HEAD
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester CS701 Software Architectures
Describe the Fundamentals of software architecture, qualities and terminologies.
Understand the fundamental principles and guidelines for software architecture design, architectural styles, patterns, and frameworks.
Use implementation techniques of Software architecture for effective software development.
Apply core values and principles of software architectures for enterprise application development.
Bass, L., P. Clements, and R. Kazman, “Software Architecture in Practice”, Second Edition, Prentice- Hall.
Jim Keogh, “J2EE – Complete Reference”, Tata McGraw Hill.
Dikel, David, D. Kane, and J. Wilson, “Software Architecture: Organizational Principles and Practices”, Prentice-Hall.
Bennett, Douglas, “Designing Hard Software: The Essential Tasks”, Prentice-Hall, 1997.
Clements, Paul, R. Kazman, M. Klein, “Evaluating Software Architectures: Methods and Case Studies”, Addison Wesley, 2001.
Albin, S. “The Art of Software Architecture”, Indiana: Wiley, 2003.
Robert Mee, and Randy Stafford, “Patterns of Enterprise Application Architecture”, Addison-Wesley, 2002.
Witt, B., T. Baker and E. Meritt, “Software Architecture and Design: Principles, Models and Methods”, Nostrand Reinhold, 1994.
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
Describe in-depth about theories, methods, and algorithms in computation Intelligence.
Compare and contrast traditional algorithms with nature inspired algorithms.
Examine the nature of a problem at hand and determine whether a computation intelligent technique/algorithm can solve it efficiently enough.
Design and implement Computation Intelligence algorithms and approaches for solving real-life problems.
Russell C. Eberhart and Yuhui Shi, Computational Intelligence: Concepts to Implementations, Morgan Kaufmann Publishers.
Andries P. Engelbrecht, Computational Intelligence: An Introduction, Wiley Publishing.
Simon Haykin, Neural Networks: A Comprehensive Foundation, Prentice Hall.
David E. Goldberg, Genetic Algorithm in Search Optimization and Machine Learning, Pearson Education.
Jagdish Chand Bansal, Pramod Kumar Singh, Nikhil R. Pal, Evolutionary and Swarm Intelligence Algorithms, Springer Publishing, 2019.
S. Rajeskaran, G.A. VijaylakshmiPai, “Neural Networks, Fuzzy Logic, GeneticAlgorithms Synthesis and Applications”.
J.S. Roger Jang, C.T.Sun, E. Mizutani, “Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning & Machine Intelligence”, PHI, 2002.
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
Describe in-depth about theories, models and algorithms in machine learning.
Compare and contrast different learning algorithms with parameters.
Examine the nature of a problem at hand and find the appropriate learning algorithms and it’s parameters that can solve it efficiently enough.
Design and implement of deep and reinforcement learningapproaches for solving real-life problems.
Deep Learning, An MIT Press book, Ian Goodfellow and YoshuaBengio and Aaron Courville
Pattern Classification- Richard O. Duda, Peter E. Hart, David G. Stork, John Wiley & Sons Inc.
Reinforcement Learning: An Introduction, Sutton and Barto, 2nd Edition.
Reinforcement Learning: State-of-the-Art, Marco Wiering and Martijn van Otterlo, Eds
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
COURSE OUTCOMES:
Students should be able to:
CO1: Design and create traditional networks
CO2: Understand the different issues in MAC and routing issues in multi hop wireless and ad-hoc networks and existing solutions for the same.
CO3: Evaluate the transport layer issues in wireless networks due to error’s and mobility of nodes and understand existing solutions for the same.
CO4: Explain the architecture of GSM.
CO5: Discuss the services, emerging issues and future trends in M-Commerce.
Unit 1: Review of traditional networks: Review of LAN, MAN, WAN, Intranet, Internet, and interconnectivity devices: bridges, Routers etc. Review of TCP/IP Protocol Architecture: ARP/RARP, IP addressing, IP Datagram format and its Delivery, Routing table format, ICMP Messages, Subnetting, Supernetting and CIDR, DNS. NAT: Private addressing and NAT, SNAT, DNAT, NAT and firewalls, VLANS: Concepts, Comparison with Real LANS, Type of VLAN, Tagging, IPV6: address structure, address space and header.
