CSE-CC_PE4
CSE-CC_PE4
SEMESTER VIII
PROGRAM ELECTIVE IV
Year of
CATEGORY L T P Credits
CCT416 CYBER LAW Introduction
PEC 2 1 0 3 2019
Preamble: This course provides a solid foundation that furnishes the learner with in depth
knowledge of current Cyber laws. The course provides an insight into the laws keeping in view of
the latest developments in IPRs related to computer field and growing cyber related crimes. The
course also helps to create an understanding on Intellectual Properties and the importance of it,
trademarks and Trade secrets and to create awareness of unfair competition and its methods.
Course Outcomes: After the completion of the course the student will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
Analyze
Evaluate
Create
Mark Distribution
Attendance : 10 marks
Each of the two internal examinations has to be conducted out of 50 marks. First Internal Examination
shall be preferably conducted after completing the first half of the syllabus and the Second Internal
Examination shall be preferably conducted after completing the remaining part of the syllabus. There
will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly covered module), having 3 marks for each question
adding up to 15 marks for part A. Students should answer all questions from Part A. Part B contains 7
questions (preferably, 3 questions each from the completed modules and 1 question from the partly
covered module), each with 7 marks. Out of the 7 questions in Part B, a student should answer any 5.
There will be two parts; Part A and Part B. Part A contain 10 questions with 2 questions from each
module, having 3 marks for each question. Students should answer all questions. Part B contains 2
questions from each module of which a student should answer any one. Each question can have a
maximum 2 subdivisions and carries 14 marks.
Syllabus
Module 1 (Cyber Space)
Legal Recognition of Electronic Records and Electronic Evidence -Digital Signature Certificates -
Securing Electronic records and secure digital signatures - Duties of Subscribers - Role of Certifying
Authorities - Regulators under the Act -The Cyber Regulations Appellate Tribunal - Internet Service
Providers and their Liability– Powers of Police under the Act – Impact of the Act on other Laws . Cyber
Crimes -Meaning of Cyber Crimes –Different Kinds of Cyber crimes – Cyber crimes under IPC
Cybercrimes under the Information Technology Act 2000 - Cyber crimes under International Law –
Hacking, Child Pornography, Cyber Stalking, Denial of service Attack, Virus Dissemination, Software
Piracy, Internet Relay Chat (IRC) Crime, Credit Card Fraud, Net Extortion, Phishing etc - Cyber
Terrorism Violation of Privacy on Internet - Data Protection and Privacy – Indian Court cases
Copyrights- Software – Copyrights vs Patents debate - Authorship and Assignment Issues - Copyright in Internet
- Multimedia and Copyright issues - Software Piracy - Trademarks - Trademarks in Internet – Copyright and
Trademark cases.
Understanding Patents - European Position on Computer related Patents, Legal position on Computer related
Patents - Indian Position on Patents – Case Law, Domain names -registration - Domain Name Disputes-Cyber
Squatting-IPR cases.
Text books
1. Justice Yatindra Singh,” Cyber Laws”, Universal Law Publishing Co., New Delhi, 2020
2. Farouq Ahmed,”Cyber Law in India”, New Era publications, New Delhi,2017
3. S.R.Myneni, “Information Technology Law(Cyber Laws)”, Asia Law House, Hyderabad,3rd
Edition, 2023
References
1. Chris Reed, “Internet Law-Text and Materials”, Cambridge University Press, 2nd Edition,2004
2. Pawan Duggal,” Cyber Law- the Indian perspective”, Universal Law Publishing Co., New
Delhi,2016.
2. Write down the need for IT act and explain IT act 2000.
Course Outcome 2 (CO2):
1. Define the term cybercrime. List and explain the cybercrimes under IPC.
1. Describe the various types of intellectual property rights and state its objectives
2. Explain authorship and assignment issues.
1. Differentiate between Legal position on Computer related Patents and Indian Position on Patents.
2. How laws are applied on infringement of Domain name disputes?
PART B
Answer any Two Question from each module. Each question carries 14 Marks
11(a) Explain the interface of technology and law in the context of cyberspace. (8 marks)
(b) Write down the need of IT Act. (6 marks)
OR
12(a) Explain Jurisdiction in Cyber Space. (8 marks)
(b) Write down the role of enforcement agencies. (6 marks)
Preamble:
The course explores the foundations of big data, including its foundations in computing technology
and statistics. The course also gives an understanding of the nature of underlying technical challenges
and statistical assumptions used to understand relationships in a variety of applied fields, with a focus
on the fields of fraud detection and communication monitoring.
