Syllabus M.SC .ComputerScience2020 21
Syllabus M.SC .ComputerScience2020 21
FOR
February 2020
1
PONDICHERRY UNIVERSITY
Medium
The medium of instruction shall be English.
2
SCHOOL OF ENGINEERING AND TECHNOLOGY
DEPARTMENT OF COMPUTER SCIENCE
COURSE STRUCTURE
Total 72
FIRST SEMESTER
S.
Course Code Course Title H/S L T P Credits
No.
1 CSSC 411 Design and Analysis of Algorithms H 3 0 0 3
Total 18
3
SECOND SEMESTER
S.
Course Code Course Title H/S L T P Credits
No.
1 CSSC 421 Modern Operating Systems H 3 0 0 3
5 Elective – II S 3 0 0 3
6 Skill Enhancement – II S 1 0 2 2
Total 21
THIRD SEMESTER
S.
Course Code Course Title H/S L T P Credits
No.
1 CSSC 511 Advanced Computer Networks H 3 0 0 3
2 CSSC 512 Web Technology H 3 0 0 3
5 Elective – IV S 3 0 0 3
6 Elective – V S 3 0 0 3
4
FOURTH SEMESTER
S.
No Course Code Course Title H/S L T P Credits
.
STREAM 1: INFORMATION SECURITY
5
STREAM 3: HUMAN COMPUTER INTERACTION
6
STREAM 6: ARTIFICIAL INTELLIGENCE
Course
S. No. Course Title H/S Credits
Code
1 CSEL 541 Statistical Tools S 2
2 CSEL 542 Web Designing S 2
3 CSEL 543 Network Management Tools S 2
4 CSEL 544 Data Mining Tools S 2
5 CSEL 545 Data Visualization Tools S 2
6 CSEL 546 Cloud Computing Tools S 2
7 CSEL 547 Big Data Tools S 2
8 CSEL 548 Internet of Things (IoT) Tools S 2
Programme Outcomes
M.Sc. in Computer Science programme enables the students to attain the following ability to
7
FIRST SEMESTER
8
CSSC 411: DESIGN AND ANALYSIS OF ALGORITHMS
L T P C
Prerequisites:
3 0 0 3
Basic Knowledge in Data Structures and Programming.
Objectives:
To analyse the asymptotic performance of algorithms.
To demonstrate a familiarity with major algorithms and data structures.
To synthesize efficient algorithms in common engineering design situations.
Outcomes:
Ability to design efficient algorithms using various algorithm designing strategies.
Ability to classify the problem and apply the appropriate design strategy to develop algorithm.
Text Book(s):
1. Ellis Horowitz, Sartaj Sahani, Sanguthevar Rajashekaran, Computer Algorithms/C++, Second Edition, 2008
2. Horowitz, E. and Sahani, S, Fundamentals of Computer Algorithms, Second Edition, 2008.
Reference Book(s):
1. Aho A.V., Hopcroft, J.E. and Ullaman, The Design and Analysis of Computer Algorithms, 1979.
2. Sara Baase, Allen Van Gelder, Computer Algorithms – An Introduction to Design and Analysis, Third Edition,
1999.
3. Goodman, S.E. and Hedetnieml. S.T, Introduction to the design and analysis of algorithms, McGraw Hill
Computer Science Series, 1997.
9
CSSC 412: ADVANCED COMPUTER ARCHITECTURE
L T P C
3 0` 0 3
Prerequisites:
Basic knowledge in Digital Design, Microprocessor and Computer Architecture.
Objectives:
To understand the evolution of computer architecture.
To understand memory addressing, pipelining and instruction set architecture.
Outcomes:
Ability to address the design challenges in building a computer system.
Text Book(s):
1. H. El-Rewini& M. Abd-El-Barr, Advanced Computer Architecture and Parallel Processing, J. Wiley, 2005.
2. M. R. Bhujade, Parallel Computing, New Age Intr. Publishers, 1998.
3. S. Tanenbaum, Structured Computer Organization, Prentice Hall, 2007.
Reference Book(s):
1. W. Stallings, Computer Organization & Architecture, Prentice Hall, 2006.
2. Kai Hwang, Advanced Computer Architecture: Parallelism, Scalability, Programmability, Tata McGraw- Hill,
2003.
10
CSSC 413: AUTOMATA THEORY AND FORMAL LANGUAGES
L T P C
3 0 0 3
Prerequisites:
Basic knowledge in set theory, Rational relations and Functions.
Objectives:
To understand various Computing models like Finite State Machine, Pushdown Automata, and Turing
Machine.
To understand Decidability and Undecidability of various problems.
Outcomes:
Ability to get familiar with computability and complexity measures.
Text Book(s):
1. Hopcroft J.E., Motwani R. and Ullman J.D, Introduction to Automata Theory, Languages and Computations,
Pearson Education, Second Edition, 2008.
Reference Book(s):
1. John.C. Martin, Introduction to Languages and the Theory of Computation, McGraw-Hill Education, 2010.
2. Michael Sipser, Introduction to the Theory of Computation, Cengage Learning, 2012.
3. Peter Linz, An introduction to formal languages and automata, Jones & Bartlett Learning, 2001.
11
CSSC 432: PROBABILITY AND STATISTICS
L T P C
3 1 0 3
Prerequisites:
Introduction concepts in Probability/Statistics.
Basic discrete Probability.
Basic mathematical concepts like Sets, Number Line.
Equations and Inequalities.
Objectives:
To Understand concepts of discrete probability, conditional probability, independence, and can apply these
concepts to engineering applications (selected by instructor).
Outcomes:
Ability to understand mathematical descriptions of random variables including probability mass functions
(PMFs), cumulative distribution functions (CDFs), probability distribution functions (PDFs), conditional mass,
conditional distribution and conditional density functions.
Text Book(s):
1. 1. Gupta, S.C. and Kapoor, V.K., Fundamentals of Mathematical Statistics, Sultan Chand and Sons, Tenth
Edition, 2000.
Reference Book(s):
1. Irwin Miller and Marlyees Miller, John E Freund’s Mathematical Statistics with Applications, PHI Learning,
Eight Edition, 2012.
2. S.M. Ross, Introduction to Probability and Statistics for Engineers and Scientists, Elsevier, Fourth Edition,
2009.
12
CSSC 414: PRACTICAL I - ALGORITHMS LAB
L T P C
0 0 3 2
Skills to be acquired:
Able to analyse performance of algorithms and the ability to get them implemented.
List of Exercises:
Programs should include but not limited to:
1. Write a program that implements Binary Search.
2. Write a program that implements Quick Sort.
3. Write a program that implements Strassen’s matrix multiplication.
4. Write a program that implements Prim’s Algorithm.
5. Write a program that implements Kruskal’s Algorithm.
6. Write a program that implements All pair shortest path problem.
7. Write a program that implements N-Queen Problem.
8. Write a program that implements Heapsort.
9. Write a program that implements Travelling Salesperson Problem.
10. Write a program that implements Knapsack using greedy Method.
13
CSSC 415: PRACTICAL II - COMPUTER ARCHITECTURE LAB
L T P C
0 0 3 2
Skills to be acquired:
Able to Understand Computer Architecture components and the ability to implement.
List of Exercises:
1. Simulation of Computer Components.
2. Simulation of Pipeline.
3. Simulation of Instruction Level Parallelism.
4. Simulation of Cache Memory.
5. Simulation of Multiprocessor.
6. Simulation of Vector Processor.
7. Simulation of Thread Level Parallelism.
8. Simulation of Data Level Parallelism.
14
SECOND SEMESTER
15
CSSC 421: MODERN OPERATING SYSTEMS
L T P C
3 0 0 3
Prerequisites:
Basic knowledge in computer organizations and operating systems.
Objectives:
To design and understand the following OS components: System calls,
Schedulers, Memory management systems, Virtual Memory and Paging systems.
To evaluate, and compare OS components through instrumentation for performance analysis.
Outcomes:
Ability to analyze the various device and resource management techniques for timesharing and distributed
systems.
Ability to know the components and management aspects of Real time, Mobile operating systems.
Text Book(s):
1. Andrew S. Tanenbaum and Herbert Bos, Modern Operating Systems, Prentice Hall, Fourth Edition, 2014.
2. Mukesh Singhal, Niranjan Shivaratri, Advanced Concepts in Operating Systems – Distributed, Database and
Multiprocessor Operating Systems, Tata McGraw-Hill, 2001.
3. Rajib Mall, Real-Time Systems: Theory and Practice, Prentice Hall, 2006.
Reference Book(s):
1. Jonathan Levin, Mac OS X and iOS Internals: To the Apple’s Core, John Wiley & Sons, 2012.
2. Mike Ebbers, John Kettner, Wayne O’Brien, Bill Ogden, Introduction to the New Mainframe: z/OS Basics,
International Business Machines Corporation, Third Edition, 2011.
3. Abraham Silberschatz, Peter B. Galvin, Greg Gagne, Operating System Concepts, Wiley, Eighth edition, 2008.
16
CSSC 422: ADVANCED DATABASE SYSTEMS
L T P C
Prerequisites: 3 0 0 3
Basic knowledge in database systems.
Objectives:
To acquaint the students with the use of current relational database systems.
Outcomes:
Text Book(s):
1. R. Elmasri, S.B. Navathe, Fundamentals of Database Systems, Fifth Edition, Pearson Education/Addison
Wesley, 2007.
2. Thomas Cannolly and Carolyn Begg, Database Systems, A Practical Approach to Design, Implementation and
Management, Third Edition, Pearson Education, 2007.
3. Henry F Korth, Abraham Silberschatz, S. Sudharshan, Database System Concepts, Fifth Edition, McGraw Hill,
2006.
Reference Book(s):
1. L. Dunckley, Multimedia Databases: An Object Relational Approach, Addison-Wesley, 2003.
2. Vijay Kumar, Mobile Database Systems, John Wiley & Sons, 2006
3. Raghu Ramakrishnan, Database Management Systems, Third Edition, McGrawHill, 2003.
17
CSSC 433: OPTIMIZATION TECHNIQUES
L T P C
3 1 0 3
Prerequisites:
Fundamental knowledge of calculus and linear programming problem.