Unit 2: Study of traditional routing and transport: Routing Protocols: BGP- Concept of hidden network and autonomous system, An Exterior gateway protocol, Different messages of BGP. Interior Gateway protocol: RIP, OSPF. Multiplexing and ports, TCP: Segment format, Sockets, Synchronization, Three Way Hand Shaking, Variable window size and Flow control, Timeout and Retransmission algorithms, Connection Control, Silly window Syndrome. Example of TCP: Taho, Reno, Sack etc. UDP: Message Encapsulation, Format and Pseudo header.
Unit 3: Wireless LAN: Transmission Medium For WLANs, MAC problems, Hidden and Exposed terminals, Near and Far terminals, Infrastructure and Ad hoc Networks, IEEE 802.11- System arch, Protocol arch, Physical layer, Concept of spread spectrum, MAC and its management, Power management, Security. Mobile IP: unsuitability of Traditional IP; Goals, Terminology, Agent advertisement and discovery, Registration, Tunneling techniques. Ad hoc network routing: Ad hoc Network routing v/s Traditional IP routing, types of routing protocols, Examples: OADV, DSDV, DSR, ZRP etc.
Unit 4: Mobile transport layer: unsuitability of Traditional TCP; I-TCP, S-TCP, M-TCP. Wireless Cellular networks: Cellular system, Cellular networks v/s WLAN, GSM – Services, system architecture, Localization and calling, handover and Roaming.
Unit 5: Mobile Device Operating Systems: Special Constraints & Requirements, Commercial Mobile Operating Systems. Software Development Kit: iOS, Android etc.MCommerce : Structure , Pros &Cons, Mobile Payment System ,Security Issues
TEXT BOOKS RECOMMENDED:
Comer, “Internetworking with TCP/ IP Vol-I”, 5th edition, Addison Wesley, 2006.
Jochen Schiller “Mobile communication”, 2nd edition, Pearson education, 2008
REFERENCE:
W. Richard Stevens, “TCP/IP Illustrated Vol-I”, Addison-Wesley.
C.K.Toh, “AdHoc Mobile Wireless Networks”, First Edition, Pearson Education.
Uwe Hansmann, LotharMerk, Martin S. Nicklons and Thomas Stober, “Principles of Mobile Computing”, Springer
Android Developers : http://developer.android.com/index.html
Apple Developer : https://developer.apple.com/
Windows Phone Dev Center : http://developer.windowsphone.com/
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester Departmental Elective – CS702 (D) Big Data
Text Books:
RadhaShankarmani, M. Vijaylakshmi, " Big Data Analytics", Wiley, Secondedition
Seema Acharya, SubhashiniChellappan, " Big Data and Analytics", Wiley, Firstedition
Reference Books:
Michael Minelli, Michele Chambers, AmbigaDhiraj, “Big Data Big Analytics”,Wiley
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
CO1: Understanding of the basics of Cryptography and Network Security and working knowledge of Mathematics used in Cryptology.
CO2: Understanding of previous attacks on cryptosystems to prevent future attacks from securing a message over an insecure channel by various means.
CO3: Knowledge about how to maintain the Confidentiality, Integrity and Availability of a data. CO4: Understanding of various protocols for network security to protect against the network threats. CO5: Getting hands-on experience of various Information Security Tools.
Mathematical Background for Cryptography: Abstract Algebra, Number Theory, Modular Inverse, Extended Euclid Algorithm, Fermat's Little Theorem, Euler Phi-Function, Euler's theorem.
Introduction to Cryptography: Principles of Cryptography, Classical Cryptosystem, Cryptanalysis on Substitution Cipher (Frequency Analysis), Play Fair Cipher, Block Cipher. Data Encryption Standard (DES), Triple DES, Modes of Operation, Stream Cipher.