Course Outcomes: After the completion of the course, the student will be able to
CO4 Describe the security concerns of big-data. (Cognitive knowledge level: Understand)
CO5 Escalate the applications of security analytics. (Cognitive knowledge level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 P10 P11 P12
CO1
CO2
CO3
CO4
CO5
Assessment Pattern
End Semester
Test 1 (Marks in Test 2 (Marks in
Bloom’s Category Examination (Marks
percentage) percentage)
in percentage)
Remember 30 30 30
Understand 30 30 30
Apply 40 40 40
Analyze
Evaluate
Create
Mark Distribution
Internal Examination Pattern: Each of the two internal examinations has to be conducted out of 50
marks. The first series test shall be preferably conducted after completing the first half of the
syllabus. The second series test shall be preferably conducted after completing the remaining part of
the syllabus. There will be two parts: Part A and Part B. Part A contains 5 questions (preferably, 2
questions each from the completed modules and 1 question from the partly completed module),
having 3 marks for each question adding up to 15 marks for part A. Students should answer all
questions from Part A. Part B contains 7 questions (preferably, 3 questions each from the completed
modules and 1 question from the partly completed module), each with 7 marks. Out of the 7
questions, a student should answer any 5.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A contains 10
questions with 2 questions from each module, having 3 marks for each question. Students should
answer all questions. Part B contains 2 questions from each module of which a student should answer
anyone. Each question can have a maximum 2 subdivisions and carries 14 marks.
Syllabus
Introduction to Big Data, Evolution of Big data, Characteristics. Big Data Analytics, Big Data
framework - fundamental concepts of Big Data management and analytics - Current challenges and
trends in Big Data Acquisition.
Access Analytics – Analysis of Log file -Security analysis with text mining –Machine Learning and
data mining applications for security: Intrusion detection and network anomaly detection. Big data
analytics for security: Analyzing DDOS – Distributed Denial of Service attack: counter based
method, and access pattern based method – Machine learning for Ransomware detection and
prevention.
Data Masking – Privately Identified Information (PII) -Privacy preservation in Big Data- Popular Big
Data Techniques and tools- Map Reduce paradigm and the Hadoop system – Applications- Social
Media Analytics- Recommender Systems- Fraud Detection.
Text Books
1. Bart Baesens, "Analytics in a Big Data World: The Essential Guide to Data Science and its
Applications", John Wiley & Sons, 2014
2. Min Chen, Shiwen Mao, Yin Zhang, Victor CM Leung, “Big Data: Related Technologies,
Challenges and Future Prospects” , Springer, 2014.
3. Michael Minelli, Michele Chambers, AmbigaDhiraj ,“Big Data, Big Analytics: Emerging
Business Intelligence and Analytic Trends”, John Wiley & Sons, 2013.
References
1. Raj, Pethuru, “Handbook of Research on Cloud Infrastructures for Big Data Analytics”, IGI
Global.
2. Douglas R. Stinson ,“Cryptography Theory and Practice ”, Chapman & Hall/CRC, 3rd Edition,
2006.
3. Mark Talabis, Robert McPherson, I Miyamoto and Jason Martin, “Information Security
Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data”, Syngress Media,
U.S., 2014.
Sample Course Level Assessment Questions
PART A
PART B
11. a) Illustrate the various phases involved in Big Data Analytics with a neat diagram. (7)
b) Explain the trends in big data acquisition. (7)
OR
12. a) Describe the challenges in big data acquisition (7)
15. a) Compare and contrast static and dynamic malware analysis. (7)
b) Describe the various security breaches possibilities in big data scenarios. (7)
OR
OR
18. a) How machine learning helps in Ransomware detection and prevention. (8)
OR
20.a) How is Privacy preservation in Big Data achieved (8)
b) Describe the role of Recommender Systems (6)
TEACHING PLAN
No of
Sl.No. Contents Lecture Hrs
(35)
4.7 Machine learning for Ransom ware detection and prevention. 1 hour
5.3 Popular Big Data Techniques and tools- Map Reduce paradigm 1 hour
YEAR OF
CLIENT SERVER CATEGORY L T P CREDIT INTRODUCTION
CST426
ARCHITECTURE
PEC 2 1 0 3 2019
Preamble: The syllabus is prepared with the view of preparing the Engineering Graduates to
build effective Client/Server applications. This course aims at providing a foundation in
decentralized computer systems, using the client/server model. The course content is decided to
cover the essential fundamentals which can be taught within the given slots in the curriculum.