Mathematical models.
Objectives:
To introduce the fundamental concepts of Optimization Techniques.
To make the learners aware of the importance of optimizations in real scenarios.
Outcomes:
Ability to apply the concepts of various classical and modern methods for constrained and unconstrained
problems in both single and multivariable problems.
Text Book(s):
1. S. S. Rao: Engineering Optimization: Theory and Practice, New Age International, Third Edition 2013.
2. E. J. Haug and J.S. Arora, Applied Optimal Design: Mechanical and Structural Systems, Wiley, 1979.
Reference Book(s):
1. Kalyanmoy Deb, Optimization for Engineering Design: Algorithms and Examples, Prentice Hall of India,
Second Edition, 2012.
2. A. Ravindran and K.M. Rogsdell, G.V. Reklaites, Engineering Optimization: Methods and Applications, Wiley,
Second Edition, 2006.
18
CSSC 423: PRACTICAL III - OPERATING SYSTEM LAB
L T P C
0 0 3 2
Skills to be acquired:
Able to understand the design issues associated with Operating Systems.
List of Exercises:
1. Write a program to simulate the following non-pre-emptive CPU scheduling algorithms to find turnaround
time and waiting time. (a) FCFS (b) SJF (c) Round Robin (pre-emptive) (d) Priority.
2. Write a program to simulate the following file allocation strategies.
(a) Sequential (b) Indexed (c) Linked.
3. Write a program to simulate paging technique of memory management.
4. Write a program to simulate the following file organization techniques
(a) Single level directory (b) Two level directory (c) Hierarchical.
5. Write a program to simulate Bankers algorithm for the purpose of deadlock avoidance.
6. Write a program to simulate disk scheduling algorithms
(a) FCFS (b) SCAN (c) C-SCAN.
7. Write a program to simulate page replacement algorithms
(a) FIFO (b) LRU (c) LFU.
8. Write a program to simulate producer-consumer problem using semaphores.
9. Write a program to simulate the concept of Dining-Philosophers problem.
19
CSSC 424: PRACTICAL IV - DATABASE SYSTEMS LAB
L T P C
0 0 3 2
Skills to be acquired:
Able to use database efficiently in applications to handle data.
List of Exercises:
1. Distributed Database for Bookstore.
2. Deadlock Detection Algorithm for distributed database using wait- for graph.
3. Object Oriented Database – Extended Entity Relationship (EER).
4. Parallel Database – University Counselling for Engineering Colleges.
5. Parallel Database – Implementation of Parallel Join & Parallel Sort.
6. Active Database – Implementation of Triggers & Assertions for Bank Database.
7. Deductive Database – Constructing Knowledge Database for Kinship Domain (Family Relations).
8. Study and Working of WEKA Tool.
9. Query Processing – Implementation of an Efficient Query Optimizer.
10. Designing XML Schema for Company Database.
20
THIRD SEMESTER
21
CSSC 511: ADVANCED COMPUTER NETWORKS
L T P C
3 0 0 3
Prerequisites:
Fundamental knowledge about Computer Networks.
Objectives:
To learn about integrated and differentiated services in network architectures.
To understand the working of wireless network protocols.
Outcomes:
Ability to design the new protocols for modern networks.
Ability to get familiarized with next generation networks.
Text Book(s):
1. William Stallings, High Speed Networks and Internets: Performance and Quality of Service, Prentice Hall,
Second Edition, 2002.
2. Martin Sauter, From GSM to LTE, An Introduction to Mobile Networks and Mobile Broadband, Wiley, 2014.
Reference Book(s):
1. Savo G Glisic, Advanced Wireless Networks – 4G Technologies, John Wiley & Sons, 2007.
2. Martin Sauter, Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G
Devices and the Mobile Web 2.0, Wiley, 2009.
3. Naveen Chilamkurti, Sherali Zeadally, Hakima Chaouchi, Next-Generation Wireless Technologies, Springer,
2013.
22
CSSC 512: WEB TECHNOLOGY
L T P C
3 0 0 3
Prerequisites:
Basic Knowledge in computer network, working of Internet.
Objectives:
To inculcate knowledge of web technological concepts and functioning of internet.
To learn and program features of web programming languages.
Outcomes:
Ability to design an innovative application for web.
Text Book(s):
1. Laure Lemay, Web Publishing with HTML4, Techmedia, Second Edition, 2000.
2. Ivan Bayross, Web Enabled Commercial Application Development Using HTML, JavaScript, DHTML and PHP,
bpb Publications, Fourth Edition, 2005.
Reference Book(s):
1. Thau, The book of JavaScript: a practical guide to interactive Web pages, Second Edition, 2006.
2. David Lane, Hugh E. Williams, Web Database Application with PHP and MySQL, O'Reilly, Second Edition, 2004.
3. Deital and Deital, XML How to program, Pearson Education, 2000.
23
CSSC 434: LINEAR PROGRAMMING
L T P C
3 1 0 3
Prerequisites:
Introduction concepts in linear Programming/Operations, Linear Algebra, Differential Calculus, Mathematical
models.
Basic mathematical concepts such as sets, functions, vectors, matrices, etc.
Objectives:
Understand the linear programming problem.
Enumerate LPP simplex methods.
Discuss LPP duality.
Differentiate Non-Linear Programming Problem and LPP.
Outcomes:
Ability to apply the concepts in the many real time applications.
Text Book(s):
1. R.Panneerselvam, Operations Research, PHI Learning, Second Edition, 2006.
2. Kanti Swaroop, Man Mohan and P.K. Gupta, Operations Research, Sultan Chand and Sons, 2005.
3. Hamdy A Taha, Operations Research –An Introduction, Prentice Hall India, 2003.
Reference Book(s):
1. Philips, Ravindran and Solberg, Operations Research, John Wiley, 2002.
2. Ronald L.Rardin, Optimization in Operation Research, Pearson Education Pvt. Ltd. New Delhi, 2005.
24
CSSC 513: PRACTICAL V - WEB TECHNOLOGY AND COMPUTER NETWORKS LAB
L T P C
0 0 3 2
Skills to be acquired:
Able to design and develop a Web Applications.
Able to establish and Configure Computer Networks.
List of Exercises:
1. To create a simple webpage using HTML that includes all tags.
2. Applying Style to an HTML Page Using CSS.
3. Client-Side Programming:
a. Java script for Displaying and Comparing Date
b. Form Validation including text field, radio buttons, check boxes, list box and other controls.
4. Online Applications using PHP.
5. Online application with data access.
6. To analyze the performance of various configurations and protocols in LAN.
a. Establishing a LAN.
b. Connecting two LANs using multi-router topology with static routes.
7. To analyze the performance of RIP and OSPF redistribution.
8. To analyze the network security for improving the security of the network.
9. To Control Traffic Flow in a network.
10. To configure a firewall and analyze it for a network.
25
FOURTH SEMESTER
26
DOMAIN SPECIFIC ELECTIVES
STREAM 1:
INFORMATION SECURITY
27
CSEL 441: FUNDAMENTALS OF CRYPTOGRAPHY
L T P C
Prerequisites: 3 0 0 3
Basic knowledge of Cryptographic Concepts.
Objectives:
To Learn Mathematical Cryptographic Algorithms.
To Learn Modern Cryptography.
To learn Secure Protocols for Secure Transactions.
Outcomes:
Ability to understand various cryptography concepts.
Acquiring skills to work with block chain and analyse various cryptographic protocols.
Text Book(s):
1. David Hook ‘Beginning Cryptography with Java’ 2005, ISBN:978-0-7645-9633-9
2. William Stallings, Cryptography and network security, Pearson Education.
3. Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone, Hand- book of Applied Cryptography, CRC Press.
Reference Book(s):
1. Margaret Cozzens, Steven J Miller, The mathematics of encryption, American Mathematical Society
2. Bruce Schneier Applied Cryptography, John Wiley and Sons
3. Mark Stamp, Information Security: Principles and Practice, John Wiley and Sons
4. Matt Bishop, Computer Security, Art and Science, Pearson Education
5. Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder Bitcoin and
Cryptocurrency Technologies, Draft 2015.
28
CSEL 442: DATABASE AND APPLICATION SECURITY
L T P C
Prerequisites: 3 0 0 3
Knowledge of Database Management Systems and Database Administration.
Objectives:
Describe and apply Security Policies on Databases.
Understand Authentication and Password Security.
Know about Application Vulnerabilities.
Understand about Auditing Techniques.
Outcomes:
Ability to understand various components of database and application security.
Acquiring skills to encrypt and audit the data, analysing application security and vulnerabilities.
Text Book(s):
1. Ron Ben-Natan, Implementing Database Security and Auditing: A Guide for DBAs, Information Security
Administrators and Auditors, Published by Elsevier, 2005.
2. Silvana Castano, Database Security, Published by Addison-Wesley, 1994.
3. Alfred Basta, Melissa Zgola, Dana Bullaboy, Thomas L. Witlock SR, Database Security, google books, 2011.
4. Silberschatz, Korth and Sudarshan, Database System Concepts, 6th Edition, 2010.
Web Resource(s):
1. The Open Web Application Security Project, http://www.owasp.org
2. Web application security scanners, http: // www. Window security. com / software/Web-Application-Security
3. SQL Injection, http://www.cgisecurity.com/development/sql.shtml
4. 9 ways to hack a web app, http: / / developers. sun. com / learning / javaone online/2005/webtier/TS-5935.pdf
5. Database security, http:/ /docs.oracle.com/cd / B19306_01 / server.102 / b14220/security.htm
29
CSEL 443: MOBILE AND DIGITAL FORENSICS
Prerequisites: L T P C
Knowledge of Computer Networks and information security. 3 0 0 3
Objectives:
Understand the Basics of wireless technologies and security.
Become Knowledgeable in mobile phone forensics and Android Forensics.
Learn the methods of investigation using Digital Forensic techniques.
Outcomes:
Ability to understand the processes involved in mobile and digital forensics.
Acquiring skills to analyse mobile and digital forensics techniques.