Advanced Encryption Standard (AES), Introduction to Public Key Cryptosystem, Discrete Logarithmic Problem, Diffie-Hellman Key Exchange Computational & Decisional Diffie-Hellman Problem, RSA Assumptions & Cryptosystem,RSA Signatures & Schnorr Identification Schemes, Primarily Testing, Elliptic Curve over the Reals, Elliptic curve Modulo a Prime., Chinese Remainder Theorem.
Message Authentication, Digital Signature, Key Management, Key Exchange, Hash Function. Universal Hashing, Cryptographic Hash Function, MD, Secure Hash Algorithm (SHA), Digital Signature Standard (DSS), Cryptanalysis: Time-Memory Trade-off Attack, Differential Cryptanalysis. Secure channel and authentication system like Kerberos.
UNIT IV:
Information Security: Threats in Networks, Network Security Controls–Architecture, Wireless Security, Honey pots, Traffic Flow Security, Firewalls – Design and Types of Firewalls, Personal Firewalls, IDS, Email Security: Services Security for Email Attacks Through Emails, Privacy-Authentication of Source Message, Pretty Good Privacy(PGP), S-MIME. IP Security: Overview of IPSec, IP& IP version 6 Authentication, Encapsulation Security Payload ESP, Internet Key Exchange IKE, Web Security: SSL/TLS, Basic protocols of security. Encoding –Secure Electronic Transaction SET.
Cryptography and Network Security Principles and Practice Fourth Edition,William Stallings, Pearson Education.
Network Security Essentials: Applications and Standards, by William Stallings.Prentice Hall.
Behrouz A Ferouzan, “Cryptography and NetworkSecurity” Tata Mc Graw Hills, 2007
Charles PPfleeger, Shari Lawrence Pfleeger “Security in Computing”, 4thEdition Prentice Hall of India, 2006.
Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell, Chapman and Hall/CRC
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
Student should understand the value of Historical data and data mining in solving real-world problems.
Student should become affluent with the basic Supervised and unsupervised learning algorithms commonly used in data mining .
Student develops the skill in using data mining for solving real-world problems.
Data Warehousing: Introduction, Delivery Process, Data warehouse Architecture, Data Preprocessing: Data cleaning, Data Integration and transformation, Data reduction. Data warehouse Design: Datawarehouse schema, Partitioning strategy Data warehouse Implementation, Data Marts, Meta Data, Example of a Multidimensional Data model. Introduction to Pattern Warehousing.
OLAP Systems: Basic concepts, OLAP queries, Types of OLAP servers, OLAP operations etc. Data Warehouse Hardware and Operational Design: Security, Backup And Recovery,
Introduction to Data& Data Mining :Data Types, Quality of data, Data Preprocessing, Similarity measures, Summary statistics, Data distributions, Basic data mining tasks, Data Mining V/s knowledge discovery in databases. Issues in Data mining. Introduction to Fuzzy sets and fuzzy logic.
Supervised Learning: Classification: Statistical-based algorithms, Distance-based algorithms, Decision tree-based algorithms, Neural network-based algorithms, Rule-based algorithms, Probabilistic Classifiers
Clustering & Association Rule mining : Hierarchical algorithms, Partitional algorithms, Clustering large databases – BIRCH, DBSCAN, CURE algorithms.Association rules : Parallel and distributed algorithms such as Apriori and FP growth algorithms.
Pang – ningTan , Steinbach & Kumar, “Introduction to Data Mining”, Pearson Edu, 2019.
Jaiwei Han, Micheline Kamber, “Data Mining : Concepts and Techniques”, Morgan Kaufmann Publishers.
Margaret H. Dunham, “Data Mining : Introductory and Advanced topics”, Pearson Edu., 2009.
Anahory& Murray, “Data Warehousing in the Real World”, Pearson Edu., 2009.
After completion of this course, the students would be able to:
CO1. Understand the need of designing Enterprise data warehouses andwill be enabled to approach business problems analytically by identifying opportunities to derive business.
CO2. Compare and contrast, various methods for storing & retrieving data from different data sources/repository.
CO3. Ascertain the application of data mining in various areas and Preprocess the given data and visualize it for a given application or data exploration/mining task
CO4. Apply supervised learning methods to given data sets such as classification and its various types. CO5. Apply Unsupervised learning methods to given data sets such as clustering and its various types. CO6 Apply Association rule Mining to various domains.
