtualized Data Center, Cisco
Press, 2012.
4. Mei- Ling Liu, Distributed Computing: Principles and Application, Pearson, Education, Inc. New
Delhi. 2004
References:
1. S. Pearson , G. Yee , Privacy and Security for Cloud Computing, Springer, 2013.
2. T. Mather, Subra Kumaraswamy, Shahed Latif, Cloud Security and Privacy, O'Reilly Media, 2009.
3. B. Halpert, Auditing Cloud Computing: A Security and Privacy Guide, Wiley, 2011.
4. K. Saurabh, Cloud Computing, (2e), Wiley, 2012.
P a g e 17 | 29
Evaluation of Ranked Retrieval Results. XML Retrieval: Basic XML Concepts, Challenges in XML
Retrieval, A Vector Space Model for XML Retrieval, Evaluation of XML Retrieval, Text-Centric vs. Data-
Centric XML Retrieval. Web Search Basics: Web Characteristics, Advertising as the Economic Model,
The Search User Experience, Index Size and Estimation, Near-Duplicates and Shingling. Web Crawling
and Indexes: Overview, Crawling, Distributing Indexes, Connectivity Servers. Link Analysis: The Web as
a Graph, Page Rank, Hubs, and Authorities.
References:
1. C. Manning, P. Raghavan, H. Schütze, Introduction to Information Retrieval, Cambridge University
Press, 2009.
2. R. Baeza-Yate, B. Ribeiro-Neto, Modern Information Retrieval, (2e), Addison Wesley, 2012.
3. S. Chakrabarti, Mining the Web: discovering knowledge from hypertext data, (2e), Morgan
Kaufmann, 2002.
4. D. A. Grossman, O. Frieder, Information Retrieval: Algorithms, and Heuristics, (2e), Springer, 2004.
References:
1. D. Hearn, M. P. Baker, Computer Graphics with OpenGL, (4e), Pearson Education, 2014.
2. R. Steinmetz, K. Nahrstedt, Multimedia Systems, Springer, 2004
3. J. F. Hughes, J. D. Foley, Computer graphics Principles and Practice, (3e), Pearson Education,
2014.
4. R. Steinmetz, K. Nahrstedt, Multimedia Fundamentals: Media Coding and Content Processing, (2e),
Pearson Education, 2004
References:
1. Norman, A. Donald, The Design of Everyday Things. MIT Press, 2014.
2. htps://www.coursera.org/specializations/user-interface-design#courses
P a g e 18 | 29
CS4147: DIGITAL IMAGE PROCESSING [3 0 0 3]
Introduction to image processing: steps in image processing, Image file formats, Basic relationships
between pixels, Colour Models. Image Enhancement and Restoration: Image histogram, Spatial domain
enhancement, point operations, Log transformation, Power-law transformation. Frequency domain
enhancement: introduction to image transforms, Fourier transform, 2D-DFT. Restoration: Noise models,
Restoration using Inverse filtering and Wiener filtering. Image Coding and Compression: Lossless
compression, Lossy compression, JPEG, MPEG. Image Segmentation and Representation: Grey level
features, edges and lines, similarity, correlation, template matching, edge detection using templates,
Representation scheme, boundary descriptors, regional descriptors, Image Morphology. Biometric
Authentication, Object Detection.
References:
1. K. R. Castleman, Digital Image Processing, (2e), Pearson Education, 2011.
2. R. C. Gonzalez, R. E. Woods, Digital Image Processing, (4e), Pearson Education, 2018.
3. A. K. Jain, Fundamentals of Digital Image Processing, Pearson Education, Reprint 2015.
4. S. Jayaraman, S. Esakkirajan, T Veerakumar, Digital Image Processing, Tata McGraw Hill
Education, 2009.
5. R. C. Gonzalez, R. E. Woods, S. Eddins, Digital Image Processing using MATLAB, (2e), Pearson
Education.
6. A. McAndrew, Introduction to Image processing using MATLAB, Cengage Learning Publisher, 2007.
7. Prateek Joshi, OpenCV with Python by Example, (1e) PACKT Publishing, 2018.
References:
1. V. Madisetti, A. Bahga, Internet of Things: A Hands-On- Approach, VPT, 2014.
2. R. Buyya, A. V. Dastjerdi, Internet of Things Principles and Paradigms, 2016.
3. H. Geng, Internet of Things Principles and Data Analytics Handbook, Wiley, 2017.
4. P. Raj, A. C. Raman, The Internet of Things Enabling Technologies, Platforms, and Use Cases, CRC
Press, 2017.