Reference Book(s):
1. Iosif I. Androulidakis, Mobile phone security and forensics: A practical approach, Springer publications, 2012.
2. Andrew Hoog, Android Forensics: Investigation, Analysis and Mobile Security for Google Android, Elsevier
publications, 2011.
3. Angus M. Marshall, Digital forensics: Digital evidence in criminal investigation, John – Wiley and Sons, 2008
4. Gregory Kipper, Wireless Crime and Forensic Investigation, Auerbach Publications.
30
CSEL 444: MALWARE ANALYSIS
L T P C
Prerequisites: 3 0 0 3
Network Security.
Objectives:
To understand the Computer infection program.
To implement the Covert channel and mechanisms.
To test and exploit various malware in open source environment.
To analyze and design the famous virus and worms.
Outcomes:
Ability to understand various types of malware and threats.
Acquiring skills to use open source to analyse malware.
Text Book(s):
1. ErciFiliol, Computer Viruses: from theory to applications, Springer, 1st edition, 2005. ISBN 10: 2-287-23939-1
2. Mark. A. Ludwig, The Giant black book of computer viruses, Create Space Independent Publishing Platform, 2nd
edition, 2009, ISBN 10: 144140712X.
Web Resource(s):
1. http://www.crysys.hu/downloads/vihimb01/2017/MW-meres.pdf
31
CSEL 445: INFORMATION SYSTEM AUDIT
L T P C
3 0 0 3
Prerequisites:
Basic knowledge on Information Systems and Security.
Objectives:
Examine the Multiple layers of IS security in organizations.
Analyze the Risk management approach to information assets’ security with respect to operational and
organizational goals.
Evaluate Physical and logical security controls, and the automated approaches in IS security.
Outcomes:
Ability to understand auditing Information Systems process.
Acquiring skills to perform information system audit.
Module-V: Auditing Information Systems Software Development, Acquisition and Maintenance (9 hrs)
System Integration Concepts - SDAM Methodologies - SDAM Practices - Information Systems Maintenance Practices
Text Book(s):
1. Principles of Information Security, by Michael E. Whitman and Herbert J. Mattord, Thomson Course Technology,
2003, ISBN: 0619063181
2. Handbook of Information Security Management, by Micki Krause and Harold F. Tipton, ISACA Publication, 1999.
3. Handbook of IT Auditing, D.Warren, L.Edelson, X.Parker, Coopers & Lybrand LLP, Warren, Gorham & Lamont.
Boston, 1995 with 1999 supplement.
4. The information audit: an important management tool / Katherine Bertolucci. - Managing Information, June
1996, vol.3, no.6, p.34-35.
5. The value and impact of information / edited by M. Feeney and M. Grieves. - London: Bowker Saur, 1994. - ISBN
1 85739 084 9.
6. The value of information to the intelligent organisation. - Hatfield: University of Hertfordshire Press, 1994. -
ISBN 0 900458 54 2.
7. Porter, M. E. (1985). Competitive Advantage: Creating and Sustaining Superior Performance. New York, N.Y.:
Collier Macmillan.
Web Resource(s):
1. www.c3i.osd.mil/org/cio/i3/AWG_Digital_Library/index.htm
2. www.isaca.org
3. www.bsi.org
4. www.isaca.org/gir
5. www.isaca.org/cobit.htm
32
CSEL 446: INFORMATION SECURITY MANAGEMENT
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Computer Networks.
Objectives:
Review, Refresh and Expand the Information Security Knowledge (including information security concepts and
industry best practices).
Outcomes:
Ability to understand the processes involved in Information Security management.
Ability to understand communication and network security, identity and access management.
Module-I: (9 hrs)
Security and Risk Management (Security, Risk, Compliance, Law, Regulations, and Business Continuity): Confidentiality,
integrity, and availability concepts - Security governance principles – Compliance - Legal and regulatory issues -
Professional ethic - Security policies, standards, procedures and guidelines
Module-II: (9 hrs)
Asset Security (Protecting Security of Assets): Information and asset classification -Ownership (e.g. data owners, system
owners) - Protect privacy - Appropriate retention - Data security controls - Handling requirements (e.g. markings, labels,
storage)
Module-IV: (9 hrs)
Communication and Network Security (Designing and Protecting Network Security): Secure network architecture design
(e.g. IP & non - IP protocols, segmentation) - Secure network components - Secure communication channels - Network
attacks
Module-V: (9 hrs)
Identity and Access Management (Controlling Access and Managing Identity) - Physical and logical assets control -
Identification and authentication of people and devices - Identity as a service (e.g. cloud identity) – Third-party identity
services (e.g. on- premise) - Access control attacks - Identity and access provisioning lifecycle (e.g. provisioning review)
Reference Book(s):
1. James M. Stewart, Ed Tittel, Mike Chapple ‘CISSP: Certified Information Systems Security Professional Study
Guide’, Wiley 2008.
33
CSEL 447: CLOUD SECURITY
L T P C
3 0 0 3
Prerequisites:
Security and methods to improve virtualization security are also dealt with in this course Cloud security
introduces the basic concepts of security systems and cryptographic protocols, which are widely used in the
design of cloud security. The issues related multi tenancy operation, virtualized infrastructure.
Objectives:
Compare modern security concepts as they are applied to cloud computing.
Assess the security of virtual systems.
Evaluate the security issues related to multi-tenancy.
Appraise compliance issues that arise from cloud computing.
Outcomes:
Ability to understand the processes involved in cloud security.
Acquiring skills to implement virtualization systems and enhancing virtualization-based security.
Reference Book(s):
1. Tim Mather, SubraKumaraswamy, ShahedLatif, Cloud Security and Privacy: An Enterprise Perspective on Risks
and Compliance [ISBN: 0596802765]
2. Ronald L. Krutz, Russell Dean Vines, Cloud Security [ISBN: 0470589876]
3. John Rittinghouse, James Ransome, Cloud Computing [ISBN: 1439806802]
4. J.R. (Vic) Winkler, Securing the Cloud [ISBN: 1597495921]
5. Cloud Security Alliance 2009, Security Guidance for Critical Areas of Focus in Cloud ComputingVMware Security
Hardening Guide
6. Cloud Security Alliance 2010, Top Threats to Cloud Computing
7. NIST Guidelines on Security and Privacy in Public Cloud Computing
8. NIST Guide to Security for Full Virtualization Technologies
34
9. NIST The NIST Definition of Cloud Computing
10. William Hau, Rudolph Araujo et al How Virtualization Affects PCI DSS
www.mcafee.com/us/resources/.../wp-how-virt-affect-pci-dss-part-1.pdf
35
CSEL 448: ETHICAL HACKING
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Network Security & Threat Mechanisms.
Objectives:
To Understand the Ethical Hacking Process.
To Get familiarized with Tools and Techniques of Ethical Hacking.
Outcomes:
Ability to understand the processes involved in ethical hacking.
Acquiring skills to analyse malware threats and developing solutions.
Module-I: (9 hrs)
Introduction to Ethical Hacking: Information security overview – skills of an ethical hacker – Hacking concepts and phases
- Types of attacks – Information Security threats, attack vectors, and controls – Information Assurance (IA) – Information
Security Laws and Standards – Security Policies types, HR/legal implications – Physical Security – Threat Modelling –
Enterprise Information Security Architecture (EISA) – Network Security Zoning.
Module-II: (9 hrs)
Foot Printing & Reconnaissance: Foot printing concepts, threats, attack vectors and controls, Foot printing through
Search Engines, Foot Printing through Social Networking sites, Website Foot printing, Competitive Intelligence, WHOIS
Foot printing, Foot Printing tools. Scanning Networks: Scanning Methodology, techniques, and countermeasures -
Techniques for IDS evasion, scanning, HTTP tunneling, and IP spoofing - Drawing network diagrams—latest network
discovery and mapping tools, network discovery tools for mobile - Proxy chaining—latest proxy tools, proxy tools for
mobile Enumeration: Protocols: NetBIOS, SNMP, LDAP, NTP, SMTP, DNS – Countermeasures - Techniques
Module-III: (9 hrs)
System Hacking: Cracking passwords, escalating privileges, executing applications, hiding files and covering tracks –
Steganography application and classification, tools, methods/attacks on Steganography, Steganography detection tools.
Practical: Foot Printing & Reconnaissance, Scanning Networks, Enumeration, System Hacking
Module-IV: (9 hrs)
Malware Threats: Introduction to malware – Trojans attacks, how to infect a system, crypters, how to deploy, latest
types, analysis, countermeasures - Viruses—stages, types, latest virus maker, analysis, countermeasures - Worms—
types, makers, analysis, countermeasures - Malware analysis - Antivirus tools - Penetration testing.
Module-V: (9 hrs)
Sniffing: Attacks: MAC, DHCP, and spoofing - Poisoning: ARP and DNS – Tools Social Engineering: Concepts, techniques,
impersonation, identity theft, and Counter measures - Phases of an attack - Common targets of an attack - Impersonation
scenario - Computer based, mobile based, social networking based Denial of Service: Concepts, case study, tools, attack
techniques, and Countermeasures Botnet - Scanning methods for vulnerable machines - Detection Techniques and tools.
Session Hijacking: Concepts, case study, tools, attack techniques, and Countermeasures - Five stages of a web malware
attack - Application level session hijacking - Network level session hijacking - TCP/IP Hijacking. Practical: Trojans and
Backdoors, Viruses and Worms, Sniffers, Social Engineering, Denial of Service, Session Hijacking
Reference Book(s):
1. Kimberly Graves, CEH: Certified Ethical Hacker Study Guide, Wiley; 2010.
36
STREAM 2:
SOFTWARE ENGINEERING
37
CSEL 451: OBJECT ORIENTED SYSTEM DESIGN
L T P C
3 0 0 3
Prerequisites:
Nil.
Objectives:
To learn the fundamentals of OOSD.
To learn the various Object-Oriented Design Models and Testing Objects.
Outcomes:
Ability to understand the fundamentals of object-oriented system design.
Acquiring skills to develop object-oriented system design.