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester Open Elective – CS703 (C) Agile Software Development
Describe the fundamental principles and practices associated with each of the agile development methods.
Compare agile software development model with traditional development models and identify the benefits and pitfalls.
Use techniques and skills to establish and mentor Agile Teams for effective software development.
Apply core values and principles of Agile Methods in software development.
Robert C. Martin, Agile Software Development- Principles, Patterns and Practices, Prentice Hall, 2013.
Kenneth S. Rubin, Essential Scrum: A Practical Guide to the Most Popular Agile Process, Addison Wesley, 2012.
James Shore and Shane Warden, The Art of Agile Development, O’Reilly Media, 2007.
Craig Larman, ―Agile and Iterative Development: A manager’s Guide, Addison-Wesley, 2004.
Ken Schawber, Mike Beedle, Agile Software Development with Scrum, Pearson, 2001.
Cohn, Mike, Agile Estimating and Planning, Pearson Education, 2006.
Cohn, Mike, User Stories Applied: For Agile Software Development Addison Wisley, 2004.
IEEE Transactions on Software Engineering
IEEE Transactions on Dependable and Secure Computing
IET Software
ACM Transactions on Software Engineering and Methodology (TOSEM)
ACM SIGSOFT Software Engineering Notes
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester Open Elective – CS703 (D) Disaster Management
Course Objective
To provide students an exposure to disasters, their significance and types.
To ensure that students begin to understand the relationship between vulnerability, disasters, disaster prevention and risk reduction
To gain a preliminary understanding of approaches of Disaster Risk Reduction (DRR)
To enhance awareness of institutional processes in the country and
To develop rudimentary ability to respond to their surroundings with potential disaster response in areas where they live, with due sensitivity
Definition: Disaster, Hazard, Vulnerability, Resilience, Risks – Disasters: Types of disasters – Earthquake, Landslide, Flood, Drought, Fire etc - Classification, Causes, Impacts including social, economic, political, environmental, health, psychosocial, etc.- Differential impacts- in terms of caste, class, gender, age, location, disability - Global trends in disasters: urban disasters,pandemics,complexemergencies,Climatechange-DosandDont’sduringvarious types ofDisasters
Disaster cycle - Phases, Culture of safety, prevention, mitigation and preparedness community based DRR, Structural- nonstructural measures, Roles and responsibilities of- community, Panchayati Raj Institutions/Urban Local Bodies (PRIs/ULBs), States, Centre, and other stake-holders- Institutional Processess and Framework at State and Central Level- State Disaster Management Authority(SDMA) – Early Warning System – Advisories from Appropriate Agencies.
Factors affecting Vulnerabilities, differential impacts, impact of Development projects such as dams, embankments, changes in Land-use etc.- Climate Change Adaptation- IPCC Scenario and Scenarios in the context of India - Relevance of indigenous knowledge, appropriate technology and local resources
Hazard and Vulnerability profile of India, Components of Disaster Relief: Water, Food, Sanitation, Shelter, Health, Waste Management, Institutional arrangements (Mitigation, Response and Preparedness, Disaster Management Act and Policy - Other related policies, plans, programmes and legislation – Role of GIS and Information Technology Components in Preparedness, Risk Assessment, Response and Recovery Phases of Disaster – Disaster Damage Assessment
Landslide Hazard Zonation: Case Studies, Earthquake Vulnerability Assessment of Buildings and Infrastructure: Case Studies, Drought Assessment: Case Studies, Coastal Flooding: Storm Surge Assessment, Floods: Fluvial and Pluvial Flooding: Case Studies; Forest Fire: Case Studies, Man Made disasters: Case Studies, Space Based Inputs for Disaster Mitigation and Management and field works related to disastermanagement.
Text Books/Reference Books
Singhal J.P, Disaster Management, Laxmi Publications.
Tushar Bhattacharya, Disaster Science and Management, McGraw Hill India.
Govt. of India, Disaster Management, Government of India.
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester CS701 Software Architectures
Describe the Fundamentals of software architecture, qualities and terminologies.