Course Outcomes: After the completion of the course the student will be able to
Explain the basics of client/server systems and the driving force behind the
development of client/server systems (Cognitive Knowledge Level:
CO 1 Understand)
Outline the architecture and classifications of client/server systems (Cognitive
CO 2 Knowledge Level: Understand)
Choose the appropriate client/server network services for a typical application
CO 3 (Cognitive Knowledge Level: Understand)
Describe management services and issues in network (Cognitive Knowledge
CO 4 Level: Understand)
Compare and summarize the web extensions and choose appropriate web services
CO 5
standards for an application (Cognitive Knowledge Level: Understand)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Conduct investigations of
PO4 complex problems PO10 Communication
Assessment Pattern
Remember 30 30 30
Understand 70 70 50
Apply
Analyse
Evaluate
Create
Mark distribution
Attendance : 10 marks
Continuous Assessment Test 1 (for theory, for 2 hrs) : 20 marks
Continuous Assessment Test 2 (for lab, internal examination, for 2hrs) : 20 marks
COMPUTER SCIENCE AND ENGINEERING
Internal Examination Pattern: There will be two parts; Part A and Part B. Part A
contains 5 questions with 2 questions from each module (2.5 modules x 2 = 5), having 3
marks for each question. Students should answer all questions. Part B also contains 5
questions with 2 questions from each module (2.5 modules x 2 = 5), of which a student
should answer any one. The questions should not have sub- divisions and each one carries
7 marks.
End Semester Examination Pattern: There will be two parts; Part A and Part B. Part A
contain 10 questions with 2 questions from each module, having 3 marks for each
question. Students should answer all questions. Part B contains 2 questions from each
module of which a student should answer any one. Each question can have maximum 2
sub-divisions and carry 14 marks.
Client- Services, Request for services, RPC, Windows services, Print services, Remote
boot services, other remote services, Utility Services. Dynamic Data Exchange (DDE).
Object Linking and Embedding (OLE). Common Object Request Broker Architecture
(CORBA).
Web Services History. Web Server Technology- Web Server, Web Server Communication,
Role of Java for Client/Server on Web. Web Services- MicroServices, APIs, API
Gateway, Authentication of users/clients, Tokens/Keys for Authentication, Service Mesh,
Message Queues, SaaS, Web Sockets.
Client/Server/Browser – Server Technology, Client/Server Technology and Web
Applications, Balanced Computing and the Server’s Changing Role. Thin client computing
- Computing models-Comparison-Computing Environment.
Future of client/ server Computing Enabling Technologies, Transformational system.
COMPUTER SCIENCE AND ENGINEERING
Text Books
Reference Books
QP CODE:
PART A
10. With an example, explain the role of java for client/server on web (10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain the driving forces behind the development of Client/ Server system (10)
from different perspectives.
OR
12. (a) Explain Client/Server System development methodology and explain various (10)
phases and their activities involved in System Integration Life Cycle.
(b) Write short notes on the following. (a) Single system image. (b) Downsizing (4)
and Client/Server computing.
13. (a) How two-tier computing and three-tier computing improves the performance (10)
of Client/Server system.
OR
15. (a) In Client/Server computing, explain the following with example in detail (a) (10)
Dynamic Data Exchange (b) RPC (c) Remote Boot Service (d) Object-
linking and embedding.
COMPUTER SCIENCE AND ENGINEERING
(b) Explain the role of client in Client/Server computing and also explain the (4)
various services provide by client.
OR
(b) Explain the server functionality in detail, for Client/Server computing. (4)
(b) Comment on the network service acquisition mechanism for the client/service (4)
model.
OR
18. (a) In client server architecture, what do you mean by Availability, Reliability, (10)
Serviceability and Security? Explain with examples
19. (a) What is the future of Client/Server computing in the following technologies (10)
(i) Electronic Document Management. (ii) Full Text Retrieval. (iii)
Geographic Information System.
(b) Discuss the role of web browser for providing web service in Client/Server (4)
environment.
