7th Sem Syllabus
7th Sem Syllabus
7th Sem Syllabus
1. Classify security vulnerabilities involved in data communication over Internet and make
use of classical algorithms to address the vulnerabilities.
2. Make use of modern block ciphers to secure data transmission and storage
3. Analyze challenges involved in key distribution and select approache that can be adopted
4. Analyze strengths of public key algorithms and explore applications in exchange,
authentication and hashing of messages.
5. Appreciate application of algorithms for ensuring access control, authentication, secured
transmission of data at different layers.
6. Appraiserisks related to wireless, web, cloud security and measures to be adopted to
secure organizational network.
6. Detailed Syllabus
Contact
UNIT CONTENTS
Hrs
Introduction to security attacks, services and mechanism, introduction to
cryptography.
Unit – I Conventional Encryption: Conventional encryption model, classical 8
encryption techniques- substitution ciphers and transposition ciphers,
cryptanalysis, stenography, stream and block ciphers.
Modern Block Ciphers: Block ciphers principals, Shannon's theory of
confusion and diffusion, Modes of operations of block ciphers: ECB, CBC,
OFB, CFB, Advanced Encryption Standard (AES)
Unit – II 10
Traffic confidentiality, Key distribution, random numbers, Pseudo random
number generation using Linear Congruential and Blum BlumShub
algorithms
Prime and relative prime numbers, modular arithmetic, Primality testing,
Euclid's Algorithm for GCD and Extended Euclid's Algorithm for
Multiplicative inverse
Principals of public key crypto systems, RSA algorithm, security of RSA,
Unit – III key management, Diffle-Hellman key exchange algorithm 8
Text Books:
1. William Stallings, “Cryptography and Network Security: Principals and Practice”, 7th Edition,
Pearson, 2017
2. William Stallings, “Network Security Essentials – Applications and Standards”, 4th edition,
Pearson Education, 2011
Reference Books
2. Contact Hours: L: 3 T: - P: -
3. Semester: VII
1. Analyze Global and Centralized Routing protocols and utilize tools (such as NS2)
to examine routing protocols of LS and DV types
2. Evaluate and select the appropriate technology to meet Data Link Layer
requirements
3. Specify the devices, components and technologies to build a cost-effective LAN
4. Appreciate issues for supporting real time and multimedia traffic over public
network
5. Describe the key benefited of SDN, in particular those benefits brought about by
the separation of data and control planes.
6. Implement client server applications with TCP/UDP Socket Programming
6. Detailed Syllabus
Contact
UNIT CONTENTS
Hrs
Routing Algorithms: Introduction, global vs decentralized routing, The Link
State(LS) Routing Algorithm, The Distance Vector (DV) Routing Algorithm,
Unit - I 9
Hierarchical Routing, Routing in the Internet: RIP, OSPF, BGP; Introduction
to Broadcast and Multicast Routing
Link Layer and Local Area Networks: Introduction to Link Layer and its
services, Where Link Layer is implemented?, Error detection and correction
techniques: Parity checks, Checksumming, CRC; Multiple Access
Unit - II protocols: Channel Partitioning, Random Access (Slotted Aloha, Aloha, 10
CSMA), Taking Turns; Link Layer Addressing: MAC addresses, ARP,
Ethernet, CSMA/CD, Ethernet Technologies, Link Layer Switches,
Switches vs Routers, VLANS
Multimedia Networking: Introduction, Streaming Stored Audio and Video,
Real Time Streaming Protocol(RTSP), Making the Best of the Best Effort
Unit – III 9
Services, Protocols for Real Time Interactive Applications: RTP, RTCP,
SIP, H.323; Providing multiple classes of service.
Generalized forwarding and SDN Match , Action, Open flow, SDN Control
Unit – IV Plane , SDN controller and SDN control Application , Open flow protocol, 9
Data and control plane Interaction , SDN : PAST and FUTURE.
Network Programming: Sockets-Address structures, TCP sockets, creating
sockets, bind, listen, accept, fork and exec function, close function; TCP
client server: Echo server, normal startup, terminate and signal handling,
Unit – V server process termination, crashing and rebooting of server, host 8
shutdown; Elementary UDP sockets: UDP echo server, lack of flow control
with UDP
Total 45
Text Book:
1. “Computer Networking A Top Down Approach, Kurose and Ross”, 5th edition, Pearson
Reference Book:
1. Douglas E. Comer, Pearson ,“Internetworking with TCP/IP Volume 1 and 2 “,; 6 edition
Name of Department:- Computer Science and Engineering
1. Analyze the classes of computers, and new trends and developments in computer
architecture.
2. Evaluate advanced performance enhancement techniques such as pipelines ,dynamic
scheduling branch predictions, caches.
3. Compare and contrast the modern computer architectures such as RISC, Scalar, and multi
CPU systems.