Understand the fundamental principles and guidelines for software architecture design, architectural styles, patterns, and frameworks.
Use implementation techniques of Software architecture for effective software development.
Apply core values and principles of software architectures for enterprise application development.
Bass, L., P. Clements, and R. Kazman, “Software Architecture in Practice”, Second Edition, Prentice- Hall.
Jim Keogh, “J2EE – Complete Reference”, Tata McGraw Hill.
Dikel, David, D. Kane, and J. Wilson, “Software Architecture: Organizational Principles and Practices”, Prentice-Hall.
Bennett, Douglas, “Designing Hard Software: The Essential Tasks”, Prentice-Hall, 1997.
Clements, Paul, R. Kazman, M. Klein, “Evaluating Software Architectures: Methods and Case Studies”, Addison Wesley, 2001.
Albin, S. “The Art of Software Architecture”, Indiana: Wiley, 2003.
Robert Mee, and Randy Stafford, “Patterns of Enterprise Application Architecture”, Addison-Wesley, 2002.
Witt, B., T. Baker and E. Meritt, “Software Architecture and Design: Principles, Models and Methods”, Nostrand Reinhold, 1994.
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
Describe in-depth about theories, methods, and algorithms in computation Intelligence.
Compare and contrast traditional algorithms with nature inspired algorithms.
Examine the nature of a problem at hand and determine whether a computation intelligent technique/algorithm can solve it efficiently enough.
Design and implement Computation Intelligence algorithms and approaches for solving real-life problems.
Russell C. Eberhart and Yuhui Shi, Computational Intelligence: Concepts to Implementations, Morgan Kaufmann Publishers.
Andries P. Engelbrecht, Computational Intelligence: An Introduction, Wiley Publishing.
Simon Haykin, Neural Networks: A Comprehensive Foundation, Prentice Hall.
David E. Goldberg, Genetic Algorithm in Search Optimization and Machine Learning, Pearson Education.
Jagdish Chand Bansal, Pramod Kumar Singh, Nikhil R. Pal, Evolutionary and Swarm Intelligence Algorithms, Springer Publishing, 2019.
S. Rajeskaran, G.A. VijaylakshmiPai, “Neural Networks, Fuzzy Logic, GeneticAlgorithms Synthesis and Applications”.
J.S. Roger Jang, C.T.Sun, E. Mizutani, “Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning & Machine Intelligence”, PHI, 2002.
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
Describe in-depth about theories, models and algorithms in machine learning.
Compare and contrast different learning algorithms with parameters.
Examine the nature of a problem at hand and find the appropriate learning algorithms and it’s parameters that can solve it efficiently enough.
Design and implement of deep and reinforcement learningapproaches for solving real-life problems.
Deep Learning, An MIT Press book, Ian Goodfellow and YoshuaBengio and Aaron Courville
Pattern Classification- Richard O. Duda, Peter E. Hart, David G. Stork, John Wiley & Sons Inc.
Reinforcement Learning: An Introduction, Sutton and Barto, 2nd Edition.
Reinforcement Learning: State-of-the-Art, Marco Wiering and Martijn van Otterlo, Eds
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
COURSE OUTCOMES:
Students should be able to:
CO1: Design and create traditional networks
CO2: Understand the different issues in MAC and routing issues in multi hop wireless and ad-hoc networks and existing solutions for the same.
CO3: Evaluate the transport layer issues in wireless networks due to error’s and mobility of nodes and understand existing solutions for the same.
CO4: Explain the architecture of GSM.
CO5: Discuss the services, emerging issues and future trends in M-Commerce.
Unit 1: Review of traditional networks: Review of LAN, MAN, WAN, Intranet, Internet, and interconnectivity devices: bridges, Routers etc. Review of TCP/IP Protocol Architecture: ARP/RARP, IP addressing, IP Datagram format and its Delivery, Routing table format, ICMP Messages, Subnetting, Supernetting and CIDR, DNS. NAT: Private addressing and NAT, SNAT, DNAT, NAT and firewalls, VLANS: Concepts, Comparison with Real LANS, Type of VLAN, Tagging, IPV6: address structure, address space and header.