References:
1. B. Schmarzo, Big Data: Understanding How Data Powers Big Business, Wiley.2013
2. A. Jorgensen, J. Rowland-Jones, J. Welch, Microsoft Big Data Solutions, Wiley.,2014
P a g e 19 | 29
3. J. Thompson, S. P. Rogers, Analytics: How to Win with Intelligence, Technics, LLC Publications,
2017
References:
1. T. D. Nadeau, K. Gray, SDN: Software Defined Networks, An Authoritative Review of Network
Programmability Technologies, (1e) O'Reilly Media, 2013.
2. P. Goransson, C. Black, Software Defined Networks: A Comprehensive Approach, (2e) Morgan
Kaufmann, 2016.
3. F. Hu, Network Innovation through Open Flow and SDN: Principles and Design, CRC Press, 2014.
4. V. Tiwari, SDN and Open Flow for Beginners, Amazon Digital Services, Inc., ASIN, 2013.
5. S Subramanian, Software Defined Networking with OpenStack, Packt Publishing, 2016.
6. https://www.coursera.org/learn/sdn
References:
1. I. Goodfellow, Y. Bengio, A. Courville, Deep Learning, MIT Press 2016.
2. S. Haykin, Neural Networks and Learning Machines, (3e), PHI, 2008.
P a g e 20 | 29
References:
1. J. Goldbeck, Analyzing the Social Web, Morgan Kaufmann Publications, 2013.
2. C. C. Aggarwal, Social Network Data Analytics, Springer Publications, 2011.
3. J. Scott, Social Network Analysis, (3e), SAGE Publications Limited, 2013.
4. J. Goldman, Facebook Cookbook, O'Reilly, 2009.
5. S. Kumar, F. Morstatter, H. Liu, Twitter Data Analytics, Springer Publications, 2013.
References:
1. W. E. Perry, Effective Methods for Software Testing, John Wiley, and Sons, 2000.
2. R. Patton, Software Testing, Sams Publishing, 2005.
3. A. P. Mathur, Foundations of Software Testing, Pearson Education, 2013.
4. J. L. Mitchell, R. Black, Advanced Software Testing—Vol. 3, Rocky Nook, 2015.
References:
P a g e 21 | 29
MANETs- Part- II Routing in MANETs- Part- I, Routing in MANETs- Part- II Routing in MANETs- Part- III
Multicasting in MANETs, Mobility Models for MANETs Transport Protocols for MANETs- Part- I Transport
Protocols for MANETs- Part- II, Opportunistic Mobile Networks- Part- I, Opportunistic Mobile Networks-
Part- II, Opportunistic Mobile Networks- Part- III, UAV Networks- Part- I UAV Networks- Part- II UAV
Networks- Part- III Introduction: Wireless Sensor Networks- Part- I Introduction: Wireless Sensor
Networks- Part- II WSN Coverage & Placement- Part-I Topology Management in Wireless Sensor
Network Mobile Wireless Sensor Networks Mobile Wireless Sensor Networks Medium Access Control
in Wireless Networks- Part-I, Medium Access Control in Wireless Networks- Part-II Routing in Wireless
Sensor Networks- Part- I Routing in Wireless Sensor Networks- Part- II Congestion and Flow Control-
Part- I Congestion and Flow Control- Part- II Underwater Sensor Networks- Part- I Underwater Sensor
Networks- Part- II, Underwater Sensor Networks- Part- III, Underwater Sensor Networks- Part- IV,
Security of Wireless Sensor Networks- Part- I Security of Wireless Sensor Networks- Part- II Hardware
Design of Sensor Node
References:
1. S. K. Sarkar, T G Basavaraju, C Puttamadappa, Ad Hoc Mobile Wireless Networks: Principles,
Protocols, and Applications, (2e), CRC Press, 2016.
2. C. D. Morais Cordeiro, D. P. Agrawal, Ad Hoc and Sensor Networks: Theory and Applications, (2e),
World Scientific Publishing, 2011.
3. H. Karl, A. Willing, Protocols and Architectures for Wireless Sensor Networks, John Wiley & Sons,
2007.
4. R. Jurdak, Wireless Ad Hoc and Sensor Networks: A Cross-Layer Design Perspective, Springer
Publications, 2007.
5. S R Murthy, B. S. Manoj, Ad Hoc Wireless Networks Architectures and Protocols, Pearson
Education, 2008.