OR
Sl Contents No. of
No Lecture
Hours (35)
Module- 1( Introduction) (7 hours)
3.1 The client: Services, Request for services, RPC, Windows services, Print 1 hour
services
3.2 Remote boot services, Utility Services & Other Services 1 hour
3.3 Dynamic Data Exchange (DDE), Object Linking and Embedding (OLE) 1 hour
3.4 Common Object Request Broker Architecture (CORBA) 1 hour
COMPUTER SCIENCE AND ENGINEERING
3.5 The server: Detailed server functionality, the network operating system 1 hour
5.1 Web Services History , Web Server Technology , Web Server 1 hour
5.2 Web Server Communication , Role of Java for Client/Server on Web 1 hour
5.3 Web Services , MicroServices, APIs, API Gateway, Authentication of 1 hour
users/clients
5.4 Tokens/Keys for Authentication ,Service Mesh, Message Queues 1 hour
YEAR OF
PARALLEL CATEGORY L T P CREDIT INTRODUCTION
CST436
COMPUTING
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand basic and advanced concepts of parallel
computing. It covers Principles of Parallel Algorithm Design, Communication operations,
Programming Using the Message Passing Paradigm, Programming Shared Address Space
Platforms Thread Basics, and GPU Programming. This course enables a learner to design
solutions to complex real world problems using parallel computing paradigms including thread
parallelism, shared memory program, message passing interfaces, and vector processing.
Course Outcomes: After the completion of the course the students will be able to
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
CO5
CO6
Conduct investigations of
PO4 PO10 Communication
complex problems
Assessment Pattern
Remember 30 20 20
Understand 50 40 40
Apply 20 40 40
COMPUTER SCIENCE AND ENGINEERING
Analyze
Evaluate
Create
Mark Distribution
Attendance 10 marks
Continuous Assessment Tests 25 marks
Continuous Assessment Assignment 15 marks
Syllabus
Module- 1 (Principles of Parallel Algorithm Design)
Thread Basics, Why Threads? The POSIX Thread Application Programme Interface,
Synchronization Primitives in POSIX, Controlling Thread and Synchronization Attributes,
Thread Cancellation, Composite Synchronization Constructs, OpenMP: a Standard for Directive
Based Parallel Programming, Specifying Concurrent Tasks in OpenMP, Synchronization
Constructs in OpenMP, Data Handling in OpenMP, OpenMP Library Functions, OpenMP
Applications: Parallel algorithm development for Matrix multiplication
Text Books
1. Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar, Introduction to Parallel
Computing, 2nd Ed, Addison-Wesley, 2003
2. David B. Kirk, Wen-mei W. Hwu, Programming Massively Parallel Processors: A
Hands-on Approach, 3rd Ed., Morgan Kaufman, 2016.
References
2. Barbara Chapman, Gabriele Jost, Ruud van der Pas, Using OpenMP: Portable Shared
Memory Paralwlel Programming , MIT Press, 2008.
3. William Gropp, Ewing Lusk, Anthony Skjellum Using MPI: Portable Parallel
Programming with the Message-Passing Interface, 3rd Ed, MIT Press, 2014.
4. Thomas Rauber, Gudula Rünger, Parallel Programming for Multicore and Cluster
Systems, Springer, 2010
2. Which are the characteristics of tasks influencing the selection of mapping scheme?
10. Describe how the data transfer between GPU device and the host memories are (10x3=30)
managed.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a)
Describe recursive decomposition with an example.
(8)
COMPUTER SCIENCE AND ENGINEERING
(b)
Compare various parallel algorithm models
(6)
OR
(b) In the algorithm, assume a decomposition such that each execution of Line 7 is (6)
a task. Draw a task-dependency graph and a task-interaction graph.
1. procedure FFT_like_pattern(A, n)
2. begin
3. m := log2 n;
4. for j := 0 to m - 1 do
5. k := 2j;
6. for i := 0 to n - 1 do
7. A[i] := A[i] + A[i XOR 2j];
8. end // for
9. end // FFT_like_pattern
13. (a)
Illustrate the All-to-All Broadcast and Reduction with an example
(8)
(b) (6)
Explain any three techniques to improve the speed of communication
operations
OR
(b) Explain the Ring and Mesh techniques of All-to-All Personalized (6)
communication.
15. (a) Explain Collective Communication and Computation Operations in MPI (9)
OR
16. (a) Write algorithm for Collective Communication and Computation Operations
(9)
COMPUTER SCIENCE AND ENGINEERING
using MPI.
17. (a) Explain how mutual exclusion for shared variables are accomplished in (6)
threads.
(b) Explain the nesting of parallel directives with a suitable example. (8)
OR
18. (a) Explain the compilation operations of an example openMP program along (4)
with its pThread translations.
(b) (8)
How is synchronization between CUDA threads achieved?