Unit 2: Study of traditional routing and transport: Routing Protocols: BGP- Concept of hidden network and autonomous system, An Exterior gateway protocol, Different messages of BGP. Interior Gateway protocol: RIP, OSPF. Multiplexing and ports, TCP: Segment format, Sockets, Synchronization, Three Way Hand Shaking, Variable window size and Flow control, Timeout and Retransmission algorithms, Connection Control, Silly window Syndrome. Example of TCP: Taho, Reno, Sack etc. UDP: Message Encapsulation, Format and Pseudo header.
Unit 3: Wireless LAN: Transmission Medium For WLANs, MAC problems, Hidden and Exposed terminals, Near and Far terminals, Infrastructure and Ad hoc Networks, IEEE 802.11- System arch, Protocol arch, Physical layer, Concept of spread spectrum, MAC and its management, Power management, Security. Mobile IP: unsuitability of Traditional IP; Goals, Terminology, Agent advertisement and discovery, Registration, Tunneling techniques. Ad hoc network routing: Ad hoc Network routing v/s Traditional IP routing, types of routing protocols, Examples: OADV, DSDV, DSR, ZRP etc.
Unit 4: Mobile transport layer: unsuitability of Traditional TCP; I-TCP, S-TCP, M-TCP. Wireless Cellular networks: Cellular system, Cellular networks v/s WLAN, GSM – Services, system architecture, Localization and calling, handover and Roaming.
Unit 5: Mobile Device Operating Systems: Special Constraints & Requirements, Commercial Mobile Operating Systems. Software Development Kit: iOS, Android etc.MCommerce : Structure , Pros &Cons, Mobile Payment System ,Security Issues
TEXT BOOKS RECOMMENDED:
Comer, “Internetworking with TCP/ IP Vol-I”, 5th edition, Addison Wesley, 2006.
Jochen Schiller “Mobile communication”, 2nd edition, Pearson education, 2008
REFERENCE:
W. Richard Stevens, “TCP/IP Illustrated Vol-I”, Addison-Wesley.
C.K.Toh, “AdHoc Mobile Wireless Networks”, First Edition, Pearson Education.
Uwe Hansmann, LotharMerk, Martin S. Nicklons and Thomas Stober, “Principles of Mobile Computing”, Springer
Android Developers : http://developer.android.com/index.html
Apple Developer : https://developer.apple.com/
Windows Phone Dev Center : http://developer.windowsphone.com/
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester Departmental Elective – CS702 (D) Big Data
Text Books:
RadhaShankarmani, M. Vijaylakshmi, " Big Data Analytics", Wiley, Secondedition
Seema Acharya, SubhashiniChellappan, " Big Data and Analytics", Wiley, Firstedition
Reference Books:
Michael Minelli, Michele Chambers, AmbigaDhiraj, “Big Data Big Analytics”,Wiley
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
CO1: Understanding of the basics of Cryptography and Network Security and working knowledge of Mathematics used in Cryptology.
CO2: Understanding of previous attacks on cryptosystems to prevent future attacks from securing a message over an insecure channel by various means.
CO3: Knowledge about how to maintain the Confidentiality, Integrity and Availability of a data. CO4: Understanding of various protocols for network security to protect against the network threats. CO5: Getting hands-on experience of various Information Security Tools.
Mathematical Background for Cryptography: Abstract Algebra, Number Theory, Modular Inverse, Extended Euclid Algorithm, Fermat's Little Theorem, Euler Phi-Function, Euler's theorem.
Introduction to Cryptography: Principles of Cryptography, Classical Cryptosystem, Cryptanalysis on Substitution Cipher (Frequency Analysis), Play Fair Cipher, Block Cipher. Data Encryption Standard (DES), Triple DES, Modes of Operation, Stream Cipher.
Advanced Encryption Standard (AES), Introduction to Public Key Cryptosystem, Discrete Logarithmic Problem, Diffie-Hellman Key Exchange Computational & Decisional Diffie-Hellman Problem, RSA Assumptions & Cryptosystem,RSA Signatures & Schnorr Identification Schemes, Primarily Testing, Elliptic Curve over the Reals, Elliptic curve Modulo a Prime., Chinese Remainder Theorem.