6. https://nptel.ac.in/courses/106105160
References:
1. W. Stallings, Wireless Communications and Networks, (2e) Pearson Education, 2018.
2. J. Schiller, Mobile Communications, (2e), Pearson Education, 2009.
3. K. Garg, Mobile Computing: Theory and Practice, (1e) Pearson Education India, 2010.
4. https://nptel.ac.in/courses/106106147
References:
1. D. Jurafsky, J. H. Martin, Speech, and Language Processing, (2e), Pearson Education, 2009.
2. T. Siddiqui, U. S. Tiwary, Natural language processing and Information retrieval, Oxford University
Press, 2008.
P a g e 22 | 29
CS4158: COMPUTER VISION [3 0 0 3]
Introduction to computer vision and its applications, Geometric Image Features: Differential Geometry,
Contour Geometry, analytical image features: Euclidean geometry, Geometric Camera Parameters,
Calibration methods, Image formation, Liner Filtering: Linear filters and convolution, shift invariant linear
systems, spatial frequency and Fourier transforms, Image transformations and Colour models, Edge
Detection methods (Laplacian detectors and Canny edge detector), Points and patches, Harris corner
detector, Histogram of Gradients, Difference of Gaussian detector, SIFT, Colour and Texture, Feature
based alignment, least squares and RANSAC, Camera models, Camera calibration, Stereo vision,
Stereo correspondence, Epipolar geometry Optical flow, Lucas Kanade method, KLT tracking method,
Mean shift method, Dense motion estimation, Support Vector Machines, Face detection and recognition,
Bag of words, Deep convolution neural network.
References:
1. R. Szeliski, Computer Vision: Algorithms and Applications, Springer 2011.
2. D. A. Forsyth, J. Ponce, Computer Vision: A Modern Approach, (2e), PHI learning, 2012
3. J. E. Solem, Programming Computer Vision with Python, O’Reilly, 2012.
Visualization: Visual Representation of Data, Gestalt Principles, Information Overloads. Creating Visual
Representations: Visualization Reference Model, Visual Mapping, Visual Analytics, Design of
Visualization Applications. Classification of Visualization Systems: Interaction and Visualization
Techniques, Visualization of One, Two and Multi-Dimensional Data, Text, and Text Documents.
Visualization of Groups: Trees, Graphs, Clusters, Networks, Software, Metaphorical Visualization.
Visualization of Volumetric Data: Vector Fields, Processes and Simulations, Visualization of Maps,
Geographic Information, GIS systems, Collaborative Visualizations, Evaluating Visualizations. Recent
Trends in Various Perception Techniques: Various Visualization Techniques, Data Structures used in
Data Visualization.
Reference:
1. Stephanie D. H. Evergreen, Effective Data Visualization the Right Chart for the Right Data, (2e),
2019
2. Tamara Munzner, Visualization Analysis and Design, (1e), A K Peters Visualization Series, CRC
Press, 2014
3. Glenn J. Myatt, Wayne P. Johnson, Making Sense of Data II: A Practical Guide to Data Visualization,
Advanced Data Mining Methods, and Applications, John Wiley & Sons Publication, (1e), 2011.
Reference:
1. J. Thompson, S. P. Rogers, Analytics: How to Win with Intelligence, Technics, LLC Publications,
2017.
2. A. Jorgensen, J. Rowland-Jones, J. Welch, Microsoft Big Data Solutions, Wiley, 2014.
3. B. Schmarzo, Big Data: Understanding How Data Powers Big Business, Wiley, 2013.
P a g e 23 | 29
CS4170: INDUSTRIAL TRAINING [0 0 2 1]
In this course the student, undergo in reputed Private / Public Sector / Government organization /
companies as industrial training for minimum 45 days to be undergone by the student in the summer
vacation of the VI semester.
OPEN ELECTIVES
References:
1. G. James, D. Witten, T Hastie, R Tibshirani, An introduction to statistical learning with applications
in R, Springer, 2013.
2. J. Han, M. Kamber, J. Pei, Data Mining concepts and techniques, (2e), Morgan Kaufmann-
Elsevier, 2011.
3. https://nptel.ac.in/courses/106/106/106106179/
P a g e 24 | 29
solutions. Scope in Python: local, global, nonlocal names, Nested functions. Data structures: stack,
queue, Heaps, Abstract datatypes, Classes, and objects in Python. "Linked" lists: find, insert, delete.
Binary search trees: find, insert, delete, Height-balanced binary search trees. Efficient evaluation of
recursive definitions: memorization. Dynamic programming: examples. Other programming languages:
C and manual memory management. Other programming paradigms: functional programming.
References:
1. M. T. Goodrich, R. Tamassia, M. H. Golwasser, Data Structures and Algorithms in Python, Wiley,
2021.