Text Book(s):
1. Ali Bahrami, Object Oriented System Development, Mc-Graw Hill International Edition, 1999.
2. Grady Booch, James Rumbaugh, Ivar Jacobson, The Unified Modeling Language User Guide, Addison - Wesley
Longman, 1999.
Reference Book(s):
1. The Unified Modeling Language User Guide. – Addison Wesley, Booch, Rambaush, Jacobson, 2000.
38
CSEL 452: SOFTWARE ARCHITECTURE
L T P C
3 0 0 3
Prerequisites:
Basic Knowledge in Software Engineering.
Objectives:
Understand software Architectural Requirements and drivers.
Be exposed to architectural styles and views.
Outcomes:
Get familiarized with various software architectures and emerging technologies.
Text Book(s):
1. Len Bass, Paul Clements, and Rick Kazman, Software Architectures Principles and Practices, 2nd Edition,
Addison-Wesley, 2003.
2. Anthony J Lattanze, Architecting Software Intensive System. A Practitioner’s Guide, Auerbach Publications,
2010.
Reference Book(s):
1. Paul Clements, Felix Bachmann, Len Bass, David Garlan, James Ivers, Reed Little, Paulo Merson, Robert Nord,
and Judith Stafford, Documenting Software Architectures. Views and Beyond, 2nd Edition, Addison-Wesley,
2010.
2. Paul Clements, Rick Kazman, and Mark Klein, Evaluating software architectures: Methods and case studies.
Addison-Wesley, 2001.
3. Rajkumar Buyya, James Broberg, and Andrzej Goscinski, Cloud Computing. Principles and Paradigms, John Wiley
& Sons, 2011.
4. Mark Hansen, SOA Using Java Web Services, Prentice Hall, 2007.
39
CSEL 453: SOFTWARE PROJECT MANAGEMENT
L T P C
3 0 0 3
Prerequisites:
Software Engineering Principles.
Objectives:
This Course is intended to provide the students with an overall view over Software Engineering Discipline and
with insight into the processes of software development.
To understand the various methods of Cost Estimation.
To Study about Software Quality Management.
To Study about Software Metrics.
Outcomes:
Ability to understand various software project management concepts.
Ability to perform cost estimation and project evaluation.
Text Book(s):
1. Ramesh Gopalaswamy, Managing and Global Software Projects, Tata McGraw Hill, 2017.
2. Neal Whitten, Managing Software Development Projects, John Wiley & Sons, Inc., 2 nd Ed., 1995.
Reference Book(s):
1. Demarco, T. and Lister, T. Peopleware: Productive Projects and Teams, 2nd Ed., Dorset House, 1999.
2. Royce, W. Software Project Management: A Unified Framework, Addison-Wesley, 1998. Demarco, T. and Lister,
T. Peopleware: Productive Projects and Teams, 2ndEd., Dorset House,1999.
3. Fenton, N.E., and Pfleeger, S.L. Software Metrics: A Rigorous and Practical Approach, Revised Brooks Cole,
1998.
4. Kaplan, R.S., Norton, D.P. The Balanced Scorecard: Translating Strategy into Action, Harvard Business School
Press, 1996.
5. Boehm, B. W. Software Risk Management: Principles and Practices in IEEE Software, January 1991, pp32-41.
6. Grant, J.L. Foundations of Economic Value Added, John Wiley & Sons, 1997.
40
7. Cooper, R., The Rise of Activity-Based Costing- PartOne: What is an Activity-Based Cost System Journal of Cost
Management, Vol.2, No.2.
41
CSEL 454: SOFTWARE TESTING
L T P C
3 0 0 3
Prerequisites:
Basic Knowledge in Software Engineering
Objectives:
To understand Standard Software Testing Principles.
To learn the Functionality of Automated Testing tools.
Outcomes:
Ability to understand various software testing techniques.
Ability to incorporate specialize testing responsibilities
Text Book(s):
1. William Perry, Effective Methods of Software Testing, Third Edition, Wiley Publishing 2007
2. Srinivasan Desikan and Gopalaswamy Ramesh, Software Testing – Principles and Practices, Pearson Education,
2007.
Reference Book(s):
1. Naresh Chauhan, Software Testing Principles and Practices, Oxford University Press, New Delhi, 2010.
2. Dale H. Besterfiled et al., Total Quality Management, Pearson Education Asia, Third Edition, 2006.
3. Stephen Kan, Metrics and Models in Software Quality, Addison – Wesley, Second Edition, 2004
4. Llene Burnstein, Practical Software Testing, Springer International Edition, Chennai, 2003.
5. Renu Rajani, Pradeep Oak, Software Testing – Effective Methods, Tools and Techniques, Tata McGraw Hill,
2004.
6. Edward Kit, Software Testing in the Real World – Improving the Process, Pearson Education, 1995.
7. Boris Beizer, Software Testing Techniques – 2nd Edition, Van Nostr and Reinhold, New York, 1990.
42
CSEL 455: SOFTWARE QUALITY ASSURANCE
L T P C
3 0 0 3
Prerequisites:
Basic Knowledge in Software Design Process.
Objectives:
To understand the basic tenets of Software Quality and quality factors.
To Understand the SQA Components.
Outcomes:
Ability to understand SQA components and project life cycle.
Ability to understand software quality management and apply various metrics.
Text Book(s):
1. Daniel Galin, Software Quality Assurance, Pearson Publication, 2009.
Reference Book(s):
1. Alan C. Gillies, Software Quality: Theory and Management, International Thomson Computer Press, 1997.
2. Mordechai Ben-Menachem, Software Quality: Producing Practical Consistent Software, International
Thompson Computer Press, 1997.
43
CSEL 456: SOFTWARE RISK MANAGEMENT AND MAINTENANCE
L T P C
3 0 0 3
Prerequisites:
Basic Knowledge in Software Analysis & Design Process.
Objectives:
To understand the various Risk levels in software development.
To understand the Risk plan, implementation and tracking Risks.
To realize the Software maintenance process, Measurement and benchmarking.
Outcomes:
Ability to understand the basics concepts of software risk management and maintenance.
Ability to identify, asses, respond and track risk.
Text Book(s):
1. C. RavindranathPandian, Applied Software Risk Management: A guide for Software Project Managers,
Auerbach Publications, 2007.
2. John Mcmanus, Risk Management in Software Development Projects, Elsevier Butterworth- Heinemann, First
Edition, 2004.
Reference Book(s):
1. Alian April and Alain Abran, Software Maintenance Management: Evaluation and Continuous Improvement,
John Wiley & Sons Inc, 2008.
2. Gopalaswamy Ramesh and Ramesh Bhattiprolu, Software Maintenance: Effective Practices for Geographically
Distributed Environments, Second Reprint, Tata McGraw Hill, 2009.
44
CSEL 457: AGILE SOFTWARE PROCESS
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Software Design Process.
Objectives:
To Understand the basic concepts of Agile Software Process.
To gain knowledge in the area of various Agile Methodologies.
To Understand the Principles of Agile Testing.
Outcomes:
Ability to understand basic agile and its significance.
Ability to understand the methodology of agile through various case studies.
Text Book(s):
1. Craig Larman, Agile and Iterative Development – A Manager’s Guide, Pearson Education – 2004.
2. Elisabeth Hendrickson, Agile Testing, Quality Tree Software Inc 2008.
Reference Book(s):
1. Alistair Cockburn, Agile Software Development Series, Addison-Wesley Professional, 2001.
2. Robert C. Martin, Agile Software Development Principles, Patterns and Practices, Prentice Hall, 2002.
45
STREAM 3:
HUMAN COMPUTER INTERACTION
46
CSEL 461: FOUNDATIONS OF HUMAN COMPUTER INTERACTION
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Graphical User Interface.
Objectives:
Understanding the Components of Human Computer Interaction.
Getting insights into the world of Universal Design.
Outcomes:
Ability to understand various components of Human Computer Interaction.
Ability to understand the role of HCI in software process.
Text Book(s):
1. Alan Dix, Janet Finaly, Gregory D. Abowd, Russell Beale., Human Computer Interaction, 3 rd Edition, Prentice Hall
Publishers, 2003.
Reference Book(s):
1. Jonathan Lazar, Research Methods in Human–Computer Interaction, John Wiley & Sons, 2009.
47
CSEL 462: INTRODUCTION TO WEB ACCESSIBILITY
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Human Computer Interaction Concepts.
Objectives:
Understanding the elements of Web accessibility.
Acquiring skills to Design accessible web pages.
Outcomes:
Ability to understand the processes involved in web accessibility.
Ability to acquire skills to perform web accessibility analysis.
Module-I: (9 hrs)
Web accessibility - Definitions – Universal Design – Disabilities and Accessibility Requirements – Introduction to
Accessible web design – Accessibility Myths – Assistive Technologies.
Module-III: (9 hrs)
Accessibility of web page components: Images – Hyperlinks – Color contrast – Tables – Forms – Document Accessibility
– Video accessibility – Audio accessibility – Static vs Dynamic page accessibility.
Module-IV: (9 hrs)
W3C Web Accessibility Initiatives (WAI) – Ajax applications accessibility – Features. Authoring tools accessibility
guidelines – UAAG: User Agents Accessibility Guidelines – Accessibility regulations: Global and Indian context.
Module-V: (9 hrs)
Introduction to web accessibility analysis tools: Open Source vs. commercial – Features of accessibility analysis tools;
Introduction to Mobile web accessibility – Tools and techniques.
Reference Book(s):
1. Simon Harper, Yeliz Yesilada (Editors). Web Accessibility: A Foundation for Research – Springer Publications,
2010.
Web Resource(s):
1. W3C Resources on Web Accessibility https://www.w3.org/WAI/intro/accessibility.php
2. WebAIM(Web Accessibility in Mind) Resources : http://webaim.org
Online Course(s):
1. Introduction to Web Accessibility by Google: https://webaccessibility.withgoogle.com/course
48
CSEL 463: INTRODUCTION TO MOBILE ACCESSIBILITY
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Human Computer Interaction.
Basic Understanding of Web Accessibility.
Objectives:
Introducing Android Mobile App development.
Making the learner to understand the basics of Mobile accessibility.