OR
(b) Write and explain the CUDA program for vector addition. (4 )
COMPUTER SCIENCE AND ENGINEERING
TEACHING PLAN
No Contents No of
Lecture
Hrs (37)
Module- 3 ( Programming Using the Message Passing Paradigm) (TB-1, Ch. 6 ) (7 hrs)
5.3 Vector Addition Kernel, Device Global Memory and Data Transfer 1
YEAR OF
DATA COMPRESSION CATEGORY L T P CREDIT INTRODUCTION
CST446
TECHNIQUES
PEC 2 1 0 3 2019
Preamble: This course helps the learners to understand compression techniques on text, image,
audio and video data. It covers lossy &lossless compression, RLE, JPEG, MPEG and its variants.
This course enables the students to develop and implement compression algorithms on different
domains.
CO# CO
Describe the fundamental principles of data compression(Cognitive Knowledge
CO1 level: Understand)
Make use of statistical and dictionary based compression techniques for various
CO2 applications (Cognitive Knowledge level: Apply)
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12
CO1
CO2
CO3
CO4
CO5
COMPUTER SCIENCE AND ENGINEERING
Assessment Pattern
Continuous Assessment Tests
Bloom’s End Semester Examination
Category Marks (%)
Test 1 (%) Test 2 (%)
Remember 30 30 30
Understand 40 40 40
Apply 30 30 30
Analyze
Evaluate
Create
Mark Distribution
Each of the two internal examinations has to be conducted out of 50 marks. First series test shall
be preferably conducted after completing the first half of the syllabus and the second series test
shall be preferably conducted after completing remaining part of the syllabus. There will be two
parts: Part A and Part B. Part A contains 5 questions (preferably, 2 questions each from the
completed modules and 1 question from the partly completed module), having 3 marks for each
question adding up to 15 marks for part A. Students should answer all questions from Part A.
Part B contains 7 questions (preferably, 3 questions each from the completed modules and 1
question from the partly completed module), each with 7 marks. Out of the 7 questions, a student
should answer any5.
Syllabus
Module-1 (Modelling and types of compression)) 1
Introduction to Compression Techniques- Lossy compression & Lossless compression, Measures
of Performance, Modeling and coding. Mathematical modelling for Lossless and lossy compression
- Physical models and probability models.
Text Book
1. David Solomon, Data compression: the complete reference, 4/e, Springer, January 2007
2. Khalid Sayood, Introduction to data compression, Morgan Kaufmann Publishers,2003.
References
1) Stephen Welstead, Fractal and wavelet Image Compression techniques, PHI, 1999.
2) Sleinreitz, Multimedia System, Addison Wesley.
3) Mark Nelson and Jean-loup Gailly, The Data Compression Book, M&T Books.
1. Explain RLE based text compression and identify a example with compression ratio of 2.
2. Given the eight symbols A, B, C, D, E, F, G, and H with probabilities 1/30, 1/30, 1/30,
2/30, 3/30, 5/30, 5/30, and 12/30, draw three different Huffman trees with heights 5 and 6
for these symbols and calculate the average code size for each tree.
1. Differentiate the LZ77 and LZ78 performance with the input given as
‘sirsideastmaneasilyteasesseasickseals’
2. Explain why the continuous-tone images is required for JPEG and the main steps used in
image compression.
QP CODE:
PART A
10. Explain the working of -law encoder and decoder with an example
(10x3=30)
COMPUTER SCIENCE AND ENGINEERING
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Explain mathematical model for lossy compression and lossless compression (10)
(b) Define compression ratio with an example (4)
OR
12. (a) Discuss any probability model and identify the shortcoming of the solution. (7)
13. (a) With a help of flowchart discuss the RLE text compression for text data given (10)
below
‘ABBBBBBBBBCDEEEEF’
(b) calculate the compression ratio for the example while taking repetitions = 4 (4)
OR
14. (a) Illustrate with a example why Huffman coding is preferred than Shannon (10)
Fano Algorithm for compression
(b) How Huffman coding is handling the unpredictability of input data stream (4)
15. (a) Explain in detail the working of LZ78 with example and dictionary Tree (10)
(b) Illustrate with example, how the compression factor LZW differ from the (4)
LZ78
OR
16. (a) How quantization and coding helps in compression and their role in JPEG. (6)
(b) With the help of the given example illustrate the compression ratio of JPEG (8)
and JPEG-LS
17. (a) With the help of equations discuss Composite and Components Video (7)
(b) Differentiate the major changes in MPEG - 2 and MPEG-4 Video (7)
OR
18. (a) Describe in details about functionalities for MPEG-4 (8)
19. (a) How The Human Auditory System limitations can be taken in audio (7)
COMPUTER SCIENCE AND ENGINEERING
compressions
(b) Discuss the complexity of Layer III compared to others in MPEG Audio (7)
Coding
OR
20. (a) Discuss Format of Compressed Data and encoding in layer I and II (9)
TEACHING PLAN
No Contents No of
Lecture
Hrs (36
Hours)
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST466 DATA MINING
PEC 2 1 0 3 2019
Preamble: This course helps the learner to understand the concepts of data mining and data
warehousing. It covers the key processes of data mining, data preprocessing techniques,
fundamentals and advanced concepts of classification, clustering, association rule mining, web
mining and text mining. It enables the learners to develop new data mining algorithms and apply
the existing algorithms in real-world scenarios.