2. R. Thareja, Python Programming: Using Problem Solving Approach, Oxford university Press, 2017.
3. https://swayam.gov.in/nd1_noc20_cs70/preview
References:
1. M. T. Goodrich, R. Tamassia, Data Structures and Algorithms in Java (4e), Wiley, 2021.
2. N. Karumachi, Data Structures and Algorithms Made Easy in JAVA: Data Structure and
Algorithmic Puzzles, Careermonk, 2018.
3. https://swayam.gov.in/nd1_noc20_cs85/preview
References:
1. M. T. Goodrich, R. Tamassia, M. H. Golwasser, Data Structures and Algorithms in Python, Wiley,
2021.
2. R. Thareja, Python Programming: Using Problem Solving Approach, Oxford University Press,
2017.
3. https://nptel.ac.in/courses/106/106/106106182/
References:
1. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems, (6e), Addison-Wesley, 2010.
P a g e 25 | 29
2. R. Ramakrishnan, J. Gehrke, Database Management Systems, (3e), McGraw Hill, 2014
3. https://nptel.ac.in/courses/106106220
References:
1. W. Stallings, Cryptography and Network Security: Principles and Practice, (6e), Prentice Hall, 2014.
2. B. A. Forouzan, D. Mukhopadhyay, Cryptography and Network Security, (2e), Mc-Graw Hill, 2008.
3. https://nptel.ac.in/courses/106106221
References:
1. R. W. Sebesta, Concepts of Programming Languages, (10e), Pearson Education, 2008
2. D. A. Watt, Programming Language Design Concepts, Wiley, (2e), 2007.
3. B. Tucker, R. E. Noonan, Programming Languages, (2e), TMH, 2007.
4. K. C. Louden, Programming Languages, (2e), Thomson, 2003.
5. T. W. Pratt, M. V. Zelkowitz, T. V. Gopal, Programming Languages: Design and Implementation,
(4e), PHI, 2006.
6. https://nptel.ac.in/courses/106102067
References:
1. D. Budgen, Software Design (2e), Addison Wesley, Pearson Education, 2012
2. H. Zhu, Software Design Methodology from Principles to Architectural Styles (1e), Elsevier, 2011.
3. R.S. Pressman, Software Engineering (5e), McGraw Hill Inc., 2015.
P a g e 26 | 29
4. B. Hughes et al., Software Project Management (6e), McGraw Hill, 2017.
5. https://nptel.ac.in/courses/106105182
References:
1. Sudip Misra, Anandarup Mukherjee, Arijit Roy, Introduction to IoT, Cambridge University Press,
2021.
2. Adrian McEwen, Hakim Cassimally, Designing the Internet of Things, Wiley publication, 1st Edition,
November 2013.
3. Honbo Zhou, The Internet of Things in the Cloud: A Middleware Perspective, CRC Press, 2012.
4. Dieter Uckelmann, Mark Harrison, Michahelles, Florian (Eds), Architecting the Internet of Things,
Springer, 2011.
5. Olivier Hersent, David Boswarthick, Omar Elloumi, The Internet of Things – Key applications and
Protocols, Wiley, 2012.
6. https://onlinecourses.nptel.ac.in/noc22_cs53/preview
References:
1. G. F. Luger, W. A. Stubblefield, Artificial Intelligence - Structures and Strategies for Complex
Problem Solving. (5e), Addison Wesley, 2005.
2. P Baldi, S Brunak, Bioinformatics: A Machine Learning Approach, (2e) MIT Press, 2002.
3. T. M. Mitchell, Machine Learning, McGraw-Hill Education, 2017.
4. Y Abu-Mostafa, M. Magdon-Ismail, H.T. Lin, H-T. Learning from Data. AML Book, 2012.
5. https://nptel.ac.in/courses/106106139
References:
1. R. Connolly, R. Hoar, Fundamentals of Web Development, Pearson Education India, 2015.
2. R. Nixon, Learning PHP, MySQL & JavaScript with jQuery, CSS and HTML5, (5e), O’Reilly
Publications, 2018.
3. N. C. Zakas, Professional JavaScript for Web Developers, (3e), Wrox/Wiley India, 2019.
4. https://www.coursera.org/learn/html-css-javascript-for-web-developers,
https://www.coursera.org/learn/duke-programming-web
P a g e 27 | 29
CS0052: NETWORKING AND SECURITY IN IOS APPLICATIONS [3 0 0 3]
Introduction, Using Secure Web APIs: an Instagram Case Study, Push notifications, securely storing
data on the iOS platform called Core Data.
References:
1. Academy, Json for Beginners: Your Guide to Easily Learn Json in 7 Days, Zaccheus Entertainment,
2017.