Acquiring skills in designing accessible mobile applications.
Outcomes:
Ability to understand the processes involved in mobile accessibility.
Ability to acquire skills to perform mobile accessibility analysis.
Module-I: (9 hrs)
Mobile Application types: Native, Mobile web and Hybrid apps – Standards and guidelines – The business case for
accessibility – Legal and regulatory requirements. Introduction to Android – Versions – Features – The Android Studio –
Architecture of Android – Creating and Publishing an application.
Module-II: (9 hrs)
Activities – Fragments – Intents – Layouts – Action Bar – UI Notifications – Building UI with Views – Images, Menus with
views – Data Persistence: Files – Internal Storage – External Storage – Creating and using Databases.
Module-III: (9 hrs)
Accessible Design Principles – Color and Contrast – Sound and motion – Style – Hierarchy and focus – Implementation –
Text accessibility.
Module-IV: (9 hrs)
Screen Reader Access: Talkback – Select to Speak; Switch access – Voice commands. Accessibility Factors: Labeling UI
Elements – Grouping Content – Touch target size – Color contrasts - Non-color cues- Media content accessibility.
Module-V: (9 hrs)
Accessibility analysis: Success criterion and components – Mapping WCAG to Mobile devices: Screen size factors –
Contrast – Keyboard control for touchscreen devices – touch target size and spacing – device manipulation gestures –
Tools for analyzing mobile accessibility.
Reference Book(s):
1. Colin Shanley. Cracking Accessibility on Mobile Devices: The definitive field guide to accessibility and digital
inclusion for business managers and project teams. RS Books Publishers, 2016.
2. J.F. DiMarzio. Beginning Android Programming with Android Studio, Fourth Edition – 2016 – Wiley Publications.
Web Resource(s):
1. https://developer.android.com/guide/topics/ui/accessibility/apps.html
2. https://material.io/guidelines/usability/accessibility.html
48
CSEL 464: FUNDAMENTALS OF CONTEXT AWARE COMPUTING
L T P C
3 0 0 3
Prerequisites:
Knowledge of Mobile computing and Distributed systems.
Objectives:
Understanding the Components of context awareness.
Getting familiar with Context acquisition, interpretation and use.
Outcomes:
Ability to understand the various components of context aware systems.
Ability to analyse security of context aware systems.
Module-I: (9 hrs)
Basics of Context Awareness – Surrounding Context – User Attention in a Meeting - Activity context from multiple sensors.
Module-II: (9 hrs)
Distributed and Heterogeneous Context for Ambient Intelligence: Fundamental Concepts – Ontology Representation and
Reasoning about Context – Ontology Alignment Approaches.
Module-III: (9 hrs)
Ubiquitous web – System Description – System Deployment – Collaborative Optimizations- Context Acquisition –
Provisioning.
Module-IV: (9 hrs)
Elements of a context aware pervasive system- Architecture- Infrastructure, Middleware, Tool Kits – context for mobile
device users – Location based Services – Ambient services – context aware mobile services – Mobile code and policy –
Multi agent technology.
Module-V: (9 hrs)
Context Aware Security: Traditional Security issues – models – context aware security systems – context aware safety.
Reference Book(s):
1. Context aware pervasive systems-Architecture for a new breed of applications Sengloke, Auerbach publications,
2006.
2. Context Aware Computing and Self Managing systems, Waltenegus Dargie,A chapman & Hall Book/CRC press,
2010.
3. Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability: Adaptive Technologies and
Applications: Dragan Stojanović, IGI Global Snippet, 2009.
4. Context Management for Distributed and Dynamic Context-Aware Computing, Rocha, Ricardo Couto Antunes
da, Endler, Markus, Springer,2012.
5. Context-Aware Computing: A Special Triple Issue of Human-Computer Interaction,Thomas P.Moran Paul
Dourish, 2002.
49
CSEL 465: DIGITAL ACCESSIBILITY AUDIT
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of HCI.
Basic Understanding of Web Accessibility.
Objectives:
Understanding the components of digital accessibility audit.
Acquiring skills in Conducting the digital accessibility audit.
Outcomes:
Ability to understand the processes involved in performing digital accessibility audit.
Ability to carry out digital accessibility audit.
Module-III: (9 hrs)
Personas and Scenarios - Comprehensive Accessibility Evaluation – Standards Review – Heuristic Evaluation – Design
Walkthroughs – Screening Techniques – Usability Testing.
Reference Book(s):
1. Shawn Lawton Henry, Just Ask – Integrating Accessibility Throughout Design, (Online Open Book:
http://www.uiaccess.com/accessucd/), 2007.
2. Colin Shanley, Cracking Accessibility on Mobile Devices: The definitive field guide to accessibility and digital
inclusion for business managers and project teams, RS Books Publishers, 2016.
Web Resource(s):
1. https://www.w3.org/WAI/ER/tools/
2. https://www.w3.org/WAI/eval/preliminary.html
3. https://www.w3.org/WAI/eval/template
50
CSEL 466: USER INTERFACE ENGINEERING
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Human-Computer Interaction.
Basic Understanding of Graphical User Interfaces.
Objectives:
Exploring the interaction design process.
Explaining the role of interaction designers and the tools they use.
Outcomes:
Ability to understand the principles of User interface design.
Ability to develop effective user interface design.
Module-I: (9 hrs)
Introduction: Goals of User Interface Design – Motivations of Human factors in Design – High Level Theories – Three
Principles – Guidelines for Data Display and Data Entry.
Module-II: (9 hrs)
The Three Pillars of Design Development Methodologies- Ethnographic Observation – Participating Design- Scenario
Development- Social Impact Statement for Early Design – Legal Issues- Reviews.
Module-III: (9 hrs)
Usability Testing and laboratories- Surveys- Acceptance tests – Evaluation during Active use- Specification Methods-
Interface – Building Tools- Evaluation and Critiquing tools. Visual Thinking and Icons – Direct manipulation Programming
– Virtual Environments- Task-Related Organization – Item Presentation Sequence- Response Time and Display Rate –
Fast Movement Through Menus- Menu Layouts- Form Filling – Dialog Box – Functionality to Support User’s Tasks –
Command Organization Strategies –Natural Language in Computing.
Module-IV: (9 hrs)
Interaction Devices: Introduction – Keyboards and Functions – Pointing Devices- Speech recognition, Digitization and
Generation – Image and Video Displays – Printers – User Productivity – Variability – Error messages – Non-
anthropomorphic Design –Display Design – Color-Reading from Paper versus from Displays- Preparation of Printed
Manuals- Preparation of Online Facilities.
Module-V: (9 hrs)
Windows Strategies and Information Search: Introduction- Individual Widow Design- Multiple Window Design-
Coordination by Tightly –Coupled Widow- Image Browsing- Multimedia Documents Searches – Information Visualization
– Advance Filtering Hypertext and Hypermedia – World Wide Web- Genres and Goals and Designers – Users and their
tasks – Object Action Interface Model for Web site Design
Text book:
1. Ben Shneiderman, Designing the User Interface, 5th Edition, Addison-Wesley, 2010.
Reference books:
1. Jacob Nielsen, Usability Engineering, Elsevier; First edition, 2015
2. Wilbert O. Galiz, The Essential guide to User Interface Design, Wiley, 2002.
3. Barfied, Lon, The User Interface: Concepts and Design, Addison Wesley, 1993.
51
CSEL 467: COMPUTER VISION AND APPLICATIONS
L T P C
3 0 0 3
Prerequisites:
Basic Understanding of Image Processing.
Basic Understanding of Programming.
Objectives:
Understanding the Basics of Computer Vision.
Acquiring skills to develop computer vision-based applications.
Outcomes:
Ability to understand the computer vision pipeline.
Ability to build solutions using computer vision algorithms.
Module-I: (9 hrs)
Basic Image Handling and Processing: Loading images – Converting image formats – Plotting images, points and lines –
Image contours and histograms – Image resizing – Histogram equalization- PCA of Images – Image denoising.
Module-II: (9 hrs)
Local image descriptors – Harris corner detector – Scale Invariant Feature Transform - Matching geo-tagged images.
Module-III: (9 hrs)
Image to image mappings: Homo-graphics – warping images – creating panoramas; Camera models and augmented
reality – Multiple view geometry.
Module-IV: (9 hrs)
Clustering images – Searching images: content-based image retrieval – visual words – indexing images – searching the
database for images – ranking with geometry.
Module-V: (9 hrs)
Classifying image content – Image segmentation: Graph cuts – Segmentation using clustering – OpenCV: Basics –
processing video – tracking.
Text Book(s):
1. Jan Erik Solem, Programming Computer Vision with Python. O’Reilly Publishers, 2012.
52
STREAM 4:
DATA ANALYTICS
53
CSEL 561: BIG DATA
L T P C
3 0 0 3
Prerequisites:
Data mining and Information Systems.
Objectives:
This course brings together several key big data technologies used for storage, analysis and manipulation of
data.
To recognize the key concepts of Hadoop framework, MapReduce, Pig, Hive, and No-SQL.
Outcomes:
Text Book(s):
1. Michael Minelli, Michehe Chambers, Big Data, Big Analytics: Emerging Business Intelligence and Analytic
Trends for Today’s Business, Ambiga Dhiraj, Wiely CIO Series, First Edition, 2013.
2. Arvind Sathi, Big Data Analytics: Disruptive Technologies for Changing the Game, IBM Corporation, First
Edition, 2012.
3. Bill Franks, Taming the Big Data Tidal Wave: Finding Opportunities in Huge Data Streams with Advanced
Analytics, Wiley and SAS Business Series, First Edition, 2012.
Reference Book(s):
1. Tom White, Hadoop: The Definitive Guide, O’Reilly, Third Edition, 2012.
54
CSEL 562: PYTHON PROGRAMMING FOR DATA ANALYTICS
L T P C
3 0 0 3
Prerequisites:
Programming knowledge in any OO language.
Objectives:
Understanding the basic concepts of Python.
Preparing and pre-processing data.
Understanding the data aggregation and grouping concepts.
Leveraging web scraping.