4. Critically evaluate the performance of different CPU architecture.
5. Improve the performance of applications running on different CPU architectures.
6. Develop applications for high performance computing systems.
1. Detailed Syllabus
Contact
UNIT CONTENTS
Hrs
Fundamentals: Computer Architecture and Technology Trends, Moore's
Law, Classes of Parallelism and Parallel Architectures, Instruction Set
Architecture: The Myopic View of Computer Architecture, Trends in
Unit - I Technology, Trends in Cost, Processor Speed, Cost, Power, Power 10
Consumption, Fabrication Yield
Performance Metrics and Evaluation: Measuring Performance, Benchmark
Standards, Iron Law of Performance, Amdahl's Law, Lhadma's Law
Memory Hierarchy Design: Basics of Memory Hierarchy, Coherence and
locality properties, Cache memory organizations, Cache Performance,
Unit - II 9
Cache optimization techniques, Virtual Memory, Techniques for Fast
Address Translation
Pipelining: What is pipelining, Basics of a RISC ISA, The classic five-stage
Unit – III pipeline for a RISC processor, Performance issues in pipelining, Pipeline 10
Hazards
Branches and Prediction: Branch Prediction, Direction Predictor,
Hierarchical Predictors, If Conversion, Conditional Move
Unit – IV 8
Instruction Level Parallelism: Introduction, RAW and WAW, dependencies,
Duplicating Register Values, ILP
Multiprocessor architecture: taxonomy of parallel architectures. Centralized
Unit – V shared-memory, Distributed shared-memory architecture, Message 9
passing vs Shared Memory
Total 46
Text/ Reference Books
4. Prerequisite:
Contact
UNIT CONTENTS
Hrs
Cyber Crimes, Laws and Cyber Forensics: Introduction to IT laws
& Cyber Crimes, The World and India
Cyber Forensics Investigation: Introduction to Cyber Forensic
Investigation, Investigation Tools, eDiscovery, Digital Evidence
Unit - I 9
Collection, Evidence Preservation, E-Mail Investigation, E-Mail
Tracking, IP Tracking, E-Mail Recovery, Encryption and Decryption
methods, Search and Seizure of Computers, Recovering deleted
evidences, Password Cracking
Digital Forensics Fundamentals: Introduction to Incident response,
digital forensics stepwise procedure, Computer/network/Internet
forensic and anti-forensics , Unix/Linux incident response,
Unix/Linux forensics investigation steps and technologies, Memory
Unit - II forensics, Windows incident response tools , Windows forensics 9
tools
TEXT BOOKS:
1. Bill Nelson, Amelia Phillips, Frank Enfinger, Christopher Steuart, ―”Computer Forensics and
Investigations”, Cengage Learning, India Edition, 2016
2. MarjieT.Britz, “Computer Forensics and Cyber Crime”: An Introduction”, 3rd Edition, Prentice
Hall
REFERENCES:
1. Kenneth C.Brancik ―”Insider Computer Fraud Auerbach “, Publications Taylor &; Francis Group
2. “CEH official Certfied Ethical Hacking Review Guide”, Wiley India Edition, 2015
Name of Department:- Computer Science and Engineering
1. Explain the capabilities of both humans and computers from the viewpoint of human
information processing.
2. Describe typical human–computer interaction (HCI) models, styles, and various historic
HCI paradigms.
3. Apply an interactive design process and universal design principles to designing HCI
systems.
4. Describe and use HCI design principles, standards and guidelines.
5. Analyze and identify user models, user support, socio-organizational issues, and
stakeholder requirements of HCI systems.
6. Discuss tasks and dialogs of relevant HCI systems based on task analysis and dialog
design.
6. Detailed Syllabus
Contact
UNIT CONTENTS
Hrs
Introduction : Importance of user Interface – definition, importance of good
design. Benefits of good design. A brief history of Screen design.The
Unit - I graphical user interface – popularity of graphics, the concept of direct 8
manipulation, graphical system, Characteristics, Web user – Interface
popularity, characteristics- Principles of user interface
Design process – Human interaction with computers, importance of human
Unit - II characteristics human consideration, Human interaction speeds, 8
understanding business junctions
Screen Designing : Design goals – Screen planning and purpose,
organizing screen elements, ordering of screen data and content – screen
navigation and flow – Visually pleasing composition – amount of information
Unit – III 9
– focus and emphasis – presentation information simply and meaningfully
– information retrieval on web – statistical graphics – Technological
consideration in interface design
Windows – New and Navigation schemes selection of window, selection of
Unit – IV 8
devices based and screen based controls.
Components – text and messages, Icons and increases – Multimedia,
colors, uses problems, choosing colors
.Text Books :
1. “The essential guide to user interface design”, Wilbert O Galitz, Wiley DreamaTech.
2. “Designing the user interface”. 3rd Edition Ben Shneidermann , Pearson Education Asia.
Reference Book:
1. “Human – Computer Interaction”. ALAN DIX, JANET FINCAY, GRE GORYD, ABOWD,
RUSSELL BEALG, PEARSON.