Prerequisite: NIL
Course Outcomes: After the completion of the course the student will be able to
CO# CO
CO1 Employ the key process of data mining and data warehousing concepts in application
domains. (Cognitive Knowledge Level: Understand)
CO2 Make use of appropriate preprocessing techniques to convert raw data into suitable
format for practical data mining tasks (Cognitive Knowledge Level: Apply)
CO3 Illustrate the use of classification and clustering algorithms in various application
domains (Cognitive Knowledge Level: Apply)
CO4 Comprehend the use of association rule mining techniques. (Cognitive Knowledge
Level: Apply)
CO5 Explain advanced data mining concepts and their applications in emerging domains
(Cognitive Knowledge Level: Understand)
PO PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO1 PO11 PO1
1 0 2
CO1
CO2
CO3
COMPUTER SCIENCE AND ENGINEERING
CO4
CO5
Assessment Pattern
Remember 20 20 20
Understand 30 30 30
Apply 50 50 50
Analyze
Evaluate
Create
Mark Distribution
150 50 100 3
COMPUTER SCIENCE AND ENGINEERING
Syllabus
Module – 1 (Introduction to Data Mining and Data Warehousing)
Data warehouse-Differences between Operational Database Systems and Data Warehouses,
Multidimensional data model- Warehouse schema, OLAP Operations, Data Warehouse
Architecture, Data Warehousing to Data Mining, Data Mining Concepts and Applications,
Knowledge Discovery in Database Vs Data mining, Architecture of typical data mining system,
Data Mining Functionalities, Data Mining Issues.
Text Books
1. Dunham M H, “Data Mining: Introductory and Advanced Topics”, Pearson Education, New
Delhi, 2003.
2. Arun K Pujari, “Data Mining Techniques”, Universities Press Private Limited,2008.
3. Jaiwei Han and Micheline Kamber, “Data Mining Concepts and Techniques”, Elsevier,
2006
Reference Books
1. M Sudeep Elayidom, “Data Mining and Warehousing”, 1st Edition, 2015, Cengage
Learning India Pvt. Ltd.
2. MehmedKantardzic, “Data Mining Concepts, Methods and Algorithms”, John Wiley and
Sons, USA, 2003.
3. Pang-Ning Tan and Michael Steinbach, “Introduction to Data Mining”, Addison Wesley,
2006.
COMPUTER SCIENCE AND ENGINEERING
1. Use the methods below to normalize the following group of data:100, 200, 300, 400,550,
600, 680, 850, 1000
(a) min-max normalization by setting min = 0 and max = 1
(b) z-score normalization
(c) Normalization by decimal scaling
Comment on which method you would prefer to use for the given data, givingreasons as to
why.
2. Identify a suitable dataset from any available resources and apply different preprocessing
steps that you have learned. Observe and analyze the output obtained. (Assignment)
2. Illustrate the working of K medoid algorithm for the given dataset. A1=(3,9), A2=(2,5),
A3=(8,4), A4=(5,8), A5=(7,5), A6=(6,4), A7=(1,2), A8=(4,9).
COMPUTER SCIENCE AND ENGINEERING
3. Take a suitable dataset from available resources and apply all the classification and clustering
algorithms that you have studied on original and preprocessed datasets. Analyze the
performance variation in terms of different quality metrics. Give a detailed report based on
the analysis. (Assignment)
1. A database has five transactions. Let min sup = 60% and min con f = 80%.
a) Find all frequent item sets using Apriori and FP-growth, respectively. Compare the
efficiency of the two mining processes.
b) List all of the strong association rules (with support s and confidence c) matching the
following metarule, where X is a variable representing customers, and𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖 denotes
variables representing items (e.g., “A”, “B”, etc.)
