Cse Autonomous Syllabus 31 05 24
Cse Autonomous Syllabus 31 05 24
Cse Autonomous Syllabus 31 05 24
Graduates can
Apply their technical competence in computer science to solve real world problems, with
technical and people leadership.
Conduct cutting edge research and develop solutions on problems of social relevance.
Work in a business environment, exhibiting team skills, work ethics, adaptability and lifelong
learning.
II. PROGRAM OUTCOMES (POs)
2 Problem analysis: Identify, formulate, review research literature, and analyze complex
engineering problems reaching substantiated conclusions using first principles of mathematics,
natural sciences, and engineering sciences.
5 Modern tool usage: Create, select, and apply appropriate techniques, resources, and modern
engineering and IT tools including prediction and modeling to complex engineering activities
with an understanding of the limitations.
6 The engineer and society: Apply reasoning informed by the contextual knowledge to assess
societal, health, safety, legal and cultural issues and the consequent responsibilities relevant to
the professional engineering practice.
8 Ethics: Apply ethical principles and commit to professional ethics and responsibilities and
norms of the engineering practice.
9 Individual and team work: Function effectively as an individual, and as a member or leader
in diverse teams, and in multidisciplinary settings.
12 Life-long learning: Recognize the need for, and have the preparation and ability to engage
in independent and life-long learning in the broadest context of technological change.
Exhibit design and programming skills to build and automate business solutions using cutting
edge technologies.
Ability to work effectively with various engineering fields as a team to design, build and
develop system applications.
COURSE STRUCTURE (R24 REGULATION)
I YEAR I SEMESTER
II YEAR I SEMESTER
II YEAR II SEMESTER
Professional electives
Internet of Things
Parallel Computing
Network Security
Data Analytics
Cryptography
Computational Neuroscience
Ecommerce
Cyber security
Machine Learning
Multimedia
Ethical Hacking
Deep Learning
IV- I PE5 React Js
Digital Forensic
Quantum Computing
Super Computing
Bioinformatics
Reinforcement Learning
I YEAR I SEMESTER
TOTAL: 45 PERIODS
REFERENCE BOOKS:
1. Paul Dietel, Harvey Deitel, “ Python for Programmers”, Pearson
2. Reema Thareja,” Problem Solving and programming with Python, Oxford University
Press.
C O P O P S O
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 3 1 2 2 2 2 3 2 3 3 3
2 2 2 2 3 3 2 2 2 2 2 3 2 3 3 3
3 2 3 2 1 3 2 2 3 2 1 2 2 3 3 3
4 1 2 2 2 3 2 2 1 2 3 2 3 3 3 3
5 3 1 3 2 3 3 2 2 2 2 3 3 3 3 3
AVG 2 2 2 2 3 2 2 2 2 2 3 2 3 3 3
COURSE OBJECTIVES:
To understand the problem solving approaches.
To learn the basic programming constructs in Python.
To practice various computing strategies for Python-based solutions to real world problems.
To use Python data structures - lists, tuples, dictionaries.
To do input/output with files in Python.
1. Identification and solving of simple real life or scientific or technical problems, and
developing flow charts for the same. (Electricity Billing, Retail shop billing, Sin
series, weight of a motorbike, Weight of a steel bar, compute Electrical Current in
Three Phase AC Circuit, etc.)
2. Python programming using simple statements and expressions (exchange the values
of two variables, circulate the values of n variables, distance between two points).
3. Scientific problems using Conditionals and Iterative loops. (Number series, Number
Patterns, pyramid pattern)
4. Implementing real-time/technical applications using Lists, Tuples. (Items present in
a library/Components of a car/ Materials required for construction of a building –
operations of list & tuples)
5. Implementing real-time/technical applications using Sets, Dictionaries. (Language,
components of an automobile, Elements of a civil structure, etc.- operations of Sets
& Dictionaries)
6. Implementing programs using Functions. (Factorial, largest number in a list, area of
shape)
7. Implementing programs using Strings. (reverse, palindrome, character count,
replacing characters)
8. Implementing programs using written modules and Python Standard Libraries
(pandas, numpy. Matplotlib, scipy)
9. Implementing real-time/technical applications using File handling. (copy from one
file to another, word count, longest word)
10. Implementing real-time/technical applications using Exception handling. (divide by
zero error, voter’s age validity, student mark range validation)
11. Exploring Pygame tool. 12. Developing a game activity using Pygame like bouncing
ball, car race etc.
TOTAL: 45 PERIODS
TEXT BOOKS:
1. Ashok Namdev Kamthane, Amit Ashok Kamthane “Programming and Problem
Solving with Python” , 2nd edition , Mc Graw Hill
2. Dr,R,Nageswara Rao, “Core Python Programming”,3rd edition, Deamtech
Publisher.
REFERENCE BOOKS:
1. Paul Dietel, Harvey Deitel, “ Python for Programmers”, Pearson
2. Reema Thareja,” Problem Solving and programming with Python, Oxford
University Press.
C O P O P S O
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 3 1 2 2 2 2 3 2 3 3 3
2 2 2 2 3 3 2 2 2 2 2 3 2 3 3 3
3 2 3 2 1 3 2 2 3 2 1 2 2 3 3 3
4 1 2 2 2 3 2 2 1 2 3 2 3 3 3 3
5 3 1 3 2 3 3 2 2 2 2 3 3 3 3 3
AVG 2 2 2 2 3 2 2 2 2 2 3 2 3 3 3
I YEAR II SEMESTER
INTRODUCTION TO VIRTUALIZATION AND CLOUD COMPUTING LTPC
300 3
COURSE OBJECTIVES:
To understand the principles of cloud architecture, models and infrastructure.
To understand the concepts of virtualization and virtual machines.
To gain knowledge about virtualization Infrastructure.
To explore and experiment with various Cloud deployment environments.
To learn about the security issues in the cloud environment.
UNIT I INTRODUCTION 9
Introduction to cloud computing - Definition of cloud – Scalable Computing over the Internet –
System Models for Distributed and Cloud Computing – NIST Cloud Computing – Architectural
Design of Compute and storage clouds - Cloud Characteristics.
COURSE OUTCOMES:
CO1: Understand the design challenges in the cloud.
CO2: Apply the concept of virtualization and its types.
CO3: Experiment with virtualization of hardware resources.
CO4: Develop and deploy services on the cloud and set up a cloud environment.
CO5: Explain security challenges in the cloud environment.
TEXT BOOKS
1. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, "Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things, Morgan Kaufmann Publishers, 2012.
2. Mastering Cloud Computing Foundations and Applications Programming Rajkumar Buyya,
Christian Vechhiola, S. Thamarai Selvi
REFERENCES
1. Cloud Computing: Concepts, Technology & Architecture by Thomas Erl, Ricardo Puttini,
Zaigham Mohammad 2013
2. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud
Computing”, Wiley Publishing, 2010.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 3 1 - - - 2 3 1 2 3 3 3
2 2 2 2 3 3 - - - 1 2 2 3 1 1 3
3 3 3 3 3 3 - - - 2 1 1 2 2 1 3
4 3 3 1 1 1 - - - 1 3 1 3 2 1 1
5 3 2 2 2 3 - - - 2 3 2 2 2 3 3
AVG 2.8 2.4 2 2.4 2.2 - - - 1.6 2.4 1.4 2.4 2 1.8 2.6
PRACTICAL EXERCISES
1. Create type 2 virtualization in VMWARE or any equivalent Open Source Tool. Allocate
memory and storage space as per requirement. Install Guest OS on that VMWARE.
2. Find a procedure for the following
a. Shrink and extend virtual disk
b. Create, Manage, Configure and schedule snapshots
c. Create Spanned, Mirrored and Striped volume
d. Create RAID 5 volume
3. Desktop Virtualization using VNC and Chrome Remote Desktop
4. Create type 2 virtualization on ESXI 6.5 server
5. Create a VLAN in CISCO packet tracer
6. Install KVM in Linux
7. Create Nested Virtual Machine(VM under another VM)
8. Install a C compiler in the virtual machine created using a virtual box and execute Simple
Programs
9. Install Google App Engine. Create a hello world app and other simple web applications using
python/java.
10. Find a procedure to transfer the files from one virtual machine to another virtual machine.
TOTAL : 30 PERIODS
COURSE OUTCOMES:
CO1: Analyze the virtualization concepts and Hypervisor
CO2: Apply the Virtualization for real-world applications
CO3: Install & Configure the different VM platforms
CO4: Experiment with the VM with various software
TEXT BOOKS
1. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, "Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things, Morgan Kaufmann Publishers, 2012.
2. Mastering Cloud Computing Foundations and Applications Programming Rajkumar Buyya,
Christian Vechhiola, S. Thamarai Selvi
REFERENCES
1. Cloud Computing: Concepts, Technology & Architecture by Thomas Erl, Ricardo Puttini,
Zaigham Mohammad 2013
2. Krutz, R. L., Vines, R. D, “Cloud security. A Comprehensive Guide to Secure Cloud
Computing”, Wiley Publishing, 2010.
CO’s-PO’s & PSO’s MAPPING
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 3 1 - - - 2 3 1 2 3 3 3
2 2 2 2 3 3 - - - 1 2 2 3 1 1 3
3 3 3 3 3 3 - - - 2 1 1 2 2 1 3
4 3 3 1 1 1 - - - 1 3 1 3 2 1 1
5 3 2 2 2 3 - - - 2 3 2 2 2 3 3
AVG 2.8 2.4 2 2.4 2.2 - - - 1.6 2.4 1.4 2.4 2 1.8 2.6
II YEAR I SEMESTER
COURSE OUTCOMES.
CO1 - Comprehend the concepts of data structures and analyze the efficiency of an algorithm based
on time and space complexity.
CO2 - Design applications of linear data structures and apply appropriate algorithms for solving
problems like sorting and searching.
CO3 - Demonstrate the representation and traversal techniques of graphs and their applications
CO4 - Design a solution by using branch and bound, backtracking techniques and implement the
various non-linear data structures and perform the intended operations.
CO5 - Utilize the state space tree method for solving problems.
TEXT BOOKS
1. Anany Levitin, ―Introduction to the Design and Analysis of Algorithms‖, 3rd Edition,
Pearson Education, 2012.
2. Ellis Horowitz, Sartaj Sahni and Sanguthevar Rajasekaran, ―Fundamentals of Computer
Algorithms‖, 2nd Edition, Universities Press, 2007.
3. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest and Clifford Stein,
―Introduction to Algorithms‖, 4th Edition, MIT Press, 2022.
REFERENCES
1. Goodrich MT, Tamassia R, Goldwasser MH., ― Data structures and Algorithms in Python‖,
John Wiley and Sons Ltd; 2013.