Visualizing the results of analytics effectively.
Outcomes:
Text Book(s):
1. Mark Lutz, Programming Python, O'Reilly Media, Fourth edition, 2010.
2. Mark Lutz, Learning Python, O'Reilly Media, Fifth Edition, 2013.
3. Tim Hall and J-P Stacey, Python 3 for Absolute Beginners, Apress, First Edition, 2009.
4. Magnus Lie Hetland, Beginning Python: From Novice to Professional, Apress, Second Edition, 2005.
5. Shai Vaingast, Beginning Python Visualization Crafting Visual Transformation Scripts, Apress, Second
Edition, 2014.
Reference Book(s):
1. Wes Mc Kinney, Python for Data Analysis, O'Reilly Media, 2012.
2. White, Hadoop: The Definitive Guide, Third Edition - O’Reilly , 2012.
3. Brandon Rhodes and John Goerzen, Foundations of Python Network Programming: The Comprehensive
55
Guide to Building Network Applications with Python, Apress, Second Edition, 2010.
4. http://blog.matthewrathbone.com/2013/11/17/python-map-reduce-on-hadoop---a- beginnerstutorial.html
5. http://www.michael-noll.com/tutorials/writing-an-hadoop-mapreduce-program-in-python/
6. http://allthingshadoop.com/category/python/
56
CSEL 563: STATISTICS FOR BUSINESS ANALYTICS
L T P C
3 0 0 3
Prerequisites:
Data mining and its concepts.
Objectives:
To identify the association between various types of data.
To apply statistical inference techniques.
To apply methods of inference to applied business situations.
To identify, build and validate appropriate statistical regression models.
Outcomes:
Text Book(s):
1. Robert Stine, Dean Foster, Statistics for Business: Decision Making and Analysis, Pearson Education, Second
Edition, 2013.
2. Paul Newbold, William L. Carlson, Betty Thorne, Statistics for Business and Economics, Pearson Education,
Sixth Edition, 2007.
Reference Book(s):
1. Keller Gerald, Statistics for Management and Economics, South Western, Tenth Edition, 2015.
57
CSEL 564: MARKETING ANALYTICS
L T P C
3 0 0 3
Prerequisites:
Objectives:
Learn how to tap a simple and cost-effective tool, Microsoft Excel, to solve specific business problems using
powerful analytic techniques.
Helps to forecast sales and improve response rates for marketing campaigns.
Explores how to optimize price points for products and services, optimize store layouts, and improve online
advertising.
Outcomes:
Cluster Analysis - User-Based Collaborative Filtering - Collaborative Filtering – Using Classification Trees for
Segmentation.
Text Book(s):
1. Wayne. L. Winston, Marketing Analytics: Data driven techniques with MS-Excel, Wiley, First Edition, 2014.
Reference Book(s):
1. Stephan Sorger, Marketing Analytics: Strategic models and metrics, CreateSpace Independent Publishing
Platform, First Edition, 2013.
58
CSEL 565: SOCIAL NETWORK ANALYTICS
L T P C
3 0 0 3
Prerequisites:
Nil.
Objectives:
Outcomes:
Ability to do Online interactive demonstrations and hands-on analysis of real-world data sets.
Module - III: Information Networks and The World Wide Web (9 hrs)
The Structure of the Web- World Wide Web- Information Networks, Hypertext, and Associative Memory- Web as a
Directed Graph, Bow-Tie Structure of the Web- Link Analysis and Web Search Searching the Web: Ranking, Link Analysis
using Hubs and Authorities- Page Rank- Link Analysis in Modern Web Search, Applications, Spectral Analysis, Random
Walks, and Web Search.
Text Book(s):
1. Easley and Kleinberg, Networks, Crowds, and Markets: Reasoning about a highly connected world,
Cambridge Univ. Press, 2010.
2. Robert A. Hanneman and Mark Riddle, Introduction to social network methods, University of California, 2005.
3. Jure Leskovec, Anand Rajaraman, Milliway Labs, Jeffrey D. Ullman, Mining of Massive Datasets, Cambridge
University Press, Second Edition, 2014.
Reference Book(s):
1. Wasserman, S., & Faust, K, Social Network Analysis: Methods and Applications, Cambridge University Press;
First Edition, 1994.
2. Borgatti, S. P., Everett, M. G., & Johnson, J. C., Analyzing social networks, SAGE Publications Ltd; First Edition,
2013.
3. John Scott, Social Network Analysis: A Handbook, SAGE Publications Ltd; Second Edition, 2000.
59
CSEL 566: RISK ANALYTICS
L T P C
3 0 0 3
Prerequisites:
Nil.
Objectives:
To understand the functioning of Banking and apply analytic techniques to mitigate risks.
To understand the operations of Insurance sector and apply analytic techniques to mitigate risks and
improve profitability.
To understand the processes involved in Healthcare industry and use data analysis to improve patient care
and optimize cost.
To understand human relationship management techniques for effective management of people.
Outcomes:
Reference Book(s):
1. Laura B. Madsen, Data-Driven Healthcare: How Analytics and BI are Transforming the Industry, John Wiley
& Sons, First Edition, 2014.
2. Jason Burke, Health Analytics: Gaining the Insights to Transform Health Care, John Wiley & Sons, 2013.
3. Jac Fitz-Enz , John R. Mattox II, Predictive Analytics for Human Resources, Wiley, 2014.
4. James C. Sesil, Applying Advanced Analytics to HR Management Decisions: Methods for Selection,
Developing Incentives, and Improving Collaboration, Pearson Education, 2017.
60
CSEL 567: DATABASE SYSTEMS IN BIG DATA
L T P C
3 0 0 3
Prerequisites:
Nil.
Objectives:
Outcomes:
61
Text Book(s):
1. Tom Plunkett, Brian Macdonald, Bruce Nelson, Oracle Big Data Handbook, (Oracle Press), Fujitsu
2. Madhu Jagadeesh, Soumendra Mohanty, Harsha Srivatsa, Big Data Imperatives: Enterprise Big Data
Warehouse, BI Implementations and Analytics, Apress, First Edition, 2013.
3. Frank J. Ohlhorst, Big Data Analytics: Turning Big Data into Big Money, Wiley Publishers, 2012.
Reference Book(s):
1. Cristian Molaro, Surekha Parekh, Terry Purcell, DB2 11: The Database for Big Data & Analytics, MC Press, 2013.
62
CSEL 568: STREAMING ANALYTICS
L T P C
3 0 0 3
Prerequisites:
Nil.
Objectives:
Outcomes:
Text Book(s):
1. Byron Ellis, Real-Time Analytics: Techniques to Analyze and Visualize Streaming Data, Wiley, First Edition, 2014.
2. Sherif Sakr, Large Scale and Big Data: Processing and Management, CRC Press, 2014.
3. Bill Franks, Taming, The Big Data Tidal Wave Finding Opportunities In Huge Data Streams With Advanced
Analytics, Wiley, 2012.
4. Jure Leskovec, Anand Rajaraman, Jeffrey D. Ullman, Mining of Massive Datasets, Cambridge University Press,
2014.
Reference Book(s):
1. Paul C Zikopoulos, Chris Eaton, Paul Zikopoulos, Understanding Big Data: Analytics for Enterprise Class
Hadoop and Streaming Data, McGraw-Hil, First Edition, 2011.
2. kafka.apache.org
3. flume.apache.org
63
CSEL 569: VIDEO PROCESSING AND ANALYTICS
L T P C
3 0 0 3
Prerequisites:
Objectives:
Outcomes:
Text Book(s):
1. Oges Marques, Practical Image and Video Processing Using MATLAB, Wiley-IEEE Press, 2011.
2. Michael Berthold, David J.Hand, Intelligent Data Analysis, Springer, 2007.
Reference Book(s):
1. Anand Rajaraman and Jeffrey David Ullman, Mining of Massive Datasets, Cambridge University Press, 2012.
64
STREAM 5:
NETWORK COMPUTING
65
CSEL 571: PRINCIPLES OF DISTRIBUTED COMPUTING
L T P C
3 0 0 3
Prerequisites:
Objectives:
To learn the principles, architectures, algorithms and programming models used in distributed systems.
To examine state-of-the-art distributed systems, such as JINI.
Outcomes:
Text Book(s):
1. Andrew S.Tanenbaum, Maarten van Steer, Distributed Systems Principles and Paradigms, Prentice Hall India,
2002.
Reference Book(s):
1. George Couloursis, Jean Dollomore and Tim Kinderberg, Distributed Systems - Concepts and Design, Addison
Wesley.
66
CSEL 571: INTRODUCTION TO PARALLEL COMPUTING
L T P C
3 0 0 3
Prerequisites:
Basic knowledge in computer architecture and computer networks.
Objectives:
To study various types of parallel computers and their architectures.
To describe the concepts underlying the design, implementation, and use of message-passing computing and
shared-memory computing.
To set up cluster computing systems, code and evaluate the performance of parallel programs.
Outcomes:
Text Book(s):
1. Ananth Grama, Anshul Gupta, George Karypis, Vipin Kumar, Introduction to Parallel Computing, , Pearson,
Second Edition, 2003.
Reference Book(s):
1. Peter S. Pacheco, An introduction to Parallel Programming, Morgan Kaufmann, First Edition, 2011.
2. Fayez Gebali, Algorithms and Parallel Computing, Wiley series, 2011.
67
CSEL 573: NETWORK DESIGN AND MANAGEMENT
L T P C
3 0 0 3
Prerequisites:
Basic knowledge in computer networks.
Objectives:
Learn design considerations for Layer 2 and Layer 3 components and network identity.
Understand design considerations for common applications such as DNS, mail, and web.
Identify the key roles and placement issues for network elements such as firewalls, intrusion detection
systems, VPN gateways.
Outcomes:
Ability to choose the various testing and optimizations strategies to select the technologies and devices for
current network design.
Text Book(s):
1. Steven T. Karris, Network Design and Management, Orchard Publications, 2002.
2. Teresa C. Piliouras, Network Design: Management and Technical Perspectives, Auerbach Publications,
Second Edition, 2004.