Message Authentication, Digital Signature, Key Management, Key Exchange, Hash Function. Universal Hashing, Cryptographic Hash Function, MD, Secure Hash Algorithm (SHA), Digital Signature Standard (DSS), Cryptanalysis: Time-Memory Trade-off Attack, Differential Cryptanalysis. Secure channel and authentication system like Kerberos.
UNIT IV:
Information Security: Threats in Networks, Network Security Controls–Architecture, Wireless Security, Honey pots, Traffic Flow Security, Firewalls – Design and Types of Firewalls, Personal Firewalls, IDS, Email Security: Services Security for Email Attacks Through Emails, Privacy-Authentication of Source Message, Pretty Good Privacy(PGP), S-MIME. IP Security: Overview of IPSec, IP& IP version 6 Authentication, Encapsulation Security Payload ESP, Internet Key Exchange IKE, Web Security: SSL/TLS, Basic protocols of security. Encoding –Secure Electronic Transaction SET.
Cryptography and Network Security Principles and Practice Fourth Edition,William Stallings, Pearson Education.
Network Security Essentials: Applications and Standards, by William Stallings.Prentice Hall.
Behrouz A Ferouzan, “Cryptography and NetworkSecurity” Tata Mc Graw Hills, 2007
Charles PPfleeger, Shari Lawrence Pfleeger “Security in Computing”, 4thEdition Prentice Hall of India, 2006.
Introduction to Modern Cryptography by Jonathan Katz and Yehuda Lindell, Chapman and Hall/CRC
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester
Student should understand the value of Historical data and data mining in solving real-world problems.
Student should become affluent with the basic Supervised and unsupervised learning algorithms commonly used in data mining .
Student develops the skill in using data mining for solving real-world problems.
Data Warehousing: Introduction, Delivery Process, Data warehouse Architecture, Data Preprocessing: Data cleaning, Data Integration and transformation, Data reduction. Data warehouse Design: Datawarehouse schema, Partitioning strategy Data warehouse Implementation, Data Marts, Meta Data, Example of a Multidimensional Data model. Introduction to Pattern Warehousing.
OLAP Systems: Basic concepts, OLAP queries, Types of OLAP servers, OLAP operations etc. Data Warehouse Hardware and Operational Design: Security, Backup And Recovery,
Introduction to Data& Data Mining :Data Types, Quality of data, Data Preprocessing, Similarity measures, Summary statistics, Data distributions, Basic data mining tasks, Data Mining V/s knowledge discovery in databases. Issues in Data mining. Introduction to Fuzzy sets and fuzzy logic.
Supervised Learning: Classification: Statistical-based algorithms, Distance-based algorithms, Decision tree-based algorithms, Neural network-based algorithms, Rule-based algorithms, Probabilistic Classifiers
Clustering & Association Rule mining : Hierarchical algorithms, Partitional algorithms, Clustering large databases – BIRCH, DBSCAN, CURE algorithms.Association rules : Parallel and distributed algorithms such as Apriori and FP growth algorithms.
Pang – ningTan , Steinbach & Kumar, “Introduction to Data Mining”, Pearson Edu, 2019.
Jaiwei Han, Micheline Kamber, “Data Mining : Concepts and Techniques”, Morgan Kaufmann Publishers.
Margaret H. Dunham, “Data Mining : Introductory and Advanced topics”, Pearson Edu., 2009.
Anahory& Murray, “Data Warehousing in the Real World”, Pearson Edu., 2009.
After completion of this course, the students would be able to:
CO1. Understand the need of designing Enterprise data warehouses andwill be enabled to approach business problems analytically by identifying opportunities to derive business.
CO2. Compare and contrast, various methods for storing & retrieving data from different data sources/repository.
CO3. Ascertain the application of data mining in various areas and Preprocess the given data and visualize it for a given application or data exploration/mining task
CO4. Apply supervised learning methods to given data sets such as classification and its various types. CO5. Apply Unsupervised learning methods to given data sets such as clustering and its various types. CO6 Apply Association rule Mining to various domains.