2. Alfred V. Aho, John E. Hopcroft and Jeffrey D. Ullman, ―Data Structures and Algorithms
David E. Goldberg, ―Genetic Algorithm In Search Optimization And Machine Learning‖
Pearson Education India, 2013
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 1 - - 2 2 3 1 2 2 2 2 3 3 3
2 3 2 - - 3 3 3 1 2 2 2 2 3 3 3
3 3 - 1 - 2 2 2 1 2 2 2 2 3 3 3
4 3 2 1 1 2 2 2 1 2 2 2 2 3 3 3
5 3 2 1 - 2 2 2 1 2 2 2 1 3 3 3
AVG 2.8 1.8 1 1 - 2.2 2.4 2 2 2 2 1.8 3 3 3
REFERENCES
1. Cay S. Horstmann, “Core Java Fundamentals”, Volume 1, 11 th Edition, Prentice Hall, 2018.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 1 - - 2 2 3 1 2 2 2 2 3 3 3
2 3 2 - - 3 3 3 1 2 2 2 2 3 3 3
3 3 - 1 - 2 2 2 1 2 2 2 2 3 3 3
4 3 2 1 1 2 2 2 1 2 2 2 2 3 3 3
5 3 2 1 - 2 2 2 1 2 2 2 1 3 3 3
AVG 2.8 1.8 1 1 - 2.2 2.4 2 2 2 2 1.8 3 3 3
LIST OF EXPERIMENTS
1. Implement Linear Search and recursive Binary Search. Determine the time required to search
for an element. Repeat the experiment for different values of n, the number of elements in the
list to be searched and plot a graph of the time taken versus n.
2. Given a text txt [0...n-1] and a pattern pat [0...m-1], write a function search (char pat [ ], char
txt [ ]) that prints all occurrences of pat [ ] in txt [ ]. You may assume that n > m.
3. Sort a given set of elements using the Insertion sort and Heap sort methods and determine the
time required to sort the elements. Repeat the experiment for different values of n, the number
of elements in the list to be sorted and plot a graph of the time taken versus n.
4. Develop a program to implement graph traversal using Breadth First Search and Depth First
Search
5. From a given vertex in a weighted connected graph, develop a program to find the shortest
paths to other vertices using Dijkstra’s algorithm.
6. Find the minimum cost spanning tree of a given undirected graph using Prim’s algorithm. 5.
Implement Floyd’s algorithm for the All-Pairs- Shortest-Paths problem.
7. Develop a program to find out the maximum and minimum numbers in a given list of n
numbers using the divide and conquer technique.
8. Implement Merge sort and Quick sort methods to sort an array of elements and determine the
time required to sort. Repeat the experiment for different values of n, the number of elements
in the list to be sorted and plot a graph of the time taken versus n.
COURSE OUTCOMES: At the end of this course, the students will be able to:
CO1: Implement Linear data structure algorithms using arrays and Linked lists
CO2: Analyze the efficiency of algorithms using various frameworks
CO3: Analyze the various searching and sorting algorithms.
CO4: Apply graph algorithms to solve problems and analyze their efficiency.
CO5: Make use of algorithm design techniques like divide and conquer, dynamic programming and
greedy techniques to solve problems
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 1 - - 2 2 3 1 2 2 2 2 3 3 3
2 3 2 - - 3 3 3 1 2 2 2 2 3 3 3
3 3 - 1 - 2 2 2 1 2 2 2 2 3 3 3
4 3 2 1 1 2 2 2 1 2 2 2 2 3 3 3
5 3 2 1 - 2 2 2 1 2 2 2 1 3 3 3
AVG 2.8 1.8 1 1 - 2.2 2.4 2 2 2 2 1.8 3 3 3
OBJECT ORIENTED PROGRAMMING LABORATORY L T PC
0 0 3 2
COURSE OBJECTIVES
To build software development skills using java programming for real-world applications.
To understand and apply the concepts of classes, packages, interfaces, inheritance, exception
handling and file processing.
To develop applications using generic programming and event handling
LIST OF EXPERIMENTS
1. Solve problems by using sequential search, binary search, and quadratic sorting algorithms
(selection, insertion)
2. Develop stack and queue data structures using classes and objects.
3. Develop a java application with an Employee class and Generate pay slips for the employees
with their gross and net salary.
4. Write a Java Program to create an abstract class named Shape that contains two integers and
an empty method named printArea(). Each one of the classes contains only the method
printArea( ) that prints the area of the given shape.
5. Solve the above problem using an interface.
6. Implement exception handling and creation of user defined exceptions.
7. Write a java program that implements a multi-threaded application that has three threads. First
thread generates a random integer every 1 second and if the value is even, the second thread
computes the square of the number and prints. If the value is odd, the third thread will print the
value of the cube of the number.
8. Write a program to perform file operations.
9. Develop applications to demonstrate the features of generics classes.
10. Develop applications using JavaFX controls, layouts and menus.
11. Develop a mini project for any application using Java concepts.
TOTAL: 45 PERIODS
COURSE OUTCOMES: On completion of this course, the students will be able to
CO1 : Design and develop java programs using object oriented programming concepts
CO2 : Develop simple applications using object oriented concepts such as package, exceptions
CO3: Implement multithreading, and generics concepts
CO4 : Create GUIs and event driven programming applications for real world problems
CO5: Implement and deploy web applications using Java
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 1 - - 2 2 3 1 2 2 2 2 3 3 3
2 3 2 - - 3 3 3 1 2 2 2 2 3 3 3
3 3 - 1 - 2 2 2 1 2 2 2 2 3 3 3
4 3 2 1 1 2 2 2 1 2 2 2 2 3 3 3
5 3 2 1 - 2 2 2 1 2 2 2 1 3 3 3
AVG 2.8 1.8 1 1 - 2.2 2.4 2 2 2 2 1.8 3 3 3
BUSINESS ECONOMICS AND FINANCIAL ANALYSIS L T PC
0 0 3 2
UNIT – I: - Introduction to Business and Economics: Business: Structure of Business Firm, Theory
of Firm, Types of Business Entities, Limited Liability Companies, Sources of Capital for a Company,
Non-Conventional Sources of Finance. Economics: Significance of Economics, Micro and Macro
Economic Concepts, Concepts and Importance of National Income, Inflation, Money Supply in
Inflation, Business Cycle, Features and Phases of Business Cycle. Nature and Scope of Business
Economics, Role of Business Economist, Multidisciplinary nature of Business Economics.
UNIT – II: - Demand and Supply Analysis: Elasticity of Demand: Elasticity, Types of Elasticity,
Law of Demand, Measurement and Significance of Elasticity of Demand, Factors affecting Elasticity
of Demand, Elasticity of Demand in decision making, Demand Forecasting: Characteristics of Good
Demand Forecasting, Steps in Demand Forecasting, Methods of Demand Forecasting. Supply
Analysis: Determinants of Supply, Supply Function & Law of Supply.
UNIT- III: - Production, Cost, and Market Structures & Pricing: Production Analysis: Factors of
Production, Production Function, Production Function with one variable input, two variable inputs,
Returns to Scale, Different Types of Production Functions. Cost analysis: Types of Costs, Short run
and Long run Cost Functions. Market Structures: Nature of Competition, Features of Perfect
competition, Monopoly, Oligopoly, and Monopolistic Competition. Pricing: Types of Pricing,
Product Life Cycle based Pricing, Break Even Analysis, & Cost Volume Profit Analysis.
UNIT – IV:- Financial Accounting: Accounting concepts and Conventions, Accounting Equation,
Double-Entry system of Accounting, Rules for maintaining Books of Accounts, Journal, Posting to
Ledger, Preparation of Trial Balance, Elements of Financial Statements, and Preparation of Final
Accounts.
UNIT – V:- Financial Analysis through Ratios: Concept of Ratio Analysis, Liquidity Ratios,
Turnover Ratios, Profitability Ratios, Proprietary Ratios, Solvency, Leverage Ratios (simple
problems), Introduction to Fund Flow and Cash Flow Analysis (simple problems)
TEXT BOOKS
I. A.R. Aryasri, “Managerial Economics and Financial Analysis”, TMH Publications, 3nd Edition,
2007.
REFERENCE BOOKS:
II. D.N. Dwivedi, “Managerial Economics”, Vikas Publication House Pvt. Ltd, 2nd Edition, 2012.
III. S.N. Maheshwari & S.K.Maheshwari, “Financial Accounting”, Vikas Publication House Pvt.Ltd,
4th Edition, 2012.
V. J.V. Prabhakar Rao & P.V. Rao, “Managerial Economics & Financial Analysis”, Maruthi
Publishers, 1st Revised Edition, 2011.
VI. M.Kasi Reddy & Saraswathi, “Managerial Economics and Financial Analysis”, PHI Publications,
New Delhi, 10th Revised Edition, 2012.
VII. Varshney & Maheswari, “Managerial Economics”, Sulthan Chand Publishers, 1st Revised
Edition, 2009.
II YEAR II SEMESTER
UNIT III 9
Transactions: Transaction concept – A simple transaction model - Storage structure - Transaction
atomicity and durability - Transaction isolation – Serializability – Recoverable schedules,
Cascadeless schedules. Concurrency control: Lock-based protocols – Locks, granting of locks,
The two-phase locking protocol, implementation of locking, Graph-based protocols. Deadlock
handling: Deadlock prevention, Deadlock detection and recovery.
UNIT IV 9
Distributed Database: Distributed Database concepts, Data Fragmentation, Replication, Allocation
Techniques for Distributed Database Design, Distributed Database Architectures, Types of
distributed database Distributed Catalog Management, Transaction Management, Concurrency
Control and Recovery, Query processor and optimization in distributed database, Views -
Integrity Procedures, Functions, Cursor and Triggers
UNIT V 9
NOSQL Databases: Introduction to NOSQL, CAP Theorem, Document-Based NOSQL System
and MongoDB, NOSQL Key-Value Stores, Column-Based, NOSQL Graph Database and Neo4j,
Big Data Technologies Based on MapReduce and Hadoop: Introduction, HDFS, MapReduce,
HadoopV2 alias YARN.
Case Study: Different types of high level databases – MongoDB, Hadoop/Hbase, Redis, IBM
Cloudant, DynamoDB, Cassandra and CouchDB etc . Tips for choosing the right database for the
given problem.
TEXT BOOK
1. Silberschatz A, Korth HF, Sudharshan S. Database System Concepts. Sixth Edition, TMH
publishing company limited; 2011. (unit 1,2,3)
2. Elmasri R, Navathe SB. Fundamentals of Database Systems. Seventh Edition, Addison
Wesley;2017. (unit 4&5)
REFERENCES
1. Garcia-Molina H, Ullman JD, Widom J. Database System ; The complete book. Second
Edition, Pearson Education India, 2011.