Name of Department:- Computer Science and Engineering
1. Subject Code: TCS 722 Course Title: Data Warehousing and Data
Mining
2. Contact Hours: L: 3 T: - P: -
3. Semester: VII
1. Describe the fundamental concepts, benefits and problem areas associated with
datawarehousing
2. Understand the various architectures and main components of a data warehouse.
3. Find the issues that arise when implementing a data warehouse.
4. Understand the techniques applied in data mining.
5. Compare and contrast OLAP and data mining as techniques for extracting knowledge
from a data warehouse.
6. Find the association rules.
6. Detailed Syllabus
Contact
UNIT CONTENTS
Hrs
Overview, Motivation(for Data Mining),Data Mining-Definition &
Functionalities, Data Processing, Form of Data Preprocessing, Data
Cleaning: Missing Values, Noisy Data,(Binning, Clustering, Regression,
Unit - I Computer and Human inspection),Inconsistent Data, Data Integration and 9
Transformation. Data Reduction:-Data Cube Aggregation, Dimensionality
reduction, Data Compression, Numerosity Reduction, Clustering,
Discretization and Concept hierarchy generation
Concept Description:- Definition, Data Generalization, Analytical
Characterization, Analysis of attribute relevance, Mining Class
comparisions, Statistical measures in large Databases. Measuring Central
Tendency, Measuring Dispersion of Data, Graph Displays of Basic
Unit - II Statistical class Description, Mining Association Rules in Large Databases, 8
Association rule mining, mining Single-Dimensional Boolean Association
rules from Transactional Databases– Apriori Algorithm, Mining Multilevel
Association rules from Transaction Databases and Mining Multi-
Dimensional Association rules from Relational Databases
What is Classification & Prediction, Issues regarding Classification and
prediction, Decision tree, Bayesian Classification, Classification by Back
propagation, Multilayer feed-forward Neural Network, Back propagation
Unit – III Algorithm, Classification methods K-nearest neighbor classifiers, Genetic 9
Algorithm. Cluster Analysis: Data types in cluster analysis, Categories of
clustering methods, Partitioning methods. Hierarchical Clustering- CURE
and Chameleon, Density Based Methods-DBSCAN, OPTICS, Grid Based
Methods- STING, CLIQUE, Model Based Method –Statistical Approach,
Neural Network approach, Outlier Analysis
Data Warehousing: Overview, Definition, Delivery Process, Difference
between Database System and Data Warehouse, Multi Dimensional Data
Unit – IV 9
Model, Data Cubes, Stars, Snow Flakes, Fact Constellations, Concept
hierarchy, Process Architecture, 3 Tier Architecture, Data Marting
Aggregation, Historical information, Query Facility, OLAP function and
Tools. OLAP Servers, ROLAP, MOLAP, HOLAP, Data Mining interface,
Unit – V 8
Security, Backup and Recovery, Tuning Data Warehouse, Testing Data
Warehouse
Total 43
Books:
1. M.H.Dunham,”DataMining:Introductory and Advanced Topics” Pearson Education
Jiawei Han, Micheline Kamber, ”Data Mining Concepts & Techniques” Elsevier
Name of Department:- Computer Science and Engineering
2. Contact Hours: L: 3 T: - P: -
3. Semester: VII
Contact
UNIT CONTENTS
Hrs
Introduction
Introduction to Artificial Intelligence, Simulation of sophisticated & Intelligent
Unit – I Behavior indifferent area, problem solving in games, natural language, 10
automated reasoning visualperception, heuristic algorithm versus solution
guaranteed algorithms.
Understanding Natural Languages
Parsing techniques, context free and transformational grammars, transition
nets, augmentedtransition nets, Fillmore’s grammars, Shanks Conceptual
Unit – II 9
Dependency, grammar free
analyzers, sentence generation, and translation.
Knowledge Representation
First order predicate calculus, Horn Clauses, Introduction to PROLOG,
Unit – III Semantic NetsPartitioned Nets, Minskey frames, Case Grammar Theory, 10
Production Rules KnowledgeBase, The Inference System, Forward &
Backward Deduction
Expert System
Existing Systems (DENDRAL, MYCIN, DART,XOON expert, shells),
Unit – IV 9
domain exploration, Meta Knowledge, Expertise Transfer, Self
ExplainingSystem, Architecture of Expert system
Pattern Recognition
Introduction to pattern Recognition, Structured Description, Symbolic
Description, Machineperception, Line Finding, Interception, Semantic, &
Unit – V 8
Model, Object Identification, SpeechRecognition.
Programming Language: Introduction to programming Language, LISP,
PROLOG
Total 46
Text/ Reference Books:
1. Charnick “Introduction to Artificial Intelligence.” Addision Wesley.
2. Rich & Knight, “Artificial Intelligence”.TMH
3. Winston, “LISP”, Addison Wesley.
4. Marcellous, “Expert Systems Programming”, PHI.