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester Open Elective – CS703 (C) Agile Software Development
Describe the fundamental principles and practices associated with each of the agile development methods.
Compare agile software development model with traditional development models and identify the benefits and pitfalls.
Use techniques and skills to establish and mentor Agile Teams for effective software development.
Apply core values and principles of Agile Methods in software development.
Robert C. Martin, Agile Software Development- Principles, Patterns and Practices, Prentice Hall, 2013.
Kenneth S. Rubin, Essential Scrum: A Practical Guide to the Most Popular Agile Process, Addison Wesley, 2012.
James Shore and Shane Warden, The Art of Agile Development, O’Reilly Media, 2007.
Craig Larman, ―Agile and Iterative Development: A manager’s Guide, Addison-Wesley, 2004.
Ken Schawber, Mike Beedle, Agile Software Development with Scrum, Pearson, 2001.
Cohn, Mike, Agile Estimating and Planning, Pearson Education, 2006.
Cohn, Mike, User Stories Applied: For Agile Software Development Addison Wisley, 2004.
IEEE Transactions on Software Engineering
IEEE Transactions on Dependable and Secure Computing
IET Software
ACM Transactions on Software Engineering and Methodology (TOSEM)
ACM SIGSOFT Software Engineering Notes
New Scheme Based On AICTE Flexible Curricula Computer Science and Engineering, VII-Semester Open Elective – CS703 (D) Disaster Management
Course Objective
To provide students an exposure to disasters, their significance and types.
To ensure that students begin to understand the relationship between vulnerability, disasters, disaster prevention and risk reduction
To gain a preliminary understanding of approaches of Disaster Risk Reduction (DRR)
To enhance awareness of institutional processes in the country and
To develop rudimentary ability to respond to their surroundings with potential disaster response in areas where they live, with due sensitivity
Definition: Disaster, Hazard, Vulnerability, Resilience, Risks – Disasters: Types of disasters – Earthquake, Landslide, Flood, Drought, Fire etc - Classification, Causes, Impacts including social, economic, political, environmental, health, psychosocial, etc.- Differential impacts- in terms of caste, class, gender, age, location, disability - Global trends in disasters: urban disasters,pandemics,complexemergencies,Climatechange-DosandDont’sduringvarious types ofDisasters
Disaster cycle - Phases, Culture of safety, prevention, mitigation and preparedness community based DRR, Structural- nonstructural measures, Roles and responsibilities of- community, Panchayati Raj Institutions/Urban Local Bodies (PRIs/ULBs), States, Centre, and other stake-holders- Institutional Processess and Framework at State and Central Level- State Disaster Management Authority(SDMA) – Early Warning System – Advisories from Appropriate Agencies.
Factors affecting Vulnerabilities, differential impacts, impact of Development projects such as dams, embankments, changes in Land-use etc.- Climate Change Adaptation- IPCC Scenario and Scenarios in the context of India - Relevance of indigenous knowledge, appropriate technology and local resources
Hazard and Vulnerability profile of India, Components of Disaster Relief: Water, Food, Sanitation, Shelter, Health, Waste Management, Institutional arrangements (Mitigation, Response and Preparedness, Disaster Management Act and Policy - Other related policies, plans, programmes and legislation – Role of GIS and Information Technology Components in Preparedness, Risk Assessment, Response and Recovery Phases of Disaster – Disaster Damage Assessment
Landslide Hazard Zonation: Case Studies, Earthquake Vulnerability Assessment of Buildings and Infrastructure: Case Studies, Drought Assessment: Case Studies, Coastal Flooding: Storm Surge Assessment, Floods: Fluvial and Pluvial Flooding: Case Studies; Forest Fire: Case Studies, Man Made disasters: Case Studies, Space Based Inputs for Disaster Mitigation and Management and field works related to disastermanagement.
Text Books/Reference Books
Singhal J.P, Disaster Management, Laxmi Publications.
Tushar Bhattacharya, Disaster Science and Management, McGraw Hill India.
Govt. of India, Disaster Management, Government of India.