2. Ramakrishnan R, Gehrke J. Database Management Systems. Third Edition, TMH; 2003.
COURSE OUTCOMES: At the end of this course, the students will be able to:
CO1: Formulate and apply relational algebraic expressions, SQL and PL/SQL statements to query
relational databases.
CO2: Design and build ER models for real world databases.
CO3: Design and build a normalized database management system for real world databases.
CO4: Understand and apply the principles of transaction processing and concurrency control.
CO5: To learn different high level databases and selection of right database.
CO-PO-PSO Mapping
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 1 3 1 1 - - - 1 3 3 3 2 1 3
2 3 1 1 2 2 - - - 3 2 1 1 3 1 2
3 3 3 2 1 2 - - - 3 3 1 2 2 2 2
4 1 2 2 3 2 - - - 3 1 3 1 1 2 1
5 2 2 1 1 3 - - - 1 2 2 3 1 3 3
AVG 2 2 2 2 2 - - - 2 2 2 2 2 2 2
OPERATING SYSTEMS LTPC
3 0 0 3
COURSE OBJECTIVES:
To understand the basics and functions of operating systems.
To understand processes and threads
To analyze scheduling algorithms and process synchronization.
To understand the concept of deadlocks.
To analyze various memory management schemes.
To be familiar with I/O management and file systems.
To be familiar with the basics of virtual machines and Mobile OS like iOS and Android.
UNIT I INTRODUCTION 7
Operating System Overview - Objectives and Functions - Evolution of Operating System; Operating
System Structures - User Operating System Interface - System Calls – System Programs - Design and
Implementation - Structuring methods.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 1 3 1 1 - - - 1 3 3 3 2 1 3
2 3 1 1 2 2 - - - 3 2 1 1 3 1 2
3 3 3 2 1 2 - - - 3 3 1 2 2 2 2
4 1 2 2 3 2 - - - 3 1 3 1 1 2 1
5 2 2 1 1 3 - - - 1 2 2 3 1 3 3
AVG 2 2 2 2 2 - - - 2 2 2 2 2 2 2
COURSE OUTCOMES: At the end of this course, the students will be able to:
CO1 : Define and implement UNIX Commands.
CO2 : Compare the performance of various CPU Scheduling Algorithms.
CO3 : Compare and contrast various Memory Allocation Methods.
CO4 :Define File Organization and File Allocation Strategies.
CO5 : Implement various Disk Scheduling Algorithms.
OBJECTIVES:
To be familiar with Web page design using HTML/XML and style sheets
To be exposed to creation of user interfaces using Java frames and applets.
To learn to create dynamic web pages using server side scripting.
To learn to write Client Server applications.
To be familiar with the PHP programming.
To be exposed to creating applications with AJAX
LIST OF EXPERIMENTS
1. Create a web page with the following using HTML
a. To embed a map in a web page
b. To fix the hot spots in that map
c. Show all the related information when the hot spots are clicked.
2. Create a web page with the following.
3. Cascading style sheets.
4. Embedded style sheets.
5. Inline style sheets. Use our college information for the web pages.
6. Validate the Registration, user login, user profile and payment by credit card pages using
JavaScript.
7. Write programs in Java using Servlets:
(i) To invoke servlets from HTML forms
(ii) Session tracking using hidden form fields and Session tracking for a hit count
8. Write programs in Java to create three-tier applications using servlets for conducting on-
line examination for displaying student mark list. Assume that student information is
available in a database which has been stored in a database server.
9. Install TOMCAT web server. Convert the static web pages of programs into dynamic web
pages using servlets (or JSP) and cookies. Hint: Users information (user id, password, credit
card number) would be stored in web.xml. Each user should have a separate
Shopping Cart.
10. Redo the previous task using JSP by converting the static web pages into dynamic web
pages. Create a database with user information and books information. The books catalogue
should be dynamically loaded from the database.
11. Create and save an XML document at the server, which contains 10 users Information.
Write a Program, which takes user Id as an input and returns the User details by taking
the user information from the XML document
12. Validate the form using PHP regular expression.
13. PHP stores a form data into database.
14. Write a web service for finding what people think by asking 500 people‘s opinion for any
consumer product.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon Completion of the course, the students will be able to:
Construct Web pages using HTML/XML and style sheets.
Build dynamic web pages with validation using Java Script objects and by applying
different event handling mechanisms.
Develop dynamic web pages using server side scripting.
Use PHP programming to develop web applications.
Construct web applications using AJAX and web services.
SOFTWARE REQUIRED:
ARTIFICIAL INTELLIGENCE L T P C
3 0 0 3
OBJECTIVES
The main objectives of this course are to:
Learn the basic AI approaches to develop problem solving agent
Learn game playing
Perform knowledge representation in Logic
Perform probabilistic reasoning under uncertainty
Perform Planning and Controlling Uncertain movements in robots
UNIT I PROBLEM-SOLVING 9
Foundations of Artificial Intelligence, History of Artificial Intelligence, State of the Art, Risk and
Benefits of AI Intelligent Agents – Agents and Environments, Concept of Rationality, Nature of
Environments, Structure of Agents; Problem-solving – Problem-Solving Agents, Search Algorithms,
Uninformed Search Strategies Informed Search Strategies, Heuristic Functions
UNIT V ROBOTICS 9
Reinforcement Learning – Learning from Rewards, Passive and Active Reinforcement Learning,
Policy Search Applications; Robotics – Robots, Robots Hardware, Robotic Perception, Planning and
Control, Planning Uncertain Movements, Reinforcement Learning in Robotics, Humans and
Robots, Robotic Frameworks
Application Domains
TOTAL : 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, students will be able to
CO1 Apply intelligent agent frameworks for toy problems
CO2 Apply search algorithms for game playing
CO3 Perform logical reasoning
CO4 Perform probabilistic reasoning under uncertainty
CO5 Learn robotic frameworks for various application domains
TEXT BOOKS
1. Stuart Russell and Peter Norvig, Artificial Intelligence: A Modern Approach, Pearson, 4th
Edition, 2020
REFERENCES
1. Dan W. Patterson, “Introduction to AI and ES”, Pearson Education,2007
2. Kevin Night, Elaine Rich, and Nair B., “Artificial Intelligence”, McGraw Hill, 2008
3. Patrick H. Winston, "Artificial Intelligence", Third Edition, Pearson Education, 2006
4. Deepak Khemani, “Artificial Intelligence”, Tata McGraw Hill Education, 2013
5. https://nptel.ac.in/
CO’s-PO’s & PSO’s MAPPING
POs PSOs
COs
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 - 3 3 3 - - - - - - 3 3 3 3
2 3 3 3 - 3 - - - - - - 3 3 3 3
3 3 - 3 - 3 - - - - - - 3 3 3 3
4 3 - 3 3 3 - - - - - - 3 3 3 3
5 3 3 3 - 3 - - - - - - 3 3 3 3
COURSE OBJECTIVES
To design and implement search strategies.
To implement game playing and CSP techniques.
To develop systems with logical and probabilistic reasoning.
LIST OF EXPERIMENTS
1. Implement intelligent agents – Vacuum World Problem
2. Implement basic search strategies – 8-Puzzle, 8 - Queens problem
3. Implement A* algorithm – Route-Finding problem
4. Implement Minimax algorithm for game playing (Alpha-Beta pruning)
5. Solve constraint satisfaction problems (Cryptarithmetic, MapColouring)
6. Study of Prolog
7. Implement forward chaining, backward chaining, and resolution strategies in First-order
logic
8. Building Naive Bayes model
9. Probabilistic Inferencing in Bayesian Network
10. Implementation of policy search in Reinforcement learning
TOTAL: 45 PERIODS
LIST OF EQUIPMENT FOR A BATCH OF 30 STUDENTS:
Standalone desktops with C/C++/Java/Python/Prolog/JESS compiler 30 Nos.
COURSE OUTCOMES:
Upon successful completion of the course, the students should be able to
CO1 Design and implement search strategies
CO2 Implement game playing and CSP techniques
CO3 Develop logical reasoning and probabilistic systems
CO’s-PO’s & PSO’s MAPPING
POs PSOs
COs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
1 3 3 3 3 - - - - 3 3 2 3 3 2
2 3 2 3 3 3 - - - 3 2 3 3 3 3
3 3 3 3 3 3 - - - 3 3 3 3 3 3
UNIT IV TESTING 9
Taxonomy Of Software Testing – Types Of S/W Test – Black Box Testing – Testing Boundary
Conditions – Structural Testing – Test Coverage Criteria Based On Data Flow Mechanisms –
Regression Testing – Unit Testing – Integration Testing – Validation Testing – System Testing And
Debugging – Software Implementation Techniques.
TEXT BOOKS:
1. Ian Sommerville, “Software engineering”, Seventh Edition, Pearson Education Asia, 2007.
2. Roger S. Pressman, “Software Engineering – A practitioner’s Approach”, Sixth Edition,
McGraw-Hill International Edition, 2005.
REFERENCES:
1. Watts S.Humphrey,”A Discipline for Software Engineering”, Pearson Education, 2007.
2. James F.Peters and Witold Pedrycz,”Software Engineering, An Engineering Approach”,
Wiley-India, 2007.
3. Stephen R.Schach, “ Software Engineering”, Tata McGraw-Hill Publishing Company
Limited, 2007.
4. S.A.Kelkar,”Software Engineering”, Prentice Hall of India Pvt, 2007.
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 2 - - - - 1 1 2 2 2 1
2 2 3 2 3 2 - - - 2 2 3 2 3 2 1
3 2 3 2 1 1 - - - 2 2 3 2 2 3 1
4 2 3 2 2 3 - - - 2 2 3 2 2 3 1
5 2 3 1 2 2 - - - - - - 1 3 2 2
AVG 2 2 1 2 2 - - - 1.2 1 1 2 2 2 1
IV YEAR I SEMESTER
Computer Vision - Geometric primitives and transformations - Photometric image formation - The
digital camera - Point operators - Linear filtering - More neighborhood operators - Fourier transforms
- Pyramids and wavelets - Geometric transformations - Global optimization.
Points and patches - Edges - Lines - Segmentation - Active contours - Split and merge - Mean shift
and mode finding - Normalized cuts - Graph cuts and energy-based methods.
UNIT IV 3D RECONSTRUCTION 6
TEXT BOOKS:
1. Richard Szeliski, “Computer Vision: Algorithms and Applications”, Springer- Texts in Computer
Science, Second Edition, 2022.
2. Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Pearson Education, Second
Edition, 2015.
3. Dieter Schmalstieg, Tobias Hollerer, “Augmented Reality: Principles & Practice”, Addison
Wesley, 2016
4. William R. Sherman, Alan B. Craig: Understanding Virtual Reality – Interface, Application,
Design”, Morgan Kaufmann, 2003
REFERENCES:
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer Vision, Second
Edition, Cambridge University Press, March 2004.
2. Christopher M. Bishop; Pattern Recognition and Machine Learning, Springer, 2006 3. E. R.
Davies, Computer and Machine Vision, Fourth Edition, Academic Press, 2012.
COURSE OUTCOMES: At the end of this course, the students will be able to:
CO1:To understand basic knowledge, theories and methods in image processing and computer
vision. CO2:To implement basic and some advanced image processing techniques in OpenCV.
CO3:To apply 2D a feature-based based image alignment, segmentation and motion estimations.
CO4:To apply 3D image reconstruction techniques
CO5:To design and develop innovative image processing and computer vision applications.
CO6: : Develop AR/VR applications in different domains
TEXT BOOKS:
1. Richard Szeliski, “Computer Vision: Algorithms and Applications”, Springer- Texts in Computer
Science, Second Edition, 2022.
2. Computer Vision: A Modern Approach, D. A. Forsyth, J. Ponce, Pearson Education, Second
Edition, 2015.
3. Dieter Schmalstieg, Tobias Hollerer, “Augmented Reality: Principles & Practice”, Addison
Wesley, 2016
4. William R. Sherman, Alan B. Craig: Understanding Virtual Reality – Interface, Application,
Design”, Morgan Kaufmann, 2003
REFERENCES:
1. Richard Hartley and Andrew Zisserman, Multiple View Geometry in Computer Vision, Second
Edition, Cambridge University Press, March 2004.
2. Christopher M. Bishop; Pattern Recognition and Machine Learning, Springer, 2006 3. E. R.
Davies, Computer and Machine Vision, Fourth Edition, Academic Press, 2012.
Professional Elective 4
UNIT II SOCKETS 9
Address structures, value – result arguments, Byte ordering and manipulation function and related
functions Elementary TCP sockets – Socket, connect, bind, listen, accept, fork and exec function,
concurrent servers, Close function.
TEXT BOOKS:
1.W. Richard Stevens, “UNIX Network Programming Vol. I Sockets API”, 3nd Edition, Pearson,
2015.
2. W.Richard Stevens, “UNIX Network Programming”, 1st Edition, PHI, 1990.
REFERENCES:
1. King abls, “UNIX for Programmers and Users”, 3rd Edition, Pearson, 2003.
2. M.J.Rochkind, “Advanced UNIX Programming”, 2nd Edition, Pearson, 2000.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 1 - - - 2 3 - - - - 2 - - -
2 3 2 - - - 3 3 - - - - 2 - - -
3 3 - 1 - - 2 2 - - - - 2 - - -
4 3 2 1 1 - 2 2 - - - - 2 - - -
5 3 2 1 - - 2 2 - - - - 1 - - -
TEXT BOOKS:
1.Fog Computing: Theory and Practice by Assad Abbas, Samee U. Khan, Albert Y. Zomaya
2. IoT and Edge Computing for Architects - Second Edition, by Perry Lea, Publisher: Packt
Publishing, 2020, ISBN: 9781839214806
3. Raspberry Pi Cookbook, 3rd Edition, by Simon Monk, Publisher: O'Reilly Media, Inc., 2019,
ISBN: 978149204322
4. David Jensen, “Beginning Azure IoT Edge Computing: Extending the Cloud to the
Intelligent Edge, MICROSOFT AZURE
REFERENCES:
1. Fog and Edge Computing: Principles and Paradigms (Wiley Series on Parallel and
Distributed Computing) by RajkumarBuyya and Satish Narayana Srirama
2. FlavioBonomi, Rodolfo Milito, Jiang Zhu, SateeshAddepalli, ―Fog Computing and
Its Role in the Internet of Thingsǁ, MCC’12, August 17, 2012, Helsinki, Finland.
Copyright 2012 ACM 978- 1-4503-1519-7/12/08... $15.00.
3. Shanhe Yi, Cheng Li, Qun Li, ―A Survey of Fog Computing: Concepts,
Applications and Issuesǁ, Mobidata’15, ACM 978-1-4503-3524-9/15/06, DOI:
10.1145/2757384.2757397, June 21, 2015, Hangzhou, China..
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 - 2 3 - - - - 2 2 2 1
2 2 3 2 3 - 3 3 - - - - 2 3 2 1
3 2 3 2 1 - 2 2 - - - - 2 2 3 1
4 2 3 2 2 - 2 2 - - - - 2 2 3 1
5 2 3 1 2 - 2 2 - - - - 1 3 2 2
MULTIMEDIA LTPC
3 003
COURSE OBJECTIVES :
To grasp the fundamental knowledge of Multimedia elements and systems
To get familiar with Multimedia file formats and standards
To learn the process of Authoring multimedia presentations
To learn the techniques of animation in 2D and 3D and for the mobile UI
To explore different popular applications of multimedia
UNIT IV ANIMATION 9
Principles of animation: staging, squash and stretch, timing, onion skinning, secondary action, 2D, 2
½ D, and 3D animation, Animation techniques: Keyframe, Morphing, Inverse Kinematics, Hand
Drawn, Character rigging, vector animation, stop motion, motion graphics, , Fluid Simulation,
skeletal animation, skinning Virtual Reality, Augmented Reality.
TEXT BOOKS:
1. Ze-Nian Li, Mark S. Drew, Jiangchuan Liu, Fundamentals of Multimedia”, Third Edition,
Springer Texts in Computer Science, 2021.
REFERENCES:
1.John M Blain, The Complete Guide to Blender Graphics: Computer Modeling &
Animation, CRC press, 3rd Edition, 2016.
2. Gerald Friedland, Ramesh Jain, “Multimedia Computing”, Cambridge University Press,
2018.
3. Prabhat K.Andleigh, Kiran Thakrar, “Multimedia System Design”, Pearson Education, 1st
Edition, 2015.
4.Mohsen Amini Salehi, Xiangbo Li, “Multimedia Cloud Computing Systems”, Springer
Nature, 1st Edition, 2021.
5.Mark Gaimbruno, “3D Graphics and Animation”, Second Edition, New Riders, 2002.
6.Rogers David, “Animation: Master – A Complete Guide (Graphics Series)”, Charles River
Media, 2006.
7.Rick parent, “Computer Animation: Algorithms and Techniques”, Morgan Kauffman, 3rd
Edition, 2012.
8.Emilio Rodriguez Martinez, Mireia Alegre Ruiz, “UI Animations with Lottie and After
Effects: Create, render, and ship stunning After Effects animations natively on mobile with React
Native”, Packt Publishing, 2022.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 3 2 3 - - - 3 2 1 2 3 2 3
2 3 3 3 3 3 - - - 3 3 2 2 3 2 3
3 3 3 3 3 3 - - - 3 3 2 3 3 2 3
4 3 3 3 3 3 2 - - 3 3 3 3 3 3 3
5 3 3 3 3 3 2 - - 3 3 3 3 3 3 3
UNIT I INTRODUCTION 9
Ethical Hacking Overview - Role of Security and Penetration Testers .- Penetration-Testing
Methodologies- Laws of the Land - Overview of TCP/IP- The Application Layer - The Transport
Layer - The Internet Layer - IP Addressing .- Network and Computer Attacks - Malware - Protecting
Against Malware Attacks.- Intruder Attacks - Addressing Physical Security.
COURSE OUTCOMES:
Upon completion of the course, students will be able to
CO1: To express knowledge on basics of computer based vulnerabilities
CO2: To gain understanding on different foot printing, reconnaissance and scanning methods.
CO3: To demonstrate the enumeration and vulnerability analysis methods.
CO4: To gain knowledge on hacking options available in Web and wireless applications.
CO5: To acquire knowledge on the options for network protection.
CO6: To use tools to perform ethical hacking to expose the vulnerabilities.
TEXT BOOKS:
1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and
Network Defense, Course Technology, Delmar Cengage Learning, 2010.
2. The Basics of Hacking and Penetration Testing - Patrick Engebretson, SYNGRESS,
Elsevier, 2013.
3. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Dafydd
Stuttard and Marcus Pinto, 2011.
REFERENCES:
1. Black Hat Python: Python Programming for Hackers and Pentesters, Justin Seitz , 2014.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 3 1 - - - 2 3 1 2 3 3 3
2 2 2 2 3 3 - - - 1 2 2 3 1 1 3
3 3 3 3 3 3 - - - 2 1 1 2 2 1 3
4 3 3 1 1 1 - - - 1 3 1 3 2 1 1
5 3 2 2 2 3 - - - 2 3 2 2 2 3 3
AVG 2.8 2.4 2 2.4 2.2 - - - 1.6 2.4 1.4 2.4 2 1.8 2.6
DEEP LEARNING LTPC
3 003
COURSE OBJECTIVES :
To understand and need and principles of deep neural networks
To understand CNN and RNN architectures of deep neural networks
To comprehend advanced deep learning models
To learn the evaluation metrics for deep learning models
Define under complete autoencoders and their role in dimensionality reduction.
COURSE OUTCOMES:
Upon completion of the course, students will be able to
CO1: Explain the basics in deep neural networks
CO2: Apply Convolution Neural Network for image processing
CO3: Apply Recurrent Neural Network and its variants for text analysis
CO4: Apply model evaluation for various applications
CO5: Apply autoencoders and generative models for suitable applications
TEXT BOOKS:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, ``Deep Learning'', MIT Press, 2016.
2. Andrew Glassner, “Deep Learning: A Visual Approach”, No Starch Press, 2021.
REFERENCES:
1. Salman Khan, Hossein Rahmani, Syed Afaq Ali Shah, Mohammed Bennamoun, ``A Guide
to Convolutional Neural Networks for Computer Vision'', Synthesis Lectures on Computer Vision,
Morgan & Claypool publishers, 2018.
2. Yoav Goldberg, ``Neural Network Methods for Natural Language Processing'', Synthesis
Lectures on Human Language Technologies, Morgan & Claypool publishers, 2017.
3. Francois Chollet, ``Deep Learning with Python'', Manning Publications Co, 2018.
4. Charu C. Aggarwal, ``Neural Networks and Deep Learning: A Textbook'', Springer
International Publishing, 2018.