Reference Book(s):
1. Oppenheimer, Top-Down Network Design, CISCO, 2010.
2. Ralph J Tyser, S Raghavan, Telecommunications Network Design and Management, Springer Science Business
Media, 2014.
68
CSEL 574: WEB SERVICES COMPUTING
L T P C
3 0 0 3
Prerequisites:
Basic knowledge in Web Technology and Computer Networks.
Objectives:
To understand the details of Web services technologies: SOAP, WSDL, UDDI.
To learn how to implement and deploy web service clients and servers.
To explore interoperability between different frameworks.
To learn basic concepts of SOA.
Outcomes:
Text Book(s):
1. R. Nagappan, R. Skoczylas, R.P. Sriganesh, Developing Java Web Services, , Wiley India, 2008.
2. Eric Newcomer and Greg Lomow, Understanding SQA with Web Services, Pearson, 2009
3. James McGovern, Sameer Tyagi et.al., Java Web Service Architecture, Elsevier, 2009.
69
Reference Book(s):
1. S. Graham, Building Web Services with Java, Pearson, Second Edition, 2008.
2. D.A. Chappell & T. Jewell, Java Web Services, O’Reilly, SPD.
3. McGovern, et al., Java Neb Services Architecture, Morgan Kaufmann Publishers, 2005.
70
CSEL 575: PERVASIVE AND UBIQUITOUS COMPUTING
L T P C
3 0 0 3
Prerequisites:
Basic knowledge in Distributed systems.
Objectives:
to acquire a conceptual foundation in the area of Pervasive Computing aspects.
to provide a balanced treatment of the mechanisms and environments of pervasive computing.
Outcomes:
Text Book(s):
1. Symonds, Judith, ed. Ubiquitous and Pervasive Computing: Concepts, Methodologies, Tools, and Applications:
Concepts, Methodologies, Tools, and Applications. IGI Global, 2009.
Reference Book(s):
1. Bakhouya, Mohamed. Ubiquitous and pervasive computing: architectures and protocols for applications
design. Proceedings of the 3rd workshop on Agent-oriented software engineering challenges for ubiquitous
and pervasive computing. ACM, 2009.
71
CSEL 576: CLOUD COMPUTING
L T P C
3 0 0 3
Prerequisites:
Basic knowledge in distributed systems.
Objectives:
To analyze the components of cloud computing and its business perspective.
To evaluate the various cloud development tools.
To collaborate with real time cloud services.
Outcomes:
Text Book(s):
1. Rajkumar Buyya, James Broberg, Andrzej M. Goscinski, Cloud Computing: Principles and Paradigms, Wiley,
2011.
2. Ronald L. Krutz, Russell Dean Vines, Cloud Security: A Comprehensive Guide to Secure Cloud Computing, Wiley-
India, 2010.
72
Reference Book(s):
1. Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi, Mastering Cloud Computing, Mc Graw Hill Education,
2013.
2. Nikos Antonopoulos, Lee Gillam, Cloud Computing: Principles, Systems and Applications, Springer, 2012.
3. Barrie Sosinsky,Cloud Computing Bible, Wiley-India, 2010.
73
CSEL 577: INTERNET OF THINGS
L T P C
3 0 0 3
Prerequisites:
Basic knowledge in computer networks and working of sensors.
Objectives:
To understand IoT Market perspective.
To understand State of the Art – IoT Architecture.
To understand Real World IoT Design Constraints, Industrial Automation and Commercial Building
Automation in IoT.
Outcomes:
Text Book(s):
1. Jan Holler, VlasiosTsiatsis, Catherine Mulligan, Stefan Avesand, Stamatis Karnouskos, David Boyle, From
Machine-to-Machine to the Internet of Things: Introduction to a New Age of Intelligence, Academic Press,
First Edition, 2014.
Reference Book(s):
1. Vijay Madisetti and ArshdeepBahga, Internet of Things (A Hands-on-Approach), VPT, First Edition,2014.
2. Francis daCosta, Rethinking the Internet of Things: A Scalable Approach to Connecting Everything, Apress
Publications, First Edition, 2013.
74
STREAM 6:
ARTIFICIAL INTELLIGENCE
75
CSEL 581: INTRODUCTION TO ARTIFICIAL INTELLIGENCE AND EXPERT SYSTEMS
L T P C
3 0 0 3
Prerequisites:
Exposure to Algorithms, Data structure and Mathematical Logic.
Objectives:
Explore basic concepts of AI and expert systems.
Outcomes:
Text Book(s):
1. Stuart J Russell and Peter Norvig, Artificial Intelligence – A Modern Approach, PHI Learning, Third Edition,
2010.
2. Patterson W D, Introduction to Artificial Intelligence and Expert Systems, PHI Learning, First Edition, 1995.
Reference Book(s):
1. Elaine Rich and Kelvin Knight, Artificial Intelligence, TMH, Third Edition, 2009.
76
CSEL 582: NEURAL NETWORKS
L T P C
3 0 0 3
Prerequisites:
Knowledge in Artificial Intelligence.
Objectives:
Develop the skill in basic understanding on neural network.
Explore the Advanced methods of representing information in ANN.
Exposure to many real-world control problems.
Outcomes:
Text Book(s):
1. James A. Freeman and David M. Skapura, Neural Networks Algorithms, Applications, and Programming
Techniques, 2003, Addison Wesley, 2003.
2. LauranceFausett, Fundamentals of Neural Networks, 1992, Prentice hall.
3. C.M.Bishop, Neural networks and Pattern recognition, 2003, Oxford University
4. Mitchell Melanie, An Introduction to Genetic Algorithm,1996, MIT Press.
77
CSEL 583: FUZZY LOGIC
L T P C
3 0 0 3
Prerequisites:
Mathematical Foundation of Computer Science and probability theory.
Knowledge in programming languages.
Objectives:
To develop an elementary practical theory for automatic control of uncertain or imperfectly modelled
systems encountered in engineering applications.
To provide a basic exposition to the goals and methods of Fuzzy Logic.
Outcomes:
Reference Book(s):
1. G. J. Klir and T. A. Folger: Fuzzy Sets, Uncertainty, and Information, Prentice Hall, Englewood Cliffs, 1988
2. A. Kandel: Fuzzy Mathematical Techniques With Applications, Addison-Wesley, Englewood Cliffs, 1986.
3. J. C. Bezdek and S. K. Pal (Eds.): Fuzzy Models for Pattern Recognition – Methods that Search for Structures
in Data, IEEE Press, Los Alamos, California, 1992.
4. S. K. Pal and D. Dutta Majumder: Fuzzy Mathematical Approach to Pattern Recognition, John Wiley (Halsted
Press), New York, 1986.
5. M. M. Gupta: Fuzzy Mathematical Models with Applications to Engineering and Management Science, North
Holland, Amsterdam, 1988.
6. T. J. Ross: Fuzzy Logic With Engineering Applications, McGraw Hill, Singapore, 1997.
7. J. C.Bezdek, J. M. Keller, R. Krishnapuram, and N. R. Pal: Fuzzy Models and Algorithms for Pattern Recognition
and Image Processing, Kluwer Academic Publisher, Boston, 1999.
78
CSEL 584: DECISION SUPPORT SYSTEMS
L T P C
3 0 0 3
Prerequisites:
Exposure to AI and Mathematical Logic.
Objectives:
Explore basic concepts of DSS.
Outcomes:
Text Book(s):
1. E Turban, J E Aronson, Decision Support systems and Intelligent systems, 2005, Seventh Edition, Pearson
Education.
79
CSEL 585: INTRODUCTION TO MACHINE LEARNING
L T P C
3 0 0 3
Prerequisites:
Basic knowledge in artificial intelligence, learning activities.
Objectives:
To understand the concepts of machine learning.
To appreciate supervised and unsupervised learning and their applications.
To appreciate the concepts and algorithms of learning.
Outcomes:
Text Book(s):
1. Tom M. Mitchell, Machine learning, McGraw-Hill, 1997.
2. Ethem Alpaydin, Introduction to Machine Learning, MIT Press, Third Edition, 2014.
80
CSEL 586: INTRODUCTION TO ROBOTICS
L T P C
3 0 0 3
Prerequisites:
Mathematical Foundation of Computer Science.
Machine Learning.
Natural Language Processing.
Objectives:
To understand the different robotic configurations and their subsystems.
Outcomes:
Text Book(s):
1. Deb, S. R., Robotics Technology and Flexible Automation, Tata McGraw Hill publishing company limited, 1994.
2. Richard David Klafter, Thomas A. Chmielewski, Michael Negin, Robot Engineering: An integrated Approach,
Prentice Hall of India Pvt. Ltd, 1994.
Reference Book(s):
1. King Sun Fu, Rafael C. González, C. S. George Lee, Robotics: control, sensing, vision, and intelligence, McGraw-
Hill, 1987.
2. Craig, J. J, Introduction to Robotics: Mechanics and Control, Addison-Wesley, London, Third Edition, 2004.
3. M.P.Groover, M. Weins, R.N.Nage, N.C.Odrey, Industrial Robotics, McGraw Hill
4. K.D. Richard, Chmielewski T.A and Michael, Robotic Engineering, PHI Learning.
5. K.S. Fu Gonzalez, Lee, Robotics Control, Sensing, Vision and intelligence.
81
CSEL 587: SOFT COMPUTING
L T P C
Prerequisites: 3 0 0 3
Outcomes:
Ability to apply these techniques in applications which involve perception, reasoning and learning.
Reference Book(s):
1. Jang J.S.R.,Sun C.T and Mizutami E - Neuro Fuzzy and Soft Computing Prentice hall, New Jersey,1998.
2. Munakata, T.: Fundamentals of the New Artificial Intelligence, Springer-Verlag New York, Inc., 1998.
3. Goldberg, Introduction to Genetic Algorithms.
4. Jang, Nero-Fuzzy & Soft Computing, Pearsons.
5. Cordón, O., Herrera, F., Hoffman, F., Magdalena, L.: Genetic Fuzzy systems, World Scientific Publishing Co.
Pte. Ltd., 2001.