2. N. C. Zakas, Professional JavaScript for Web Developers, (3e), Wrox/Wiley India, 2019.
3. https://www.coursera.org/learn/security,
https://www.coursera.org/learn/managing-network-cybersecurity
References:
1. F. HU, Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations,
CRC Press, First Edition, 2016.
2. Russell, Brian and Drew Van Duren, Practical Internet of Things Security, Packt Publishing, First
Edition, 2016.
3. O. Whitehouse, Security of Things: An Implementers' Guide to Cyber-Security for Internet of Things
Devices and Beyond, NCC Group, First Edition, 2014.
4. https://www.coursera.org/lecture/aws-iot-developing-and-deploying-an-internet-of-things/iot-
security-oGiF6
https://www.coursera.org/learn/iot-cyber-secrity
References:
1. S. R. Magal, J. Word, Integrated Business Processes with ERP Systems, (2e), John Wiley & Sons,
2011.
2. M. Sumner, Enterprise Resource Planning, Pearson Education, (2e), 2006.
3. E. Monk, B. Wagner, Concepts in Enterprise Resource Planning, (3e), Thomson Course
Technology, 2006.
4. https://www.coursera.org/lecture/advanced-manufacturing-enterprise/enterprise-resource-
planning-erp-MAUTK
P a g e 28 | 29
CS4161: ADVANCED DATA STRUCTURES [2 0 1 3]
Dictionaries: Definition, Dictionary Abstract Data Type, Implementation of Dictionaries. Hashing: Review
of Hashing, Hash Function, Collision Resolution Techniques in Hashing, Separate Chaining, Open
Addressing, Quadratic Probing, Double Hashing, Rehashing, Extendible Hashing. Skip Lists: Need for
Randomizing Data Structures and Algorithms, Search and Update Operations on Skip Lists, Probabilistic
Analysis of Skip Lists, Deterministic Skip Lists. Splay Trees: Splaying, Search and Update Operations
on Splay Trees, Amortized Analysis of Splaying. Text Processing: String Operations, Brute-Force Pattern
Matching, The Boyer-Moore Algorithm, The Knuth-Morris-Pratt Algorithm, Standard Tries, Compressed
Tries, Suffix Tries, The Huffman Coding Algorithm, The Longest Common Subsequence Problem (LCS),
Applying Dynamic Programming to the LCS Problem. Computational Geometry: One Dimensional
Range Searching, Two-Dimensional Range Searching, constructing a Priority Search Tree, Searching a
Priority Search Tree, Priority Range Trees, Quad trees, k-D Trees.
References:
1.M. A. Weiss, Data Structures and Algorithm Analysis in C++, (2e), Pearson, 2004.
2.T. H. Cormen, C. E. Leiserson, R.L.Rivest, and C. Stein, Introduction to Algorithms, (3e), MIT press,
2010.
Introduction and concept learning: Introduction to Blockchain, Building blocks of Blockchain, Industry
Applications of Blockchain, Types of Blockchain, History of Centralized Services, Trust and Vulnerability.
Types of Trust model; Introduction to Cryptography: Hashing, Data Integrity, Merkle Trees, Symmetric
Key Cryptography, Public Key Cryptography, Digital Signatures, Application of Cryptography to
Blockchain; Mining and consensus: Mining, Proof of Work, Proof of Stake, Byzantine Fault Tolerance,
Proof of Authority and Proof of Elapsed Time; Bitcoin versus Cryptocurrencies versus Blockchain:
Transaction, Wallet, Distributed Ledger Technology (DLT), Fork, Ethereum: Ethereum Virtual Machine
(EVM), Wallet for Ethereum, Solidity, Smart Contracts, Introducing WEB 3.0, Hyperledger, Coinbase’s
API; Regulation and Anonymity: Initial Coin Offerings (ICO), Securities and Exchange Commission
(SEC) ruling, Anonymity: Zcash, Monero, Anti Money Laundering, Case study: Use of blockchain in
different areas such as healthcare, finance, supply chain.
References:
1. I. Bashir, Mastering Blockchain: Distributed ledger technology, decentralization, and smart contracts
explained, (2e), Packt Publication, 2018.
2. M. Grincalaitis, Mastering Ethereum: Implement advanced blockchain applications using Ethereum-
supported tools, services, and protocols, (1e), Packt Publishing, 2019
3. B. Hill, S. Chopra, P. Valencourt, Blockchain Quick Reference: A guide to exploring decentralized
Blockchain application development, Packt Publication, 2018.
4. A. T. Norman, Blockchain Technology Explained: The Ultimate Beginner’s Guide, Create Space
Independent Publishing, 2017.
P a g e 29 | 29