5. Josh Patterson, Adam Gibson, ``Deep Learning: A Practitioner's Approach'', O'Reilly
Media, 2017.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 1 - - - 2 3 - - - - 2 - - -
2 3 2 - - - 3 3 - - - - 2 - - -
3 3 - 1 - - 2 2 - - - - 2 - - -
4 3 2 1 1 - 2 2 - - - - 2 - - -
5 3 2 1 - - 2 2 - - - - 1 - - -
PROFESSIONAL ELECTIVE 3
3003
OBJECTIVES:
To make the student understand the basic concepts of mobile application development
Be aware of Characteristics of mobile applications, User-interface design, basics of graphics and
multimedia
To gain knowledge about testing and publishing of Android application
To facilitate students to understand android SDK
To help students to gain a basic understanding of Android application development
UNIT – I 11
Mobile Application Development - Mobile Applications and Device Platforms - Alternatives for Building
Mobile Apps -Comparing Native vs. Hybrid Applications -The Mobile Application Development
Lifecycle-The Mobile Application Front-End-The Mobile Application Back-EndKey Mobile Application
Services-What is Android-Android version history-Obtaining the Required Tools- Launching Your First
Android Application-Exploring the IDE-Debugging Your Application-Publishing Your Application
UNIT – II 7
UNIT – III 10
Using Basic Views-Using Picker Views -Using List Views to Display Long Lists-Understanding
Specialized Fragments - Using Image Views to Display Pictures -Using Menus with ViewsUsing
WebView- Saving and Loading User Preferences-Persisting Data to Files-Creating and Using Databases.
UNIT – IV 7
Testing Android applications, Publishing Android application, Using Android preferences, Managing
Application resources in a hierarchy, working with different types of resources.
UNIT – V 10
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
Using Common Android APIs: Using Android Data and Storage APIs, Managing data using Sqlite,
Sharing Data between Applications with Content Providers, Using Android Networking APIs, Using
Android Web APIs, Using Android Telephony APIs, Deploying Android Application to the World.
TOTAL:45 PERIODS
OUTCOMES:
1. Jerome DiMarzio, “Beginning Android Programming with Android Studio”, 4th edition.
2. T1. Lauren Darcey and Shane Conder, “Android Wireless Application Development”, Pearson
Education, 2nd ed. (2011)
REFERENCE BOOKS:
1. Dawn Griffiths, David Griffiths, “Head First Android Development: A Brain-Friendly Guide”, 2017.
2. Neil Smyth , “Android Studio 3.0 Development Essentials: Android”, 8th Edition.
00 42
Objectives
1. Install the Android SDK and developer tools and build a test project to confirm that those tools are
properly installed and configured
2. Write a program using a Table Layout for our restaurant data entry form, add a set of radio buttons to
represent the type of restaurant
3. Write a program using activity class to show different events.
4. Write a program to send user from one application to another. (For example redirection to map)
5. Write a program to play audio files.
6. Write a program to play video files.
7. Write a program to capture image using built in camera.
8. Write a program to send SMS.
9. Write a program to convert text to speech.
10. Write a program to call a number.
TOTAL:30 PERIODS
OUTCOMES
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 3 - - - 1 1 2 1 2 3 3
2 2 1 3 2 2 - - - 3 2 2 3 3 2 1
3 2 2 2 1 2 - - - 1 1 1 1 1 1 2
4 1 3 1 1 3 - - - 1 1 3 2 1 3 1
5 1 1 3 1 3 - - - 1 1 2 1 3 2 1
AVG 1.6 1.8 2 1.4 2.6 - - - 1.4 1.2 2 1.6 2 2.2 1.6
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
3003
OBJECTIVES:
Working of Web - HTML Markup for Structure - Creating simple page - Marking up text - Adding Links -
Adding Images - Table Markup - Forms - HTML5
Systematic approach to build an E-Commerce: Planning, System Analysis, System Design, Building the
system, Testing the system, Implementation and Maintenance, Optimize Web Performance – Choosing
hardware and software – Other E-Commerce Site tools – Developing a Mobile Website and Mobile App
Digital Commerce Marketing and Advertising strategies and tools – Internet Marketing Technologies –
Social Marketing – Mobile Marketing – Location based Marketing – Ethical, Social, Political Issues in E-
Commerce
Case Study : Identify Key components, strategy, B2B, B2C Models of E-commerce Business model of any
e-commerce website - Mini Project : Develop E-Commerce project in any one of Platforms like Woo-
Commerce, Magento or Opencart
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
TOTAL : 45 PERIODS
OUTCOMES:
On Successful completion of the course ,Students will be able to
• Design Website using HTML CSS and JS
• Design Responsive Sites
• Manage, Maintain and Support Web Apps
TEXT BOOK:
1. Kenneth C.Laudon, Carol Guercio Traver ―E-Commerce‖, Pearson, 10th Edition, 2016
REFERENCES
1. http://docs.opencart.com/
2. http://devdocs.magento.com/
3. http://doc.prestashop.com/display/PS15/Developer+tutorials
4. Robbert Ravensbergen, ―Building E-Commerce Solutions with WooCommerce‖, PACKT, 2nd Edition
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 3 1 2 2 2 2 3 2 3 3 -
2 2 2 2 3 3 2 2 2 2 2 3 2 3 3 -
3 2 3 2 1 3 2 2 3 2 1 2 2 3 3 -
4 1 2 2 2 3 2 2 1 2 3 2 3 3 3 -
5 3 1 3 2 3 3 2 2 2 2 3 3 3 3 -
AVG 2 2 2 2 3 2 2 2 2 2 3 2 3 3 -
3003
Course Objectives:
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
To have knowledge on accessing, storing and manipulating the huge data from different resources.
To understand the working environment of Pig and Hive for processing the structured and unstructured
data.
To differentiate the RDBMS and Hive architectures and implement queries to process the data using
sqoop.
To have a knowledge on searching mechanisms using solr
Architecture – Availability - Fault tolerance - Optimization for large scale data. Structured and
Unstructured Data - Taxonomy of NoSQL Implementation - Discussion of basic architecture of Hbase,
Cassandra and MongoDb.
Full text Indexing and Searching - Indexing with Lucene - Distributed Searching with elastic search
Introduction to Hadoop Environment - Data Flow - Hadoop I/O - Query languages for Hadoop - Hadoop
and Amazon Cloud.
TOTAL: 45 PERIODS
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 2 3 1 3 2 1 - - -
2 2 3 3 2 3 1 1 - - -
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
3 1 3 2 1 2 3 - - -
4 1 2 3 3 2 1 - - -
5 1 2 3 1 2 3 - - -
AVG 0.6 5.4 3.6 5.6 4.6 2.2 3.6 4.6 2.6 3.6 1.4 2.2 - - -
1. Downloading and installing Hadoop; Understanding different Hadoop modes. Startup scripts,
Configuration files.
2. Hadoop Implementation of file management tasks, such as Adding files and directories,
4. Run a basic Word Count Map Reduce program to understand Map Reduce Paradigm.
Software Requirements:
COURSE OUTCOMES:
To understand the specialized aspects of big data including big data application, and big data
analytics.
To study different types Case studies on the current research and applications of the Hadoop and
big data in industry
Student must be know the recent research trends related to Hadoop File System, MapReduce and
Google File System etc
TEXT BOOKS
REFERENCES
1. Sanjay Ghemawat, Howard Gobioff, and Shun-Tak Leung The Google File System
2. http://wiki.apache.org/hadoop/
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 2 3 1 3 2 1 3 1
2 2 3 3 2 3 1 1 2 3 3
3 1 3 2 1 2 3 2
4 1 2 3 3 2 1 1 2
5 1 2 3 1 2 3 3 1
AVG 0.6 5.4 3.6 5.6 4.6 2.2 3.6 4.6 2.6 3.6 1.4 2.2 3.6 5.6 4.6
2023
COURSE OBJECTIVES:
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
UNIT I INTRODUCTION 6
Cyber Security – History of Internet – Impact of Internet – CIA Triad; Reason for Cyber Crime – Need for
Cyber Security – History of Cyber Crime; Cybercriminals – Classification of Cybercrimes – A Global
Perspective on Cyber Crimes; Cyber Laws – The Indian IT Act – Cybercrime and Punishment.
OSWAP; Malicious Attack Threats and Vulnerabilities: Scope of Cyber-Attacks – Security Breach –
Malicious Attacks Types – Malicious Software – Common Attack Vectors – Social engineering Attack –
Wireless Network Attack – Web Application Attack – Attack Tools – Countermeasures.
Harvester – Whois – Netcraft – Host – Extracting Information from DNS – Extracting Information from E-
mail Servers – Social Engineering Reconnaissance; Scanning – Port Scanning – Network Scanning and
Vulnerability Scanning – Scanning Methodology – Ping Sweer Techniques – Nmap Command Switches –
FIN Scans – Banner Grabbing and OS Finger printing Techniques.
Host -Based Intrusion Detection – Network -Based Intrusion Detection – Distributed or Hybrid Intrusion
Detection – Intrusion Detection Exchange Format – Honeypots – Example System Snort.
Firewalls and Intrusion Prevention Systems: Need for Firewalls – Firewall Characteristics and Access
Policy – Types of Firewalls – Firewall Basing – Firewall Location and Configurations – Intrusion
Prevention Systems – Example Unified Threat Management Products.
TOTAL: 30 PERIODS
CO PO PSO
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 1 3 3 1 3 - 1 - 3 - 2 -
2 2 2 1 1 3 3 2 3 - 1 - 3 - 3 -
3 2 2 1 1 - 3 1 3 - 1 - 3 - 3 -
4 2 2 1 1 3 3 1 3 - 1 - 3 - 2 -
5 2 2 1 1 - 3 1 3 - 1 - 3 - 3 -
AVG 2 2 1 1 1 3 1 3 - 1 - 3 - 3 -
1. Anand Shinde, “Introduction to Cyber Security Guide to the World of Cyber Security”,
2. Nina Godbole, Sunit Belapure, “Cyber Security: Understanding Cyber Crimes, Computer
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
3. https://owasp.org/www-project-top-ten/
REFERENCES
1. David Kim, Michael G. Solomon, “Fundamentals of Information Systems Security”, Jones & Bartlett
Learning Publishers, 2013 (Unit 2)
2. Patrick Engebretson, “The Basics of Hacking and Penetration Testing: Ethical Hacking and
3. Kimberly Graves, “CEH Official Certified Ethical hacker Review Guide”, Wiley Publishers,
2007 (Unit 3)
4. William Stallings, Lawrie Brown, “Computer Security Principles and Practice”, Third Edition, Pearson
Education, 2015 (Units 4 and 5)
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 1 3 3 1 3 - 1 - 3 - 2 -
2 2 2 1 1 3 3 2 3 - 1 - 3 - 3 -
3 2 2 1 1 - 3 1 3 - 1 - 3 - 3 -
4 2 2 1 1 3 3 1 3 - 1 - 3 - 2 -
5 2 2 1 1 - 3 1 3 - 1 - 3 - 3 -
AVG 2 2 1 1 1 3 1 3 - 1 - 3 - 3 -
3003
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
COURSE OBJECTIVES:
Introduction - Examples of Various Learning Paradigms - Perspectives and Issues - Version Spaces - Finite
and Infinite Hypothesis Spaces - PAC Learning, VC Dimension. Model Combination Schemes, Voting,
Error-Correcting Output Codes, Bagging: Random Forest Trees, Boosting: Adaboost, Stacking.