∀𝑥𝑥 ∈ 𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡𝑡, 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏(𝑋𝑋, 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖1 ) ∧ 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏(𝑋𝑋, 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖2 ) ⇒ 𝑏𝑏𝑏𝑏𝑏𝑏𝑏𝑏 (𝑋𝑋, 𝑖𝑖𝑖𝑖𝑖𝑖𝑖𝑖3 ) [𝑠𝑠, 𝑐𝑐]
2. Identify and list some scenarios in which association rule mining can be used, and then use at
least two appropriate association rule mining techniques in one of the two scenarios.
(Assignment)
1. Consider an e-mail database that stores a large number of electronic mail (e-mail)
messages. It can be viewed as a semi structured database consisting mainly of text data.
Discuss the following.
a. How can such an e-mail database be structured so as to facilitate multidimensional
search, such as by sender, by receiver, by subject, and by time?
b. What can be mined from such an e-mail database?
c. Suppose you have roughly classified a set of your previous e-mail messages as junk,
unimportant, normal, or important. Describe how a data mining system may take this
as the training set to automatically classify new e-mail messages or unclassified ones.
2. Precision and recall are two essential quality measures of an information retrieval system.
(a) Explain why it is the usual practice to trade one measure for the other.
(b) Explain why the F-score is a good measure for this purpose.
COMPUTER SCIENCE AND ENGINEERING
(c) Illustrate the methods that may effectively improve the F-score in an information
retrieval system.
3. Explain HITS algorithm with an example.
PART A
6. Given two objects represented by the tuples (22,1,42,10) and (20,0, 36,8).
Compute the Euclideanand Manhattan distance between the two objects.
7. The pincer search algorithm is a bi-directional search, whereas the level wise
algorithm is a unidirectional search. Express your opinion about the statement.
8. Define support, confidence and frequent set in association data mining context.
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Suppose a data warehouse consists of three measures: customer, account (7)
and branch and two measures count (number of customers in the branch)
and balance. Draw the schema diagram using snowflake schema and star
schema.
(b) Explain three- tier data warehouse architecture with a neat diagram. (7)
OR
13 (a) Suppose that the data for analysis includes the attribute age. The age values (8)
for the data tuples are (in increasing order) 13, 15, 16, 16, 19, 20, 20, 21, 22,
22, 25, 25, 25, 25, 30, 33, 33, 35, 35, 35, 35, 36, 40, 45, 46, 52, 70.
(a) Use min-max normalization to transform the value 35 for age onto
COMPUTER SCIENCE AND ENGINEERING
the
range [0-1].
(b) Use z-score normalization to transform the value 35 for age, where
the standard deviation of age is 12.94 years.
(c) Use normalization by decimal scaling to transform the value 35 for
age.
(d) Use smoothing by bin means to smooth the above data, using a bin
depth of 3. Illustrate your steps. Comment on the effect of this
technique for the given data.
(b) With proper illustration, explain how PCA can be used for dimensionality (6)
reduction? Explain
OR
14 (a) Suppose a group of 12 sales price records has been sorted as follows: 5, 10, (8)
11, 13, 15, 35, 50, 55, 72, 92, 204, 215. Sketch examples of each of the
following sampling techniques: SRSWOR, SRSWR, cluster sampling,
stratified sampling. Use samples of size 5 and the strata “youth,” “middle-
aged,” and “senior.”
(b) Partition the above data into three bins by each of the following methods: (6)
(i) equal-frequency (equi-depth) partitioning
(ii) equal-width partitioning
15 (a) Explain the concept of a cluster as used in ROCK. Illustrate with examples (9)
(b) Consider the following dataset for a binary classification problem. (5)
A B Class
Label
T F +
T T +
T T +
T F -
T T +
F F -
F F -
F F -
T T -
T F -
Calculate the gain in Gini index when splitting on A and B respectively.
Which attribute would the decision tree induction algorithm choose?
COMPUTER SCIENCE AND ENGINEERING
OR
16 (a) For a sunburn dataset given below, find the first splitting attribute for the (10)
decision tree by using the ID3 algorithm.
17 (a) Illustrate the working of Pincer Search Algorithm with an example. (7)
(b) Describe the working of dynamic itemset counting technique? Specify when (7)
to move an itemset from dashed structures to solid structures?
OR
18 (a) A database has six transactions. Let min_sup be 60% and min_conf be (9)
80%.
TID items_bought
T1 I1, I2, I3
T2 I2, I3, I4
T3 I4, I5
T4 I1, I2, I4
(b) Write partitioning algorithm for finding large itemset and compare its (5)
efficiency with apriori algorithm
COMPUTER SCIENCE AND ENGINEERING
(b) Write an algorithm to find maximal frequent forward sequences to mine log (7)
traversal patterns. Illustrate the working of this algorithm.