6. Kecman, V.: Learning and Soft Computing, The MIT Press, 2001.
7. Nih.J.Ndssen Artificial Intelligence, Harcourt Asia Ltd., 1998.
82
SKILL ENHANCEMENT COURSES
83
CSEL 541: STATISTICAL TOOLS
L T P C
Prerequisites:
1 0 2 2
Fundamentals of Statistics.
Objectives:
Understand the difference between descriptive & inferential statistics.
Understand the concepts of hypothesis testing: risks, p-value, confidence intervals, power.
Understand the importance of sample size calculations and the required input parameters.
Analyse data more quickly and more accurately.
Outcomes:
Ability to use the statistical tools for analysis.
Module - I:
Introduction- Statistics and its importance–Classification of variables -Importance of identifying the type & role of
variables -Descriptive statistics: Visualizing and summarizing data distributions -Frequency tables for categorical
variables- Pearson's correlation coefficient for continuous variables.
Module - II:
Plotting Data: Histograms, Scatter, box-plots, bar charts-Inferential statistics - Hypothesis testing principles: Null and
alternative hypothesis, one vs. two-tailed test.
Module - III:
Test statistics: T-test, F-tests - Observed significance level or p-value - Statistical significance & decision rules -The
importance of sample size calculations -Statistical inference with confidence Intervals -Numerical application to the
single sample case.
Text Book(s):
1. Allan G. Bluman, Elementary Statistics, 1992.
2. Dr. M.J de Smith, Statistical Analysis Handbook, 2014.
3. ARice, John. Mathematical Statistics and Data Analysis. Duxbury Press, 2006.
84
CSEL 542: WEB DESIGNING
L T P C
1 0 2 2
Prerequisites:
Fundamentals of Statistics.
Objectives:
Able to define the principle of Web page design and the basics in web design.
To Visualize the basic concept of HTML and recognize the elements of HTML.
Understand basics concept of CSS and web publishing.
Outcomes:
Ability to develop web applications.
Module - I:
Basics in Web Design – Brief History of Internet – What is World Wide Web – Why create a web site – Web Standards
– Audience requirement. HTML – Introduction to HTML – What is HTML – HTML Documents – Basic structure of an
HTML document – Creating an HTML document – Mark up Tags – Heading-Paragraphs – Line Breaks – HTML Tags.
Module - II:
Introduction to Cascading Style Sheets – Concept of CSS – Creating Style Sheet – CSS Properties – CSS
Styling(Background, Text Format, Controlling Fonts) – Working with block elements and objects – Working with Lists
and Tables – CSS Id and Class – Box Model(Introduction, Border properties, Padding Properties, Margin properties) –
CSS Color – Creating page Layout and Site Designs.
Module - III:
Introduction to Web Publishing or Hosting – Creating the Web Site – Saving the site – Working on the web site –
Creating web site structure – Creating Titles for web pages – Themes-Publishing web sites.
Text Book(s):
1. Thomas Powell, HTML& CSS: The Complete Reference, Mc Graw Hill, Fifth Edition, 2017.
85
CSEL 543: NETWORK MANAGEMENT TOOLS
L T P C
Prerequisites:
1 0 2 2
Basic knowledge about Computer Networks
Objectives:
To gain knowledge on how to install, maintain, and manage Local Area Networks and internetworks.
To understand network management architectures and protocols.
To use a variety of network management tools.
Outcomes:
Ability to use the network management tools for configuration, troubleshoot and maintenance.
Module - I:
Data Communications and Network Management Overview-Review of Computer Network Technology
Module - II:
Basic Foundations: Standards, Models, and Language - Network Management Tools and Systems -Network
Management Applications -Web-Based Management
Module - III:
OpUtils - Network Management Tools - Case study on Designing and Managing a Network
Reference Material(s):
1. Network Management: Principles and Practice; by Mani Subramanian; Addison Wesley; 2000; ISBN 0- 201-
35742-9.
2. The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage by Clifford Stoll Pocket Books ISBN
0671726889.
86
CSEL 544: DATA MINING TOOLS
L T P C
Prerequisites: 1 0 2 2
Nil.
Objectives:
To introduce students to the basic concepts and techniques of Data Mining.
To develop skills of using recent data mining software for solving practical problems.
To gain experience of doing independent study and research.
Outcomes:
Ability to use the tools for data analysis.
Module - I:
Introduction to Data Mining - Related technologies - Machine Learning, DBMS, OLAP, Statistics - Data Mining Goals -
Stages of the Data Mining Process - Data Mining Techniques Knowledge Representation Methods - Data Warehouse
and OLAP Data Warehouse and DBMS Multidimensional data model OLAP operations - Data preprocessing - Data
cleaning - Data transformation - Data reduction.
Module - II:
Discretization and generating concept hierarchies - Installing Weka 3 Data Mining System - Experiments with Weka -
filters, discretization - Data mining knowledge representation - Task relevant data - Background knowledge -
Interestingness measures Representing input data and output knowledge Visualization techniques
- Experiments with Weka - visualization - Attribute-oriented analysis - Attribute generalization - Attribute relevance
Class comparison Statistical measures - Experiments with Weka - using filters and statistics.
Module - III:
Experiments with Weka - training and testing - Mining real data - Preprocessing data from a real medical domain.
Applying various data mining techniques to create a comprehensive and accurate model of the data. Clustering - Basic
issues in clustering First conceptual clustering system: Cluster/2 - Partitioning methods: k-means, expectation
maximization (EM) - Hierarchical methods: distance-based agglomerative and divisible clustering - Conceptual
clustering: Cobweb.
Required Software:
• Weka - Data Mining System with Free Open Source Machine Learning Software in Java.
Data Sets
• IDS data sets
• Data Sets for Data Mining
• Competition Data Set
• UCI Machine learning repository
• Quest data repository
• KDNuggets
87
Reference Book(s):
1. Pang-Ning Tan, Michael Steinbach, and Vipin Kumar, Introduction to Data Mining, 2005.
2. Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, 2000.
88
CSEL 545: DATA VISUALIZATION TOOLS
L T P C
1 0 2 2
Prerequisites:
Prior experience in image editing or object-oriented programming may lead to a more sophisticated final project
but is not required.
Objectives:
To introduce visual perception and core skills for visual analysis
To understand visualization for time-series analysis and ranking analysis
To understand visualization for deviation analysis
To understand visualization for distribution analysis and correlation analysis
To understand visualization for multivariate analysis
To understand issues and best practices in information dashboard design
Outcomes:
Ability to use the tools for data visualization.
Reference Book(s):
1. Stephen Few, Now you see it: Simple Visualization techniques for quantitative analysis, Analytics Press, 2009.
2. Stephen Few, Information Dashboard Design: The effective visual communication of data, O'Reilly, 2006.
3. Edward R. Tufte, The visual display of quantitative information, Second Edition, Graphics Press, 2001.
4. Nathan Yau, Data Points: Visualization that means something, Wiley, 2013.
5. Ben Fry, Visualizing data: Exploring and explaining data with the processing environment, O'Reilly, 2008.
6. Gert H. N. Laursen and Jesper Thorlund, Business Analytics for Managers: Taking business intelligence beyond
reporting, Wiley, 2010.
7. Evan Stubbs, The value of business analytics: Identifying the path to profitability, Wiley, 2011.
89
CSEL 546: CLOUD COMPUTING TOOLS
L T P C
Prerequisites: 1 0 2 2
Nil
Objectives:
Analyze the components of cloud computing showing how business agility in an organization can be created
Evaluate the deployment of web services from cloud architecture
Critique the consistency of services deployed from a cloud architecture
Compare and contrast the economic benefits delivered by various cloud models based on application
requirements, economic constraints and business requirements.
Outcomes:
Ability to use the tools for simulating cloud computing applications.
Text Book(s):
1. Paul J. Deitel, Harvey Deitel, Abbey Deitel, Internet and World Wide Web How to Program, Fifth Edition, 2011.
2. Chris Bates, Web Programming – Building Intranet applications, Wiley Publications, Third Edition, 2009.
Reference Book(s):
1. Jeffrey C. Jackson, Web Technologies a Computer Science Perspective, Pearson, 2011.
2. Eilliote, Rusty Harold, Java Network Programming, O'Reilly Media, Third Edition, 2004.
3. Kogent Solutions, Java server programming java JavaEE5 Black Book, Dreamtech Press, 2012.
90
CSEL 547: BIG DATA TOOLS
L T P C
Prerequisites: 1 0 2 2
Processing Big Data with Apache Hadoop.
Objectives:
To enables immediate and effective participation in big data projects.
To learn the basic and advanced methods to big data technology and tools, including MapReduce and
Hadoop and its ecosystem.
Outcomes:
Ability to use the tools for big data analysis.
Software(s):
Apache, Hadoop
Reference Book(s):
1. Boris lublinsky, Kevin t. Smith, Alexey Yakubovich, Professional Hadoop Solutions, Wiley, 2015.
2. Chris Eaton, Dirk deroos et al., Understanding Big data, McGraw Hill, 2012.
3. Tom White, HADOOP: The definitive Guide, O’Reilly 2012.
91
CSEL 548: INTERNET OF THINGS (IoT) TOOLS
L T P C
1 0 2 2
Prerequisites:
Nil
Objectives:
To understand the fundamentals of Internet of Things.
To build a small low-cost embedded system using Arduino / Raspberry Pi or equivalent boards.
To apply the concept of Internet of Things in the real-world scenario.
Outcomes:
Ability to use the tools to simulate IoT applications.
Reference Book(s):
1. Arshdeep Bahga, Vijay Madisetti, Internet of Things – A hands-on approach, Universities Press, 2015.
2. Manoel Carlos Ramon, Intel® Galileo and Intel® Galileo Gen 2: API Features and Arduino Projects for Linux
Programmers, Apress, 2014.
3. Marco Schwartz, Internet of Things with the Arduino Yun, Packt Publishing, 2014.
4. Vijay Madisetti, Arshdeep Bahga, Internet of Things: A Hands-On Approach.
5. Waltenegus Dargie,Christian Poellabauer, Fundamentals of Wireless Sensor Networks: Theory and Practice.
92