Decision Trees: ID3, Classification and Regression Trees, Regression: Linear Regression, Multiple Linear
Regression, Logistic Regression, Neural Networks: Introduction, Perceptron, Multilayer Perceptron,
Support vector machines: Linear and Non-Linear, Kernel Functions, KNearest Neighbours.
Mining Frequent Patterns - basic concepts -Apriori algorithm, FP- Growth algorithm, Associationbased
Decision Trees. Design, Analysis and Evaluation of Machine Learning Experiments, Other Issues:
Handling imbalanced data sets.
Big Data Overview - Background of Data Analytics - Role of Distributed System in Big Data - Role of
Data Scientist - Current Trend in Big Data Analytics. Information retrieval search engine, categories of
data, inverted index. Design- field attributes and types. Indexing- indexing tool. Indexing operations using
csv documents. Searching data- parameters, default query.
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
TOTAL : 45 PERIODS
COURSE OUTCOME:
1. Recognize the characteristics of Machine Learning techniques that enable to solve real
world problems
4.Identify and integrate more than one techniques to enhance the performance of
learning
5. Create probabilistic and unsupervised learning models for handling unknown pattern
TEXT BOOKS
1. Kevin P. Murphy ”Machine Learning: A Probabilistic Perspective”, The MIT Press, 2012
Reference Books
Edition2014.
2. Mehryar Mohri, Afshin Rostamizadeh, Ameet Talwalkar ”Foundations of Machine Learning”, MIT
Press,2012.
4. CharuC.Aggarwal,“DataClassificationAlgorithmsandApplications”,CRCPress,2014.
2014.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 2 3 2 2 1 - 1 - - - - - - -
2 1 3 2 2 - 1 1 - - - - - - -
3 1 1 3 1 1 1 - - - - - - - -
4 2 1 1 2 - 1 1 - - - - - - -
5 1 1 3 2 2 1 - - - - - - -
0 0 3 1.5
COURSE OUTCOMES:
LIST OF PROGRAMS:
a) Matrix addition
b) Matrix Subtraction
c) Matrix Multiplication
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
d) Matrix Inversion
e) Transpose of a Matrix
b) Find the minimum and maximum element of each row in the matrix
c) Find the minimum and maximum element of each column in the matrix
3. Write a Program to find the mean, median, standard deviation and mode using user defined
functions.
b) Summarize the data frame and observe the statistics of the DataFrame created
c) Observe the mean and standard deviation of the data frame and print the values.
5. Write a program to implement the Linear Regression for a sample training data set stored as
a .CSV file. Compute Mean Square Error by considering few test data sets.
6. Write a program to implement the Non-linear Regression for a sample training data set
stored as a .CSV file. Compute Mean Square Error by considering few test data sets.
7. Write a program to implement the Logistic Regression for a sample training data set stored
8. Write a program to implement the naïve Bayesian classifier for a sample training data set
stored as a .CSV file. Compute the accuracy of the classifier, considering few test data sets.
9. Write a program to implement k-Nearest Neighbor algorithm to classify the iris data set.
10. Write a program to implement Support Vector Machine algorithm to classify the iris data
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
11. Write a program to demonstrate the working of the decision tree based ID3 algorithm. Use
an appropriate data set for building the decision tree and apply this knowledge to classify a new
sample.
12. Write a program to demonstrate the working of the decision tree based CART algorithm. Use
an appropriate data set for building the decision tree and apply this knowledge to classify a new
sample.
13. Write a program to construct a Regression tree for cost estimation by assuming any
numerical dataset.
14. Write a program to calculate the accuracy, precision, and recall for your data set. Assume a set of
documents that need to be classified, use the naïve Bayesian Classifier model to perform this task.
15. Implement a single neural network and test for different logic gates.
16. Build an Artificial Neural Network by implementing the Backpropagation algorithm and test the same
using appropriate data sets.
REFERENCES:
2. Aurelien Geron, Hands-On Machine Learning with Scikit-Learn and TensorFlow, Oreilly,March 2017.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 1 2 3 2 2 1 - 1 - - - - - - -
2 1 3 2 2 - 1 1 - - - - - - -
3 1 1 3 1 1 1 - - - - - - - -
4 2 1 1 2 - 1 1 - - - - - - -
5 1 1 3 2 2 1 - - - - - - -
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
UNIT IV TESTING 9
Taxonomy Of Software Testing – Types Of S/W Test – Black Box Testing – Testing Boundary Conditions
– Structural Testing – Test Coverage Criteria Based On Data Flow Mechanisms – Regression Testing –
Unit Testing – Integration Testing – Validation Testing – System Testing And Debugging – Software
Implementation Techniques.
TOTAL: 45 PERIODS
COURSE OUTCOMES:
Upon completion of the course, students will be able to
CO1: Compare various Software Development Lifecycle Models.
CO2: Evaluate project management approaches as well as cost and schedule estimation strategies.
CO3: Perform formal analysis on specifications.
CO4: Architect and design using architectural styles and design patterns, and test the system.
CO5: Explain the quality assurance and standard in software.
TEXT BOOKS:
1. Ian Sommerville, “Software engineering”, Seventh Edition, Pearson Education Asia, 2007.
2. Roger S. Pressman, “Software Engineering – A practitioner’s Approach”, Sixth Edition,
McGraw-Hill International Edition, 2005.
REFERENCES:
1. Watts S.Humphrey,”A Discipline for Software Engineering”, Pearson Education, 2007.
2. James F.Peters and Witold Pedrycz,”Software Engineering, An Engineering Approach”, Wiley-
India, 2007.
3. Stephen R.Schach, “ Software Engineering”, Tata McGraw-Hill Publishing Company Limited,
2007.
4. S.A.Kelkar,”Software Engineering”, Prentice Hall of India Pvt, 2007.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 2 - - - - 1 1 2 2 2 1
2 2 3 2 3 2 - - - 2 2 3 2 3 2 1
3 2 3 2 1 1 - - - 2 2 3 2 2 3 1
4 2 3 2 2 3 - - - 2 2 3 2 2 3 1
5 2 3 1 2 2 - - - - - - 1 3 2 2
AVG 2 2 1 2 2 - - - 1.2 1 1 2 2 2 1
Professional Elective 4
● Implement the poll function to monitor multiple file descriptors for I/O readiness and optimize resource
utilization.
● Understand the fundamentals of UDP and its role in communication protocols.
UNIT II SOCKETS 9
Address structures, value – result arguments, Byte ordering and manipulation function and related
functions Elementary TCP sockets – Socket, connect, bind, listen, accept, fork and exec function,
concurrent servers, Close function.
TEXT BOOKS:
1.W. Richard Stevens, “UNIX Network Programming Vol. I Sockets API”, 3nd Edition, Pearson,
2015.
2. W.Richard Stevens, “UNIX Network Programming”, 1st Edition, PHI, 1990.
REFERENCES:
1. King abls, “UNIX for Programmers and Users”, 3rd Edition, Pearson, 2003.
2. M.J.Rochkind, “Advanced UNIX Programming”, 2nd Edition, Pearson, 2000.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 1 - - - 2 3 - - - - 2 - - -
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
2 3 2 - - - 3 3 - - - - 2 - - -
3 3 - 1 - - 2 2 - - - - 2 - - -
4 3 2 1 1 - 2 2 - - - - 2 - - -
5 3 2 1 - - 2 2 - - - - 1 - - -
TEXT BOOKS:
1.Fog Computing: Theory and Practice by Assad Abbas, Samee U. Khan, Albert Y. Zomaya
2. IoT and Edge Computing for Architects - Second Edition, by Perry Lea, Publisher: Packt
Publishing, 2020, ISBN: 9781839214806
3. Raspberry Pi Cookbook, 3rd Edition, by Simon Monk, Publisher: O'Reilly Media, Inc.,
2019, ISBN: 978149204322
4. David Jensen, “Beginning Azure IoT Edge Computing: Extending the Cloud to the
Intelligent Edge, MICROSOFT AZURE
REFERENCES:
4. Fog and Edge Computing: Principles and Paradigms (Wiley Series on Parallel and
Distributed Computing) by RajkumarBuyya and Satish Narayana Srirama
5. FlavioBonomi, Rodolfo Milito, Jiang Zhu, SateeshAddepalli, ―Fog Computing and
Its Role in the Internet of Thingsǁ, MCC’12, August 17, 2012, Helsinki, Finland.
Copyright 2012 ACM 978- 1-4503-1519-7/12/08... $15.00.
6. Shanhe Yi, Cheng Li, Qun Li, ―A Survey of Fog Computing: Concepts,
Applications and Issuesǁ, Mobidata’15, ACM 978-1-4503-3524-9/15/06, DOI:
10.1145/2757384.2757397, June 21, 2015, Hangzhou, China..
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 2 1 2 - 2 3 - - - - 2 2 2 1
2 2 3 2 3 - 3 3 - - - - 2 3 2 1
3 2 3 2 1 - 2 2 - - - - 2 2 3 1
4 2 3 2 2 - 2 2 - - - - 2 2 3 1
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
5 2 3 1 2 - 2 2 - - - - 1 3 2 2
MULTIMEDIA LTPC
3 003
COURSE OBJECTIVES :
To grasp the fundamental knowledge of Multimedia elements and systems
To get familiar with Multimedia file formats and standards
To learn the process of Authoring multimedia presentations
To learn the techniques of animation in 2D and 3D and for the mobile UI
To explore different popular applications of multimedia
UNIT IV ANIMATION 9
Principles of animation: staging, squash and stretch, timing, onion skinning, secondary action, 2D, 2 ½ D,
and 3D animation, Animation techniques: Keyframe, Morphing, Inverse Kinematics, Hand Drawn,
Character rigging, vector animation, stop motion, motion graphics, , Fluid Simulation, skeletal animation,
skinning Virtual Reality, Augmented Reality.
CO3: Author 2D and 3D creative and interactive presentations for different target multimedia applications.