OR
20 (a) Explain how web structure mining is different from web usage mining and (7)
web content mining? Write a CLEVER algorithm for web structure mining.
(b) Describe different Text retrieval methods. Explain the relationship between (7)
text mining and information retrieval and information extraction.
Teaching Plan
No. of
No Contents lecture
hours
(36
Hrs)
YEAR OF
CATEGORY L T P CREDIT INTRODUCTION
CST476 MOBILE COMPUTING
PEC 2 1 0 3 2019
Preamble: The course is designed with the view of preparing the engineering students
capable of understanding the communication protocols, various architectures and security
features used in mobile computing. This course covers basics of mobile computing,
architecture of wireless transmission systems and next generation networks. This course
enables the learners to acquire advanced concepts on wireless communication systems and
mobile ad-hoc networks.
Course Outcomes: After the completion of the course the student will be able to
CO1
CO2
CO3
CO4
COMPUTER SCIENCE AND ENGINEERING
CO5
CO6
Assessment Pattern
Remember 30 30 30
Understand 50 50 50
Apply 20 20 20
Analyse
Evaluate
Create
Mark Distribution
Syllabus
Text Books
1. Asoke K. Talukder, Hasan Ahmad, Roopa R Yavagal, Mobile Computing Technology-
Application and Service Creation, 2/e, McGraw Hill Education.
2. Jochen Schiller, Mobile Communications, Pearson Education Asia, 2008.
3. Jonathan Rodriguez, Fundamentals of 5G Mobile Networks, Wiley Publishers, 2015.
Reference Books
1. Raj Kamal, Mobile Computing, 2/e, Oxford University Press.
2. Andrew S. Tanenbaum, Computer Networks, PHI, 3/e, 2003
3. Theodore S. Rappaport, Wireless Communications Principles and Practice, 2/e, PHI, New
Delhi, 2004.
4. Curt M. White, Fundamentals of Networking and Communication 7/e, Cengage learning.
data. Show the encoding, decoding and channel sharing mechanisms using CDMA.
2. Compare the influence of near/far effect and its countermeasures in TDMA and
CDMA systems.
Reg No:_______________
Name:_________________
3. Compare and contrast the satellite systems – GEO, LEO and MEO.
4. Assume all stations can hear all other stations. One station wants to transmit
and senses the carrier idle. Why can a collision still occur after the start of
transmission?
7. Mention the basic purpose of DHCP. Also list the entities of DHCP.
10. How does multifactor security model provide security in a mobile network?
(10x3=30)
Part B
(Answer any one question from each module. Each question carries 14 Marks)
11. (a) Describe the design considerations of three tier architecture of mobile (6)
computing.
(b) Explain any four functions and applications of mobile computing. (8)
OR
12. (a) Explain Internet-Ubiquitous networks mentioning the significance and (6)
functions of core, edge and access network.
(b) With the help of a neat sketch explain the three-tier architecture of mobile (8)
computing.
13. (a) Check to see if the following set of chips can belong to an orthogonal system. (6)
[+1, +1, +1, +1] , [+1, -1, -1, +1] , [-1, +1, +1, -1] , [+1, -1, -1, +1]
(b) Summarize the routing and localization process in satellite systems. (8)
OR
14. (a) Apply Direct Sequence Spread Spectrum to the data 101 using Barker (6)
sequence 10110111000. Show the encoding and decoding steps.
(b) Describe the system architecture of GSM networks. (8)
OR
16. (a) Describe the protocol architecture of IEEE 802.11. (6)
(b) Explain the Medium Access Control management features provided in an (8)
IEEE 802.11 station.
17. (a) With the help of an example, show the routing table creation using (7)
Destination Sequence Distance Vector Routing protocol in mobile ad-hoc
networks.
(b) Describe the router discovery methods used in mobile IP. (7)
OR
18. (a) Compare the features of flat routing and hierarchical routing. (6)
(b) List the entities of a mobile IP. With the help of an example, explain how (8)
packet delivery is done to and from a fixed node.
OR
20. (a) Describe the services of Wireless Asynchronous Transfer Mode. (6)
TEACHING PLAN
No Contents No.of
Lecture
Hrs
(35 hrs)
Module – 1 (Mobile Computing Basics) (6 hrs)
3.6 HIPERLAN-1 1
3.7 Bluetooth 1