CO4: Use different standard animation techniques for 2D, 21/2 D, 3D applications
CO5: Understand the complexity of multimedia applications in the context of cloud, security, bigdata
streaming, social networking, CBIR etc.,
TEXT BOOKS:
1. Ze-Nian Li, Mark S. Drew, Jiangchuan Liu, Fundamentals of Multimedia”, Third Edition,
Springer Texts in Computer Science, 2021.
REFERENCES:
1.John M Blain, The Complete Guide to Blender Graphics: Computer Modeling & Animation,
CRC press, 3rd Edition, 2016.
2. Gerald Friedland, Ramesh Jain, “Multimedia Computing”, Cambridge University Press, 2018.
3. Prabhat K.Andleigh, Kiran Thakrar, “Multimedia System Design”, Pearson Education, 1st
Edition, 2015.
4.Mohsen Amini Salehi, Xiangbo Li, “Multimedia Cloud Computing Systems”, Springer Nature,
1st Edition, 2021.
5.Mark Gaimbruno, “3D Graphics and Animation”, Second Edition, New Riders, 2002.
6.Rogers David, “Animation: Master – A Complete Guide (Graphics Series)”, Charles River
Media, 2006.
7.Rick parent, “Computer Animation: Algorithms and Techniques”, Morgan Kauffman, 3rd
Edition, 2012.
8.Emilio Rodriguez Martinez, Mireia Alegre Ruiz, “UI Animations with Lottie and After Effects:
Create, render, and ship stunning After Effects animations natively on mobile with React Native”, Packt
Publishing, 2022.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 3 2 3 - - - 3 2 1 2 3 2 3
2 3 3 3 3 3 - - - 3 3 2 2 3 2 3
3 3 3 3 3 3 - - - 3 3 2 3 3 2 3
4 3 3 3 3 3 2 - - 3 3 3 3 3 3 3
5 3 3 3 3 3 2 - - 3 3 3 3 3 3 3
UNIT I INTRODUCTION 9
Ethical Hacking Overview - Role of Security and Penetration Testers .- Penetration-Testing
Methodologies- Laws of the Land - Overview of TCP/IP- The Application Layer - The Transport Layer -
The Internet Layer - IP Addressing .- Network and Computer Attacks - Malware - Protecting Against
Malware Attacks.- Intruder Attacks - Addressing Physical Security.
COURSE OUTCOMES:
Upon completion of the course, students will be able to
CO1: To express knowledge on basics of computer based vulnerabilities
CO2: To gain understanding on different foot printing, reconnaissance and scanning methods.
CO3: To demonstrate the enumeration and vulnerability analysis methods.
CO4: To gain knowledge on hacking options available in Web and wireless applications.
CO5: To acquire knowledge on the options for network protection.
CO6: To use tools to perform ethical hacking to expose the vulnerabilities.
TEXT BOOKS:
1. Michael T. Simpson, Kent Backman, and James E. Corley, Hands-On Ethical Hacking and
Network Defense, Course Technology, Delmar Cengage Learning, 2010.
2. The Basics of Hacking and Penetration Testing - Patrick Engebretson, SYNGRESS, Elsevier,
2013.
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
3. The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Dafydd
Stuttard and Marcus Pinto, 2011.
REFERENCES:
2. Black Hat Python: Python Programming for Hackers and Pentesters, Justin Seitz , 2014.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 3 1 - - - 2 3 1 2 3 3 3
2 2 2 2 3 3 - - - 1 2 2 3 1 1 3
3 3 3 3 3 3 - - - 2 1 1 2 2 1 3
4 3 3 1 1 1 - - - 1 3 1 3 2 1 1
5 3 2 2 2 3 - - - 2 3 2 2 2 3 3
AVG 2.8 2.4 2 2.4 2.2 - - - 1.6 2.4 1.4 2.4 2 1.8 2.6
COURSE OUTCOMES:
Upon completion of the course, students will be able to
CO1: Explain the basics in deep neural networks
CO2: Apply Convolution Neural Network for image processing
CO3: Apply Recurrent Neural Network and its variants for text analysis
CO4: Apply model evaluation for various applications
CO5: Apply autoencoders and generative models for suitable applications
TEXT BOOKS:
1. Ian Goodfellow, Yoshua Bengio, Aaron Courville, ``Deep Learning'', MIT Press, 2016.
2. Andrew Glassner, “Deep Learning: A Visual Approach”, No Starch Press, 2021.
REFERENCES:
1. Salman Khan, Hossein Rahmani, Syed Afaq Ali Shah, Mohammed Bennamoun, ``A Guide to
Convolutional Neural Networks for Computer Vision'', Synthesis Lectures on Computer Vision, Morgan
& Claypool publishers, 2018.
2. Yoav Goldberg, ``Neural Network Methods for Natural Language Processing'', Synthesis
Lectures on Human Language Technologies, Morgan & Claypool publishers, 2017.
3. Francois Chollet, ``Deep Learning with Python'', Manning Publications Co, 2018.
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
4. Charu C. Aggarwal, ``Neural Networks and Deep Learning: A Textbook'', Springer International
Publishing, 2018.
5. Josh Patterson, Adam Gibson, ``Deep Learning: A Practitioner's Approach'', O'Reilly Media,
2017.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 2 1 - - - 2 3 - - - - 2 - - -
2 3 2 - - - 3 3 - - - - 2 - - -
3 3 - 1 - - 2 2 - - - - 2 - - -
4 3 2 1 1 - 2 2 - - - - 2 - - -
5 3 2 1 - - 2 2 - - - - 1 - - -
3 0 0 3
OBJECTIVES
The main objectives of this course are to:
Learn the basic AI approaches to develop problem solving agent
Learn game playing
Perform knowledge representation in Logic
Perform probabilistic reasoning under uncertainty
Perform Planning and Controlling Uncertain movements in robots
UNIT I PROBLEM-SOLVING 9
Foundations of Artificial Intelligence, History of Artificial Intelligence, State of the Art, Risk and Benefits
of AI Intelligent Agents – Agents and Environments, Concept of Rationality, Nature of Environments,
Structure of Agents; Problem-solving – Problem-Solving Agents, Search Algorithms, Uninformed Search
Strategies Informed Search Strategies, Heuristic Functions
UNIT V ROBOTICS 9
Reinforcement Learning – Learning from Rewards, Passive and Active Reinforcement Learning, Policy
Search Applications; Robotics – Robots, Robots Hardware, Robotic Perception, Planning and Control,
Planning Uncertain Movements, Reinforcement Learning in Robotics, Humans and Robots,
Robotic Frameworks
Application Domains
TOTAL : 45 PERIODS
OUTCOMES:
CO statements RBT
CO Upon successful completion of the course, the students should be able to Level
CO1 Apply intelligent agent frameworks for toy problems 3
TEXT BOOKS
1. Stuart Russell and Peter Norvig, Artificial Intelligence: A Modern Approach, Pearson, 4th
Edition, 2020
REFERCENCES
CO-PO_PSO Mapping
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 - 3 3 3 - - - - - - 3 3 3 3
2 3 3 3 - 3 - - - - - - 3 3 3 3
3 3 - 3 - 3 - - - - - - 3 3 3 3
4 3 - 3 3 3 - - - - - - 3 3 3 3
5 3 3 3 - 3 - - - - - - 3 3 3 3
AVG 3 - 3 3 3 - - - - - - 3 3 3 3
0 0 3 1.5
OBJECTIVES
LIST OF EXPERIMENTS
COURSE OUTCOMES:
CO statements RBT
CO Upon successful completion of the course, the students should be able to level
CO1 Design and implement search strategies 3
POs PSOs
COs
1 2 3 4 5 6 7 8 9 10 11 12 1 2
1 3 3 3 3 - - - - 3 3 2 3 3 2
2 3 2 3 3 3 - - - 3 2 3 3 3 3
3 3 3 3 3 3 - - - 3 3 3 3 3 3
SOFTWARE TESTING L T P C
3 0 0 3
COURSE OBJECTIVES
To Understand the roles of software process
To introduce the basics and necessity of software testing.
To Know various testing terminologies and techniques.
To understand various the levels and types of testing
To learn to manage automation in testing.
TEXT BOOKS:
1. Roger S. Pressman, ―Software Engineering – A Practitioner‘s Approach‖, Seventh
Edition, Mc Graw-Hill International Edition, 2010.
2. Yogesh Singh, ―Software Testing‖, Cambridge University Press, 2012
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
PROFESSIONAL ELECTIVE V
COURSE OBJECTIVES:
At the end of the course the students will understand:
Basics of JavaScript used in React and functional programming with JavaScript.
Develop applications by using JSX and state management.
Demonstrate modern web applications by using enhanced components with hooks
. React Router and leverage its features to handle routing on the client and server.
UNIT I 9
Introducing React: Old School Multi-Page Design, New School Single-Page Apps, Meet React -
Automatic UI State Management, Lightning-fast DOM Manipulation, APIs to Create Truly
Composable UIs, Visuals Defined Entirely in JavaScript, Just the V in an MVC Architecture,
React’s Past and Future. JavaScript for React: Declaring Variables, Creating Functions, Compiling
JavaScript, Objects and Arrays, Asynchronous JavaScript, Classes, ES6 Modules. Functional
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
UNIT II 9
How React Works: Page Setup, React Elements, ReactDOM, React Components. React with JSX:
React Elements as JSX, Babel, Recipes as JSX, React Fragments, Intro to webpack. React State
Management: Building a Star Rating Component, The useState Hook, Refactoring for Advanced
Reusability, State in Component Trees, Building Forms, React Context.
UNIT III 9
Enhancing Components with Hooks: Introducing useEffect - The Dependency Array, Deep
Checking Dependencies, When to useLayoutEffect, Rules to Follow with Hooks, Improving Code
with useReducer, useReducer to Handle Complex State, Improving Component Performance,
shouldComponentUpdate and PureComponent, When to Refactor. Incorporating Data: Requesting
Data, Render Props, Virtualized Lists, Introducing GraphQL. Suspense: Error Boundaries, Code
Splitting.
UNIT IV 9
React.js: React installation and application setup, JSX, React Classes and Components, Rendering
of elements, Properties, State, Context, Component lifecycle methods, Refs & Keys, Handling
events and forms, React Router, Stateless components, React form & controls, State management
with Redux or Context API, Asynchronous data fetching with Axios or Fetch API, React hooks –
useState, useEffect
UNIT V 9
React Router: Incorporating the Router, Router Properties, Using Redirects. React and the Server:
Isomorphic Versus Universal, Server Rendering React, Server Rendering with Next.js, Gatsby,
React in the Future.
COURSE OUTCOMES:
After successful completion of the course, the students are able to:
Summarize the ES6 features and implement functional techniques with JavaScript.
Design and develop React applications with JSX and state management.
Create modern data driven React web application by using enhanced components
with hooks.
Design and implement client – server applications by using React Router.
TEXT BOOK:
1. Learning React: Modern Patterns for Developing React Apps by Alex Banks and Eve Porcello,
2nd Edition, Published by O’Reilly.
REFERENCES:
1. Learning React: A Hands-On Guide to Building Web Applications Using React and Redux by
Kirupa Chinnathambi, Second edition, Addison-Wesley Professional.
2. Fullstack React: The Complete Guide to ReactJS and Friends by Anthony Accomazzo, Nate
Murray, Ari Lerner, Clay Allsopp, David Gutman, and Tyler McGinnis.
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
Web References:
1. https://reactjs.org/
2. https://www.geeksforgeeks.org/reactjs-tutorials/
3. www.w3schools.com
4. www.tutorialspot.com
CO’s-PO’s & PSO’s MAPPING
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 3 1 - - - 2 3 1 2 3 3 3
2 2 2 2 3 3 - - - 1 2 2 3 1 1 3
3 3 3 3 3 3 - - - 2 1 1 2 2 1 3
4 3 3 1 1 1 - - - 1 3 1 3 2 1 1
5 3 2 2 2 3 - - - 2 3 2 2 2 3 3
AVG 2.8 2.4 2 2.4 2.2 - - - 1.6 2.4 1.4 2.4 2 1.8 2.6
COURSE OBJECTIVE
To understand the principles of Data warehousing and Data Mining.
To be familiar with the Data warehouse architecture and its Implementation.
To know the Architecture of a Data Mining system.
To understand the various Data preprocessing Methods.
To perform classification and prediction of data.
UNIT I
Data Warehousing and Business Analysis: - Data warehousing Components –Building a Data warehouse –
Data Warehouse Architecture – DBMS Schemas for Decision Support – Data Extraction, Cleanup, and
Transformation Tools –Metadata – reporting – Query tools and Applications – Online Analytical
Processing (OLAP) – OLAP and Multidimensional Data Analysis.
UNIT II
Data Mining: - Data Mining Functionalities – Data Preprocessing – Data Cleaning – Data Integration and
Transformation – Data Reduction – Data Discretization and Concept Hierarchy Generation- Architecture
Of A Typical Data Mining Systems- Classification Of Data Mining Systems.
Association Rule Mining: - Efficient and Scalable Frequent Item set Mining Methods – Mining Various
Kinds of Association Rules – Association Mining to Correlation Analysis – Constraint-Based Association
Mining.
UNIT III
Classification and Prediction: - Issues Regarding Classification and Prediction – Classification by Decision
Tree Introduction – Bayesian Classification – Rule Based Classification – Classification by Back
propagation – Support Vector Machines – Associative Classification – Lazy Learners – Other
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
Classification Methods – Prediction – Accuracy and Error Measures – Evaluating the Accuracy of a
Classifier or Predictor – Ensemble Methods – Model Section.
UNIT IV
Cluster Analysis: - Types of Data in Cluster Analysis – A Categorization of Major Clustering Methods –
Partitioning Methods – Hierarchical methods – Density-Based Methods – Grid-Based Methods – Model-
Based Clustering Methods – Clustering High-Dimensional Data – Constraint-Based Cluster Analysis –
Outlier Analysis.
UNIT V
Mining Object, Spatial, Multimedia, Text and Web Data:
Multidimensional Analysis and Descriptive Mining of Complex Data Objects – Spatial Data Mining –
Multimedia Data Mining – Text Mining – Mining the World Wide Web.
Course Outcome
Technical knowhow of the Data Mining principles and techniques for real time applications.
Text Book
1. Jiawei Han, Micheline Kamber and Jian Pei“Data Mining Concepts and Techniques”, Third Edition,
Elsevier, 2011.
Reference Books
1. Alex Berson and Stephen J. Smith “Data Warehousing, Data Mining & OLAP”, Tata McGraw – Hill
Edition, Tenth Reprint 2007.
2. K.P. Soman, Shyam Diwakar and V. Ajay “Insight into Data mining Theory and Practice”, Easter
Economy Edition, Prentice Hall of India, 2006.
3. G. K. Gupta “Introduction to Data Mining with Case Studies”, Easter Economy Edition, Prentice
Hall of India, 2006.
4. Pang-Ning Tan, Michael Steinbach and Vipin Kumar “Introduction to Data Mining”, Pearson
Education, 2007.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 3 1 - - - 2 3 1 2 3 3 3
2 2 2 2 3 3 - - - 1 2 2 3 1 1 3
3 3 3 3 3 3 - - - 2 1 1 2 2 1 3
4 3 3 1 1 1 - - - 1 3 1 3 2 1 1
5 3 2 2 2 3 - - - 2 3 2 2 2 3 3
AVG 2.8 2.4 2 2.4 2.2 - - - 1.6 2.4 1.4 2.4 2 1.8 2.6
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
COURSE OBJECTIVES
To understand the basic digital forensics and techniques for conducting the forensic examination on
different digital devices.
To understand how to examine digital evidences such as the data acquisition, identification analysis.
Unit -I
Computer forensics fundamentals, Benefits of forensics, computer crimes, computer forensics evidence and
courts, legal concerns and private issues.
Unit- II
Understanding Computing Investigations – Procedure for corporate High-Tech investigations,
understanding data recovery work station and software, conducting and investigations.
Unit-III
Data acquisition- understanding storage formats and digital evidence, determining the best acquisition
method, acquisition tools, validating data acquisitions, performing RAID data acquisitions, remote network
acquisition tools, other forensics acquisitions tools.
Unit-IV
Processing crimes and incident scenes, securing a computer incident or crime, seizing digital evidence at
scene, storing digital evidence, obtaining digital hash, reviewing case.
Unit-V
Current computer forensics tools- software, hardware tools, validating and testing forensic software,
addressing data-hiding techniques, performing remote acquisitions, E-Mail investigations- investigating
email crime and violations, understanding E-Mail servers, specialized E-Mail forensics tool.
Outcome
Know how to apply forensic analysis tools to recover important evidence for identifying computer
crime.
To be well-trained as next-generation computer crime investigators.
Text Books:
1. Warren G. Kruse II and Jay G. Heiser, “Computer Forensics: Incident Response Essentials”,
Addison Wesley, 2002.
2. Nelson, B, Phillips, A, Enfinger, F, Stuart, C., “Guide to Computer Forensics and Investigations,
2nd ed., Thomson Course Technology, 2006, ISBN: 0-619-21706-5.
Reference Books:
1. Vacca, J, Computer Forensics, Computer Crime Scene Investigation, 2nd Ed, Charles River Media,
2005, ISBN: 1-58450-389.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 3 1 - - - 2 3 1 2 3 3 3
2 2 2 2 3 3 - - - 1 2 2 3 1 1 3
3 3 3 3 3 3 - - - 2 1 1 2 2 1 3
4 3 3 1 1 1 - - - 1 3 1 3 2 1 1
5 3 2 2 2 3 - - - 2 3 2 2 2 3 3
AVG 2.8 2.4 2 2.4 2.2 - - - 1.6 2.4 1.4 2.4 2 1.8 2.6
TOTAL: 45 PERIODS
COURSE OUTCOMES
Upon completion of the course, the student should be able to:
-> Analyze the natural language text.
-> Generate the natural language.
-> Do machine translation.
-> Apply information retrieval techniques.
TEXT BOOK:
1. Tanveer Siddiqui, U.S. Tiwary, “Natural Language Processing and Information Retrieval”,
Oxford University Press, 2008.
REFERENCES:
1. Daniel Jurafsky and James H Martin, “Speech and Language Processing: An introduction to Natural
Language Processing, Computational Linguistics and Speech Recognition”, 2nd Edition, Prentice Hall,
2008.
2. James Allen, “Natural Language Understanding”, 2nd edition, Benjamin /Cummings
publishing company, 1995.
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 3 1 - - - 2 3 1 2 3 3 3
2 2 2 2 3 3 - - - 1 2 2 3 1 1 3
3 3 3 3 3 3 - - - 2 1 1 2 2 1 3
4 3 3 1 1 1 - - - 1 3 1 3 2 1 1
5 3 2 2 2 3 - - - 2 3 2 2 2 3 3
AVG 2.8 2.4 2 2.4 2.2 - - - 1.6 2.4 1.4 2.4 2 1.8 2.6
XT BOOK:
1. Kai Hwang, Geoffrey C. Fox, Jack G. Dongarra, "Distributed and Cloud Computing, From
Parallel Processing to the Internet of Things", Morgan Kaufmann Publishers, 2012
2. Rittinghouse, JohnW., and James F. Ransome,―Cloud Computing: Implementation,
Management and Security‖ , CRC Press, 2017.
REFERENCES:
the Cloud: Transactional Systems for EC2 and Beyond (Theory in Practice), O'Reilly, 2009
CO/
PO
PO1
PO2
PO
3
PO4
PO5
PO6
PO7
PO
8
PO9
PO1
0
PO11
PO1
2
PSO1
PSO2
CO
1
2
2
--
--
--
--
--
--
--
--
--
--
3
3
CO
2
3
3
1
--
1
--
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
--
--
--
--
2
--
3
3
CO
3
3
3
2
--
1
--
--
--
--
--
2
--
3
3
CO
4
3
3
1
--
1
--
--
--
--
--
2
--
3
3
CO
5
2
2
--
--
--
--
Jeppiaar Institute of Technology, Sriperumbudur w.e.f.2024-2025
--
--
--
--
--
--
3
3
2.6
2.6
1.3
--
1
--
--
--
--
--
2
--
3.00
3.00
1: Low 2: Medium 3: High
Faculty-in-Charge HoD/CSE
WEB & CLOUD SERVICES LTPC 3003
OBJECTIVES:
The student should be made to:
Understand the division of network functionalities into layers.
Be familiar with the components required to build different types of networks
Be exposed to the required functionality at each layer
Learn the flow control and congestion control algorithms
CO PO PSO
1 2 3 4 5 6 7 8 9 10 11 12 1 2 3
1 3 2 2 3 1 - - - 2 3 1 2 3 3 3
2 2 2 2 3 3 - - - 1 2 2 3 1 1 3
3 3 3 3 3 3 - - - 2 1 1 2 2 1 3
4 3 3 1 1 1 - - - 1 3 1 3 2 1 1
5 3 2 2 2 3 - - - 2 3 2 2 2 3 3
AVG 2.8 2.4 2 2.4 2.2 - - - 1.6 2.4 1.4 2.4 2 1.8 2.6